From 474e469bbd056aebcf7e7d3207ef820f2faed4ce Mon Sep 17 00:00:00 2001 From: Rich Salz Date: Tue, 27 Jan 2015 12:34:45 -0500 Subject: OPENSSL_NO_xxx cleanup: SHA Remove support for SHA0 and DSS0 (they were broken), and remove the ability to attempt to build without SHA (it didn't work). For simplicity, remove the option of not building various SHA algorithms; you could argue that SHA_224/256/384/512 should be kept, since they're like crypto algorithms, but I decided to go the other way. So these options are gone: GENUINE_DSA OPENSSL_NO_SHA0 OPENSSL_NO_SHA OPENSSL_NO_SHA1 OPENSSL_NO_SHA224 OPENSSL_NO_SHA256 OPENSSL_NO_SHA384 OPENSSL_NO_SHA512 Reviewed-by: Richard Levitte --- engines/e_sureware.c | 2 -- 1 file changed, 2 deletions(-) (limited to 'engines') diff --git a/engines/e_sureware.c b/engines/e_sureware.c index dc3e21f56e..aae568ab71 100644 --- a/engines/e_sureware.c +++ b/engines/e_sureware.c @@ -946,13 +946,11 @@ static int surewarehk_rsa_priv_dec(int flen, const unsigned char *from, } memcpy(buf, to, tlen); /* transfert to into buf */ switch (padding) { /* check padding in software */ -# ifndef OPENSSL_NO_SHA case RSA_PKCS1_OAEP_PADDING: ret = RSA_padding_check_PKCS1_OAEP(to, tlen, (unsigned char *)buf, tlen, tlen, NULL, 0); break; -# endif case RSA_SSLV23_PADDING: ret = RSA_padding_check_SSLv23(to, tlen, (unsigned char *)buf, flen, -- cgit v1.2.3