djm@openbsd.org | 04c091f | 2019-01-19 21:43:56 +0000 | [diff] [blame] | 1 | /* $OpenBSD: kex.h,v 1.94 2019/01/19 21:43:56 djm Exp $ */ |
Ben Lindstrom | 36579d3 | 2001-01-29 07:39:26 +0000 | [diff] [blame] | 2 | |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 3 | /* |
Ben Lindstrom | 4469723 | 2001-07-04 03:32:30 +0000 | [diff] [blame] | 4 | * Copyright (c) 2000, 2001 Markus Friedl. All rights reserved. |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 5 | * |
| 6 | * Redistribution and use in source and binary forms, with or without |
| 7 | * modification, are permitted provided that the following conditions |
| 8 | * are met: |
| 9 | * 1. Redistributions of source code must retain the above copyright |
| 10 | * notice, this list of conditions and the following disclaimer. |
| 11 | * 2. Redistributions in binary form must reproduce the above copyright |
| 12 | * notice, this list of conditions and the following disclaimer in the |
| 13 | * documentation and/or other materials provided with the distribution. |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 14 | * |
| 15 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
| 16 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 17 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
| 18 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
| 19 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
| 20 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
| 21 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
| 22 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 23 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
| 24 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 25 | */ |
| 26 | #ifndef KEX_H |
| 27 | #define KEX_H |
| 28 | |
markus@openbsd.org | 128343b | 2015-01-13 19:31:40 +0000 | [diff] [blame] | 29 | #include "mac.h" |
| 30 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 31 | #ifdef WITH_LEAKMALLOC |
| 32 | #include "leakmalloc.h" |
Darren Tucker | 8ccb739 | 2010-09-10 12:28:24 +1000 | [diff] [blame] | 33 | #endif |
Damien Miller | d8337c5 | 2006-07-24 14:14:19 +1000 | [diff] [blame] | 34 | |
Damien Miller | 773dda2 | 2015-01-30 23:10:17 +1100 | [diff] [blame] | 35 | #ifdef WITH_OPENSSL |
| 36 | # ifdef OPENSSL_HAS_ECC |
| 37 | # include <openssl/ec.h> |
| 38 | # else /* OPENSSL_HAS_ECC */ |
| 39 | # define EC_KEY void |
| 40 | # define EC_GROUP void |
| 41 | # define EC_POINT void |
| 42 | # endif /* OPENSSL_HAS_ECC */ |
| 43 | #else /* WITH_OPENSSL */ |
Damien Miller | eef1447 | 2018-07-12 14:49:26 +1000 | [diff] [blame] | 44 | # define DH void |
| 45 | # define BIGNUM void |
Damien Miller | 773dda2 | 2015-01-30 23:10:17 +1100 | [diff] [blame] | 46 | # define EC_KEY void |
| 47 | # define EC_GROUP void |
| 48 | # define EC_POINT void |
| 49 | #endif /* WITH_OPENSSL */ |
| 50 | |
Darren Tucker | 5b48cdd | 2009-06-21 18:15:25 +1000 | [diff] [blame] | 51 | #define KEX_COOKIE_LEN 16 |
| 52 | |
djm@openbsd.org | b97739d | 2016-09-22 21:15:41 +0000 | [diff] [blame] | 53 | #define KEX_DH1 "diffie-hellman-group1-sha1" |
| 54 | #define KEX_DH14_SHA1 "diffie-hellman-group14-sha1" |
| 55 | #define KEX_DH14_SHA256 "diffie-hellman-group14-sha256" |
| 56 | #define KEX_DH16_SHA512 "diffie-hellman-group16-sha512" |
| 57 | #define KEX_DH18_SHA512 "diffie-hellman-group18-sha512" |
| 58 | #define KEX_DHGEX_SHA1 "diffie-hellman-group-exchange-sha1" |
| 59 | #define KEX_DHGEX_SHA256 "diffie-hellman-group-exchange-sha256" |
| 60 | #define KEX_ECDH_SHA2_NISTP256 "ecdh-sha2-nistp256" |
| 61 | #define KEX_ECDH_SHA2_NISTP384 "ecdh-sha2-nistp384" |
| 62 | #define KEX_ECDH_SHA2_NISTP521 "ecdh-sha2-nistp521" |
| 63 | #define KEX_CURVE25519_SHA256 "curve25519-sha256" |
| 64 | #define KEX_CURVE25519_SHA256_OLD "curve25519-sha256@libssh.org" |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 65 | |
Damien Miller | 9786e6e | 2005-07-26 21:54:56 +1000 | [diff] [blame] | 66 | #define COMP_NONE 0 |
sf@openbsd.org | 984bacf | 2018-07-10 09:36:58 +0000 | [diff] [blame] | 67 | /* pre-auth compression (COMP_ZLIB) is only supported in the client */ |
sf@openbsd.org | ab39267 | 2018-07-06 09:06:14 +0000 | [diff] [blame] | 68 | #define COMP_ZLIB 1 |
sf@openbsd.org | 168b46f | 2018-07-09 13:37:10 +0000 | [diff] [blame] | 69 | #define COMP_DELAYED 2 |
Damien Miller | 9786e6e | 2005-07-26 21:54:56 +1000 | [diff] [blame] | 70 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 71 | #define CURVE25519_SIZE 32 |
| 72 | |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 73 | enum kex_init_proposals { |
| 74 | PROPOSAL_KEX_ALGS, |
| 75 | PROPOSAL_SERVER_HOST_KEY_ALGS, |
| 76 | PROPOSAL_ENC_ALGS_CTOS, |
| 77 | PROPOSAL_ENC_ALGS_STOC, |
| 78 | PROPOSAL_MAC_ALGS_CTOS, |
| 79 | PROPOSAL_MAC_ALGS_STOC, |
| 80 | PROPOSAL_COMP_ALGS_CTOS, |
| 81 | PROPOSAL_COMP_ALGS_STOC, |
| 82 | PROPOSAL_LANG_CTOS, |
| 83 | PROPOSAL_LANG_STOC, |
| 84 | PROPOSAL_MAX |
| 85 | }; |
| 86 | |
| 87 | enum kex_modes { |
| 88 | MODE_IN, |
| 89 | MODE_OUT, |
| 90 | MODE_MAX |
| 91 | }; |
| 92 | |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 93 | enum kex_exchange { |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 94 | KEX_DH_GRP1_SHA1, |
Damien Miller | f675fc4 | 2004-06-15 10:30:09 +1000 | [diff] [blame] | 95 | KEX_DH_GRP14_SHA1, |
djm@openbsd.org | 0e8eeec | 2016-05-02 10:26:04 +0000 | [diff] [blame] | 96 | KEX_DH_GRP14_SHA256, |
| 97 | KEX_DH_GRP16_SHA512, |
| 98 | KEX_DH_GRP18_SHA512, |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 99 | KEX_DH_GEX_SHA1, |
Damien Miller | a63128d | 2006-03-15 12:08:28 +1100 | [diff] [blame] | 100 | KEX_DH_GEX_SHA256, |
Damien Miller | eb8b60e | 2010-08-31 22:41:14 +1000 | [diff] [blame] | 101 | KEX_ECDH_SHA2, |
Damien Miller | 1e12426 | 2013-11-04 08:26:52 +1100 | [diff] [blame] | 102 | KEX_C25519_SHA256, |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 103 | KEX_MAX |
Damien Miller | 874d77b | 2000-10-14 16:23:11 +1100 | [diff] [blame] | 104 | }; |
Kevin Steves | ef4eea9 | 2001-02-05 12:42:17 +0000 | [diff] [blame] | 105 | |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 106 | #define KEX_INIT_SENT 0x0001 |
djm@openbsd.org | a6a0788 | 2018-12-07 03:39:40 +0000 | [diff] [blame] | 107 | #define KEX_INITIAL 0x0002 |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 108 | |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 109 | struct sshenc { |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 110 | char *name; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 111 | const struct sshcipher *cipher; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 112 | int enabled; |
Damien Miller | 963f6b2 | 2002-02-19 15:21:23 +1100 | [diff] [blame] | 113 | u_int key_len; |
Damien Miller | 1d75abf | 2013-01-09 16:12:19 +1100 | [diff] [blame] | 114 | u_int iv_len; |
Damien Miller | 963f6b2 | 2002-02-19 15:21:23 +1100 | [diff] [blame] | 115 | u_int block_size; |
Ben Lindstrom | 46c1622 | 2000-12-22 01:43:59 +0000 | [diff] [blame] | 116 | u_char *key; |
| 117 | u_char *iv; |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 118 | }; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 119 | struct sshcomp { |
| 120 | u_int type; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 121 | int enabled; |
| 122 | char *name; |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 123 | }; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 124 | struct newkeys { |
| 125 | struct sshenc enc; |
| 126 | struct sshmac mac; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 127 | struct sshcomp comp; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 128 | }; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 129 | |
| 130 | struct ssh; |
| 131 | |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 132 | struct kex { |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 133 | u_char *session_id; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 134 | size_t session_id_len; |
| 135 | struct newkeys *newkeys[MODE_MAX]; |
Damien Miller | eccb9de | 2005-06-17 12:59:34 +1000 | [diff] [blame] | 136 | u_int we_need; |
Damien Miller | 76eea4a | 2014-01-26 09:37:25 +1100 | [diff] [blame] | 137 | u_int dh_need; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 138 | int server; |
| 139 | char *name; |
markus@openbsd.org | 76c9fbb | 2015-12-04 16:41:28 +0000 | [diff] [blame] | 140 | char *hostkey_alg; |
Ben Lindstrom | 2d90e00 | 2001-04-04 02:00:54 +0000 | [diff] [blame] | 141 | int hostkey_type; |
djm@openbsd.org | 5104db7 | 2015-01-26 06:10:03 +0000 | [diff] [blame] | 142 | int hostkey_nid; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 143 | u_int kex_type; |
djm@openbsd.org | 4ba0d54 | 2018-07-03 11:39:54 +0000 | [diff] [blame] | 144 | char *server_sig_algs; |
markus@openbsd.org | 76c9fbb | 2015-12-04 16:41:28 +0000 | [diff] [blame] | 145 | int ext_info_c; |
markus@openbsd.org | 091c302 | 2015-01-19 19:52:16 +0000 | [diff] [blame] | 146 | struct sshbuf *my; |
| 147 | struct sshbuf *peer; |
djm@openbsd.org | 0a843d9 | 2018-12-27 03:25:24 +0000 | [diff] [blame] | 148 | struct sshbuf *client_version; |
| 149 | struct sshbuf *server_version; |
Damien Miller | 97c91f6 | 2006-04-23 12:08:37 +1000 | [diff] [blame] | 150 | sig_atomic_t done; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 151 | u_int flags; |
Damien Miller | b3051d0 | 2014-01-10 10:58:53 +1100 | [diff] [blame] | 152 | int hash_alg; |
Damien Miller | ea11119 | 2013-04-23 19:24:32 +1000 | [diff] [blame] | 153 | int ec_nid; |
djm@openbsd.org | f319912 | 2015-07-29 04:43:06 +0000 | [diff] [blame] | 154 | char *failed_choice; |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 155 | int (*verify_host_key)(struct sshkey *, struct ssh *); |
djm@openbsd.org | 5104db7 | 2015-01-26 06:10:03 +0000 | [diff] [blame] | 156 | struct sshkey *(*load_host_public_key)(int, int, struct ssh *); |
| 157 | struct sshkey *(*load_host_private_key)(int, int, struct ssh *); |
djm@openbsd.org | 523463a | 2015-02-16 22:13:32 +0000 | [diff] [blame] | 158 | int (*host_key_index)(struct sshkey *, int, struct ssh *); |
djm@openbsd.org | 04c091f | 2019-01-19 21:43:56 +0000 | [diff] [blame] | 159 | int (*sign)(struct ssh *, struct sshkey *, struct sshkey *, |
| 160 | u_char **, size_t *, const u_char *, size_t, const char *); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 161 | int (*kex[KEX_MAX])(struct ssh *); |
| 162 | /* kex specific state */ |
| 163 | DH *dh; /* DH */ |
| 164 | u_int min, max, nbits; /* GEX */ |
| 165 | EC_KEY *ec_client_key; /* ECDH */ |
| 166 | const EC_GROUP *ec_group; /* ECDH */ |
| 167 | u_char c25519_client_key[CURVE25519_SIZE]; /* 25519 */ |
| 168 | u_char c25519_client_pubkey[CURVE25519_SIZE]; /* 25519 */ |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 169 | }; |
| 170 | |
Damien Miller | d5f62bf | 2010-09-24 22:11:14 +1000 | [diff] [blame] | 171 | int kex_names_valid(const char *); |
Damien Miller | 690d989 | 2013-11-08 12:16:49 +1100 | [diff] [blame] | 172 | char *kex_alg_list(char); |
djm@openbsd.org | f9eca24 | 2015-07-30 00:01:34 +0000 | [diff] [blame] | 173 | char *kex_names_cat(const char *, const char *); |
djm@openbsd.org | 312d2f2 | 2018-07-04 13:49:31 +0000 | [diff] [blame] | 174 | int kex_assemble_names(char **, const char *, const char *); |
Damien Miller | d5f62bf | 2010-09-24 22:11:14 +1000 | [diff] [blame] | 175 | |
djm@openbsd.org | 0a843d9 | 2018-12-27 03:25:24 +0000 | [diff] [blame] | 176 | int kex_exchange_identification(struct ssh *, int, const char *); |
| 177 | |
| 178 | struct kex *kex_new(void); |
| 179 | int kex_ready(struct ssh *, char *[PROPOSAL_MAX]); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 180 | int kex_setup(struct ssh *, char *[PROPOSAL_MAX]); |
| 181 | void kex_free_newkeys(struct newkeys *); |
| 182 | void kex_free(struct kex *); |
Ben Lindstrom | 238abf6 | 2001-04-04 17:52:53 +0000 | [diff] [blame] | 183 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 184 | int kex_buf2prop(struct sshbuf *, int *, char ***); |
| 185 | int kex_prop2buf(struct sshbuf *, char *proposal[PROPOSAL_MAX]); |
| 186 | void kex_prop_free(char **); |
| 187 | |
| 188 | int kex_send_kexinit(struct ssh *); |
markus@openbsd.org | 2ae666a | 2017-05-30 14:23:52 +0000 | [diff] [blame] | 189 | int kex_input_kexinit(int, u_int32_t, struct ssh *); |
| 190 | int kex_input_ext_info(int, u_int32_t, struct ssh *); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 191 | int kex_derive_keys(struct ssh *, u_char *, u_int, const struct sshbuf *); |
| 192 | int kex_derive_keys_bn(struct ssh *, u_char *, u_int, const BIGNUM *); |
| 193 | int kex_send_newkeys(struct ssh *); |
djm@openbsd.org | 19bcf2e | 2016-02-08 10:57:07 +0000 | [diff] [blame] | 194 | int kex_start_rekex(struct ssh *); |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 195 | |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 196 | int kexdh_client(struct ssh *); |
| 197 | int kexdh_server(struct ssh *); |
| 198 | int kexgex_client(struct ssh *); |
| 199 | int kexgex_server(struct ssh *); |
| 200 | int kexecdh_client(struct ssh *); |
| 201 | int kexecdh_server(struct ssh *); |
| 202 | int kexc25519_client(struct ssh *); |
| 203 | int kexc25519_server(struct ssh *); |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 204 | |
djm@openbsd.org | 0a843d9 | 2018-12-27 03:25:24 +0000 | [diff] [blame] | 205 | int kex_dh_hash(int, const struct sshbuf *, const struct sshbuf *, |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 206 | const u_char *, size_t, const u_char *, size_t, const u_char *, size_t, |
| 207 | const BIGNUM *, const BIGNUM *, const BIGNUM *, u_char *, size_t *); |
Damien Miller | 1e12426 | 2013-11-04 08:26:52 +1100 | [diff] [blame] | 208 | |
djm@openbsd.org | 0a843d9 | 2018-12-27 03:25:24 +0000 | [diff] [blame] | 209 | int kexgex_hash(int, const struct sshbuf *, const struct sshbuf *, |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 210 | const u_char *, size_t, const u_char *, size_t, const u_char *, size_t, |
| 211 | int, int, int, |
| 212 | const BIGNUM *, const BIGNUM *, const BIGNUM *, |
| 213 | const BIGNUM *, const BIGNUM *, |
| 214 | u_char *, size_t *); |
| 215 | |
djm@openbsd.org | 0a843d9 | 2018-12-27 03:25:24 +0000 | [diff] [blame] | 216 | int kex_ecdh_hash(int, const EC_GROUP *, |
| 217 | const struct sshbuf *, const struct sshbuf *, |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 218 | const u_char *, size_t, const u_char *, size_t, const u_char *, size_t, |
| 219 | const EC_POINT *, const EC_POINT *, const BIGNUM *, u_char *, size_t *); |
| 220 | |
djm@openbsd.org | 0a843d9 | 2018-12-27 03:25:24 +0000 | [diff] [blame] | 221 | int kex_c25519_hash(int, const struct sshbuf *, const struct sshbuf *, |
djm@openbsd.org | 1a31d02 | 2016-05-02 08:49:03 +0000 | [diff] [blame] | 222 | const u_char *, size_t, const u_char *, size_t, |
| 223 | const u_char *, size_t, const u_char *, const u_char *, |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 224 | const u_char *, size_t, u_char *, size_t *); |
| 225 | |
| 226 | void kexc25519_keygen(u_char key[CURVE25519_SIZE], u_char pub[CURVE25519_SIZE]) |
Damien Miller | 686c7d9 | 2014-05-15 14:37:03 +1000 | [diff] [blame] | 227 | __attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE))) |
| 228 | __attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE))); |
markus@openbsd.org | 57d10cb | 2015-01-19 20:16:15 +0000 | [diff] [blame] | 229 | int kexc25519_shared_key(const u_char key[CURVE25519_SIZE], |
| 230 | const u_char pub[CURVE25519_SIZE], struct sshbuf *out) |
Damien Miller | 686c7d9 | 2014-05-15 14:37:03 +1000 | [diff] [blame] | 231 | __attribute__((__bounded__(__minbytes__, 1, CURVE25519_SIZE))) |
| 232 | __attribute__((__bounded__(__minbytes__, 2, CURVE25519_SIZE))); |
Damien Miller | 8e7fb33 | 2003-02-24 12:03:03 +1100 | [diff] [blame] | 233 | |
Damien Miller | eb8b60e | 2010-08-31 22:41:14 +1000 | [diff] [blame] | 234 | #if defined(DEBUG_KEX) || defined(DEBUG_KEXDH) || defined(DEBUG_KEXECDH) |
Ben Lindstrom | 16ae3d0 | 2001-07-04 04:02:36 +0000 | [diff] [blame] | 235 | void dump_digest(char *, u_char *, int); |
Ben Lindstrom | 20d7c7b | 2001-04-04 01:56:17 +0000 | [diff] [blame] | 236 | #endif |
| 237 | |
Damien Miller | 773dda2 | 2015-01-30 23:10:17 +1100 | [diff] [blame] | 238 | #if !defined(WITH_OPENSSL) || !defined(OPENSSL_HAS_ECC) |
| 239 | # undef EC_KEY |
| 240 | # undef EC_GROUP |
| 241 | # undef EC_POINT |
| 242 | #endif |
| 243 | |
Damien Miller | 33b1356 | 2000-04-04 14:38:59 +1000 | [diff] [blame] | 244 | #endif |