@@ -58,18 +58,18 @@ static int send_raw_packet(SSL *ssl, uint8_t protocol);
58
58
* ciphers are listed. This order is defined at compile time.
59
59
*/
60
60
#ifdef CONFIG_SSL_SKELETON_MODE
61
- const uint8_t ssl_prot_prefs [NUM_PROTOCOLS ] =
61
+ const uint8_t ssl_prot_prefs [NUM_PROTOCOLS ] =
62
62
{ SSL_RC4_128_SHA };
63
63
#else
64
64
static void session_free (SSL_SESSION * ssl_sessions [], int sess_index );
65
65
66
- const uint8_t ssl_prot_prefs [NUM_PROTOCOLS ] =
66
+ const uint8_t ssl_prot_prefs [NUM_PROTOCOLS ] =
67
67
#ifdef CONFIG_SSL_PROT_LOW /* low security, fast speed */
68
- { SSL_RC4_128_SHA , SSL_AES128_SHA , SSL_AES256_SHA , SSL_RC4_128_MD5 };
68
+ { SSL_AES128_SHA , SSL_AES256_SHA };
69
69
#elif CONFIG_SSL_PROT_MEDIUM /* medium security, medium speed */
70
- { SSL_AES128_SHA , SSL_AES256_SHA , SSL_RC4_128_SHA , SSL_RC4_128_MD5 };
70
+ { SSL_AES128_SHA , SSL_AES256_SHA };
71
71
#else /* CONFIG_SSL_PROT_HIGH */ /* high security, low speed */
72
- { SSL_AES256_SHA , SSL_AES128_SHA , SSL_RC4_128_SHA , SSL_RC4_128_MD5 };
72
+ { SSL_AES256_SHA , SSL_AES128_SHA };
73
73
#endif
74
74
#endif /* CONFIG_SSL_SKELETON_MODE */
75
75
@@ -108,40 +108,14 @@ static const cipher_info_t cipher_info[NUM_PROTOCOLS] =
108
108
{ /* AES256-SHA */
109
109
SSL_AES256_SHA , /* AES256-SHA */
110
110
32 , /* key size */
111
- 16 , /* iv size */
111
+ 16 , /* iv size */
112
112
2 * (SHA1_SIZE + 32 + 16 ), /* key block size */
113
113
16 , /* block padding size */
114
114
SHA1_SIZE , /* digest size */
115
115
hmac_sha1 , /* hmac algorithm */
116
116
(crypt_func )AES_cbc_encrypt , /* encrypt */
117
117
(crypt_func )AES_cbc_decrypt /* decrypt */
118
- },
119
- { /* RC4-SHA */
120
- SSL_RC4_128_SHA , /* RC4-SHA */
121
- 16 , /* key size */
122
- 0 , /* iv size */
123
- 2 * (SHA1_SIZE + 16 ), /* key block size */
124
- 0 , /* no padding */
125
- SHA1_SIZE , /* digest size */
126
- hmac_sha1 , /* hmac algorithm */
127
- (crypt_func )RC4_crypt , /* encrypt */
128
- (crypt_func )RC4_crypt /* decrypt */
129
- },
130
- /*
131
- * This protocol is from SSLv2 days and is unlikely to be used - but was
132
- * useful for testing different possible digest algorithms.
133
- */
134
- { /* RC4-MD5 */
135
- SSL_RC4_128_MD5 , /* RC4-MD5 */
136
- 16 , /* key size */
137
- 0 , /* iv size */
138
- 2 * (MD5_SIZE + 16 ), /* key block size */
139
- 0 , /* no padding */
140
- MD5_SIZE , /* digest size */
141
- hmac_md5 , /* hmac algorithm */
142
- (crypt_func )RC4_crypt , /* encrypt */
143
- (crypt_func )RC4_crypt /* decrypt */
144
- },
118
+ }
145
119
};
146
120
#endif
147
121
0 commit comments