aboutsummaryrefslogtreecommitdiff
path: root/src/pki_crypto.c
diff options
context:
space:
mode:
authorAnderson Toshiyuki Sasaki <ansasaki@redhat.com>2019-04-24 15:17:45 +0200
committerAndreas Schneider <asn@cryptomilk.org>2019-05-13 16:37:51 +0200
commit01e98a6df7583960d17f914d4ede4905e4d388c3 (patch)
tree803b9647dee74195d76e43488c1e42f86eea7e95 /src/pki_crypto.c
parentdbf3f962a4f5fb9ec6e5718bfc2778d685c038f5 (diff)
downloadlibssh-01e98a6df7583960d17f914d4ede4905e4d388c3.tar.gz
libssh-01e98a6df7583960d17f914d4ede4905e4d388c3.tar.xz
libssh-01e98a6df7583960d17f914d4ede4905e4d388c3.zip
pki: Remove duplicate and unused code
Remove duplicate code previously used only in server side to generate signatures. Currently the code used to generate the signature is the same for both client and server. Signed-off-by: Anderson Toshiyuki Sasaki <ansasaki@redhat.com> Reviewed-by: Jakub Jelen <jjelen@redhat.com> Reviewed-by: Andreas Schneider <asn@cryptomilk.org>
Diffstat (limited to 'src/pki_crypto.c')
-rw-r--r--src/pki_crypto.c61
1 files changed, 0 insertions, 61 deletions
diff --git a/src/pki_crypto.c b/src/pki_crypto.c
index a06b6bfc..8b8fb8d2 100644
--- a/src/pki_crypto.c
+++ b/src/pki_crypto.c
@@ -2014,65 +2014,4 @@ ssh_signature pki_do_sign_hash(const ssh_key privkey,
return sig;
}
-#ifdef WITH_SERVER
-ssh_signature pki_do_sign_sessionid_hash(const ssh_key key,
- const unsigned char *hash,
- size_t hlen,
- enum ssh_digest_e hash_type)
-{
- ssh_signature sig;
-
- /* Only RSA supports different signature algorithm types now */
- if (key->type != SSH_KEYTYPE_RSA && hash_type != SSH_DIGEST_AUTO) {
- SSH_LOG(SSH_LOG_WARN, "Incompatible signature algorithm passed");
- return NULL;
- }
-
- sig = ssh_signature_new();
- if (sig == NULL) {
- return NULL;
- }
-
- sig->type = key->type;
- sig->type_c = ssh_key_signature_to_char(key->type, hash_type);
-
- switch(key->type) {
- case SSH_KEYTYPE_DSS:
- sig->dsa_sig = DSA_do_sign(hash, hlen, key->dsa);
- if (sig->dsa_sig == NULL) {
- ssh_signature_free(sig);
- return NULL;
- }
- break;
- case SSH_KEYTYPE_RSA:
- case SSH_KEYTYPE_RSA1:
- sig->rsa_sig = _RSA_do_sign_hash(hash, hlen, key->rsa, hash_type);
- if (sig->rsa_sig == NULL) {
- ssh_signature_free(sig);
- return NULL;
- }
- break;
- case SSH_KEYTYPE_ECDSA_P256:
- case SSH_KEYTYPE_ECDSA_P384:
- case SSH_KEYTYPE_ECDSA_P521:
-#ifdef HAVE_OPENSSL_ECC
- sig->ecdsa_sig = ECDSA_do_sign(hash, hlen, key->ecdsa);
- if (sig->ecdsa_sig == NULL) {
- ssh_signature_free(sig);
- return NULL;
- }
- break;
-#endif
- case SSH_KEYTYPE_ED25519:
- /* ED25519 handled in caller */
- case SSH_KEYTYPE_UNKNOWN:
- default:
- ssh_signature_free(sig);
- return NULL;
- }
-
- return sig;
-}
-#endif /* WITH_SERVER */
-
#endif /* _PKI_CRYPTO_H */