may be disabled by preprocessor symbols)
s->session->sess_cert->peer_rsa_tmp=rsa;
rsa=NULL;
}
s->session->sess_cert->peer_rsa_tmp=rsa;
rsa=NULL;
}
+#else /* NO_RSA */
+ if (0)
+ ;
+ else if (alg & SSL_kEDH)
{
if ((dh=DH_new()) == NULL)
{
{
if ((dh=DH_new()) == NULL)
{
#ifndef NO_RSA
if (alg & SSL_aRSA)
pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
#ifndef NO_RSA
if (alg & SSL_aRSA)
pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_RSA_ENC].x509);
+ else if (alg & SSL_aDSS)
pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_DSA_SIGN].x509);
#endif
/* else anonymous DH, so no certificate or pkey. */
pkey=X509_get_pubkey(s->session->sess_cert->peer_pkeys[SSL_PKEY_DSA_SIGN].x509);
#endif
/* else anonymous DH, so no certificate or pkey. */
SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE,SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER);
goto f_err;
}
SSLerr(SSL_F_SSL3_GET_KEY_EXCHANGE,SSL_R_TRIED_TO_USE_UNSUPPORTED_CIPHER);
goto f_err;
}
if (alg & SSL_aFZA)
{
al=SSL_AD_HANDSHAKE_FAILURE;
if (alg & SSL_aFZA)
{
al=SSL_AD_HANDSHAKE_FAILURE;