summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNiklas Hallqvist <niklas@cvs.openbsd.org>1998-11-16 12:20:34 +0000
committerNiklas Hallqvist <niklas@cvs.openbsd.org>1998-11-16 12:20:34 +0000
commit04443fbe56e28029b5d3b17ac6b223a2afef9358 (patch)
tree0ab1077db6308a5946392e18a32cb438c176e084
parente7b1a21acb051df256368cf860c125653d011742 (diff)
Add back cert handling, no patent problem here
-rw-r--r--sbin/isakmpd/exchange.c6
-rw-r--r--sbin/isakmpd/message.c6
2 files changed, 2 insertions, 10 deletions
diff --git a/sbin/isakmpd/exchange.c b/sbin/isakmpd/exchange.c
index cc19e35f351..b3a0cd51219 100644
--- a/sbin/isakmpd/exchange.c
+++ b/sbin/isakmpd/exchange.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: exchange.c,v 1.4 1998/11/15 01:13:26 niklas Exp $ */
+/* $OpenBSD: exchange.c,v 1.5 1998/11/16 12:20:33 niklas Exp $ */
/*
* Copyright (c) 1998 Niklas Hallqvist. All rights reserved.
@@ -857,15 +857,12 @@ int
exchange_save_certreq (struct message *msg)
{
struct payload *cp = TAILQ_FIRST (&msg->payload[ISAKMP_PAYLOAD_CERT_REQ]);
-#if 0
struct exchange *exchange = msg->exchange;
struct certreq_aca *tmp;
-#endif
for ( ; cp; cp = TAILQ_NEXT (cp, link))
{
cp->flags |= PL_MARK;
-#if 0
tmp = certreq_decode (GET_ISAKMP_CERTREQ_TYPE (cp->p),
cp->p + ISAKMP_CERTREQ_AUTHORITY_OFF,
GET_ISAKMP_GEN_LENGTH (cp->p) -
@@ -873,7 +870,6 @@ exchange_save_certreq (struct message *msg)
if (tmp == NULL)
continue;
TAILQ_INSERT_TAIL (&exchange->aca_list, tmp, link);
-#endif
}
return 0;
diff --git a/sbin/isakmpd/message.c b/sbin/isakmpd/message.c
index 0385170e3de..29e96ef5a11 100644
--- a/sbin/isakmpd/message.c
+++ b/sbin/isakmpd/message.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: message.c,v 1.4 1998/11/15 01:13:27 niklas Exp $ */
+/* $OpenBSD: message.c,v 1.5 1998/11/16 12:20:33 niklas Exp $ */
/*
* Copyright (c) 1998 Niklas Hallqvist. All rights reserved.
@@ -350,10 +350,8 @@ message_validate_cert (struct message *msg, struct payload *p)
static int
message_validate_cert_req (struct message *msg, struct payload *p)
{
-#if 0
struct cert_handler *cert;
size_t len = GET_ISAKMP_GEN_LENGTH (p->p)- ISAKMP_CERTREQ_AUTHORITY_OFF;
-#endif
if (GET_ISAKMP_CERTREQ_TYPE (p->p) >= ISAKMP_CERTENC_RESERVED_MIN)
{
@@ -365,7 +363,6 @@ message_validate_cert_req (struct message *msg, struct payload *p)
* Check the certificate types we support and if an acceptable authority
* is included in the payload check if it can be decoded
*/
-#if 0
if ((cert = cert_get (GET_ISAKMP_CERTREQ_TYPE (p->p))) == NULL ||
(len && !cert->certreq_validate (p->p + ISAKMP_CERTREQ_AUTHORITY_OFF,
len)))
@@ -373,7 +370,6 @@ message_validate_cert_req (struct message *msg, struct payload *p)
message_drop (msg, ISAKMP_NOTIFY_CERT_TYPE_UNSUPPORTED, 0, 0, 1);
return -1;
}
-#endif
return 0;
}