diff options
author | Theo Buehler <tb@cvs.openbsd.org> | 2021-10-13 16:57:44 +0000 |
---|---|---|
committer | Theo Buehler <tb@cvs.openbsd.org> | 2021-10-13 16:57:44 +0000 |
commit | 96735703a311c4808376c2ff9e2cd8e5507c39ec (patch) | |
tree | c61ea48d9efcd8740a5f3b598b794c352653a437 | |
parent | a1e1ae2e5f1807c7b3544498add5ac5616457ae8 (diff) |
isakmpd: remove #ifdefs for ancient OPENSSL_VERSIONs.
No-one is going to build this with OpenSSL 0.9.7 or earlier, so we
can remove this code.
ok bluhm sthen (as part of a larger diff)
-rw-r--r-- | sbin/isakmpd/key.c | 9 | ||||
-rw-r--r-- | sbin/isakmpd/x509.c | 18 |
2 files changed, 2 insertions, 25 deletions
diff --git a/sbin/isakmpd/key.c b/sbin/isakmpd/key.c index e661be3c16b..c869d195397 100644 --- a/sbin/isakmpd/key.c +++ b/sbin/isakmpd/key.c @@ -1,4 +1,4 @@ -/* $OpenBSD: key.c,v 1.26 2017/02/03 08:23:46 guenther Exp $ */ +/* $OpenBSD: key.c,v 1.27 2021/10/13 16:57:43 tb Exp $ */ /* * The author of this code is Angelos D. Keromytis (angelos@cis.upenn.edu) * @@ -119,19 +119,12 @@ key_internalize(int type, int private, u_int8_t *data, size_t datalen) return strdup((char *)data); case ISAKMP_KEY_RSA: switch (private) { -#if OPENSSL_VERSION_NUMBER >= 0x00907000L case ISAKMP_KEYTYPE_PUBLIC: return d2i_RSAPublicKey(NULL, (const u_int8_t **)&data, datalen); case ISAKMP_KEYTYPE_PRIVATE: return d2i_RSAPrivateKey(NULL, (const u_int8_t **)&data, datalen); -#else - case ISAKMP_KEYTYPE_PUBLIC: - return d2i_RSAPublicKey(NULL, &data, datalen); - case ISAKMP_KEYTYPE_PRIVATE: - return d2i_RSAPrivateKey(NULL, &data, datalen); -#endif default: log_error("key_internalize: not public or private " "RSA key passed"); diff --git a/sbin/isakmpd/x509.c b/sbin/isakmpd/x509.c index bf4a4c3b812..29638d29b1a 100644 --- a/sbin/isakmpd/x509.c +++ b/sbin/isakmpd/x509.c @@ -1,4 +1,4 @@ -/* $OpenBSD: x509.c,v 1.119 2021/07/02 11:15:12 schwarze Exp $ */ +/* $OpenBSD: x509.c,v 1.120 2021/10/13 16:57:43 tb Exp $ */ /* $EOM: x509.c,v 1.54 2001/01/16 18:42:16 ho Exp $ */ /* @@ -658,7 +658,6 @@ x509_read_from_dir(X509_STORE *ctx, char *name, int hash, int *pcount) int x509_read_crls_from_dir(X509_STORE *ctx, char *name) { -#if OPENSSL_VERSION_NUMBER >= 0x00907000L FILE *crlfp; X509_CRL *crl; struct stat sb; @@ -729,8 +728,6 @@ x509_read_crls_from_dir(X509_STORE *ctx, char *name) X509_STORE_set_flags(ctx, X509_V_FLAG_CRL_CHECK); } -#endif /* OPENSSL_VERSION_NUMBER >= 0x00907000L */ - return 1; } @@ -791,7 +788,6 @@ x509_crl_init(void) * is valid for OpenSSL versions prior to 0.9.7. For now, simply do not * support it. */ -#if OPENSSL_VERSION_NUMBER >= 0x00907000L char *dirname; dirname = conf_get_str("X509-certificates", "CRL-directory"); if (!dirname) { @@ -803,10 +799,6 @@ x509_crl_init(void) "x509_crl_init: x509_read_crls_from_dir failed")); return 0; } -#else - LOG_DBG((LOG_CRYPTO, 10, "x509_crl_init: CRL support only " - "with OpenSSL v0.9.7 or later")); -#endif return 1; } @@ -831,19 +823,11 @@ x509_cert_validate(void *scert) * we trust. */ X509_STORE_CTX_init(&csc, x509_cas, cert, NULL); -#if OPENSSL_VERSION_NUMBER >= 0x00908000L /* XXX See comment in x509_read_crls_from_dir. */ if (x509_cas->param->flags & X509_V_FLAG_CRL_CHECK) { X509_STORE_CTX_set_flags(&csc, X509_V_FLAG_CRL_CHECK); X509_STORE_CTX_set_flags(&csc, X509_V_FLAG_CRL_CHECK_ALL); } -#elif OPENSSL_VERSION_NUMBER >= 0x00907000L - /* XXX See comment in x509_read_crls_from_dir. */ - if (x509_cas->flags & X509_V_FLAG_CRL_CHECK) { - X509_STORE_CTX_set_flags(&csc, X509_V_FLAG_CRL_CHECK); - X509_STORE_CTX_set_flags(&csc, X509_V_FLAG_CRL_CHECK_ALL); - } -#endif res = X509_verify_cert(&csc); err = csc.error; X509_STORE_CTX_cleanup(&csc); |