summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTheo Buehler <tb@cvs.openbsd.org>2021-10-13 16:57:44 +0000
committerTheo Buehler <tb@cvs.openbsd.org>2021-10-13 16:57:44 +0000
commit96735703a311c4808376c2ff9e2cd8e5507c39ec (patch)
treec61ea48d9efcd8740a5f3b598b794c352653a437
parenta1e1ae2e5f1807c7b3544498add5ac5616457ae8 (diff)
isakmpd: remove #ifdefs for ancient OPENSSL_VERSIONs.
No-one is going to build this with OpenSSL 0.9.7 or earlier, so we can remove this code. ok bluhm sthen (as part of a larger diff)
-rw-r--r--sbin/isakmpd/key.c9
-rw-r--r--sbin/isakmpd/x509.c18
2 files changed, 2 insertions, 25 deletions
diff --git a/sbin/isakmpd/key.c b/sbin/isakmpd/key.c
index e661be3c16b..c869d195397 100644
--- a/sbin/isakmpd/key.c
+++ b/sbin/isakmpd/key.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: key.c,v 1.26 2017/02/03 08:23:46 guenther Exp $ */
+/* $OpenBSD: key.c,v 1.27 2021/10/13 16:57:43 tb Exp $ */
/*
* The author of this code is Angelos D. Keromytis (angelos@cis.upenn.edu)
*
@@ -119,19 +119,12 @@ key_internalize(int type, int private, u_int8_t *data, size_t datalen)
return strdup((char *)data);
case ISAKMP_KEY_RSA:
switch (private) {
-#if OPENSSL_VERSION_NUMBER >= 0x00907000L
case ISAKMP_KEYTYPE_PUBLIC:
return d2i_RSAPublicKey(NULL,
(const u_int8_t **)&data, datalen);
case ISAKMP_KEYTYPE_PRIVATE:
return d2i_RSAPrivateKey(NULL,
(const u_int8_t **)&data, datalen);
-#else
- case ISAKMP_KEYTYPE_PUBLIC:
- return d2i_RSAPublicKey(NULL, &data, datalen);
- case ISAKMP_KEYTYPE_PRIVATE:
- return d2i_RSAPrivateKey(NULL, &data, datalen);
-#endif
default:
log_error("key_internalize: not public or private "
"RSA key passed");
diff --git a/sbin/isakmpd/x509.c b/sbin/isakmpd/x509.c
index bf4a4c3b812..29638d29b1a 100644
--- a/sbin/isakmpd/x509.c
+++ b/sbin/isakmpd/x509.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: x509.c,v 1.119 2021/07/02 11:15:12 schwarze Exp $ */
+/* $OpenBSD: x509.c,v 1.120 2021/10/13 16:57:43 tb Exp $ */
/* $EOM: x509.c,v 1.54 2001/01/16 18:42:16 ho Exp $ */
/*
@@ -658,7 +658,6 @@ x509_read_from_dir(X509_STORE *ctx, char *name, int hash, int *pcount)
int
x509_read_crls_from_dir(X509_STORE *ctx, char *name)
{
-#if OPENSSL_VERSION_NUMBER >= 0x00907000L
FILE *crlfp;
X509_CRL *crl;
struct stat sb;
@@ -729,8 +728,6 @@ x509_read_crls_from_dir(X509_STORE *ctx, char *name)
X509_STORE_set_flags(ctx, X509_V_FLAG_CRL_CHECK);
}
-#endif /* OPENSSL_VERSION_NUMBER >= 0x00907000L */
-
return 1;
}
@@ -791,7 +788,6 @@ x509_crl_init(void)
* is valid for OpenSSL versions prior to 0.9.7. For now, simply do not
* support it.
*/
-#if OPENSSL_VERSION_NUMBER >= 0x00907000L
char *dirname;
dirname = conf_get_str("X509-certificates", "CRL-directory");
if (!dirname) {
@@ -803,10 +799,6 @@ x509_crl_init(void)
"x509_crl_init: x509_read_crls_from_dir failed"));
return 0;
}
-#else
- LOG_DBG((LOG_CRYPTO, 10, "x509_crl_init: CRL support only "
- "with OpenSSL v0.9.7 or later"));
-#endif
return 1;
}
@@ -831,19 +823,11 @@ x509_cert_validate(void *scert)
* we trust.
*/
X509_STORE_CTX_init(&csc, x509_cas, cert, NULL);
-#if OPENSSL_VERSION_NUMBER >= 0x00908000L
/* XXX See comment in x509_read_crls_from_dir. */
if (x509_cas->param->flags & X509_V_FLAG_CRL_CHECK) {
X509_STORE_CTX_set_flags(&csc, X509_V_FLAG_CRL_CHECK);
X509_STORE_CTX_set_flags(&csc, X509_V_FLAG_CRL_CHECK_ALL);
}
-#elif OPENSSL_VERSION_NUMBER >= 0x00907000L
- /* XXX See comment in x509_read_crls_from_dir. */
- if (x509_cas->flags & X509_V_FLAG_CRL_CHECK) {
- X509_STORE_CTX_set_flags(&csc, X509_V_FLAG_CRL_CHECK);
- X509_STORE_CTX_set_flags(&csc, X509_V_FLAG_CRL_CHECK_ALL);
- }
-#endif
res = X509_verify_cert(&csc);
err = csc.error;
X509_STORE_CTX_cleanup(&csc);