summaryrefslogtreecommitdiff
path: root/sbin/isakmpd/ike_auth.c
diff options
context:
space:
mode:
authorTheo de Raadt <deraadt@cvs.openbsd.org>2005-04-08 17:15:02 +0000
committerTheo de Raadt <deraadt@cvs.openbsd.org>2005-04-08 17:15:02 +0000
commit279fdb6b313cbaa9614199eff4369a838ea60403 (patch)
treeda7fa3e019d18b71a75b3a02bbc72d0a76b291c0 /sbin/isakmpd/ike_auth.c
parentb023c387d825596bb473a8b891ff5d2fc703bef8 (diff)
keynote and policy always compiled in
Diffstat (limited to 'sbin/isakmpd/ike_auth.c')
-rw-r--r--sbin/isakmpd/ike_auth.c13
1 files changed, 1 insertions, 12 deletions
diff --git a/sbin/isakmpd/ike_auth.c b/sbin/isakmpd/ike_auth.c
index 19fe75e710d..599a24ca3ad 100644
--- a/sbin/isakmpd/ike_auth.c
+++ b/sbin/isakmpd/ike_auth.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ike_auth.c,v 1.98 2005/04/05 20:46:20 cloder Exp $ */
+/* $OpenBSD: ike_auth.c,v 1.99 2005/04/08 17:15:01 deraadt Exp $ */
/* $EOM: ike_auth.c,v 1.59 2000/11/21 00:21:31 angelos Exp $ */
/*
@@ -43,9 +43,7 @@
#include <string.h>
#include <unistd.h>
#include <regex.h>
-#if defined (USE_KEYNOTE)
#include <keynote.h>
-#endif
#include <policy.h>
#include "sysdep.h"
@@ -188,7 +186,6 @@ ike_auth_get_key(int type, char *id, char *local_id, size_t *keylen)
break;
case IKE_AUTH_RSA_SIG:
-#if defined (USE_KEYNOTE)
if (local_id && (keyfile = conf_get_str("KeyNote",
"Credential-directory")) != 0) {
struct stat sb;
@@ -269,7 +266,6 @@ ike_auth_get_key(int type, char *id, char *local_id, size_t *keylen)
return dc.dec_key;
}
ignorekeynote:
-#endif /* USE_KEYNOTE */
/* Otherwise, try X.509 */
keyfile = conf_get_str("X509-certificates", "Private-key");
@@ -577,7 +573,6 @@ rsa_sig_decode_hash(struct message *msg)
p ? GET_ISAKMP_CERT_ENCODING(p->p) : -1);
return -1;
}
-#if defined (USE_POLICY) || defined (USE_KEYNOTE)
/*
* We need the policy session initialized now, so we can add
* credentials etc.
@@ -588,7 +583,6 @@ rsa_sig_decode_hash(struct message *msg)
"session");
return -1;
}
-#endif /* USE_POLICY || USE_KEYNOTE */
/* Obtain a certificate from our certificate storage. */
if (handler->cert_obtain(id, id_len, 0, &rawcert, &rawcertlen)) {
@@ -609,10 +603,8 @@ rsa_sig_decode_hash(struct message *msg)
"of type %d", handler->id));
exchange->recv_cert = cert;
exchange->recv_certtype = handler->id;
-#if defined (USE_POLICY)
x509_generate_kn(exchange->policy_id,
cert);
-#endif /* USE_POLICY */
}
}
} else if (handler->id == ISAKMP_CERTENC_KEYNOTE)
@@ -695,7 +687,6 @@ rsa_sig_decode_hash(struct message *msg)
exchange->recv_cert = cert;
exchange->recv_certtype = GET_ISAKMP_CERT_ENCODING(p->p);
-#if defined (USE_POLICY) || defined (USE_KEYNOTE)
if (exchange->recv_certtype == ISAKMP_CERTENC_KEYNOTE) {
struct keynote_deckey dc;
char *pp;
@@ -725,8 +716,6 @@ rsa_sig_decode_hash(struct message *msg)
pp);
free(pp);
}
-#endif
-
found++;
}