diff options
author | tedu <> | 2014-05-30 14:30:50 +0000 |
---|---|---|
committer | tedu <> | 2014-05-30 14:30:50 +0000 |
commit | d970fd597dc43c71716f5ce1db8f102515a73ad8 (patch) | |
tree | cbf937e75b5dc1f5e8f2452d45ad4d6942a9b1d4 /src/lib/libssl/ssl_cert.c | |
parent | d7bb67cc99974281f55641afa52a0f9e8f1ff938 (diff) | |
download | openbsd-d970fd597dc43c71716f5ce1db8f102515a73ad8.tar.gz openbsd-d970fd597dc43c71716f5ce1db8f102515a73ad8.tar.bz2 openbsd-d970fd597dc43c71716f5ce1db8f102515a73ad8.zip |
remove some #if 0 code. we don't need any more reminders that we're using
a not quite appropriate data structure. ok jsing
Diffstat (limited to 'src/lib/libssl/ssl_cert.c')
-rw-r--r-- | src/lib/libssl/ssl_cert.c | 14 |
1 files changed, 0 insertions, 14 deletions
diff --git a/src/lib/libssl/ssl_cert.c b/src/lib/libssl/ssl_cert.c index c4099ca24f..3a16644cf4 100644 --- a/src/lib/libssl/ssl_cert.c +++ b/src/lib/libssl/ssl_cert.c | |||
@@ -340,10 +340,6 @@ ssl_cert_free(CERT *c) | |||
340 | X509_free(c->pkeys[i].x509); | 340 | X509_free(c->pkeys[i].x509); |
341 | if (c->pkeys[i].privatekey != NULL) | 341 | if (c->pkeys[i].privatekey != NULL) |
342 | EVP_PKEY_free(c->pkeys[i].privatekey); | 342 | EVP_PKEY_free(c->pkeys[i].privatekey); |
343 | #if 0 | ||
344 | if (c->pkeys[i].publickey != NULL) | ||
345 | EVP_PKEY_free(c->pkeys[i].publickey); | ||
346 | #endif | ||
347 | } | 343 | } |
348 | free(c); | 344 | free(c); |
349 | } | 345 | } |
@@ -409,12 +405,6 @@ ssl_sess_cert_free(SESS_CERT *sc) | |||
409 | for (i = 0; i < SSL_PKEY_NUM; i++) { | 405 | for (i = 0; i < SSL_PKEY_NUM; i++) { |
410 | if (sc->peer_pkeys[i].x509 != NULL) | 406 | if (sc->peer_pkeys[i].x509 != NULL) |
411 | X509_free(sc->peer_pkeys[i].x509); | 407 | X509_free(sc->peer_pkeys[i].x509); |
412 | #if 0 /* We don't have the peer's private key. These lines are just | ||
413 | * here as a reminder that we're still using a not-quite-appropriate | ||
414 | * data structure. */ | ||
415 | if (sc->peer_pkeys[i].privatekey != NULL) | ||
416 | EVP_PKEY_free(sc->peer_pkeys[i].privatekey); | ||
417 | #endif | ||
418 | } | 408 | } |
419 | 409 | ||
420 | if (sc->peer_rsa_tmp != NULL) | 410 | if (sc->peer_rsa_tmp != NULL) |
@@ -449,10 +439,6 @@ ssl_verify_cert_chain(SSL *s, STACK_OF(X509) *sk) | |||
449 | SSLerr(SSL_F_SSL_VERIFY_CERT_CHAIN, ERR_R_X509_LIB); | 439 | SSLerr(SSL_F_SSL_VERIFY_CERT_CHAIN, ERR_R_X509_LIB); |
450 | return (0); | 440 | return (0); |
451 | } | 441 | } |
452 | #if 0 | ||
453 | if (SSL_get_verify_depth(s) >= 0) | ||
454 | X509_STORE_CTX_set_depth(&ctx, SSL_get_verify_depth(s)); | ||
455 | #endif | ||
456 | X509_STORE_CTX_set_ex_data(&ctx, SSL_get_ex_data_X509_STORE_CTX_idx(), s); | 442 | X509_STORE_CTX_set_ex_data(&ctx, SSL_get_ex_data_X509_STORE_CTX_idx(), s); |
457 | 443 | ||
458 | /* We need to inherit the verify parameters. These can be determined by | 444 | /* We need to inherit the verify parameters. These can be determined by |