summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/ssl/ssl_rsa.c
diff options
context:
space:
mode:
authorbeck <beck@openbsd.org>2014-05-29 18:27:52 +0000
committerbeck <beck@openbsd.org>2014-05-29 18:27:52 +0000
commit0057b87e066c5a81e2df50a7aff8d320a2f0d701 (patch)
tree7f9c5adac902880e606bd75c03f779a17c3d46ec /lib/libssl/src/ssl/ssl_rsa.c
parentkssl is dead. (diff)
downloadwireguard-openbsd-0057b87e066c5a81e2df50a7aff8d320a2f0d701.tar.xz
wireguard-openbsd-0057b87e066c5a81e2df50a7aff8d320a2f0d701.zip
Any sane platform has stdio. Stop pretending we will ever use a platform
that does not. "fire bomb" tedu@
Diffstat (limited to 'lib/libssl/src/ssl/ssl_rsa.c')
-rw-r--r--lib/libssl/src/ssl/ssl_rsa.c14
1 files changed, 0 insertions, 14 deletions
diff --git a/lib/libssl/src/ssl/ssl_rsa.c b/lib/libssl/src/ssl/ssl_rsa.c
index 05d18de1d99..23891bf11b2 100644
--- a/lib/libssl/src/ssl/ssl_rsa.c
+++ b/lib/libssl/src/ssl/ssl_rsa.c
@@ -80,7 +80,6 @@ SSL_use_certificate(SSL *ssl, X509 *x)
return (ssl_set_cert(ssl->cert, x));
}
-#ifndef OPENSSL_NO_STDIO
int
SSL_use_certificate_file(SSL *ssl, const char *file, int type)
{
@@ -123,7 +122,6 @@ end:
BIO_free(in);
return (ret);
}
-#endif
int
SSL_use_certificate_ASN1(SSL *ssl, const unsigned char *d, int len)
@@ -210,7 +208,6 @@ ssl_set_pkey(CERT *c, EVP_PKEY *pkey)
return (1);
}
-#ifndef OPENSSL_NO_STDIO
int
SSL_use_RSAPrivateKey_file(SSL *ssl, const char *file, int type)
{
@@ -250,7 +247,6 @@ end:
BIO_free(in);
return (ret);
}
-#endif
int
SSL_use_RSAPrivateKey_ASN1(SSL *ssl, unsigned char *d, long len)
@@ -287,7 +283,6 @@ SSL_use_PrivateKey(SSL *ssl, EVP_PKEY *pkey)
return (ret);
}
-#ifndef OPENSSL_NO_STDIO
int
SSL_use_PrivateKey_file(SSL *ssl, const char *file, int type)
{
@@ -327,7 +322,6 @@ end:
BIO_free(in);
return (ret);
}
-#endif
int
SSL_use_PrivateKey_ASN1(int type, SSL *ssl, const unsigned char *d, long len)
@@ -415,7 +409,6 @@ ssl_set_cert(CERT *c, X509 *x)
return (1);
}
-#ifndef OPENSSL_NO_STDIO
int
SSL_CTX_use_certificate_file(SSL_CTX *ctx, const char *file, int type)
{
@@ -458,7 +451,6 @@ end:
BIO_free(in);
return (ret);
}
-#endif
int
SSL_CTX_use_certificate_ASN1(SSL_CTX *ctx, int len, const unsigned char *d)
@@ -504,7 +496,6 @@ SSL_CTX_use_RSAPrivateKey(SSL_CTX *ctx, RSA *rsa)
return (ret);
}
-#ifndef OPENSSL_NO_STDIO
int
SSL_CTX_use_RSAPrivateKey_file(SSL_CTX *ctx, const char *file, int type)
{
@@ -544,7 +535,6 @@ end:
BIO_free(in);
return (ret);
}
-#endif
int
SSL_CTX_use_RSAPrivateKey_ASN1(SSL_CTX *ctx, const unsigned char *d, long len)
@@ -578,7 +568,6 @@ SSL_CTX_use_PrivateKey(SSL_CTX *ctx, EVP_PKEY *pkey)
return (ssl_set_pkey(ctx->cert, pkey));
}
-#ifndef OPENSSL_NO_STDIO
int
SSL_CTX_use_PrivateKey_file(SSL_CTX *ctx, const char *file, int type)
{
@@ -618,7 +607,6 @@ end:
BIO_free(in);
return (ret);
}
-#endif
int
SSL_CTX_use_PrivateKey_ASN1(int type, SSL_CTX *ctx, const unsigned char *d,
@@ -640,7 +628,6 @@ SSL_CTX_use_PrivateKey_ASN1(int type, SSL_CTX *ctx, const unsigned char *d,
}
-#ifndef OPENSSL_NO_STDIO
/* Read a file that contains our certificate in "PEM" format,
* possibly followed by a sequence of CA certificates that should be
* sent to the peer in the Certificate message.
@@ -720,4 +707,3 @@ end:
BIO_free(in);
return (ret);
}
-#endif