summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src/apps/s_server.c
diff options
context:
space:
mode:
Diffstat (limited to 'lib/libssl/src/apps/s_server.c')
-rw-r--r--lib/libssl/src/apps/s_server.c32
1 files changed, 0 insertions, 32 deletions
diff --git a/lib/libssl/src/apps/s_server.c b/lib/libssl/src/apps/s_server.c
index 22e3c18ada7..c34816749a2 100644
--- a/lib/libssl/src/apps/s_server.c
+++ b/lib/libssl/src/apps/s_server.c
@@ -1557,9 +1557,6 @@ sv_body(char *hostname, int s, unsigned char *context)
unsigned long l;
SSL *con = NULL;
BIO *sbio;
-#ifndef OPENSSL_NO_KRB5
- KSSL_CTX *kctx;
-#endif
struct timeval timeout;
struct timeval *timeoutp;
@@ -1589,13 +1586,6 @@ sv_body(char *hostname, int s, unsigned char *context)
SSL_CTX_set_tlsext_status_arg(ctx, &tlscstatp);
}
#endif
-#ifndef OPENSSL_NO_KRB5
- if ((kctx = kssl_ctx_new()) != NULL) {
- SSL_set0_kssl_ctx(con, kctx);
- kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC);
- kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB);
- }
-#endif /* OPENSSL_NO_KRB5 */
if (context)
SSL_set_session_id_context(con, context,
strlen((char *) context));
@@ -1885,9 +1875,6 @@ init_ssl_connection(SSL * con)
X509 *peer;
long verify_error;
char buf[BUFSIZ];
-#ifndef OPENSSL_NO_KRB5
- char *client_princ;
-#endif
#if !defined(OPENSSL_NO_TLSEXT) && !defined(OPENSSL_NO_NEXTPROTONEG)
const unsigned char *next_proto_neg;
unsigned next_proto_neg_len;
@@ -1951,13 +1938,6 @@ init_ssl_connection(SSL * con)
TLS1_FLAGS_TLS_PADDING_BUG)
BIO_printf(bio_s_out,
"Peer has incorrect TLSv1 block padding\n");
-#ifndef OPENSSL_NO_KRB5
- client_princ = kssl_ctx_get0_client_princ(SSL_get0_kssl_ctx(con));
- if (client_princ != NULL) {
- BIO_printf(bio_s_out, "Kerberos peer principal is %s\n",
- client_princ);
- }
-#endif /* OPENSSL_NO_KRB5 */
BIO_printf(bio_s_out, "Secure Renegotiation IS%s supported\n",
SSL_get_secure_renegotiation_support(con) ? "" : " NOT");
if (keymatexportlabel != NULL) {
@@ -2002,9 +1982,6 @@ err:
return (ret);
}
#endif
-#ifndef OPENSSL_NO_KRB5
-char *client_princ;
-#endif
#if 0
static int
@@ -2037,9 +2014,6 @@ www_body(char *hostname, int s, unsigned char *context)
SSL *con;
const SSL_CIPHER *c;
BIO *io, *ssl_bio, *sbio;
-#ifndef OPENSSL_NO_KRB5
- KSSL_CTX *kctx;
-#endif
buf = malloc(bufsize);
if (buf == NULL)
@@ -2070,12 +2044,6 @@ www_body(char *hostname, int s, unsigned char *context)
SSL_set_tlsext_debug_arg(con, bio_s_out);
}
#endif
-#ifndef OPENSSL_NO_KRB5
- if ((kctx = kssl_ctx_new()) != NULL) {
- kssl_ctx_setstring(kctx, KSSL_SERVICE, KRB5SVC);
- kssl_ctx_setstring(kctx, KSSL_KEYTAB, KRB5KEYTAB);
- }
-#endif /* OPENSSL_NO_KRB5 */
if (context)
SSL_set_session_id_context(con, context,
strlen((char *) context));