aboutsummaryrefslogtreecommitdiff
path: root/lib/polarssl.c
diff options
context:
space:
mode:
authorHoi-Ho Chan <hoiho.chan@gmail.com>2010-05-09 12:44:32 -0500
committerDaniel Stenberg <daniel@haxx.se>2010-05-13 21:50:52 +0200
commit83305cbf9fdc5176dca05b5dd182f115051afd54 (patch)
treeb25ce5c5203586a0517ea3e7afe8d3e7aba0829f /lib/polarssl.c
parent76255cfdc93894747536e281391b6493212b4351 (diff)
Remove support for BSD version of PolarSSL
"The BSD version of PolarSSL was made for migratory purposes only and is not maintained. The GPL version of PolarSSL is actually the only actively developed version, so I would be very reluctant to use the BSD version." / Paul Bakker, PolarSSL hacker. Signed-off-by: Hoi-Ho Chan <hoiho.chan@gmail.com>
Diffstat (limited to 'lib/polarssl.c')
-rw-r--r--lib/polarssl.c21
1 files changed, 0 insertions, 21 deletions
diff --git a/lib/polarssl.c b/lib/polarssl.c
index 285b3ae04..e81e66091 100644
--- a/lib/polarssl.c
+++ b/lib/polarssl.c
@@ -97,9 +97,7 @@ Curl_polarssl_connect(struct connectdata *conn,
#endif
void *old_session = NULL;
size_t old_session_size = 0;
-#if defined(HAVE_POLARSSL_GPL)
char buffer[1024];
-#endif
if(conn->ssl[sockindex].state == ssl_connection_complete)
return CURLE_OK;
@@ -134,11 +132,6 @@ Curl_polarssl_connect(struct connectdata *conn,
memset(&conn->ssl[sockindex].clicert, 0, sizeof(x509_cert));
if(data->set.str[STRING_CERT]) {
-#if !defined(HAVE_POLARSSL_GPL)
- /* FIXME: PolarSSL has a bug where we need to import it twice */
- ret = x509parse_crtfile(&conn->ssl[sockindex].clicert,
- data->set.str[STRING_CERT]);
-#endif
ret = x509parse_crtfile(&conn->ssl[sockindex].clicert,
data->set.str[STRING_CERT]);
@@ -162,7 +155,6 @@ Curl_polarssl_connect(struct connectdata *conn,
}
}
-#if defined(HAVE_POLARSSL_GPL)
/* Load the CRL */
memset(&conn->ssl[sockindex].crl, 0, sizeof(x509_crl));
@@ -177,7 +169,6 @@ Curl_polarssl_connect(struct connectdata *conn,
}
}
-#endif
infof(data, "PolarSSL: Connected to %s:%d\n",
conn->host.name, conn->remote_port);
@@ -208,13 +199,9 @@ Curl_polarssl_connect(struct connectdata *conn,
&conn->ssl[sockindex].ssn);
ssl_set_ca_chain(&conn->ssl[sockindex].ssl,
-#if defined(HAVE_POLARSSL_GPL)
&conn->ssl[sockindex].cacert,
&conn->ssl[sockindex].crl,
conn->host.name);
-#else
- &conn->ssl[sockindex].cacert, conn->host.name);
-#endif
ssl_set_own_cert(&conn->ssl[sockindex].ssl,
&conn->ssl[sockindex].clicert, &conn->ssl[sockindex].rsa);
@@ -288,16 +275,10 @@ Curl_polarssl_connect(struct connectdata *conn,
if(conn->ssl[sockindex].ssl.peer_cert) {
/* If the session was resumed, there will be no peer certs */
-#if !defined(HAVE_POLARSSL_GPL)
- char *buffer = x509parse_cert_info("* ", conn->ssl[sockindex].ssl.peer_cert);
-
- if(buffer)
-#else
memset(buffer, 0, sizeof(buffer));
if(x509parse_cert_info(buffer, sizeof(buffer), (char *)"* ",
conn->ssl[sockindex].ssl.peer_cert) != -1)
-#endif
infof(data, "Dumping cert info:\n%s\n", buffer);
}
@@ -354,9 +335,7 @@ void Curl_polarssl_close(struct connectdata *conn, int sockindex)
rsa_free(&conn->ssl[sockindex].rsa);
x509_free(&conn->ssl[sockindex].clicert);
x509_free(&conn->ssl[sockindex].cacert);
-#if defined(HAVE_POLARSSL_GPL)
x509_crl_free(&conn->ssl[sockindex].crl);
-#endif
ssl_free(&conn->ssl[sockindex].ssl);
}