|
11 | 11 | *
|
12 | 12 | *
|
13 | 13 | * IDENTIFICATION
|
14 |
| - * $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-secure.c,v 1.14 2002/09/2604:41:55 momjian Exp $ |
| 14 | + * $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-secure.c,v 1.15 2002/09/2605:37:58 momjian Exp $ |
15 | 15 | *
|
16 | 16 | * NOTES
|
17 | 17 | * The client *requires* a valid server certificate. Since
|
|
123 | 123 |
|
124 | 124 | #ifdefUSE_SSL
|
125 | 125 | staticintverify_cb(intok,X509_STORE_CTX*ctx);
|
| 126 | +#ifdefNOT_USED |
126 | 127 | staticintverify_peer(PGconn*);
|
| 128 | +#endif |
127 | 129 | staticDH*load_dh_file(intkeylength);
|
128 | 130 | staticDH*load_dh_buffer(constchar*,size_t);
|
129 | 131 | staticDH*tmp_dh_cb(SSL*s,intis_export,intkeylength);
|
@@ -362,6 +364,7 @@ verify_cb(int ok, X509_STORE_CTX *ctx)
|
362 | 364 | returnok;
|
363 | 365 | }
|
364 | 366 |
|
| 367 | +#ifdefNOT_USED |
365 | 368 | /*
|
366 | 369 | *Verify that common name resolves to peer.
|
367 | 370 | *This function is not thread-safe due to gethostbyname().
|
@@ -448,6 +451,7 @@ verify_peer(PGconn *conn)
|
448 | 451 |
|
449 | 452 | return-1;
|
450 | 453 | }
|
| 454 | +#endif |
451 | 455 |
|
452 | 456 | /*
|
453 | 457 | *Load precomputed DH parameters.
|
@@ -777,7 +781,9 @@ destroy_SSL(void)
|
777 | 781 | staticint
|
778 | 782 | open_client_SSL(PGconn*conn)
|
779 | 783 | {
|
| 784 | +#ifdefNOT_USED |
780 | 785 | intr;
|
| 786 | +#endif |
781 | 787 |
|
782 | 788 | if (!(conn->ssl=SSL_new(SSL_context))||
|
783 | 789 | !SSL_set_app_data(conn->ssl,conn)||
|
|