|
11 | 11 | * |
12 | 12 | * |
13 | 13 | * IDENTIFICATION |
14 | | - * $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-secure.c,v 1.14 2002/09/2604:41:55 momjian Exp $ |
| 14 | + * $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-secure.c,v 1.15 2002/09/2605:37:58 momjian Exp $ |
15 | 15 | * |
16 | 16 | * NOTES |
17 | 17 | * The client *requires* a valid server certificate. Since |
|
123 | 123 |
|
124 | 124 | #ifdefUSE_SSL |
125 | 125 | staticintverify_cb(intok,X509_STORE_CTX*ctx); |
| 126 | +#ifdefNOT_USED |
126 | 127 | staticintverify_peer(PGconn*); |
| 128 | +#endif |
127 | 129 | staticDH*load_dh_file(intkeylength); |
128 | 130 | staticDH*load_dh_buffer(constchar*,size_t); |
129 | 131 | staticDH*tmp_dh_cb(SSL*s,intis_export,intkeylength); |
@@ -362,6 +364,7 @@ verify_cb(int ok, X509_STORE_CTX *ctx) |
362 | 364 | returnok; |
363 | 365 | } |
364 | 366 |
|
| 367 | +#ifdefNOT_USED |
365 | 368 | /* |
366 | 369 | *Verify that common name resolves to peer. |
367 | 370 | *This function is not thread-safe due to gethostbyname(). |
@@ -448,6 +451,7 @@ verify_peer(PGconn *conn) |
448 | 451 |
|
449 | 452 | return-1; |
450 | 453 | } |
| 454 | +#endif |
451 | 455 |
|
452 | 456 | /* |
453 | 457 | *Load precomputed DH parameters. |
@@ -777,7 +781,9 @@ destroy_SSL(void) |
777 | 781 | staticint |
778 | 782 | open_client_SSL(PGconn*conn) |
779 | 783 | { |
| 784 | +#ifdefNOT_USED |
780 | 785 | intr; |
| 786 | +#endif |
781 | 787 |
|
782 | 788 | if (!(conn->ssl=SSL_new(SSL_context))|| |
783 | 789 | !SSL_set_app_data(conn->ssl,conn)|| |
|