Hello Steffan, Will this change be in 2.3.6 that'll be released tomorrow? Thanks,
Reinoud. On Sun, Nov 30, 2014 at 9:55 AM, Steffan Karger <stef...@karger.me> wrote: > Remove the --disable-ssl configure option and accompanying ENABLE_SSL > defines in the master/2.4 branch, to reduce the code and testing > complexity a bit. > > This does not remove to runtime option to run without SSL, just the compile > time option to not include any SSL-related code. > > During the community meeting in November 2014 there were no objections > amongst he developers present. Also, this has been announced on the -users > and -devel mailing lists two weeks ago, without any response whatsoever. > > Signed-off-by: Steffan Karger <stef...@karger.me> > --- > config-msvc.h | 1 - > configure.ac | 21 ++----------- > doc/doxygen/doc_data_crypto.h | 12 +++---- > doc/doxygen/openvpn.doxyfile | 2 +- > include/openvpn-plugin.h | 8 ++--- > sample/sample-plugins/log/log_v3.c | 2 +- > src/openvpn/crypto.c | 20 ------------ > src/openvpn/crypto.h | 9 ------ > src/openvpn/crypto_openssl.c | 16 ---------- > src/openvpn/forward-inline.h | 4 +-- > src/openvpn/forward.c | 18 +++-------- > src/openvpn/init.c | 45 ++++++--------------------- > src/openvpn/manage.c | 4 +-- > src/openvpn/openvpn.h | 9 +----- > src/openvpn/options.c | 64 > ++++++-------------------------------- > src/openvpn/options.h | 4 --- > src/openvpn/plugin.c | 8 ++--- > src/openvpn/plugin.h | 6 ++-- > src/openvpn/reliable.c | 4 +-- > src/openvpn/reliable.h | 4 +-- > src/openvpn/session_id.c | 4 +-- > src/openvpn/session_id.h | 4 +-- > src/openvpn/ssl.c | 4 +-- > src/openvpn/ssl.h | 4 +-- > src/openvpn/ssl_openssl.c | 4 +-- > src/openvpn/ssl_polarssl.c | 4 +-- > src/openvpn/ssl_verify.c | 4 +-- > src/openvpn/ssl_verify.h | 4 +-- > src/openvpn/ssl_verify_openssl.c | 4 +-- > src/openvpn/ssl_verify_polarssl.c | 4 +-- > src/openvpn/syshead.h | 10 +++--- > 31 files changed, 79 insertions(+), 232 deletions(-) > > diff --git a/config-msvc.h b/config-msvc.h > index fa99384..8294c2c 100644 > --- a/config-msvc.h > +++ b/config-msvc.h > @@ -18,7 +18,6 @@ > #define ENABLE_PLUGIN 1 > #define ENABLE_PORT_SHARE 1 > #define ENABLE_SOCKS 1 > -#define ENABLE_SSL 1 > > #define HAVE_ERRNO_H 1 > #define HAVE_FCNTL_H 1 > diff --git a/configure.ac b/configure.ac > index 608ab6d..319e05a 100644 > --- a/configure.ac > +++ b/configure.ac > @@ -79,13 +79,6 @@ AC_ARG_ENABLE( > ) > > AC_ARG_ENABLE( > - [ssl], > - [AS_HELP_STRING([--disable-ssl], [disable SSL support for TLS-based > key exchange @<:@default=yes@:>@])], > - , > - [enable_ssl="yes"] > -) > - > -AC_ARG_ENABLE( > [x509-alt-username], > [AS_HELP_STRING([--enable-x509-alt-username], [enable the > --x509-username-field feature @<:@default=no@:>@])], > , > @@ -1080,19 +1073,11 @@ case "${with_crypto_library}" in > ;; > esac > > -if test "${enable_ssl}" = "yes"; then > - test "${enable_crypto}" != "yes" && AC_MSG_ERROR([crypto must be > enabled for ssl]) > - test "${have_crypto_ssl}" != "yes" && > AC_MSG_ERROR([${with_ssl_library} ssl is required but missing]) > - OPTIONAL_CRYPTO_CFLAGS="${OPTIONAL_CRYPTO_CFLAGS} > ${CRYPTO_SSL_CFLAGS}" > - OPTIONAL_CRYPTO_LIBS="${OPTIONAL_CRYPTO_LIBS} ${CRYPTO_SSL_LIBS}" > - AC_DEFINE([ENABLE_SSL], [1], [Enable ssl library]) > -fi > - > if test "${enable_crypto}" = "yes"; then > test "${have_crypto_crypto}" != "yes" && > AC_MSG_ERROR([${with_crypto_library} crypto is required but missing]) > test "${enable_crypto_ofb_cfb}" = "yes" && > AC_DEFINE([ENABLE_OFB_CFB_MODE], [1], [Enable OFB and CFB cipher modes]) > - OPTIONAL_CRYPTO_CFLAGS="${OPTIONAL_CRYPTO_CFLAGS} > ${CRYPTO_CRYPTO_CFLAGS}" > - OPTIONAL_CRYPTO_LIBS="${OPTIONAL_CRYPTO_LIBS} ${CRYPTO_CRYPTO_LIBS}" > + OPTIONAL_CRYPTO_CFLAGS="${OPTIONAL_CRYPTO_CFLAGS} > ${CRYPTO_CRYPTO_CFLAGS} ${CRYPTO_SSL_CFLAGS}" > + OPTIONAL_CRYPTO_LIBS="${OPTIONAL_CRYPTO_LIBS} ${CRYPTO_CRYPTO_LIBS} > ${CRYPTO_SSL_LIBS}" > AC_DEFINE([ENABLE_CRYPTO], [1], [Enable crypto library]) > fi > > @@ -1135,7 +1120,7 @@ fi > > if test "${enable_pkcs11}" = "yes"; then > test "${have_pkcs11_helper}" != "yes" && AC_MSG_ERROR([PKCS11 enabled > but libpkcs11-helper is missing]) > - test "${enable_ssl}" != "yes" && AC_MSG_ERROR([PKCS11 can be enabled > only if SSL is enabled]) > + test "${enable_crypto}" != "yes" && AC_MSG_ERROR([PKCS11 can be > enabled only if crypto is enabled]) > OPTIONAL_PKCS11_HELPER_CFLAGS="${PKCS11_HELPER_CFLAGS}" > OPTIONAL_PKCS11_HELPER_LIBS="${PKCS11_HELPER_LIBS}" > AC_DEFINE([ENABLE_PKCS11], [1], [Enable PKCS11]) > diff --git a/doc/doxygen/doc_data_crypto.h b/doc/doxygen/doc_data_crypto.h > index ee72b8c..8dcc15a 100644 > --- a/doc/doxygen/doc_data_crypto.h > +++ b/doc/doxygen/doc_data_crypto.h > @@ -60,12 +60,12 @@ > * > * @par Settings that control this module's activity > * Whether or not the Data Channel Crypto module is active depends on the > - * compile-time \c ENABLE_CRYPTO and \c ENABLE_SSL preprocessor macros. How > it > - * processes packets received from the \link data_control Data Channel > - * Control module\endlink at runtime depends on the associated \c > - * crypto_options structure. To perform cryptographic operations, the \c > - * crypto_options.key_ctx_bi must contain the correct cipher and HMAC > - * security parameters for the direction the packet is traveling in. > + * compile-time \c ENABLE_CRYPTO preprocessor macro. How it processes > packets > + * received from the \link data_control Data Channel Control module\endlink > at > + * runtime depends on the associated \c crypto_options structure. To perform > + * cryptographic operations, the \c crypto_options.key_ctx_bi must contain > the > + * correct cipher and HMAC security parameters for the direction the packet > is > + * traveling in. > * > * @par Crypto algorithms > * This module uses the crypto algorithm implementations of the external > diff --git a/doc/doxygen/openvpn.doxyfile b/doc/doxygen/openvpn.doxyfile > index cf26c42..7a02028 100644 > --- a/doc/doxygen/openvpn.doxyfile > +++ b/doc/doxygen/openvpn.doxyfile > @@ -235,7 +235,7 @@ EXPAND_ONLY_PREDEF = NO > SEARCH_INCLUDES = YES > INCLUDE_PATH = > INCLUDE_FILE_PATTERNS = > -PREDEFINED = WIN32 NTLM USE_LZO ENABLE_FRAGMENT P2MP P2MP_SERVER > ENABLE_CRYPTO ENABLE_CRYPTO_OPENSSL ENABLE_SSL ENABLE_PLUGIN > ENABLE_MANAGEMENT ENABLE_OCC HAVE_GETTIMEOFDAY > +PREDEFINED = WIN32 NTLM USE_LZO ENABLE_FRAGMENT P2MP P2MP_SERVER > ENABLE_CRYPTO ENABLE_CRYPTO_OPENSSL ENABLE_PLUGIN ENABLE_MANAGEMENT > ENABLE_OCC HAVE_GETTIMEOFDAY > EXPAND_AS_DEFINED = > SKIP_FUNCTION_MACROS = YES > #--------------------------------------------------------------------------- > diff --git a/include/openvpn-plugin.h b/include/openvpn-plugin.h > index 5f2d407..080ffff 100644 > --- a/include/openvpn-plugin.h > +++ b/include/openvpn-plugin.h > @@ -27,7 +27,7 @@ > > #define OPENVPN_PLUGIN_VERSION 3 > > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > #ifdef ENABLE_CRYPTO_POLARSSL > #include <polarssl/x509_crt.h> > #ifndef __OPENVPN_X509_CERT_T_DECLARED > @@ -358,9 +358,9 @@ struct openvpn_plugin_args_open_return > * *per_client_context : the per-client context pointer which was returned by > * openvpn_plugin_client_constructor_v1, if defined. > * > - * current_cert_depth : Certificate depth of the certificate being passed > over (only if compiled with ENABLE_SSL defined) > + * current_cert_depth : Certificate depth of the certificate being passed > over (only if compiled with ENABLE_CRYPTO defined) > * > - * *current_cert : X509 Certificate object received from the client (only if > compiled with ENABLE_SSL defined) > + * *current_cert : X509 Certificate object received from the client (only if > compiled with ENABLE_CRYPTO defined) > * > */ > struct openvpn_plugin_args_func_in > @@ -370,7 +370,7 @@ struct openvpn_plugin_args_func_in > const char ** const envp; > openvpn_plugin_handle_t handle; > void *per_client_context; > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > int current_cert_depth; > openvpn_x509_cert_t *current_cert; > #else > diff --git a/sample/sample-plugins/log/log_v3.c > b/sample/sample-plugins/log/log_v3.c > index 4d3af91..bf1a15c 100644 > --- a/sample/sample-plugins/log/log_v3.c > +++ b/sample/sample-plugins/log/log_v3.c > @@ -36,7 +36,7 @@ > #include <string.h> > #include <stdlib.h> > > -#define ENABLE_SSL > +#define ENABLE_CRYPTO > > #include "openvpn-plugin.h" > > diff --git a/src/openvpn/crypto.c b/src/openvpn/crypto.c > index ef2bde1..b6276bd 100644 > --- a/src/openvpn/crypto.c > +++ b/src/openvpn/crypto.c > @@ -726,8 +726,6 @@ test_crypto (const struct crypto_options *co, struct > frame* frame) > gc_free (&gc); > } > > -#ifdef ENABLE_SSL > - > void > get_tls_handshake_key (const struct key_type *key_type, > struct key_ctx_bi *ctx, > @@ -808,7 +806,6 @@ get_tls_handshake_key (const struct key_type *key_type, > CLEAR (*ctx); > } > } > -#endif > > /* header and footer for static key file */ > static const char static_key_head[] = "-----BEGIN OpenVPN Static key > V1-----"; > @@ -1379,23 +1376,6 @@ get_random() > return l; > } > > -#ifndef ENABLE_SSL > - > -void > -init_ssl_lib (void) > -{ > - crypto_init_lib (); > -} > - > -void > -free_ssl_lib (void) > -{ > - crypto_uninit_lib (); > - prng_uninit(); > -} > - > -#endif /* ENABLE_SSL */ > - > /* > * md5 functions > */ > diff --git a/src/openvpn/crypto.h b/src/openvpn/crypto.h > index bf2f802..618b92c 100644 > --- a/src/openvpn/crypto.h > +++ b/src/openvpn/crypto.h > @@ -343,8 +343,6 @@ void key2_print (const struct key2* k, > const char* prefix0, > const char* prefix1); > > -#ifdef ENABLE_SSL > - > #define GHK_INLINE (1<<0) > void get_tls_handshake_key (const struct key_type *key_type, > struct key_ctx_bi *ctx, > @@ -352,13 +350,6 @@ void get_tls_handshake_key (const struct key_type > *key_type, > const int key_direction, > const unsigned int flags); > > -#else > - > -void init_ssl_lib (void); > -void free_ssl_lib (void); > - > -#endif /* ENABLE_SSL */ > - > /* > * md5 functions > */ > diff --git a/src/openvpn/crypto_openssl.c b/src/openvpn/crypto_openssl.c > index f7a491d..f1a72de 100644 > --- a/src/openvpn/crypto_openssl.c > +++ b/src/openvpn/crypto_openssl.c > @@ -142,14 +142,6 @@ crypto_init_lib_engine (const char *engine_name) > void > crypto_init_lib (void) > { > -#ifndef ENABLE_SSL > - /* If SSL is enabled init is taken care of in ssl_openssl.c */ > -#ifndef ENABLE_SMALL > - ERR_load_crypto_strings (); > -#endif > - OpenSSL_add_all_algorithms (); > -#endif > - > /* > * If you build the OpenSSL library and OpenVPN with > * CRYPTO_MDEBUG, you will get a listing of OpenSSL > @@ -164,14 +156,6 @@ crypto_init_lib (void) > void > crypto_uninit_lib (void) > { > -#ifndef ENABLE_SSL > - /* If SSL is enabled cleanup is taken care of in ssl_openssl.c */ > - EVP_cleanup (); > -#ifndef ENABLE_SMALL > - ERR_free_strings (); > -#endif > -#endif > - > #ifdef CRYPTO_MDEBUG > FILE* fp = fopen ("sdlog", "w"); > ASSERT (fp); > diff --git a/src/openvpn/forward-inline.h b/src/openvpn/forward-inline.h > index 5853ce2..0ca6692 100644 > --- a/src/openvpn/forward-inline.h > +++ b/src/openvpn/forward-inline.h > @@ -35,7 +35,7 @@ > static inline void > check_tls (struct context *c) > { > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#if defined(ENABLE_CRYPTO) > void check_tls_dowork (struct context *c); > if (c->c2.tls_multi) > check_tls_dowork (c); > @@ -49,7 +49,7 @@ check_tls (struct context *c) > static inline void > check_tls_errors (struct context *c) > { > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#if defined(ENABLE_CRYPTO) > void check_tls_errors_co (struct context *c); > void check_tls_errors_nco (struct context *c); > if (c->c2.tls_multi && c->c2.tls_exit_signal) > diff --git a/src/openvpn/forward.c b/src/openvpn/forward.c > index 91c4711..a3323e9 100644 > --- a/src/openvpn/forward.c > +++ b/src/openvpn/forward.c > @@ -88,7 +88,7 @@ show_wait_status (struct context *c) > * traffic on the control-channel. > * > */ > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > void > check_tls_dowork (struct context *c) > { > @@ -117,9 +117,6 @@ check_tls_dowork (struct context *c) > if (wakeup) > context_reschedule_sec (c, wakeup); > } > -#endif > - > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > > void > check_tls_errors_co (struct context *c) > @@ -133,8 +130,7 @@ check_tls_errors_nco (struct context *c) > { > register_signal (c, c->c2.tls_exit_signal, "tls-error"); /* SOFT-SIGUSR1 > -- TLS error */ > } > - > -#endif > +#endif /* ENABLE_CRYPTO */ > > #if P2MP > > @@ -239,7 +235,7 @@ check_connection_established_dowork (struct context *c) > bool > send_control_channel_string (struct context *c, const char *str, int > msglevel) > { > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > if (c->c2.tls_multi) { > struct gc_arena gc = gc_new (); > bool stat; > @@ -264,7 +260,7 @@ send_control_channel_string (struct context *c, const > char *str, int msglevel) > gc_free (&gc); > return stat; > } > -#endif > +#endif /* ENABLE_CRYPTO */ > return true; > } > > @@ -457,7 +453,6 @@ encrypt_sign (struct context *c, bool comp_frag) > } > > #ifdef ENABLE_CRYPTO > -#ifdef ENABLE_SSL > /* > * If TLS mode, get the key we will use to encrypt > * the packet. > @@ -466,7 +461,6 @@ encrypt_sign (struct context *c, bool comp_frag) > { > tls_pre_encrypt (c->c2.tls_multi, &c->c2.buf, &c->c2.crypto_options); > } > -#endif > > /* > * Encrypt the packet and write an optional > @@ -480,7 +474,6 @@ encrypt_sign (struct context *c, bool comp_frag) > link_socket_get_outgoing_addr (&c->c2.buf, get_link_socket_info (c), > &c->c2.to_link_addr); > #ifdef ENABLE_CRYPTO > -#ifdef ENABLE_SSL > /* > * In TLS mode, prepend the appropriate one-byte opcode > * to the packet which identifies it as a data channel > @@ -493,7 +486,6 @@ encrypt_sign (struct context *c, bool comp_frag) > tls_post_encrypt (c->c2.tls_multi, &c->c2.buf); > } > #endif > -#endif > > /* if null encryption, copy result to read_tun_buf */ > buffer_turnover (orig_buf, &c->c2.to_link, &c->c2.buf, &b->read_tun_buf); > @@ -783,7 +775,6 @@ process_incoming_link_part1 (struct context *c, struct > link_socket_info *lsi, bo > link_socket_bad_incoming_addr (&c->c2.buf, lsi, &c->c2.from); > > #ifdef ENABLE_CRYPTO > -#ifdef ENABLE_SSL > if (c->c2.tls_multi) > { > /* > @@ -813,7 +804,6 @@ process_incoming_link_part1 (struct context *c, struct > link_socket_info *lsi, bo > if (c->c2.context_auth != CAS_SUCCEEDED) > c->c2.buf.len = 0; > #endif > -#endif /* ENABLE_SSL */ > > /* authenticate and decrypt the incoming packet */ > decrypt_status = openvpn_decrypt (&c->c2.buf, > c->c2.buffers->decrypt_buf, &c->c2.crypto_options, &c->c2.frame); > diff --git a/src/openvpn/init.c b/src/openvpn/init.c > index a135aa5..706d07c 100644 > --- a/src/openvpn/init.c > +++ b/src/openvpn/init.c > @@ -410,7 +410,7 @@ next_connection_entry (struct context *c) > static void > init_query_passwords (struct context *c) > { > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > /* Certificate password input */ > if (c->options.key_pass_file) > pem_password_setup (c->options.key_pass_file); > @@ -792,7 +792,7 @@ uninit_static (void) > close_port_share (); > #endif > > -#if defined(MEASURE_TLS_HANDSHAKE_STATS) && defined(ENABLE_CRYPTO) && > defined(ENABLE_SSL) > +#if defined(MEASURE_TLS_HANDSHAKE_STATS) && defined(ENABLE_CRYPTO) > show_tls_performance_stats (); > #endif > } > @@ -835,10 +835,7 @@ print_openssl_info (const struct options *options) > */ > #ifdef ENABLE_CRYPTO > if (options->show_ciphers || options->show_digests || options->show_engines > -#ifdef ENABLE_SSL > - || options->show_tls_ciphers || options->show_curves > -#endif > - ) > + || options->show_tls_ciphers || options->show_curves) > { > if (options->show_ciphers) > show_available_ciphers (); > @@ -846,12 +843,10 @@ print_openssl_info (const struct options *options) > show_available_digests (); > if (options->show_engines) > show_available_engines (); > -#ifdef ENABLE_SSL > if (options->show_tls_ciphers) > show_available_tls_ciphers (options->cipher_list); > if (options->show_curves) > show_available_curves(); > -#endif > return true; > } > #endif > @@ -901,10 +896,8 @@ do_persist_tuntap (const struct options *options) > || options->ifconfig_remote_netmask > #ifdef ENABLE_CRYPTO > || options->shared_secret_file > -#ifdef ENABLE_SSL > || options->tls_server || options->tls_client > #endif > -#endif > ) > msg (M_FATAL|M_OPTERR, > "options --mktun or --rmtun should only be used together with > --dev"); > @@ -1012,7 +1005,7 @@ const char * > format_common_name (struct context *c, struct gc_arena *gc) > { > struct buffer out = alloc_buf_gc (256, gc); > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > if (c->c2.tls_multi) > { > buf_printf (&out, "[%s] ", tls_common_name (c->c2.tls_multi, false)); > @@ -1102,9 +1095,7 @@ do_init_timers (struct context *c, bool deferred) > #ifdef ENABLE_CRYPTO > if (c->options.packet_id_file) > event_timeout_init (&c->c2.packet_id_persist_interval, 60, now); > -#endif > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > /* initialize tmp_int optimization that limits the number of times we > call > tls_multi_process in the main event loop */ > interval_init (&c->c2.tmp_int, TLS_MULTI_HORIZON, TLS_MULTI_REFRESH); > @@ -1797,7 +1788,7 @@ do_deferred_options (struct context *c, const unsigned > int found) > if (found & OPT_P_SETENV) > msg (D_PUSH, "OPTIONS IMPORT: environment modified"); > > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > if (found & OPT_P_PEER_ID) > { > msg (D_PUSH, "OPTIONS IMPORT: peer-id set"); > @@ -1928,13 +1919,11 @@ key_schedule_free (struct key_schedule *ks, bool > free_ssl_ctx) > { > #ifdef ENABLE_CRYPTO > free_key_ctx_bi (&ks->static_key); > -#ifdef ENABLE_SSL > if (tls_ctx_initialised(&ks->ssl_ctx) && free_ssl_ctx) > { > tls_ctx_free (&ks->ssl_ctx); > free_key_ctx_bi (&ks->tls_auth_key); > } > -#endif /* ENABLE_SSL */ > #endif /* ENABLE_CRYPTO */ > CLEAR (*ks); > } > @@ -2054,8 +2043,6 @@ do_init_crypto_static (struct context *c, const > unsigned int flags) > options->use_iv); > } > > -#ifdef ENABLE_SSL > - > /* > * Initialize the persistent component of OpenVPN's TLS mode, > * which is preserved across SIGUSR1 resets. > @@ -2303,10 +2290,6 @@ do_init_finalize_tls_frame (struct context *c) > } > } > > -#endif /* ENABLE_SSL */ > -#endif /* ENABLE_CRYPTO */ > - > -#ifdef ENABLE_CRYPTO > /* > * No encryption or authentication. > */ > @@ -2325,16 +2308,14 @@ do_init_crypto (struct context *c, const unsigned int > flags) > #ifdef ENABLE_CRYPTO > if (c->options.shared_secret_file) > do_init_crypto_static (c, flags); > -#ifdef ENABLE_SSL > else if (c->options.tls_server || c->options.tls_client) > do_init_crypto_tls (c, flags); > -#endif > else /* no encryption or authentication. */ > do_init_crypto_none (c); > #else /* ENABLE_CRYPTO */ > msg (M_WARN, > "******* WARNING *******: " PACKAGE_NAME > - " built without OpenSSL -- encryption and authentication features > disabled -- all data will be tunnelled as cleartext"); > + " built without crypto library -- encryption and authentication > features disabled -- all data will be tunnelled as cleartext"); > #endif /* ENABLE_CRYPTO */ > } > > @@ -2503,7 +2484,6 @@ do_option_warnings (struct context *c) > if (!o->use_iv) > msg (M_WARN, "WARNING: You have disabled Crypto IVs (--no-iv) which may > make " PACKAGE_NAME " less secure"); > > -#ifdef ENABLE_SSL > if (o->tls_server) > warn_on_use_of_common_subnets (); > if (o->tls_client > @@ -2513,7 +2493,6 @@ do_option_warnings (struct context *c) > && !o->remote_cert_eku) > msg (M_WARN, "WARNING: No server certificate verification method has > been enabled. See http://openvpn.net/howto.html#mitm for more info."); > #endif > -#endif > > #ifndef CONNECT_NONBLOCK > if (o->ce.connect_timeout_defined) > @@ -2535,7 +2514,7 @@ do_option_warnings (struct context *c) > static void > do_init_frame_tls (struct context *c) > { > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > do_init_finalize_tls_frame (c); > #endif > } > @@ -2733,9 +2712,7 @@ do_compute_occ_strings (struct context *c) > options_string_version (c->c2.options_string_remote, &gc), > md5sum ((uint8_t*)c->c2.options_string_remote, > strlen (c->c2.options_string_remote), 9, &gc)); > -#endif > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > if (c->c2.tls_multi) > tls_multi_init_set_options (c->c2.tls_multi, > c->c2.options_string_local, > @@ -2821,7 +2798,7 @@ do_close_free_buf (struct context *c) > static void > do_close_tls (struct context *c) > { > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > if (c->c2.tls_multi) > { > tls_multi_free (c->c2.tls_multi, true); > @@ -3072,7 +3049,7 @@ do_setup_fast_io (struct context *c) > static void > do_signal_on_tls_errors (struct context *c) > { > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > if (c->options.tls_exit) > c->c2.tls_exit_signal = SIGTERM; > else > @@ -3624,12 +3601,10 @@ inherit_context_child (struct context *dest, > > #ifdef ENABLE_CRYPTO > dest->c1.ks.key_type = src->c1.ks.key_type; > -#ifdef ENABLE_SSL > /* inherit SSL context */ > dest->c1.ks.ssl_ctx = src->c1.ks.ssl_ctx; > dest->c1.ks.tls_auth_key = src->c1.ks.tls_auth_key; > #endif > -#endif > > /* options */ > dest->options = src->options; > @@ -3701,7 +3676,7 @@ inherit_context_top (struct context *dest, > /* detach plugins */ > dest->plugins_owned = false; > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > dest->c2.tls_multi = NULL; > #endif > > diff --git a/src/openvpn/manage.c b/src/openvpn/manage.c > index 9f44cd9..e59776d 100644 > --- a/src/openvpn/manage.c > +++ b/src/openvpn/manage.c > @@ -701,7 +701,7 @@ man_query_need_str (struct management *man, const char > *type, const char *action > static void > man_forget_passwords (struct management *man) > { > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > ssl_purge_auth (false); > msg (M_CLIENT, "SUCCESS: Passwords were forgotten"); > #endif > @@ -1695,7 +1695,7 @@ man_reset_client_socket (struct management *man, const > bool exiting) > } > if (!exiting) > { > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > if (man->settings.flags & MF_FORGET_DISCONNECT) > ssl_purge_auth (false); > #endif > diff --git a/src/openvpn/openvpn.h b/src/openvpn/openvpn.h > index 24df3bb..fb532a2 100644 > --- a/src/openvpn/openvpn.h > +++ b/src/openvpn/openvpn.h > @@ -62,14 +62,11 @@ struct key_schedule > /* pre-shared static key, read from a file */ > struct key_ctx_bi static_key; > > -#ifdef ENABLE_SSL > /* our global SSL context */ > struct tls_root_ctx ssl_ctx; > > /* optional authentication HMAC key for TLS control channel */ > struct key_ctx_bi tls_auth_key; > - > -#endif /* ENABLE_SSL */ > #else /* ENABLE_CRYPTO */ > int dummy; > #endif /* ENABLE_CRYPTO */ > @@ -335,8 +332,6 @@ struct context_2 > /* > * TLS-mode crypto objects. > */ > -#ifdef ENABLE_SSL > - > struct tls_multi *tls_multi; /**< TLS state structure for this VPN > * tunnel. */ > > @@ -357,8 +352,6 @@ struct context_2 > /* throw this signal on TLS errors */ > int tls_exit_signal; > > -#endif /* ENABLE_SSL */ > - > struct crypto_options crypto_options; > /**< Security parameters and crypto state > * used by the \link data_crypto Data > @@ -566,7 +559,7 @@ struct context > * have been compiled in. > */ > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > #define TLS_MODE(c) ((c)->c2.tls_multi != NULL) > #define PROTO_DUMP_FLAGS (check_debug_level (D_LINK_RW_VERBOSE) ? > (PD_SHOW_DATA|PD_VERBOSE) : 0) > #define PROTO_DUMP(buf, gc) protocol_dump((buf), \ > diff --git a/src/openvpn/options.c b/src/openvpn/options.c > index 721b42e..24c7ae5 100644 > --- a/src/openvpn/options.c > +++ b/src/openvpn/options.c > @@ -68,7 +68,6 @@ const char title_string[] = > #endif > " " TARGET_ALIAS > #ifdef ENABLE_CRYPTO > -#ifdef ENABLE_SSL > #if defined(ENABLE_CRYPTO_POLARSSL) > " [SSL (PolarSSL)]" > #elif defined(ENABLE_CRYPTO_OPENSSL) > @@ -76,15 +75,6 @@ const char title_string[] = > #else > " [SSL]" > #endif /* defined(ENABLE_CRYPTO_POLARSSL) */ > -#else /* ! ENABLE_SSL */ > -#if defined(ENABLE_CRYPTO_POLARSSL) > - " [CRYPTO (PolarSSL)]" > -#elif defined(ENABLE_CRYPTO_OPENSSL) > - " [CRYPTO (OpenSSL)]" > -#else > - " [CRYPTO]" > -#endif /* defined(ENABLE_CRYPTO_POLARSSL) */ > -#endif /* ENABLE_SSL */ > #endif /* ENABLE_CRYPTO */ > #ifdef USE_COMP > #ifdef ENABLE_LZO > @@ -548,7 +538,6 @@ static const char usage_message[] = > "--use-prediction-resistance: Enable prediction resistance on the random\n" > " number generator.\n" > #endif > -#ifdef ENABLE_SSL > "\n" > "TLS Key Negotiation Options:\n" > "(These options are meaningful only for TLS-mode)\n" > @@ -633,7 +622,6 @@ static const char usage_message[] = > "--remote-cert-tls t: Require that peer certificate was signed with > explicit\n" > " key usage and extended key usage based on RFC3280 TLS > rules.\n" > " t = 'client' | 'server'.\n" > -#endif /* ENABLE_SSL */ > #ifdef ENABLE_PKCS11 > "\n" > "PKCS#11 Options:\n" > @@ -658,9 +646,7 @@ static const char usage_message[] = > "--show-ciphers : Show cipher algorithms to use with --cipher option.\n" > "--show-digests : Show message digest algorithms to use with --auth > option.\n" > "--show-engines : Show hardware crypto accelerator engines (if > available).\n" > -#ifdef ENABLE_SSL > "--show-tls : Show all TLS ciphers (TLS used only as a control > channel).\n" > -#endif > #ifdef WIN32 > "\n" > "Windows Specific:\n" > @@ -842,7 +828,6 @@ init_options (struct options *o, const bool init_gc) > #ifdef ENABLE_PREDICTION_RESISTANCE > o->use_prediction_resistance = false; > #endif > -#ifdef ENABLE_SSL > o->key_method = 2; > o->tls_timeout = 2; > o->renegotiate_seconds = 3600; > @@ -852,7 +837,6 @@ init_options (struct options *o, const bool init_gc) > #ifdef ENABLE_X509ALTUSERNAME > o->x509_username_field = X509_USERNAME_FIELD_DEFAULT; > #endif > -#endif /* ENABLE_SSL */ > #endif /* ENABLE_CRYPTO */ > #ifdef ENABLE_PKCS11 > o->pkcs11_pin_cache_period = -1; > @@ -1043,7 +1027,7 @@ string_substitute (const char *src, int from, int to, > struct gc_arena *gc) > return ret; > } > > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > static uint8_t * > parse_hash_fingerprint(const char *str, int nbytes, int msglevel, struct > gc_arena *gc) > { > @@ -1426,11 +1410,9 @@ show_settings (const struct options *o) > SHOW_BOOL (show_digests); > SHOW_BOOL (show_engines); > SHOW_BOOL (genkey); > -#ifdef ENABLE_SSL > SHOW_STR (key_pass_file); > SHOW_BOOL (show_tls_ciphers); > #endif > -#endif > > SHOW_INT (connect_retry_max); > show_connection_entries (o); > @@ -1584,7 +1566,6 @@ show_settings (const struct options *o) > SHOW_BOOL (use_prediction_resistance); > #endif > > -#ifdef ENABLE_SSL > SHOW_BOOL (tls_server); > SHOW_BOOL (tls_client); > SHOW_INT (key_method); > @@ -1636,8 +1617,7 @@ show_settings (const struct options *o) > SHOW_BOOL (tls_exit); > > SHOW_STR (tls_auth_file); > -#endif > -#endif > +#endif /* ENABLE_CRYPTO */ > > #ifdef ENABLE_PKCS11 > { > @@ -1853,7 +1833,7 @@ options_postprocess_verify_ce (const struct options > *options, const struct conne > msg (M_USAGE, "--inetd nowait can only be used with --proto tcp-server"); > > if (options->inetd == INETD_NOWAIT > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > && !(options->tls_server || options->tls_client) > #endif > ) > @@ -2144,8 +2124,6 @@ options_postprocess_verify_ce (const struct options > *options, const struct conne > /* > * SSL/TLS mode sanity checks. > */ > - > -#ifdef ENABLE_SSL > if (options->tls_server + options->tls_client + > (options->shared_secret_file != NULL) > 1) > msg (M_USAGE, "specify only one of --tls-server, --tls-client, or > --secret"); > @@ -2322,7 +2300,6 @@ options_postprocess_verify_ce (const struct options > *options, const struct conne > } > #undef MUST_BE_UNDEF > #endif /* ENABLE_CRYPTO */ > -#endif /* ENABLE_SSL */ > > #if P2MP > if (options->auth_user_pass_file && !options->pull) > @@ -2674,8 +2651,8 @@ options_postprocess_filechecks (struct options *options) > { > bool errs = false; > > +#ifdef ENABLE_CRYPTO > /* ** SSL/TLS/crypto related files ** */ > -#ifdef ENABLE_SSL > errs |= check_file_access (CHKACC_FILE|CHKACC_INLINE, options->dh_file, > R_OK, "--dh"); > errs |= check_file_access (CHKACC_FILE|CHKACC_INLINE, options->ca_file, > R_OK, "--ca"); > errs |= check_file_access_chroot (options->chroot_dir, CHKACC_FILE, > options->ca_path, R_OK, "--capath"); > @@ -2699,20 +2676,15 @@ options_postprocess_filechecks (struct options > *options) > > errs |= check_file_access (CHKACC_FILE|CHKACC_INLINE, > options->tls_auth_file, R_OK, > "--tls-auth"); > -#endif /* ENABLE_SSL */ > -#ifdef ENABLE_CRYPTO > errs |= check_file_access (CHKACC_FILE|CHKACC_INLINE, > options->shared_secret_file, R_OK, > "--secret"); > errs |= check_file_access (CHKACC_DIRPATH|CHKACC_FILEXSTWR, > options->packet_id_file, R_OK|W_OK, > "--replay-persist"); > -#endif /* ENABLE_CRYPTO */ > - > > /* ** Password files ** */ > -#ifdef ENABLE_SSL > errs |= check_file_access (CHKACC_FILE, options->key_pass_file, R_OK, > "--askpass"); > -#endif /* ENABLE_SSL */ > +#endif /* ENABLE_CRYPTO */ > #ifdef ENABLE_MANAGEMENT > errs |= check_file_access (CHKACC_FILE|CHKACC_ACPTSTDIN, > options->management_user_pass, R_OK, > @@ -2735,10 +2707,10 @@ options_postprocess_filechecks (struct options > *options) > R_OK|W_OK, "--status"); > > /* ** Config related ** */ > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > errs |= check_file_access_chroot (options->chroot_dir, CHKACC_FILE, > options->tls_export_cert, > R_OK|W_OK|X_OK, "--tls-export-cert"); > -#endif /* ENABLE_SSL */ > +#endif /* ENABLE_CRYPTO */ > #if P2MP_SERVER > errs |= check_file_access_chroot (options->chroot_dir, CHKACC_FILE, > options->client_config_dir, > R_OK|X_OK, "--client-config-dir"); > @@ -2967,13 +2939,8 @@ options_string (const struct options *o, > > #ifdef ENABLE_CRYPTO > > -#ifdef ENABLE_SSL > #define TLS_CLIENT (o->tls_client) > #define TLS_SERVER (o->tls_server) > -#else > -#define TLS_CLIENT (false) > -#define TLS_SERVER (false) > -#endif > > /* > * Key direction > @@ -3016,7 +2983,6 @@ options_string (const struct options *o, > #endif > } > > -#ifdef ENABLE_SSL > /* > * SSL Options > */ > @@ -3045,7 +3011,6 @@ options_string (const struct options *o, > buf_printf (&out, ",tls-server"); > } > } > -#endif /* ENABLE_SSL */ > > #undef TLS_CLIENT > #undef TLS_SERVER > @@ -3368,7 +3333,7 @@ usage (void) > struct options o; > init_options (&o, true); > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > fprintf (fp, usage_message, > title_string, > o.ce.connect_retry_seconds, > @@ -3379,15 +3344,6 @@ usage (void) > o.replay_window, o.replay_time, > o.tls_timeout, o.renegotiate_seconds, > o.handshake_window, o.transition_window); > -#elif defined(ENABLE_CRYPTO) > - fprintf (fp, usage_message, > - title_string, > - o.ce.connect_retry_seconds, > - o.ce.local_port, o.ce.remote_port, > - TUN_MTU_DEFAULT, TAP_MTU_EXTRA_DEFAULT, > - o.verbosity, > - o.authname, o.ciphername, > - o.replay_window, o.replay_time); > #else > fprintf (fp, usage_message, > title_string, > @@ -3413,7 +3369,7 @@ usage_small (void) > void > show_library_versions(const unsigned int flags) > { > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > #define SSL_LIB_VER_STR get_ssl_library_version() > #else > #define SSL_LIB_VER_STR "" > @@ -6484,7 +6440,6 @@ add_option (struct options *options, > options->use_prediction_resistance = true; > } > #endif > -#ifdef ENABLE_SSL > else if (streq (p[0], "show-tls")) > { > VERIFY_PERMISSION (OPT_P_GENERAL); > @@ -6921,7 +6876,6 @@ add_option (struct options *options, > options->x509_username_field = p[1]; > } > #endif /* ENABLE_X509ALTUSERNAME */ > -#endif /* ENABLE_SSL */ > #endif /* ENABLE_CRYPTO */ > #ifdef ENABLE_PKCS11 > else if (streq (p[0], "show-pkcs11-ids") && p[1]) > diff --git a/src/openvpn/options.h b/src/openvpn/options.h > index 9d188f8..7a8b21e 100644 > --- a/src/openvpn/options.h > +++ b/src/openvpn/options.h > @@ -195,10 +195,8 @@ struct options > bool show_ciphers; > bool show_digests; > bool show_engines; > -#ifdef ENABLE_SSL > bool show_tls_ciphers; > bool show_curves; > -#endif > bool genkey; > #endif > > @@ -500,7 +498,6 @@ struct options > bool use_prediction_resistance; > #endif > > -#ifdef ENABLE_SSL > /* TLS (control channel) parms */ > bool tls_server; > bool tls_client; > @@ -582,7 +579,6 @@ struct options > > bool tls_exit; > > -#endif /* ENABLE_SSL */ > #endif /* ENABLE_CRYPTO */ > > #ifdef ENABLE_X509_TRACK > diff --git a/src/openvpn/plugin.c b/src/openvpn/plugin.c > index 54c5b52..60dd2ee 100644 > --- a/src/openvpn/plugin.c > +++ b/src/openvpn/plugin.c > @@ -420,7 +420,7 @@ plugin_call_item (const struct plugin *p, > const struct argv *av, > struct openvpn_plugin_string_list **retlist, > const char **envp > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > , int certdepth, > openvpn_x509_cert_t *current_cert > #endif > @@ -449,7 +449,7 @@ plugin_call_item (const struct plugin *p, > (const char ** const) > envp, > p->plugin_handle, > per_client_context, > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > (current_cert ? certdepth > : -1), > current_cert > #else > @@ -659,7 +659,7 @@ plugin_call_ssl (const struct plugin_list *pl, > const struct argv *av, > struct plugin_return *pr, > struct env_set *es > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > , int certdepth, > openvpn_x509_cert_t *current_cert > #endif > @@ -689,7 +689,7 @@ plugin_call_ssl (const struct plugin_list *pl, > av, > pr ? &pr->list[i] : NULL, > envp > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > ,certdepth, > current_cert > #endif > diff --git a/src/openvpn/plugin.h b/src/openvpn/plugin.h > index 2f8416b..77b6e81 100644 > --- a/src/openvpn/plugin.h > +++ b/src/openvpn/plugin.h > @@ -127,7 +127,7 @@ int plugin_call_ssl (const struct plugin_list *pl, > const struct argv *av, > struct plugin_return *pr, > struct env_set *es > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > , int current_cert_depth, > openvpn_x509_cert_t *current_cert > #endif > @@ -183,7 +183,7 @@ plugin_call_ssl (const struct plugin_list *pl, > const struct argv *av, > struct plugin_return *pr, > struct env_set *es > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > , int current_cert_depth, > openvpn_x509_cert_t *current_cert > #endif > @@ -202,7 +202,7 @@ plugin_call(const struct plugin_list *pl, > struct env_set *es) > { > return plugin_call_ssl(pl, type, av, pr, es > -#ifdef ENABLE_SSL > +#ifdef ENABLE_CRYPTO > , -1, NULL > #endif > ); > diff --git a/src/openvpn/reliable.c b/src/openvpn/reliable.c > index 763169e..22883a7 100644 > --- a/src/openvpn/reliable.c > +++ b/src/openvpn/reliable.c > @@ -35,7 +35,7 @@ > > #include "syshead.h" > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > > #include "buffer.h" > #include "error.h" > @@ -754,4 +754,4 @@ reliable_debug_print (const struct reliable *rel, char > *desc) > > #else > static void dummy(void) {} > -#endif /* ENABLE_CRYPTO && ENABLE_SSL*/ > +#endif /* ENABLE_CRYPTO */ > diff --git a/src/openvpn/reliable.h b/src/openvpn/reliable.h > index 594ab82..828dcd3 100644 > --- a/src/openvpn/reliable.h > +++ b/src/openvpn/reliable.h > @@ -29,7 +29,7 @@ > */ > > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > > #ifndef RELIABLE_H > #define RELIABLE_H > @@ -477,4 +477,4 @@ void reliable_ack_debug_print (const struct reliable_ack > *ack, char *desc); > > > #endif /* RELIABLE_H */ > -#endif /* ENABLE_CRYPTO && ENABLE_SSL */ > +#endif /* ENABLE_CRYPTO */ > diff --git a/src/openvpn/session_id.c b/src/openvpn/session_id.c > index 2e07b54..0ebff65 100644 > --- a/src/openvpn/session_id.c > +++ b/src/openvpn/session_id.c > @@ -39,7 +39,7 @@ > > #include "syshead.h" > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > > #include "error.h" > #include "common.h" > @@ -64,4 +64,4 @@ session_id_print (const struct session_id *sid, struct > gc_arena *gc) > > #else > static void dummy(void) {} > -#endif /* ENABLE_CRYPTO && ENABLE_SSL*/ > +#endif /* ENABLE_CRYPTO */ > diff --git a/src/openvpn/session_id.h b/src/openvpn/session_id.h > index 33909dd..2a1f41f 100644 > --- a/src/openvpn/session_id.h > +++ b/src/openvpn/session_id.h > @@ -30,7 +30,7 @@ > * negotiated). > */ > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > > #ifndef SESSION_ID_H > #define SESSION_ID_H > @@ -83,4 +83,4 @@ void session_id_random (struct session_id *sid); > const char *session_id_print (const struct session_id *sid, struct gc_arena > *gc); > > #endif /* SESSION_ID_H */ > -#endif /* ENABLE_CRYPTO && ENABLE_SSL */ > +#endif /* ENABLE_CRYPTO */ > diff --git a/src/openvpn/ssl.c b/src/openvpn/ssl.c > index 2adfa26..ca1ad13 100644 > --- a/src/openvpn/ssl.c > +++ b/src/openvpn/ssl.c > @@ -43,7 +43,7 @@ > > #include "syshead.h" > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#if defined(ENABLE_CRYPTO) > > #include "error.h" > #include "common.h" > @@ -3621,4 +3621,4 @@ done: > > #else > static void dummy(void) {} > -#endif /* ENABLE_CRYPTO && ENABLE_SSL*/ > +#endif /* ENABLE_CRYPTO */ > diff --git a/src/openvpn/ssl.h b/src/openvpn/ssl.h > index 7e5a203..797c3e5 100644 > --- a/src/openvpn/ssl.h > +++ b/src/openvpn/ssl.h > @@ -30,7 +30,7 @@ > #ifndef OPENVPN_SSL_H > #define OPENVPN_SSL_H > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#if defined(ENABLE_CRYPTO) > > #include "basic.h" > #include "common.h" > @@ -512,6 +512,6 @@ void show_tls_performance_stats(void); > /*#define EXTRACT_X509_FIELD_TEST*/ > void extract_x509_field_test (void); > > -#endif /* ENABLE_CRYPTO && ENABLE_SSL */ > +#endif /* ENABLE_CRYPTO */ > > #endif > diff --git a/src/openvpn/ssl_openssl.c b/src/openvpn/ssl_openssl.c > index 6782a95..57fcadb 100644 > --- a/src/openvpn/ssl_openssl.c > +++ b/src/openvpn/ssl_openssl.c > @@ -35,7 +35,7 @@ > > #include "syshead.h" > > -#if defined(ENABLE_SSL) && defined(ENABLE_CRYPTO_OPENSSL) > +#if defined(ENABLE_CRYPTO) && defined(ENABLE_CRYPTO_OPENSSL) > > #include "errlevel.h" > #include "buffer.h" > @@ -1457,4 +1457,4 @@ get_ssl_library_version(void) > return SSLeay_version(SSLEAY_VERSION); > } > > -#endif /* defined(ENABLE_SSL) && defined(ENABLE_CRYPTO_OPENSSL) */ > +#endif /* defined(ENABLE_CRYPTO) && defined(ENABLE_CRYPTO_OPENSSL) */ > diff --git a/src/openvpn/ssl_polarssl.c b/src/openvpn/ssl_polarssl.c > index 2036885..8cb328e 100644 > --- a/src/openvpn/ssl_polarssl.c > +++ b/src/openvpn/ssl_polarssl.c > @@ -36,7 +36,7 @@ > > #include "syshead.h" > > -#if defined(ENABLE_SSL) && defined(ENABLE_CRYPTO_POLARSSL) > +#if defined(ENABLE_CRYPTO) && defined(ENABLE_CRYPTO_POLARSSL) > > #include "errlevel.h" > #include "ssl_backend.h" > @@ -1171,4 +1171,4 @@ get_ssl_library_version(void) > return polar_version; > } > > -#endif /* defined(ENABLE_SSL) && defined(ENABLE_CRYPTO_POLARSSL) */ > +#endif /* defined(ENABLE_CRYPTO) && defined(ENABLE_CRYPTO_POLARSSL) */ > diff --git a/src/openvpn/ssl_verify.c b/src/openvpn/ssl_verify.c > index 2d10d15..cec5f02 100644 > --- a/src/openvpn/ssl_verify.c > +++ b/src/openvpn/ssl_verify.c > @@ -35,7 +35,7 @@ > > #include "syshead.h" > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > > #include "misc.h" > #include "manage.h" > @@ -1268,4 +1268,4 @@ verify_final_auth_checks(struct tls_multi *multi, > struct tls_session *session) > gc_free (&gc); > } > } > -#endif /* defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) */ > +#endif /* ENABLE_CRYPTO */ > diff --git a/src/openvpn/ssl_verify.h b/src/openvpn/ssl_verify.h > index 84554f8..5f23431 100644 > --- a/src/openvpn/ssl_verify.h > +++ b/src/openvpn/ssl_verify.h > @@ -30,7 +30,7 @@ > #ifndef SSL_VERIFY_H_ > #define SSL_VERIFY_H_ > > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#ifdef ENABLE_CRYPTO > > #include "syshead.h" > #include "misc.h" > @@ -236,6 +236,6 @@ tls_client_reason (struct tls_multi *multi) > #endif > } > > -#endif /* defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) */ > +#endif /* ENABLE_CRYPTO */ > > #endif /* SSL_VERIFY_H_ */ > diff --git a/src/openvpn/ssl_verify_openssl.c > b/src/openvpn/ssl_verify_openssl.c > index 33cd757..0348e98 100644 > --- a/src/openvpn/ssl_verify_openssl.c > +++ b/src/openvpn/ssl_verify_openssl.c > @@ -35,7 +35,7 @@ > > #include "syshead.h" > > -#if defined(ENABLE_SSL) && defined(ENABLE_CRYPTO_OPENSSL) > +#if defined(ENABLE_CRYPTO) && defined(ENABLE_CRYPTO_OPENSSL) > > #include "ssl_verify_openssl.h" > > @@ -625,4 +625,4 @@ end: > return retval; > } > > -#endif /* defined(ENABLE_SSL) && defined(ENABLE_CRYPTO_OPENSSL) */ > +#endif /* defined(ENABLE_CRYPTO) && defined(ENABLE_CRYPTO_OPENSSL) */ > diff --git a/src/openvpn/ssl_verify_polarssl.c > b/src/openvpn/ssl_verify_polarssl.c > index 2b7c214..e21301d 100644 > --- a/src/openvpn/ssl_verify_polarssl.c > +++ b/src/openvpn/ssl_verify_polarssl.c > @@ -35,7 +35,7 @@ > > #include "syshead.h" > > -#if defined(ENABLE_SSL) && defined(ENABLE_CRYPTO_POLARSSL) > +#if defined(ENABLE_CRYPTO) && defined(ENABLE_CRYPTO_POLARSSL) > > #include "ssl_verify.h" > #include <polarssl/error.h> > @@ -403,4 +403,4 @@ end: > return retval; > } > > -#endif /* #if defined(ENABLE_SSL) && defined(ENABLE_CRYPTO_POLARSSL) */ > +#endif /* #if defined(ENABLE_CRYPTO) && defined(ENABLE_CRYPTO_POLARSSL) */ > diff --git a/src/openvpn/syshead.h b/src/openvpn/syshead.h > index 8b6d284..b898bf2 100644 > --- a/src/openvpn/syshead.h > +++ b/src/openvpn/syshead.h > @@ -517,7 +517,7 @@ socket_defined (const socket_descriptor_t sd) > * Do we have point-to-multipoint capability? > */ > > -#if defined(ENABLE_CLIENT_SERVER) && defined(ENABLE_CRYPTO) && > defined(ENABLE_SSL) && defined(HAVE_GETTIMEOFDAY_NANOSECONDS) > +#if defined(ENABLE_CLIENT_SERVER) && defined(ENABLE_CRYPTO) && > defined(HAVE_GETTIMEOFDAY_NANOSECONDS) > #define P2MP 1 > #else > #define P2MP 0 > @@ -554,7 +554,7 @@ socket_defined (const socket_descriptor_t sd) > /* > * Enable external private key > */ > -#if defined(ENABLE_MANAGEMENT) && defined(ENABLE_SSL) > +#if defined(ENABLE_MANAGEMENT) && defined(ENABLE_CRYPTO) > #define MANAGMENT_EXTERNAL_KEY > #endif > > @@ -621,14 +621,14 @@ socket_defined (const socket_descriptor_t sd) > /* > * Do we have CryptoAPI capability? > */ > -#if defined(WIN32) && defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) && > defined(ENABLE_CRYPTO_OPENSSL) > +#if defined(WIN32) && defined(ENABLE_CRYPTO) && > defined(ENABLE_CRYPTO_OPENSSL) > #define ENABLE_CRYPTOAPI > #endif > > /* > * Enable x509-track feature? > */ > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) && defined > (ENABLE_CRYPTO_OPENSSL) > +#if defined(ENABLE_CRYPTO) && defined (ENABLE_CRYPTO_OPENSSL) > #define ENABLE_X509_TRACK > #endif > > @@ -697,7 +697,7 @@ socket_defined (const socket_descriptor_t sd) > /* > * Do we support pushing peer info? > */ > -#if defined(ENABLE_CRYPTO) && defined(ENABLE_SSL) > +#if defined(ENABLE_CRYPTO) > #define ENABLE_PUSH_PEER_INFO > #endif > > -- > 1.9.1 > > > ------------------------------------------------------------------------------ > Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server > from Actuate! Instantly Supercharge Your Business Reports and Dashboards > with Interactivity, Sharing, Native Excel Exports, App Integration & more > Get technology previously reserved for billion-dollar corporations, FREE > http://pubads.g.doubleclick.net/gampad/clk?id=157005751&iu=/4140/ostg.clktrk > _______________________________________________ > Openvpn-devel mailing list > Openvpn-devel@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/openvpn-devel