aboutsummaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorDavid Sommerseth2023-11-22 20:00:57 +0100
committerGert Doering2023-12-06 13:07:11 +0100
commitf015643fe23d7847ad45b7763f31bfc6baed2159 (patch)
tree1df6bfab10e88e5bd49a56e860ae2af060914063 /src
parent12c5ef1fe6a6010362f3098d11b554566687c1f7 (diff)
downloadopenvpn-f015643fe23d7847ad45b7763f31bfc6baed2159.zip
openvpn-f015643fe23d7847ad45b7763f31bfc6baed2159.tar.gz
Remove superfluous x509_write_pem()
After removing --tls-export-cert, this function was left in the code base with no other users. This was an oversight in the previous change. Removing it to avoid leaving dead code behind. Signed-off-by: David Sommerseth <davids@openvpn.net> Acked-by: Gert Doering <gert@greenie.muc.de> Message-Id: <20231122190057.120384-1-dazo+openvpn@eurephia.org> URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg27561.html Signed-off-by: Gert Doering <gert@greenie.muc.de>
Diffstat (limited to 'src')
-rw-r--r--src/openvpn/ssl_verify_backend.h11
-rw-r--r--src/openvpn/ssl_verify_mbedtls.c7
-rw-r--r--src/openvpn/ssl_verify_openssl.c11
3 files changed, 0 insertions, 29 deletions
diff --git a/src/openvpn/ssl_verify_backend.h b/src/openvpn/ssl_verify_backend.h
index 3b79881..d402b1f 100644
--- a/src/openvpn/ssl_verify_backend.h
+++ b/src/openvpn/ssl_verify_backend.h
@@ -249,17 +249,6 @@ result_t x509_verify_cert_ku(openvpn_x509_cert_t *x509, const unsigned *const ex
*/
result_t x509_verify_cert_eku(openvpn_x509_cert_t *x509, const char *const expected_oid);
-/*
- * Store the given certificate in pem format in a temporary file in tmp_dir
- *
- * @param cert Certificate to store
- * @param tmp_dir Temporary directory to store the directory
- * @param gc gc_arena to store temporary objects in
- *
- *
- */
-result_t x509_write_pem(FILE *peercert_file, openvpn_x509_cert_t *peercert);
-
/**
* Return true iff a CRL is configured, but is not loaded. This can be caused
* by e.g. a CRL parsing error, a missing CRL file or CRL file permission
diff --git a/src/openvpn/ssl_verify_mbedtls.c b/src/openvpn/ssl_verify_mbedtls.c
index ce21324..5612139 100644
--- a/src/openvpn/ssl_verify_mbedtls.c
+++ b/src/openvpn/ssl_verify_mbedtls.c
@@ -536,13 +536,6 @@ x509_verify_cert_eku(mbedtls_x509_crt *cert, const char *const expected_oid)
return fFound;
}
-result_t
-x509_write_pem(FILE *peercert_file, mbedtls_x509_crt *peercert)
-{
- msg(M_WARN, "mbed TLS does not support writing peer certificate in PEM format");
- return FAILURE;
-}
-
bool
tls_verify_crl_missing(const struct tls_options *opt)
{
diff --git a/src/openvpn/ssl_verify_openssl.c b/src/openvpn/ssl_verify_openssl.c
index 3194c23..5afffc1 100644
--- a/src/openvpn/ssl_verify_openssl.c
+++ b/src/openvpn/ssl_verify_openssl.c
@@ -762,17 +762,6 @@ x509_verify_cert_eku(X509 *x509, const char *const expected_oid)
return fFound;
}
-result_t
-x509_write_pem(FILE *peercert_file, X509 *peercert)
-{
- if (PEM_write_X509(peercert_file, peercert) < 0)
- {
- msg(M_NONFATAL, "Failed to write peer certificate in PEM format");
- return FAILURE;
- }
- return SUCCESS;
-}
-
bool
tls_verify_crl_missing(const struct tls_options *opt)
{