summaryrefslogtreecommitdiff
path: root/sshkey.c
diff options
context:
space:
mode:
authorDamien Miller <djm@mindrot.org>2019-12-14 09:21:46 +1100
committerDamien Miller <djm@mindrot.org>2019-12-14 09:21:46 +1100
commit9244990ecdcfa36bb9371058111685b05f201c1e (patch)
treea068b6ce79b806f20c0159cf3306a0234ef1f387 /sshkey.c
parenta33ab1688b5c460a7e2a301418241ce1b13b2638 (diff)
remove a bunch of ENABLE_SK #ifdefs
The ssh-sk-helper client API gives us a nice place to disable security key support when it is wasn't enabled at compile time, so we don't need to check everywere. Also, verification of security key signatures can remain enabled all the time - it has no additional dependencies. So sshd can accept security key pubkeys in authorized_keys, etc regardless of the host's support for dlopen, etc.
Diffstat (limited to 'sshkey.c')
-rw-r--r--sshkey.c4
1 files changed, 0 insertions, 4 deletions
diff --git a/sshkey.c b/sshkey.c
index 674303c37..3bab2e893 100644
--- a/sshkey.c
+++ b/sshkey.c
@@ -2760,7 +2760,6 @@ sshkey_sign(struct sshkey *key,
2760 case KEY_ED25519_CERT: 2760 case KEY_ED25519_CERT:
2761 r = ssh_ed25519_sign(key, sigp, lenp, data, datalen, compat); 2761 r = ssh_ed25519_sign(key, sigp, lenp, data, datalen, compat);
2762 break; 2762 break;
2763#ifdef ENABLE_SK
2764 case KEY_ED25519_SK: 2763 case KEY_ED25519_SK:
2765 case KEY_ED25519_SK_CERT: 2764 case KEY_ED25519_SK_CERT:
2766 case KEY_ECDSA_SK_CERT: 2765 case KEY_ECDSA_SK_CERT:
@@ -2768,7 +2767,6 @@ sshkey_sign(struct sshkey *key,
2768 r = sshsk_sign(sk_provider, key, sigp, lenp, data, 2767 r = sshsk_sign(sk_provider, key, sigp, lenp, data,
2769 datalen, compat); 2768 datalen, compat);
2770 break; 2769 break;
2771#endif /* ENABLE_SK */
2772#ifdef WITH_XMSS 2770#ifdef WITH_XMSS
2773 case KEY_XMSS: 2771 case KEY_XMSS:
2774 case KEY_XMSS_CERT: 2772 case KEY_XMSS_CERT:
@@ -2807,12 +2805,10 @@ sshkey_verify(const struct sshkey *key,
2807 case KEY_ECDSA_CERT: 2805 case KEY_ECDSA_CERT:
2808 case KEY_ECDSA: 2806 case KEY_ECDSA:
2809 return ssh_ecdsa_verify(key, sig, siglen, data, dlen, compat); 2807 return ssh_ecdsa_verify(key, sig, siglen, data, dlen, compat);
2810# ifdef ENABLE_SK
2811 case KEY_ECDSA_SK_CERT: 2808 case KEY_ECDSA_SK_CERT:
2812 case KEY_ECDSA_SK: 2809 case KEY_ECDSA_SK:
2813 return ssh_ecdsa_sk_verify(key, sig, siglen, data, dlen, 2810 return ssh_ecdsa_sk_verify(key, sig, siglen, data, dlen,
2814 compat, detailsp); 2811 compat, detailsp);
2815# endif /* ENABLE_SK */
2816# endif /* OPENSSL_HAS_ECC */ 2812# endif /* OPENSSL_HAS_ECC */
2817 case KEY_RSA_CERT: 2813 case KEY_RSA_CERT:
2818 case KEY_RSA: 2814 case KEY_RSA: