diff options
Diffstat (limited to 'monitor_wrap.c')
-rw-r--r-- | monitor_wrap.c | 12 |
1 files changed, 11 insertions, 1 deletions
diff --git a/monitor_wrap.c b/monitor_wrap.c index 1a47e4174..45dc16951 100644 --- a/monitor_wrap.c +++ b/monitor_wrap.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: monitor_wrap.c,v 1.79 2014/02/02 03:44:31 djm Exp $ */ | 1 | /* $OpenBSD: monitor_wrap.c,v 1.80 2014/04/29 18:01:49 markus Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> | 3 | * Copyright 2002 Niels Provos <provos@citi.umich.edu> |
4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> | 4 | * Copyright 2002 Markus Friedl <markus@openbsd.org> |
@@ -38,14 +38,18 @@ | |||
38 | #include <string.h> | 38 | #include <string.h> |
39 | #include <unistd.h> | 39 | #include <unistd.h> |
40 | 40 | ||
41 | #ifdef WITH_OPENSSL | ||
41 | #include <openssl/bn.h> | 42 | #include <openssl/bn.h> |
42 | #include <openssl/dh.h> | 43 | #include <openssl/dh.h> |
43 | #include <openssl/evp.h> | 44 | #include <openssl/evp.h> |
45 | #endif | ||
44 | 46 | ||
45 | #include "openbsd-compat/sys-queue.h" | 47 | #include "openbsd-compat/sys-queue.h" |
46 | #include "xmalloc.h" | 48 | #include "xmalloc.h" |
47 | #include "ssh.h" | 49 | #include "ssh.h" |
50 | #ifdef WITH_OPENSSL | ||
48 | #include "dh.h" | 51 | #include "dh.h" |
52 | #endif | ||
49 | #include "buffer.h" | 53 | #include "buffer.h" |
50 | #include "key.h" | 54 | #include "key.h" |
51 | #include "cipher.h" | 55 | #include "cipher.h" |
@@ -174,6 +178,7 @@ mm_request_receive_expect(int sock, enum monitor_reqtype type, Buffer *m) | |||
174 | rtype, type); | 178 | rtype, type); |
175 | } | 179 | } |
176 | 180 | ||
181 | #ifdef WITH_OPENSSL | ||
177 | DH * | 182 | DH * |
178 | mm_choose_dh(int min, int nbits, int max) | 183 | mm_choose_dh(int min, int nbits, int max) |
179 | { | 184 | { |
@@ -207,6 +212,7 @@ mm_choose_dh(int min, int nbits, int max) | |||
207 | 212 | ||
208 | return (dh_new_group(g, p)); | 213 | return (dh_new_group(g, p)); |
209 | } | 214 | } |
215 | #endif | ||
210 | 216 | ||
211 | int | 217 | int |
212 | mm_key_sign(Key *key, u_char **sigp, u_int *lenp, u_char *data, u_int datalen) | 218 | mm_key_sign(Key *key, u_char **sigp, u_int *lenp, u_char *data, u_int datalen) |
@@ -912,6 +918,7 @@ mm_terminate(void) | |||
912 | buffer_free(&m); | 918 | buffer_free(&m); |
913 | } | 919 | } |
914 | 920 | ||
921 | #ifdef WITH_SSH1 | ||
915 | int | 922 | int |
916 | mm_ssh1_session_key(BIGNUM *num) | 923 | mm_ssh1_session_key(BIGNUM *num) |
917 | { | 924 | { |
@@ -931,6 +938,7 @@ mm_ssh1_session_key(BIGNUM *num) | |||
931 | 938 | ||
932 | return (rsafail); | 939 | return (rsafail); |
933 | } | 940 | } |
941 | #endif | ||
934 | 942 | ||
935 | static void | 943 | static void |
936 | mm_chall_setup(char **name, char **infotxt, u_int *numprompts, | 944 | mm_chall_setup(char **name, char **infotxt, u_int *numprompts, |
@@ -1078,6 +1086,7 @@ mm_ssh1_session_id(u_char session_id[16]) | |||
1078 | buffer_free(&m); | 1086 | buffer_free(&m); |
1079 | } | 1087 | } |
1080 | 1088 | ||
1089 | #ifdef WITH_SSH1 | ||
1081 | int | 1090 | int |
1082 | mm_auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) | 1091 | mm_auth_rsa_key_allowed(struct passwd *pw, BIGNUM *client_n, Key **rkey) |
1083 | { | 1092 | { |
@@ -1173,6 +1182,7 @@ mm_auth_rsa_verify_response(Key *key, BIGNUM *p, u_char response[16]) | |||
1173 | 1182 | ||
1174 | return (success); | 1183 | return (success); |
1175 | } | 1184 | } |
1185 | #endif | ||
1176 | 1186 | ||
1177 | #ifdef SSH_AUDIT_EVENTS | 1187 | #ifdef SSH_AUDIT_EVENTS |
1178 | void | 1188 | void |