* given to unbound on the commandline. */
/* read ssl keys while superuser and outside chroot */
+#ifdef HAVE_SSL
if(!(daemon->rc = daemon_remote_create(cfg)))
fatal_exit("could not set up remote-control");
if(cfg->ssl_service_key && cfg->ssl_service_key[0]) {
}
if(!(daemon->connect_sslctx = connect_sslctx_create(NULL, NULL, NULL)))
fatal_exit("could not set up connect SSL_CTX");
+#endif
#ifdef HAVE_KILL
/* check old pid file before forking */
+4 July 2012: Wouter
+ - compile libunbound with libnss on Suse, passes regression tests.
+
3 July 2012: Wouter
- FIPS_mode openssl does not use arc4random but RAND_pseudo_bytes.
ERR_error_string_n(e, buf, sizeof(buf));
log_err("and additionally crypto %s", buf);
}
+#else
+ (void)str;
#endif /* HAVE_SSL */
}
SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
}
return ctx;
+#else
+ (void)key; (void)pem; (void)verifypem;
+ return NULL;
#endif
}
SSL_CTX_set_verify(ctx, SSL_VERIFY_PEER, NULL);
}
return ctx;
+#else
+ (void)key; (void)pem; (void)verifypem;
+ return NULL;
#endif
}
return NULL;
}
return ssl;
+#else
+ (void)sslctx; (void)fd;
+ return NULL;
#endif
}
return NULL;
}
return ssl;
+#else
+ (void)sslctx; (void)fd;
+ return NULL;
#endif
}
}
/** continue ssl handshake */
+#ifdef HAVE_SSL
static int
ssl_handshake(struct comm_point* c)
{
-#ifdef HAVE_SSL
int r;
if(c->ssl_shake_state == comm_ssl_shake_hs_read) {
/* read condition satisfied back to writing */
}
c->ssl_shake_state = comm_ssl_shake_none;
return 1;
-#endif /* HAVE_SSL */
}
+#endif /* HAVE_SSL */
/** ssl read callback on TCP */
static int
tcp_callback_reader(c);
}
return 1;
+#else
+ (void)c;
+ return 0;
#endif /* HAVE_SSL */
}
tcp_callback_writer(c);
}
return 1;
+#else
+ (void)c;
+ return 0;
#endif /* HAVE_SSL */
}