mirror of
https://github.com/OpenVPN/openvpn.git
synced 2024-09-19 19:42:30 +02:00
Remove ENABLE_OCC #define
Commit 037669f3dd
already made occ being unconditionally on. This commit
only removes the #ifdefs
Signed-off-by: Arne Schwabe <arne@rfc2549.org>
Acked-by: Gert Doering <gert@greenie.muc.de>
Message-Id: <20200717134739.21168-6-arne@rfc2549.org>
URL: https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg20442.html
Signed-off-by: Gert Doering <gert@greenie.muc.de>
This commit is contained in:
parent
36bef1b52b
commit
ba66faad56
@ -822,7 +822,6 @@ process_coarse_timers(struct context *c)
|
||||
}
|
||||
#endif
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* Should we send an OCC_REQUEST message? */
|
||||
check_send_occ_req(c);
|
||||
|
||||
@ -834,7 +833,6 @@ process_coarse_timers(struct context *c)
|
||||
{
|
||||
process_explicit_exit_notification_timer_wakeup(c);
|
||||
}
|
||||
#endif
|
||||
|
||||
/* Should we ping the remote? */
|
||||
check_ping_send(c);
|
||||
@ -983,14 +981,12 @@ read_incoming_link(struct context *c)
|
||||
}
|
||||
else
|
||||
{
|
||||
#ifdef ENABLE_OCC
|
||||
if (event_timeout_defined(&c->c2.explicit_exit_notification_interval))
|
||||
{
|
||||
msg(D_STREAM_ERRORS, "Connection reset during exit notification period, ignoring [%d]", status);
|
||||
management_sleep(1);
|
||||
}
|
||||
else
|
||||
#endif
|
||||
{
|
||||
register_signal(c, SIGUSR1, "connection-reset"); /* SOFT-SIGUSR1 -- TCP connection reset */
|
||||
msg(D_STREAM_ERRORS, "Connection reset, restarting [%d]", status);
|
||||
@ -1214,13 +1210,11 @@ process_incoming_link_part2(struct context *c, struct link_socket_info *lsi, con
|
||||
c->c2.buf.len = 0; /* drop packet */
|
||||
}
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* Did we just receive an OCC packet? */
|
||||
if (is_occ_msg(&c->c2.buf))
|
||||
{
|
||||
process_received_occ_msg(c);
|
||||
}
|
||||
#endif
|
||||
|
||||
buffer_turnover(orig_buf, &c->c2.to_tun, &c->c2.buf, &c->c2.buffers->read_link_buf);
|
||||
|
||||
@ -1992,10 +1986,8 @@ pre_select(struct context *c)
|
||||
/* check for incoming configuration info on the control channel */
|
||||
check_incoming_control_channel(c);
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* Should we send an OCC message? */
|
||||
check_send_occ_msg(c);
|
||||
#endif
|
||||
|
||||
#ifdef ENABLE_FRAGMENT
|
||||
/* Should we deliver a datagram fragment to remote? */
|
||||
|
@ -1419,7 +1419,6 @@ do_init_timers(struct context *c, bool deferred)
|
||||
/* initialize connection establishment timer */
|
||||
event_timeout_init(&c->c2.wait_for_connect, 1, now);
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* initialize occ timers */
|
||||
|
||||
if (c->options.occ
|
||||
@ -1433,7 +1432,6 @@ do_init_timers(struct context *c, bool deferred)
|
||||
{
|
||||
event_timeout_init(&c->c2.occ_mtu_load_test_interval, OCC_MTU_LOAD_INTERVAL_SECONDS, now);
|
||||
}
|
||||
#endif
|
||||
|
||||
/* initialize packet_id persistence timer */
|
||||
if (c->options.packet_id_file)
|
||||
@ -2279,7 +2277,6 @@ do_deferred_options(struct context *c, const unsigned int found)
|
||||
msg(D_PUSH, "OPTIONS IMPORT: timers and/or timeouts modified");
|
||||
}
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
if (found & OPT_P_EXPLICIT_NOTIFY)
|
||||
{
|
||||
if (!proto_is_udp(c->options.ce.proto) && c->options.ce.explicit_exit_notification)
|
||||
@ -2292,7 +2289,6 @@ do_deferred_options(struct context *c, const unsigned int found)
|
||||
msg(D_PUSH, "OPTIONS IMPORT: explicit notify parm(s) modified");
|
||||
}
|
||||
}
|
||||
#endif
|
||||
|
||||
#ifdef USE_COMP
|
||||
if (found & OPT_P_COMP)
|
||||
@ -2901,9 +2897,7 @@ do_init_crypto_tls(struct context *c, const unsigned int flags)
|
||||
to.xmit_hold = true;
|
||||
}
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
to.disable_occ = !options->occ;
|
||||
#endif
|
||||
|
||||
to.verify_command = options->tls_verify;
|
||||
to.verify_export_cert = options->tls_export_cert;
|
||||
@ -3193,7 +3187,7 @@ do_init_frame(struct context *c)
|
||||
c->c2.frame_fragment_initial = c->c2.frame_fragment;
|
||||
#endif
|
||||
|
||||
#if defined(ENABLE_FRAGMENT) && defined(ENABLE_OCC)
|
||||
#if defined(ENABLE_FRAGMENT)
|
||||
/*
|
||||
* MTU advisories
|
||||
*/
|
||||
@ -3478,7 +3472,6 @@ do_print_data_channel_mtu_parms(struct context *c)
|
||||
#endif
|
||||
}
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/*
|
||||
* Get local and remote options compatibility strings.
|
||||
*/
|
||||
@ -3510,7 +3503,6 @@ do_compute_occ_strings(struct context *c)
|
||||
|
||||
gc_free(&gc);
|
||||
}
|
||||
#endif /* ifdef ENABLE_OCC */
|
||||
|
||||
/*
|
||||
* These things can only be executed once per program instantiation.
|
||||
@ -3586,7 +3578,6 @@ do_close_tls(struct context *c)
|
||||
c->c2.tls_multi = NULL;
|
||||
}
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* free options compatibility strings */
|
||||
if (c->c2.options_string_local)
|
||||
{
|
||||
@ -3597,7 +3588,6 @@ do_close_tls(struct context *c)
|
||||
free(c->c2.options_string_remote);
|
||||
}
|
||||
c->c2.options_string_local = c->c2.options_string_remote = NULL;
|
||||
#endif
|
||||
|
||||
if (c->c2.pulled_options_state)
|
||||
{
|
||||
@ -4256,13 +4246,11 @@ init_instance(struct context *c, const struct env_set *env, const unsigned int f
|
||||
do_open_ifconfig_pool_persist(c);
|
||||
}
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* reset OCC state */
|
||||
if (c->mode == CM_P2P || child)
|
||||
{
|
||||
c->c2.occ_op = occ_reset_op();
|
||||
}
|
||||
#endif
|
||||
|
||||
/* our wait-for-i/o objects, different for posix vs. win32 */
|
||||
if (c->mode == CM_P2P)
|
||||
@ -4362,13 +4350,11 @@ init_instance(struct context *c, const struct env_set *env, const unsigned int f
|
||||
/* print MTU info */
|
||||
do_print_data_channel_mtu_parms(c);
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* get local and remote options compatibility strings */
|
||||
if (c->mode == CM_P2P || child)
|
||||
{
|
||||
do_compute_occ_strings(c);
|
||||
}
|
||||
#endif
|
||||
|
||||
/* initialize output speed limiter */
|
||||
if (c->mode == CM_P2P)
|
||||
|
@ -29,8 +29,6 @@
|
||||
|
||||
#include "syshead.h"
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
|
||||
#include "occ.h"
|
||||
#include "forward.h"
|
||||
#include "memdbg.h"
|
||||
@ -424,10 +422,3 @@ process_received_occ_msg(struct context *c)
|
||||
}
|
||||
c->c2.buf.len = 0; /* don't pass packet on */
|
||||
}
|
||||
|
||||
#else /* ifdef ENABLE_OCC */
|
||||
static void
|
||||
dummy(void)
|
||||
{
|
||||
}
|
||||
#endif /* ifdef ENABLE_OCC */
|
||||
|
@ -24,8 +24,6 @@
|
||||
#ifndef OCC_H
|
||||
#define OCC_H
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
|
||||
#include "forward.h"
|
||||
|
||||
/* OCC_STRING_SIZE must be set to sizeof (occ_magic) */
|
||||
@ -155,5 +153,4 @@ check_send_occ_msg(struct context *c)
|
||||
}
|
||||
}
|
||||
|
||||
#endif /* ifdef ENABLE_OCC */
|
||||
#endif /* ifndef OCC_H */
|
||||
|
@ -320,7 +320,6 @@ struct context_2
|
||||
struct event_timeout inactivity_interval;
|
||||
int inactivity_bytes;
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* the option strings must match across peers */
|
||||
char *options_string_local;
|
||||
char *options_string_remote;
|
||||
@ -328,7 +327,6 @@ struct context_2
|
||||
int occ_op; /* INIT to -1 */
|
||||
int occ_n_tries;
|
||||
struct event_timeout occ_interval;
|
||||
#endif
|
||||
|
||||
/*
|
||||
* Keep track of maximum packet size received so far
|
||||
@ -340,13 +338,12 @@ struct context_2
|
||||
int max_send_size_local; /* max packet size sent */
|
||||
int max_send_size_remote; /* max packet size sent by remote */
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
|
||||
/* remote wants us to send back a load test packet of this size */
|
||||
int occ_mtu_load_size;
|
||||
|
||||
struct event_timeout occ_mtu_load_test_interval;
|
||||
int occ_mtu_load_n_tries;
|
||||
#endif
|
||||
|
||||
/*
|
||||
* TLS-mode crypto objects.
|
||||
@ -433,13 +430,11 @@ struct context_2
|
||||
/* indicates that the do_up_delay function has run */
|
||||
bool do_up_ran;
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* indicates that we have received a SIGTERM when
|
||||
* options->explicit_exit_notification is enabled,
|
||||
* but we have not exited yet */
|
||||
time_t explicit_exit_notification_time_wait;
|
||||
struct event_timeout explicit_exit_notification_interval;
|
||||
#endif
|
||||
|
||||
/* environmental variables to pass to scripts */
|
||||
struct env_set *es;
|
||||
|
@ -277,9 +277,7 @@ static const char usage_message[] =
|
||||
" 'no' -- Never send DF (Don't Fragment) frames\n"
|
||||
" 'maybe' -- Use per-route hints\n"
|
||||
" 'yes' -- Always DF (Don't Fragment)\n"
|
||||
#ifdef ENABLE_OCC
|
||||
"--mtu-test : Empirically measure and report MTU.\n"
|
||||
#endif
|
||||
#ifdef ENABLE_FRAGMENT
|
||||
"--fragment max : Enable internal datagram fragmentation so that no UDP\n"
|
||||
" datagrams are sent which are larger than max bytes.\n"
|
||||
@ -350,9 +348,7 @@ static const char usage_message[] =
|
||||
"--status file n : Write operational status to file every n seconds.\n"
|
||||
"--status-version [n] : Choose the status file format version number.\n"
|
||||
" Currently, n can be 1, 2, or 3 (default=1).\n"
|
||||
#ifdef ENABLE_OCC
|
||||
"--disable-occ : Disable options consistency check between peers.\n"
|
||||
#endif
|
||||
#ifdef ENABLE_DEBUG
|
||||
"--gremlin mask : Special stress testing mode (for debugging only).\n"
|
||||
#endif
|
||||
@ -517,10 +513,8 @@ static const char usage_message[] =
|
||||
"--allow-recursive-routing : When this option is set, OpenVPN will not drop\n"
|
||||
" incoming tun packets with same destination as host.\n"
|
||||
#endif /* if P2MP */
|
||||
#ifdef ENABLE_OCC
|
||||
"--explicit-exit-notify [n] : On exit/restart, send exit signal to\n"
|
||||
" server/remote. n = # of retries, default=1.\n"
|
||||
#endif
|
||||
"\n"
|
||||
"Data Channel Encryption Options (must be compatible between peers):\n"
|
||||
"(These options are meaningful for both Static Key & TLS-mode)\n"
|
||||
@ -827,9 +821,7 @@ init_options(struct options *o, const bool init_gc)
|
||||
o->resolve_retry_seconds = RESOLV_RETRY_INFINITE;
|
||||
o->resolve_in_advance = false;
|
||||
o->proto_force = -1;
|
||||
#ifdef ENABLE_OCC
|
||||
o->occ = true;
|
||||
#endif
|
||||
#ifdef ENABLE_MANAGEMENT
|
||||
o->management_log_history_cache = 250;
|
||||
o->management_echo_buffer_size = 100;
|
||||
@ -1482,9 +1474,7 @@ show_connection_entry(const struct connection_entry *o)
|
||||
#endif
|
||||
SHOW_INT(mssfix);
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
SHOW_INT(explicit_exit_notification);
|
||||
#endif
|
||||
|
||||
SHOW_STR_INLINE(tls_auth_file);
|
||||
SHOW_PARM(key_direction, keydirection2ascii(o->key_direction, false, true),
|
||||
@ -1578,9 +1568,7 @@ show_settings(const struct options *o)
|
||||
#ifdef ENABLE_FEATURE_SHAPER
|
||||
SHOW_INT(shaper);
|
||||
#endif
|
||||
#ifdef ENABLE_OCC
|
||||
SHOW_INT(mtu_test);
|
||||
#endif
|
||||
|
||||
SHOW_BOOL(mlock);
|
||||
|
||||
@ -1632,9 +1620,7 @@ show_settings(const struct options *o)
|
||||
SHOW_INT(status_file_version);
|
||||
SHOW_INT(status_file_update_freq);
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
SHOW_BOOL(occ);
|
||||
#endif
|
||||
SHOW_INT(rcvbuf);
|
||||
SHOW_INT(sndbuf);
|
||||
#if defined(TARGET_LINUX) && HAVE_DECL_SO_MARK
|
||||
@ -2078,12 +2064,10 @@ options_postprocess_verify_ce(const struct options *options, const struct connec
|
||||
msg(M_USAGE, "only one of --tun-mtu or --link-mtu may be defined (note that --ifconfig implies --link-mtu %d)", LINK_MTU_DEFAULT);
|
||||
}
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
if (!proto_is_udp(ce->proto) && options->mtu_test)
|
||||
{
|
||||
msg(M_USAGE, "--mtu-test only makes sense with --proto udp");
|
||||
}
|
||||
#endif
|
||||
|
||||
/* will we be pulling options from server? */
|
||||
#if P2MP
|
||||
@ -2216,12 +2200,10 @@ options_postprocess_verify_ce(const struct options *options, const struct connec
|
||||
}
|
||||
#endif
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
if (!proto_is_udp(ce->proto) && ce->explicit_exit_notification)
|
||||
{
|
||||
msg(M_USAGE, "--explicit-exit-notify can only be used with --proto udp");
|
||||
}
|
||||
#endif
|
||||
|
||||
if (!ce->remote && ce->proto == PROTO_TCP_CLIENT)
|
||||
{
|
||||
@ -3586,9 +3568,6 @@ pre_pull_restore(struct options *o, struct gc_arena *gc)
|
||||
}
|
||||
|
||||
#endif /* if P2MP */
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
|
||||
/**
|
||||
* Calculate the link-mtu to advertise to our peer. The actual value is not
|
||||
* relevant, because we will possibly perform data channel cipher negotiation
|
||||
@ -3618,7 +3597,6 @@ calc_options_string_link_mtu(const struct options *o, const struct frame *frame)
|
||||
}
|
||||
return link_mtu;
|
||||
}
|
||||
|
||||
/*
|
||||
* Build an options string to represent data channel encryption options.
|
||||
* This string must match exactly between peers. The keysize is checked
|
||||
@ -4026,8 +4004,6 @@ options_string_version(const char *s, struct gc_arena *gc)
|
||||
return BSTR(&out);
|
||||
}
|
||||
|
||||
#endif /* ENABLE_OCC */
|
||||
|
||||
char *
|
||||
options_string_extract_option(const char *options_string,const char *opt_name,
|
||||
struct gc_arena *gc)
|
||||
@ -6027,13 +6003,11 @@ add_option(struct options *options,
|
||||
VERIFY_PERMISSION(OPT_P_MTU|OPT_P_CONNECTION);
|
||||
options->ce.mtu_discover_type = translate_mtu_discover_type_name(p[1]);
|
||||
}
|
||||
#ifdef ENABLE_OCC
|
||||
else if (streq(p[0], "mtu-test") && !p[1])
|
||||
{
|
||||
VERIFY_PERMISSION(OPT_P_GENERAL);
|
||||
options->mtu_test = true;
|
||||
}
|
||||
#endif
|
||||
else if (streq(p[0], "nice") && p[1] && !p[2])
|
||||
{
|
||||
VERIFY_PERMISSION(OPT_P_NICE);
|
||||
@ -6344,7 +6318,6 @@ add_option(struct options *options,
|
||||
VERIFY_PERMISSION(OPT_P_TIMER);
|
||||
options->ping_timer_remote = true;
|
||||
}
|
||||
#ifdef ENABLE_OCC
|
||||
else if (streq(p[0], "explicit-exit-notify") && !p[2])
|
||||
{
|
||||
VERIFY_PERMISSION(OPT_P_GENERAL|OPT_P_CONNECTION|OPT_P_EXPLICIT_NOTIFY);
|
||||
@ -6357,7 +6330,6 @@ add_option(struct options *options,
|
||||
options->ce.explicit_exit_notification = 1;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
else if (streq(p[0], "persist-tun") && !p[1])
|
||||
{
|
||||
VERIFY_PERMISSION(OPT_P_PERSIST);
|
||||
@ -6681,13 +6653,11 @@ add_option(struct options *options,
|
||||
}
|
||||
|
||||
}
|
||||
#ifdef ENABLE_OCC
|
||||
else if (streq(p[0], "disable-occ") && !p[1])
|
||||
{
|
||||
VERIFY_PERMISSION(OPT_P_GENERAL);
|
||||
options->occ = false;
|
||||
}
|
||||
#endif
|
||||
#if P2MP
|
||||
else if (streq(p[0], "server") && p[1] && p[2] && !p[4])
|
||||
{
|
||||
|
@ -262,9 +262,7 @@ struct options
|
||||
|
||||
int proto_force;
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
bool mtu_test;
|
||||
#endif
|
||||
|
||||
#ifdef ENABLE_MEMSTATS
|
||||
char *memstats_fn;
|
||||
@ -375,10 +373,8 @@ struct options
|
||||
bool allow_pull_fqdn; /* as a client, allow server to push a FQDN for certain parameters */
|
||||
struct client_nat_option_list *client_nat;
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* Enable options consistency check between peers */
|
||||
bool occ;
|
||||
#endif
|
||||
|
||||
#ifdef ENABLE_MANAGEMENT
|
||||
const char *management_addr;
|
||||
@ -755,8 +751,6 @@ void show_settings(const struct options *o);
|
||||
|
||||
bool string_defined_equal(const char *s1, const char *s2);
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
|
||||
const char *options_string_version(const char *s, struct gc_arena *gc);
|
||||
|
||||
char *options_string(const struct options *o,
|
||||
@ -774,8 +768,6 @@ bool options_cmp_equal(char *actual, const char *expected);
|
||||
|
||||
void options_warning(char *actual, const char *expected);
|
||||
|
||||
#endif
|
||||
|
||||
/**
|
||||
* Given an OpenVPN options string, extract the value of an option.
|
||||
*
|
||||
|
@ -330,7 +330,6 @@ print_status(const struct context *c, struct status_output *so)
|
||||
gc_free(&gc);
|
||||
}
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/*
|
||||
* Handle the triggering and time-wait of explicit
|
||||
* exit notification.
|
||||
@ -367,7 +366,6 @@ process_explicit_exit_notification_timer_wakeup(struct context *c)
|
||||
}
|
||||
}
|
||||
}
|
||||
#endif /* ifdef ENABLE_OCC */
|
||||
|
||||
/*
|
||||
* Process signals
|
||||
@ -395,14 +393,12 @@ static bool
|
||||
process_sigterm(struct context *c)
|
||||
{
|
||||
bool ret = true;
|
||||
#ifdef ENABLE_OCC
|
||||
if (c->options.ce.explicit_exit_notification
|
||||
&& !c->c2.explicit_exit_notification_time_wait)
|
||||
{
|
||||
process_explicit_exit_notification_init(c);
|
||||
ret = false;
|
||||
}
|
||||
#endif
|
||||
return ret;
|
||||
}
|
||||
|
||||
@ -415,7 +411,6 @@ static bool
|
||||
ignore_restart_signals(struct context *c)
|
||||
{
|
||||
bool ret = false;
|
||||
#ifdef ENABLE_OCC
|
||||
if ( (c->sig->signal_received == SIGUSR1 || c->sig->signal_received == SIGHUP)
|
||||
&& event_timeout_defined(&c->c2.explicit_exit_notification_interval) )
|
||||
{
|
||||
@ -434,7 +429,6 @@ ignore_restart_signals(struct context *c)
|
||||
ret = false;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
return ret;
|
||||
}
|
||||
|
||||
|
@ -81,11 +81,8 @@ bool process_signal(struct context *c);
|
||||
|
||||
void register_signal(struct context *c, int sig, const char *text);
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
void process_explicit_exit_notification_timer_wakeup(struct context *c);
|
||||
|
||||
#endif
|
||||
|
||||
#ifdef _WIN32
|
||||
|
||||
static inline void
|
||||
|
@ -64,21 +64,6 @@
|
||||
|
||||
#include "memdbg.h"
|
||||
|
||||
#ifndef ENABLE_OCC
|
||||
static const char ssl_default_options_string[] = "V0 UNDEF";
|
||||
#endif
|
||||
|
||||
|
||||
static inline const char *
|
||||
local_options_string(const struct tls_session *session)
|
||||
{
|
||||
#ifdef ENABLE_OCC
|
||||
return session->opt->local_options;
|
||||
#else
|
||||
return ssl_default_options_string;
|
||||
#endif
|
||||
}
|
||||
|
||||
#ifdef MEASURE_TLS_HANDSHAKE_STATS
|
||||
|
||||
static int tls_handshake_success; /* GLOBAL */
|
||||
@ -1313,11 +1298,9 @@ tls_multi_init_set_options(struct tls_multi *multi,
|
||||
const char *local,
|
||||
const char *remote)
|
||||
{
|
||||
#ifdef ENABLE_OCC
|
||||
/* initialize options string */
|
||||
multi->opt.local_options = local;
|
||||
multi->opt.remote_options = remote;
|
||||
#endif
|
||||
}
|
||||
|
||||
/*
|
||||
@ -2337,7 +2320,7 @@ key_method_2_write(struct buffer *buf, struct tls_session *session)
|
||||
|
||||
/* write options string */
|
||||
{
|
||||
if (!write_string(buf, local_options_string(session), TLS_OPTIONS_LEN))
|
||||
if (!write_string(buf, session->opt->local_options, TLS_OPTIONS_LEN))
|
||||
{
|
||||
goto error;
|
||||
}
|
||||
@ -2534,7 +2517,6 @@ key_method_2_read(struct buffer *buf, struct tls_multi *multi, struct tls_sessio
|
||||
verify_final_auth_checks(multi, session);
|
||||
}
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* check options consistency */
|
||||
if (!session->opt->disable_occ
|
||||
&& !options_cmp_equal(options, session->opt->remote_options))
|
||||
@ -2546,7 +2528,6 @@ key_method_2_read(struct buffer *buf, struct tls_multi *multi, struct tls_sessio
|
||||
ks->authenticated = KS_AUTH_FALSE;
|
||||
}
|
||||
}
|
||||
#endif
|
||||
|
||||
buf_clear(buf);
|
||||
|
||||
|
@ -254,19 +254,15 @@ struct tls_options
|
||||
/* if true, don't xmit until first packet from peer is received */
|
||||
bool xmit_hold;
|
||||
|
||||
#ifdef ENABLE_OCC
|
||||
/* local and remote options strings
|
||||
* that must match between client and server */
|
||||
const char *local_options;
|
||||
const char *remote_options;
|
||||
#endif
|
||||
|
||||
/* from command line */
|
||||
bool replay;
|
||||
bool single_session;
|
||||
#ifdef ENABLE_OCC
|
||||
bool disable_occ;
|
||||
#endif
|
||||
int mode;
|
||||
bool pull;
|
||||
int push_peer_info_detail;
|
||||
|
@ -569,11 +569,6 @@ socket_defined(const socket_descriptor_t sd)
|
||||
#define UNIX_SOCK_SUPPORT 0
|
||||
#endif
|
||||
|
||||
/*
|
||||
* Should we include OCC (options consistency check) code?
|
||||
*/
|
||||
#define ENABLE_OCC
|
||||
|
||||
/*
|
||||
* Should we include NTLM proxy functionality
|
||||
*/
|
||||
|
Loading…
Reference in New Issue
Block a user