wrap a few PKCS#11-specific bits in ENABLE_PKCS11
authordjm <djm@openbsd.org>
Wed, 6 Mar 2024 00:31:04 +0000 (00:31 +0000)
committerdjm <djm@openbsd.org>
Wed, 6 Mar 2024 00:31:04 +0000 (00:31 +0000)
usr.bin/ssh/ssh-agent.c

index 1790106..9b7754e 100644 (file)
@@ -1,4 +1,4 @@
-/* $OpenBSD: ssh-agent.c,v 1.304 2023/12/18 15:58:56 djm Exp $ */
+/* $OpenBSD: ssh-agent.c,v 1.305 2024/03/06 00:31:04 djm Exp $ */
 /*
  * Author: Tatu Ylonen <ylo@cs.hut.fi>
  * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -237,6 +237,7 @@ free_dest_constraints(struct dest_constraint *dcs, size_t ndcs)
        free(dcs);
 }
 
+#ifdef ENABLE_PKCS11
 static void
 dup_dest_constraint_hop(const struct dest_constraint_hop *dch,
     struct dest_constraint_hop *out)
@@ -276,6 +277,7 @@ dup_dest_constraints(const struct dest_constraint *dcs, size_t ndcs)
        }
        return ret;
 }
+#endif /* ENABLE_PKCS11 */
 
 #ifdef DEBUG_CONSTRAINTS
 static void
@@ -1509,6 +1511,7 @@ no_identities(SocketEntry *e)
        sshbuf_free(msg);
 }
 
+#ifdef ENABLE_PKCS11
 /* Add an identity to idlist; takes ownership of 'key' and 'comment' */
 static void
 add_p11_identity(struct sshkey *key, char *comment, const char *provider,
@@ -1535,7 +1538,6 @@ add_p11_identity(struct sshkey *key, char *comment, const char *provider,
        idtab->nentries++;
 }
 
-#ifdef ENABLE_PKCS11
 static void
 process_add_smartcard_key(SocketEntry *e)
 {