]> www.infradead.org Git - users/dwmw2/openconnect.git/commitdiff
Stub openssl challenge_response functions.
authorTom Carroll <incentivedesign@gmail.com>
Fri, 24 Apr 2020 06:15:59 +0000 (23:15 -0700)
committerTom Carroll <incentivedesign@gmail.com>
Wed, 6 May 2020 08:54:26 +0000 (01:54 -0700)
Signed-off-by: Tom Carroll <incentivedesign@gmail.com>
openssl.c

index b15f2f6f25c794964b36d8b1d3b238d03ce43a7a..f028f89e1b5ba8e0fb1692a609e3960a9cbb20b5 100644 (file)
--- a/openssl.c
+++ b/openssl.c
@@ -2139,3 +2139,20 @@ void destroy_eap_ttls(struct openconnect_info *vpninfo, void *ttls)
        /* Leave the BIO_METH for now. It may get reused and we don't want to
         * have to call BIO_get_new_index() more times than is necessary */
 }
+
+int cert_auth_challenge_response(struct openconnect_info *vpninfo,
+       int cert_rq, const char *challenge, char **identity,
+       struct challenge_response *response)
+{
+       /* hush not used warnings */
+       (void) cert_rq;
+       (void) challenge;
+       (void) identity;
+       (void) response;
+
+       vpn_progress(vpninfo, PRG_ERR,
+               _("Multiple certificate-based authentication"
+                   " is not implemented for OpenSSL\n"));
+
+       return -ENOSYS;
+}