=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/ssh-keygen.c,v retrieving revision 1.383 retrieving revision 1.384 diff -u -r1.383 -r1.384 --- src/usr.bin/ssh/ssh-keygen.c 2020/01/14 15:07:30 1.383 +++ src/usr.bin/ssh/ssh-keygen.c 2020/01/21 11:06:09 1.384 @@ -1,4 +1,4 @@ -/* $OpenBSD: ssh-keygen.c,v 1.383 2020/01/14 15:07:30 naddy Exp $ */ +/* $OpenBSD: ssh-keygen.c,v 1.384 2020/01/21 11:06:09 djm Exp $ */ /* * Author: Tatu Ylonen * Copyright (c) 1994 Tatu Ylonen , Espoo, Finland @@ -2145,7 +2145,6 @@ exit(ok ? 0 : 1); } -#ifdef WITH_OPENSSL static void load_krl(const char *path, struct ssh_krl **krlp) { @@ -2440,7 +2439,6 @@ ssh_krl_free(krl); exit(ret); } -#endif static struct sshkey * load_sign_key(const char *keypath, const struct sshkey *pubkey) @@ -3344,21 +3342,13 @@ usage(); } if (gen_krl) { -#ifdef WITH_OPENSSL do_gen_krl(pw, update_krl, ca_key_path, cert_serial, identity_comment, argc, argv); return (0); -#else - fatal("KRL generation not supported"); -#endif } if (check_krl) { -#ifdef WITH_OPENSSL do_check_krl(pw, argc, argv); return (0); -#else - fatal("KRL checking not supported"); -#endif } if (ca_key_path != NULL) { if (cert_key_id == NULL)