summaryrefslogtreecommitdiff
path: root/src/usr.bin/openssl/ocsp.c
diff options
context:
space:
mode:
authorbcook <>2015-09-11 14:30:23 +0000
committerbcook <>2015-09-11 14:30:23 +0000
commite2fad4e6bdd4e404b3f4c186de52078738af2271 (patch)
treecc1109842924cab95a77b6863b32de51b6d4f960 /src/usr.bin/openssl/ocsp.c
parent7cea1ef22b79637be449efa70b99c6deaf74ef10 (diff)
downloadopenbsd-e2fad4e6bdd4e404b3f4c186de52078738af2271.tar.gz
openbsd-e2fad4e6bdd4e404b3f4c186de52078738af2271.tar.bz2
openbsd-e2fad4e6bdd4e404b3f4c186de52078738af2271.zip
Remove engine command and parameters from openssl(1).
We do not have any builtin or dynamic engines, meaning openssl(1) has no way to use the engine command or parameters at all. ok jsing@
Diffstat (limited to '')
-rw-r--r--src/usr.bin/openssl/ocsp.c23
1 files changed, 11 insertions, 12 deletions
diff --git a/src/usr.bin/openssl/ocsp.c b/src/usr.bin/openssl/ocsp.c
index ab5a755713..39000328b6 100644
--- a/src/usr.bin/openssl/ocsp.c
+++ b/src/usr.bin/openssl/ocsp.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: ocsp.c,v 1.3 2015/08/22 16:36:05 jsing Exp $ */ 1/* $OpenBSD: ocsp.c,v 1.4 2015/09/11 14:30:23 bcook Exp $ */
2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL 2/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
3 * project 2000. 3 * project 2000.
4 */ 4 */
@@ -105,7 +105,6 @@ static OCSP_RESPONSE *query_responder(BIO * err, BIO * cbio, char *path,
105int 105int
106ocsp_main(int argc, char **argv) 106ocsp_main(int argc, char **argv)
107{ 107{
108 ENGINE *e = NULL;
109 char **args; 108 char **args;
110 char *host = NULL, *port = NULL, *path = "/"; 109 char *host = NULL, *port = NULL, *path = "/";
111 char *reqin = NULL, *respin = NULL; 110 char *reqin = NULL, *respin = NULL;
@@ -335,7 +334,7 @@ ocsp_main(int argc, char **argv)
335 args++; 334 args++;
336 X509_free(issuer); 335 X509_free(issuer);
337 issuer = load_cert(bio_err, *args, FORMAT_PEM, 336 issuer = load_cert(bio_err, *args, FORMAT_PEM,
338 NULL, e, "issuer certificate"); 337 NULL, "issuer certificate");
339 if (!issuer) 338 if (!issuer)
340 goto end; 339 goto end;
341 } else 340 } else
@@ -345,7 +344,7 @@ ocsp_main(int argc, char **argv)
345 args++; 344 args++;
346 X509_free(cert); 345 X509_free(cert);
347 cert = load_cert(bio_err, *args, FORMAT_PEM, 346 cert = load_cert(bio_err, *args, FORMAT_PEM,
348 NULL, e, "certificate"); 347 NULL, "certificate");
349 if (!cert) 348 if (!cert)
350 goto end; 349 goto end;
351 if (!cert_id_md) 350 if (!cert_id_md)
@@ -531,20 +530,20 @@ ocsp_main(int argc, char **argv)
531 if (!rkeyfile) 530 if (!rkeyfile)
532 rkeyfile = rsignfile; 531 rkeyfile = rsignfile;
533 rsigner = load_cert(bio_err, rsignfile, FORMAT_PEM, 532 rsigner = load_cert(bio_err, rsignfile, FORMAT_PEM,
534 NULL, e, "responder certificate"); 533 NULL, "responder certificate");
535 if (!rsigner) { 534 if (!rsigner) {
536 BIO_printf(bio_err, "Error loading responder certificate\n"); 535 BIO_printf(bio_err, "Error loading responder certificate\n");
537 goto end; 536 goto end;
538 } 537 }
539 rca_cert = load_cert(bio_err, rca_filename, FORMAT_PEM, 538 rca_cert = load_cert(bio_err, rca_filename, FORMAT_PEM,
540 NULL, e, "CA certificate"); 539 NULL, "CA certificate");
541 if (rcertfile) { 540 if (rcertfile) {
542 rother = load_certs(bio_err, rcertfile, FORMAT_PEM, 541 rother = load_certs(bio_err, rcertfile, FORMAT_PEM,
543 NULL, e, "responder other certificates"); 542 NULL, "responder other certificates");
544 if (!rother) 543 if (!rother)
545 goto end; 544 goto end;
546 } 545 }
547 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, 546 rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL,
548 "responder private key"); 547 "responder private key");
549 if (!rkey) 548 if (!rkey)
550 goto end; 549 goto end;
@@ -574,18 +573,18 @@ redo_accept:
574 if (!keyfile) 573 if (!keyfile)
575 keyfile = signfile; 574 keyfile = signfile;
576 signer = load_cert(bio_err, signfile, FORMAT_PEM, 575 signer = load_cert(bio_err, signfile, FORMAT_PEM,
577 NULL, e, "signer certificate"); 576 NULL, "signer certificate");
578 if (!signer) { 577 if (!signer) {
579 BIO_printf(bio_err, "Error loading signer certificate\n"); 578 BIO_printf(bio_err, "Error loading signer certificate\n");
580 goto end; 579 goto end;
581 } 580 }
582 if (sign_certfile) { 581 if (sign_certfile) {
583 sign_other = load_certs(bio_err, sign_certfile, FORMAT_PEM, 582 sign_other = load_certs(bio_err, sign_certfile, FORMAT_PEM,
584 NULL, e, "signer certificates"); 583 NULL, "signer certificates");
585 if (!sign_other) 584 if (!sign_other)
586 goto end; 585 goto end;
587 } 586 }
588 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL, 587 key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL,
589 "signer private key"); 588 "signer private key");
590 if (!key) 589 if (!key)
591 goto end; 590 goto end;
@@ -690,7 +689,7 @@ done_resp:
690 goto end; 689 goto end;
691 if (verify_certfile) { 690 if (verify_certfile) {
692 verify_other = load_certs(bio_err, verify_certfile, FORMAT_PEM, 691 verify_other = load_certs(bio_err, verify_certfile, FORMAT_PEM,
693 NULL, e, "validator certificate"); 692 NULL, "validator certificate");
694 if (!verify_other) 693 if (!verify_other)
695 goto end; 694 goto end;
696 } 695 }