diff options
author | bcook <> | 2015-09-11 14:30:23 +0000 |
---|---|---|
committer | bcook <> | 2015-09-11 14:30:23 +0000 |
commit | e2fad4e6bdd4e404b3f4c186de52078738af2271 (patch) | |
tree | cc1109842924cab95a77b6863b32de51b6d4f960 /src/usr.bin/openssl/ocsp.c | |
parent | 7cea1ef22b79637be449efa70b99c6deaf74ef10 (diff) | |
download | openbsd-e2fad4e6bdd4e404b3f4c186de52078738af2271.tar.gz openbsd-e2fad4e6bdd4e404b3f4c186de52078738af2271.tar.bz2 openbsd-e2fad4e6bdd4e404b3f4c186de52078738af2271.zip |
Remove engine command and parameters from openssl(1).
We do not have any builtin or dynamic engines, meaning openssl(1) has
no way to use the engine command or parameters at all.
ok jsing@
Diffstat (limited to '')
-rw-r--r-- | src/usr.bin/openssl/ocsp.c | 23 |
1 files changed, 11 insertions, 12 deletions
diff --git a/src/usr.bin/openssl/ocsp.c b/src/usr.bin/openssl/ocsp.c index ab5a755713..39000328b6 100644 --- a/src/usr.bin/openssl/ocsp.c +++ b/src/usr.bin/openssl/ocsp.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: ocsp.c,v 1.3 2015/08/22 16:36:05 jsing Exp $ */ | 1 | /* $OpenBSD: ocsp.c,v 1.4 2015/09/11 14:30:23 bcook Exp $ */ |
2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL | 2 | /* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL |
3 | * project 2000. | 3 | * project 2000. |
4 | */ | 4 | */ |
@@ -105,7 +105,6 @@ static OCSP_RESPONSE *query_responder(BIO * err, BIO * cbio, char *path, | |||
105 | int | 105 | int |
106 | ocsp_main(int argc, char **argv) | 106 | ocsp_main(int argc, char **argv) |
107 | { | 107 | { |
108 | ENGINE *e = NULL; | ||
109 | char **args; | 108 | char **args; |
110 | char *host = NULL, *port = NULL, *path = "/"; | 109 | char *host = NULL, *port = NULL, *path = "/"; |
111 | char *reqin = NULL, *respin = NULL; | 110 | char *reqin = NULL, *respin = NULL; |
@@ -335,7 +334,7 @@ ocsp_main(int argc, char **argv) | |||
335 | args++; | 334 | args++; |
336 | X509_free(issuer); | 335 | X509_free(issuer); |
337 | issuer = load_cert(bio_err, *args, FORMAT_PEM, | 336 | issuer = load_cert(bio_err, *args, FORMAT_PEM, |
338 | NULL, e, "issuer certificate"); | 337 | NULL, "issuer certificate"); |
339 | if (!issuer) | 338 | if (!issuer) |
340 | goto end; | 339 | goto end; |
341 | } else | 340 | } else |
@@ -345,7 +344,7 @@ ocsp_main(int argc, char **argv) | |||
345 | args++; | 344 | args++; |
346 | X509_free(cert); | 345 | X509_free(cert); |
347 | cert = load_cert(bio_err, *args, FORMAT_PEM, | 346 | cert = load_cert(bio_err, *args, FORMAT_PEM, |
348 | NULL, e, "certificate"); | 347 | NULL, "certificate"); |
349 | if (!cert) | 348 | if (!cert) |
350 | goto end; | 349 | goto end; |
351 | if (!cert_id_md) | 350 | if (!cert_id_md) |
@@ -531,20 +530,20 @@ ocsp_main(int argc, char **argv) | |||
531 | if (!rkeyfile) | 530 | if (!rkeyfile) |
532 | rkeyfile = rsignfile; | 531 | rkeyfile = rsignfile; |
533 | rsigner = load_cert(bio_err, rsignfile, FORMAT_PEM, | 532 | rsigner = load_cert(bio_err, rsignfile, FORMAT_PEM, |
534 | NULL, e, "responder certificate"); | 533 | NULL, "responder certificate"); |
535 | if (!rsigner) { | 534 | if (!rsigner) { |
536 | BIO_printf(bio_err, "Error loading responder certificate\n"); | 535 | BIO_printf(bio_err, "Error loading responder certificate\n"); |
537 | goto end; | 536 | goto end; |
538 | } | 537 | } |
539 | rca_cert = load_cert(bio_err, rca_filename, FORMAT_PEM, | 538 | rca_cert = load_cert(bio_err, rca_filename, FORMAT_PEM, |
540 | NULL, e, "CA certificate"); | 539 | NULL, "CA certificate"); |
541 | if (rcertfile) { | 540 | if (rcertfile) { |
542 | rother = load_certs(bio_err, rcertfile, FORMAT_PEM, | 541 | rother = load_certs(bio_err, rcertfile, FORMAT_PEM, |
543 | NULL, e, "responder other certificates"); | 542 | NULL, "responder other certificates"); |
544 | if (!rother) | 543 | if (!rother) |
545 | goto end; | 544 | goto end; |
546 | } | 545 | } |
547 | rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, NULL, | 546 | rkey = load_key(bio_err, rkeyfile, FORMAT_PEM, 0, NULL, |
548 | "responder private key"); | 547 | "responder private key"); |
549 | if (!rkey) | 548 | if (!rkey) |
550 | goto end; | 549 | goto end; |
@@ -574,18 +573,18 @@ redo_accept: | |||
574 | if (!keyfile) | 573 | if (!keyfile) |
575 | keyfile = signfile; | 574 | keyfile = signfile; |
576 | signer = load_cert(bio_err, signfile, FORMAT_PEM, | 575 | signer = load_cert(bio_err, signfile, FORMAT_PEM, |
577 | NULL, e, "signer certificate"); | 576 | NULL, "signer certificate"); |
578 | if (!signer) { | 577 | if (!signer) { |
579 | BIO_printf(bio_err, "Error loading signer certificate\n"); | 578 | BIO_printf(bio_err, "Error loading signer certificate\n"); |
580 | goto end; | 579 | goto end; |
581 | } | 580 | } |
582 | if (sign_certfile) { | 581 | if (sign_certfile) { |
583 | sign_other = load_certs(bio_err, sign_certfile, FORMAT_PEM, | 582 | sign_other = load_certs(bio_err, sign_certfile, FORMAT_PEM, |
584 | NULL, e, "signer certificates"); | 583 | NULL, "signer certificates"); |
585 | if (!sign_other) | 584 | if (!sign_other) |
586 | goto end; | 585 | goto end; |
587 | } | 586 | } |
588 | key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, NULL, | 587 | key = load_key(bio_err, keyfile, FORMAT_PEM, 0, NULL, |
589 | "signer private key"); | 588 | "signer private key"); |
590 | if (!key) | 589 | if (!key) |
591 | goto end; | 590 | goto end; |
@@ -690,7 +689,7 @@ done_resp: | |||
690 | goto end; | 689 | goto end; |
691 | if (verify_certfile) { | 690 | if (verify_certfile) { |
692 | verify_other = load_certs(bio_err, verify_certfile, FORMAT_PEM, | 691 | verify_other = load_certs(bio_err, verify_certfile, FORMAT_PEM, |
693 | NULL, e, "validator certificate"); | 692 | NULL, "validator certificate"); |
694 | if (!verify_other) | 693 | if (!verify_other) |
695 | goto end; | 694 | goto end; |
696 | } | 695 | } |