summaryrefslogtreecommitdiff
path: root/src/usr.bin/openssl/s_server.c
diff options
context:
space:
mode:
authorbcook <>2015-09-11 14:30:23 +0000
committerbcook <>2015-09-11 14:30:23 +0000
commite2fad4e6bdd4e404b3f4c186de52078738af2271 (patch)
treecc1109842924cab95a77b6863b32de51b6d4f960 /src/usr.bin/openssl/s_server.c
parent7cea1ef22b79637be449efa70b99c6deaf74ef10 (diff)
downloadopenbsd-e2fad4e6bdd4e404b3f4c186de52078738af2271.tar.gz
openbsd-e2fad4e6bdd4e404b3f4c186de52078738af2271.tar.bz2
openbsd-e2fad4e6bdd4e404b3f4c186de52078738af2271.zip
Remove engine command and parameters from openssl(1).
We do not have any builtin or dynamic engines, meaning openssl(1) has no way to use the engine command or parameters at all. ok jsing@
Diffstat (limited to '')
-rw-r--r--src/usr.bin/openssl/s_server.c40
1 files changed, 9 insertions, 31 deletions
diff --git a/src/usr.bin/openssl/s_server.c b/src/usr.bin/openssl/s_server.c
index 0272abe43b..5989e0db90 100644
--- a/src/usr.bin/openssl/s_server.c
+++ b/src/usr.bin/openssl/s_server.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s_server.c,v 1.16 2015/09/10 16:01:06 jsing Exp $ */ 1/* $OpenBSD: s_server.c,v 1.17 2015/09/11 14:30:23 bcook Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -226,9 +226,6 @@ static int s_quiet = 0;
226static char *keymatexportlabel = NULL; 226static char *keymatexportlabel = NULL;
227static int keymatexportlen = 20; 227static int keymatexportlen = 20;
228 228
229#ifndef OPENSSL_NO_ENGINE
230static char *engine_id = NULL;
231#endif
232static const char *session_id_prefix = NULL; 229static const char *session_id_prefix = NULL;
233 230
234static int enable_timeouts = 0; 231static int enable_timeouts = 0;
@@ -262,9 +259,6 @@ s_server_init(void)
262 s_debug = 0; 259 s_debug = 0;
263 s_msg = 0; 260 s_msg = 0;
264 s_quiet = 0; 261 s_quiet = 0;
265#ifndef OPENSSL_NO_ENGINE
266 engine_id = NULL;
267#endif
268} 262}
269 263
270static void 264static void
@@ -286,12 +280,12 @@ sv_usage(void)
286 BIO_printf(bio_err, " -certform arg - certificate format (PEM or DER) PEM default\n"); 280 BIO_printf(bio_err, " -certform arg - certificate format (PEM or DER) PEM default\n");
287 BIO_printf(bio_err, " -key arg - Private Key file to use, in cert file if\n"); 281 BIO_printf(bio_err, " -key arg - Private Key file to use, in cert file if\n");
288 BIO_printf(bio_err, " not specified (default is %s)\n", TEST_CERT); 282 BIO_printf(bio_err, " not specified (default is %s)\n", TEST_CERT);
289 BIO_printf(bio_err, " -keyform arg - key format (PEM, DER or ENGINE) PEM default\n"); 283 BIO_printf(bio_err, " -keyform arg - key format (PEM or DER) PEM default\n");
290 BIO_printf(bio_err, " -pass arg - private key file pass phrase source\n"); 284 BIO_printf(bio_err, " -pass arg - private key file pass phrase source\n");
291 BIO_printf(bio_err, " -dcert arg - second certificate file to use (usually for DSA)\n"); 285 BIO_printf(bio_err, " -dcert arg - second certificate file to use (usually for DSA)\n");
292 BIO_printf(bio_err, " -dcertform x - second certificate format (PEM or DER) PEM default\n"); 286 BIO_printf(bio_err, " -dcertform x - second certificate format (PEM or DER) PEM default\n");
293 BIO_printf(bio_err, " -dkey arg - second private key file to use (usually for DSA)\n"); 287 BIO_printf(bio_err, " -dkey arg - second private key file to use (usually for DSA)\n");
294 BIO_printf(bio_err, " -dkeyform arg - second key format (PEM, DER or ENGINE) PEM default\n"); 288 BIO_printf(bio_err, " -dkeyform arg - second key format (PEM or DER) PEM default\n");
295 BIO_printf(bio_err, " -dpass arg - second private key file pass phrase source\n"); 289 BIO_printf(bio_err, " -dpass arg - second private key file pass phrase source\n");
296 BIO_printf(bio_err, " -dhparam arg - DH parameter file to use, in cert file if not specified\n"); 290 BIO_printf(bio_err, " -dhparam arg - DH parameter file to use, in cert file if not specified\n");
297 BIO_printf(bio_err, " or a default set of parameters is used\n"); 291 BIO_printf(bio_err, " or a default set of parameters is used\n");
@@ -331,9 +325,6 @@ sv_usage(void)
331 BIO_printf(bio_err, " -WWW - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n"); 325 BIO_printf(bio_err, " -WWW - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
332 BIO_printf(bio_err, " -HTTP - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n"); 326 BIO_printf(bio_err, " -HTTP - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
333 BIO_printf(bio_err, " with the assumption it contains a complete HTTP response.\n"); 327 BIO_printf(bio_err, " with the assumption it contains a complete HTTP response.\n");
334#ifndef OPENSSL_NO_ENGINE
335 BIO_printf(bio_err, " -engine id - Initialise and use the specified engine\n");
336#endif
337 BIO_printf(bio_err, " -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg'\n"); 328 BIO_printf(bio_err, " -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg'\n");
338 BIO_printf(bio_err, " -servername host - servername for HostName TLS extension\n"); 329 BIO_printf(bio_err, " -servername host - servername for HostName TLS extension\n");
339 BIO_printf(bio_err, " -servername_fatal - on mismatch send fatal alert (default warning alert)\n"); 330 BIO_printf(bio_err, " -servername_fatal - on mismatch send fatal alert (default warning alert)\n");
@@ -598,7 +589,6 @@ s_server_main(int argc, char *argv[])
598 int state = 0; 589 int state = 0;
599 const SSL_METHOD *meth = NULL; 590 const SSL_METHOD *meth = NULL;
600 int socket_type = SOCK_STREAM; 591 int socket_type = SOCK_STREAM;
601 ENGINE *e = NULL;
602 int s_cert_format = FORMAT_PEM, s_key_format = FORMAT_PEM; 592 int s_cert_format = FORMAT_PEM, s_key_format = FORMAT_PEM;
603 char *passarg = NULL, *pass = NULL; 593 char *passarg = NULL, *pass = NULL;
604 char *dpassarg = NULL, *dpass = NULL; 594 char *dpassarg = NULL, *dpass = NULL;
@@ -832,13 +822,6 @@ s_server_main(int argc, char *argv[])
832 goto bad; 822 goto bad;
833 session_id_prefix = *(++argv); 823 session_id_prefix = *(++argv);
834 } 824 }
835#ifndef OPENSSL_NO_ENGINE
836 else if (strcmp(*argv, "-engine") == 0) {
837 if (--argc < 1)
838 goto bad;
839 engine_id = *(++argv);
840 }
841#endif
842 else if (strcmp(*argv, "-servername") == 0) { 825 else if (strcmp(*argv, "-servername") == 0) {
843 if (--argc < 1) 826 if (--argc < 1)
844 goto bad; 827 goto bad;
@@ -899,10 +882,6 @@ bad:
899 goto end; 882 goto end;
900 } 883 }
901 884
902#ifndef OPENSSL_NO_ENGINE
903 e = setup_engine(bio_err, engine_id, 1);
904#endif
905
906 if (!app_passwd(bio_err, passarg, dpassarg, &pass, &dpass)) { 885 if (!app_passwd(bio_err, passarg, dpassarg, &pass, &dpass)) {
907 BIO_printf(bio_err, "Error getting password\n"); 886 BIO_printf(bio_err, "Error getting password\n");
908 goto end; 887 goto end;
@@ -913,28 +892,28 @@ bad:
913 s_key_file2 = s_cert_file2; 892 s_key_file2 = s_cert_file2;
914 893
915 if (nocert == 0) { 894 if (nocert == 0) {
916 s_key = load_key(bio_err, s_key_file, s_key_format, 0, pass, e, 895 s_key = load_key(bio_err, s_key_file, s_key_format, 0, pass,
917 "server certificate private key file"); 896 "server certificate private key file");
918 if (!s_key) { 897 if (!s_key) {
919 ERR_print_errors(bio_err); 898 ERR_print_errors(bio_err);
920 goto end; 899 goto end;
921 } 900 }
922 s_cert = load_cert(bio_err, s_cert_file, s_cert_format, 901 s_cert = load_cert(bio_err, s_cert_file, s_cert_format,
923 NULL, e, "server certificate file"); 902 NULL, "server certificate file");
924 903
925 if (!s_cert) { 904 if (!s_cert) {
926 ERR_print_errors(bio_err); 905 ERR_print_errors(bio_err);
927 goto end; 906 goto end;
928 } 907 }
929 if (tlsextcbp.servername) { 908 if (tlsextcbp.servername) {
930 s_key2 = load_key(bio_err, s_key_file2, s_key_format, 0, pass, e, 909 s_key2 = load_key(bio_err, s_key_file2, s_key_format, 0, pass,
931 "second server certificate private key file"); 910 "second server certificate private key file");
932 if (!s_key2) { 911 if (!s_key2) {
933 ERR_print_errors(bio_err); 912 ERR_print_errors(bio_err);
934 goto end; 913 goto end;
935 } 914 }
936 s_cert2 = load_cert(bio_err, s_cert_file2, s_cert_format, 915 s_cert2 = load_cert(bio_err, s_cert_file2, s_cert_format,
937 NULL, e, "second server certificate file"); 916 NULL, "second server certificate file");
938 917
939 if (!s_cert2) { 918 if (!s_cert2) {
940 ERR_print_errors(bio_err); 919 ERR_print_errors(bio_err);
@@ -966,14 +945,13 @@ bad:
966 s_dkey_file = s_dcert_file; 945 s_dkey_file = s_dcert_file;
967 946
968 s_dkey = load_key(bio_err, s_dkey_file, s_dkey_format, 947 s_dkey = load_key(bio_err, s_dkey_file, s_dkey_format,
969 0, dpass, e, 948 0, dpass, "second certificate private key file");
970 "second certificate private key file");
971 if (!s_dkey) { 949 if (!s_dkey) {
972 ERR_print_errors(bio_err); 950 ERR_print_errors(bio_err);
973 goto end; 951 goto end;
974 } 952 }
975 s_dcert = load_cert(bio_err, s_dcert_file, s_dcert_format, 953 s_dcert = load_cert(bio_err, s_dcert_file, s_dcert_format,
976 NULL, e, "second server certificate file"); 954 NULL, "second server certificate file");
977 955
978 if (!s_dcert) { 956 if (!s_dcert) {
979 ERR_print_errors(bio_err); 957 ERR_print_errors(bio_err);