diff options
author | tb <> | 2023-03-06 14:32:06 +0000 |
---|---|---|
committer | tb <> | 2023-03-06 14:32:06 +0000 |
commit | 6c965e26b1a93da63948edae6b68564be1ded507 (patch) | |
tree | bbe07d6e06b695cebe22802551f2db0a61354d7c /src/usr.bin/openssl/verify.c | |
parent | 48e828ea26ee91710242131cd75cd9d1d20b773c (diff) | |
download | openbsd-6c965e26b1a93da63948edae6b68564be1ded507.tar.gz openbsd-6c965e26b1a93da63948edae6b68564be1ded507.tar.bz2 openbsd-6c965e26b1a93da63948edae6b68564be1ded507.zip |
Rename struct ${app}_config to plain cfg
All the structs are static and we need to reach into them many times.
Having a shorter name is more concise and results in less visual clutter.
It also avoids many overlong lines and we will be able to get rid of some
unfortunate line wrapping down the road.
Discussed with jsing
Diffstat (limited to 'src/usr.bin/openssl/verify.c')
-rw-r--r-- | src/usr.bin/openssl/verify.c | 54 |
1 files changed, 27 insertions, 27 deletions
diff --git a/src/usr.bin/openssl/verify.c b/src/usr.bin/openssl/verify.c index b42dd2f243..b412623991 100644 --- a/src/usr.bin/openssl/verify.c +++ b/src/usr.bin/openssl/verify.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: verify.c,v 1.15 2022/11/11 17:07:39 joshua Exp $ */ | 1 | /* $OpenBSD: verify.c,v 1.16 2023/03/06 14:32:06 tb Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -81,7 +81,7 @@ static struct { | |||
81 | char *untfile; | 81 | char *untfile; |
82 | int verbose; | 82 | int verbose; |
83 | X509_VERIFY_PARAM *vpm; | 83 | X509_VERIFY_PARAM *vpm; |
84 | } verify_config; | 84 | } cfg; |
85 | 85 | ||
86 | static int | 86 | static int |
87 | verify_opt_args(int argc, char **argv, int *argsused) | 87 | verify_opt_args(int argc, char **argv, int *argsused) |
@@ -89,7 +89,7 @@ verify_opt_args(int argc, char **argv, int *argsused) | |||
89 | int oargc = argc; | 89 | int oargc = argc; |
90 | int badarg = 0; | 90 | int badarg = 0; |
91 | 91 | ||
92 | if (!args_verify(&argv, &argc, &badarg, bio_err, &verify_config.vpm)) | 92 | if (!args_verify(&argv, &argc, &badarg, bio_err, &cfg.vpm)) |
93 | return (1); | 93 | return (1); |
94 | if (badarg) | 94 | if (badarg) |
95 | return (1); | 95 | return (1); |
@@ -105,41 +105,41 @@ static const struct option verify_options[] = { | |||
105 | .argname = "file", | 105 | .argname = "file", |
106 | .desc = "Certificate Authority file", | 106 | .desc = "Certificate Authority file", |
107 | .type = OPTION_ARG, | 107 | .type = OPTION_ARG, |
108 | .opt.arg = &verify_config.CAfile, | 108 | .opt.arg = &cfg.CAfile, |
109 | }, | 109 | }, |
110 | { | 110 | { |
111 | .name = "CApath", | 111 | .name = "CApath", |
112 | .argname = "path", | 112 | .argname = "path", |
113 | .desc = "Certificate Authority path", | 113 | .desc = "Certificate Authority path", |
114 | .type = OPTION_ARG, | 114 | .type = OPTION_ARG, |
115 | .opt.arg = &verify_config.CApath, | 115 | .opt.arg = &cfg.CApath, |
116 | }, | 116 | }, |
117 | { | 117 | { |
118 | .name = "CRLfile", | 118 | .name = "CRLfile", |
119 | .argname = "file", | 119 | .argname = "file", |
120 | .desc = "Certificate Revocation List file", | 120 | .desc = "Certificate Revocation List file", |
121 | .type = OPTION_ARG, | 121 | .type = OPTION_ARG, |
122 | .opt.arg = &verify_config.crlfile, | 122 | .opt.arg = &cfg.crlfile, |
123 | }, | 123 | }, |
124 | { | 124 | { |
125 | .name = "trusted", | 125 | .name = "trusted", |
126 | .argname = "file", | 126 | .argname = "file", |
127 | .desc = "Trusted certificates file", | 127 | .desc = "Trusted certificates file", |
128 | .type = OPTION_ARG, | 128 | .type = OPTION_ARG, |
129 | .opt.arg = &verify_config.trustfile, | 129 | .opt.arg = &cfg.trustfile, |
130 | }, | 130 | }, |
131 | { | 131 | { |
132 | .name = "untrusted", | 132 | .name = "untrusted", |
133 | .argname = "file", | 133 | .argname = "file", |
134 | .desc = "Untrusted certificates file", | 134 | .desc = "Untrusted certificates file", |
135 | .type = OPTION_ARG, | 135 | .type = OPTION_ARG, |
136 | .opt.arg = &verify_config.untfile, | 136 | .opt.arg = &cfg.untfile, |
137 | }, | 137 | }, |
138 | { | 138 | { |
139 | .name = "verbose", | 139 | .name = "verbose", |
140 | .desc = "Verbose", | 140 | .desc = "Verbose", |
141 | .type = OPTION_FLAG, | 141 | .type = OPTION_FLAG, |
142 | .opt.flag = &verify_config.verbose, | 142 | .opt.flag = &cfg.verbose, |
143 | }, | 143 | }, |
144 | { | 144 | { |
145 | .name = NULL, | 145 | .name = NULL, |
@@ -273,7 +273,7 @@ verify_main(int argc, char **argv) | |||
273 | exit(1); | 273 | exit(1); |
274 | } | 274 | } |
275 | 275 | ||
276 | memset(&verify_config, 0, sizeof(verify_config)); | 276 | memset(&cfg, 0, sizeof(cfg)); |
277 | 277 | ||
278 | if (options_parse(argc, argv, verify_options, NULL, &argsused) != 0) { | 278 | if (options_parse(argc, argv, verify_options, NULL, &argsused) != 0) { |
279 | verify_usage(); | 279 | verify_usage(); |
@@ -288,17 +288,17 @@ verify_main(int argc, char **argv) | |||
288 | goto end; | 288 | goto end; |
289 | X509_STORE_set_verify_cb(cert_ctx, cb); | 289 | X509_STORE_set_verify_cb(cert_ctx, cb); |
290 | 290 | ||
291 | if (verify_config.vpm) | 291 | if (cfg.vpm) |
292 | X509_STORE_set1_param(cert_ctx, verify_config.vpm); | 292 | X509_STORE_set1_param(cert_ctx, cfg.vpm); |
293 | 293 | ||
294 | lookup = X509_STORE_add_lookup(cert_ctx, X509_LOOKUP_file()); | 294 | lookup = X509_STORE_add_lookup(cert_ctx, X509_LOOKUP_file()); |
295 | if (lookup == NULL) | 295 | if (lookup == NULL) |
296 | abort(); /* XXX */ | 296 | abort(); /* XXX */ |
297 | if (verify_config.CAfile) { | 297 | if (cfg.CAfile) { |
298 | if (!X509_LOOKUP_load_file(lookup, verify_config.CAfile, | 298 | if (!X509_LOOKUP_load_file(lookup, cfg.CAfile, |
299 | X509_FILETYPE_PEM)) { | 299 | X509_FILETYPE_PEM)) { |
300 | BIO_printf(bio_err, "Error loading file %s\n", | 300 | BIO_printf(bio_err, "Error loading file %s\n", |
301 | verify_config.CAfile); | 301 | cfg.CAfile); |
302 | ERR_print_errors(bio_err); | 302 | ERR_print_errors(bio_err); |
303 | goto end; | 303 | goto end; |
304 | } | 304 | } |
@@ -308,11 +308,11 @@ verify_main(int argc, char **argv) | |||
308 | lookup = X509_STORE_add_lookup(cert_ctx, X509_LOOKUP_hash_dir()); | 308 | lookup = X509_STORE_add_lookup(cert_ctx, X509_LOOKUP_hash_dir()); |
309 | if (lookup == NULL) | 309 | if (lookup == NULL) |
310 | abort(); /* XXX */ | 310 | abort(); /* XXX */ |
311 | if (verify_config.CApath) { | 311 | if (cfg.CApath) { |
312 | if (!X509_LOOKUP_add_dir(lookup, verify_config.CApath, | 312 | if (!X509_LOOKUP_add_dir(lookup, cfg.CApath, |
313 | X509_FILETYPE_PEM)) { | 313 | X509_FILETYPE_PEM)) { |
314 | BIO_printf(bio_err, "Error loading directory %s\n", | 314 | BIO_printf(bio_err, "Error loading directory %s\n", |
315 | verify_config.CApath); | 315 | cfg.CApath); |
316 | ERR_print_errors(bio_err); | 316 | ERR_print_errors(bio_err); |
317 | goto end; | 317 | goto end; |
318 | } | 318 | } |
@@ -321,20 +321,20 @@ verify_main(int argc, char **argv) | |||
321 | 321 | ||
322 | ERR_clear_error(); | 322 | ERR_clear_error(); |
323 | 323 | ||
324 | if (verify_config.untfile) { | 324 | if (cfg.untfile) { |
325 | untrusted = load_certs(bio_err, verify_config.untfile, | 325 | untrusted = load_certs(bio_err, cfg.untfile, |
326 | FORMAT_PEM, NULL, "untrusted certificates"); | 326 | FORMAT_PEM, NULL, "untrusted certificates"); |
327 | if (!untrusted) | 327 | if (!untrusted) |
328 | goto end; | 328 | goto end; |
329 | } | 329 | } |
330 | if (verify_config.trustfile) { | 330 | if (cfg.trustfile) { |
331 | trusted = load_certs(bio_err, verify_config.trustfile, | 331 | trusted = load_certs(bio_err, cfg.trustfile, |
332 | FORMAT_PEM, NULL, "trusted certificates"); | 332 | FORMAT_PEM, NULL, "trusted certificates"); |
333 | if (!trusted) | 333 | if (!trusted) |
334 | goto end; | 334 | goto end; |
335 | } | 335 | } |
336 | if (verify_config.crlfile) { | 336 | if (cfg.crlfile) { |
337 | crls = load_crls(bio_err, verify_config.crlfile, FORMAT_PEM, | 337 | crls = load_crls(bio_err, cfg.crlfile, FORMAT_PEM, |
338 | NULL, "other CRLs"); | 338 | NULL, "other CRLs"); |
339 | if (!crls) | 339 | if (!crls) |
340 | goto end; | 340 | goto end; |
@@ -352,8 +352,8 @@ verify_main(int argc, char **argv) | |||
352 | } | 352 | } |
353 | 353 | ||
354 | end: | 354 | end: |
355 | if (verify_config.vpm) | 355 | if (cfg.vpm) |
356 | X509_VERIFY_PARAM_free(verify_config.vpm); | 356 | X509_VERIFY_PARAM_free(cfg.vpm); |
357 | if (cert_ctx != NULL) | 357 | if (cert_ctx != NULL) |
358 | X509_STORE_free(cert_ctx); | 358 | X509_STORE_free(cert_ctx); |
359 | sk_X509_pop_free(untrusted, X509_free); | 359 | sk_X509_pop_free(untrusted, X509_free); |
@@ -454,7 +454,7 @@ cb(int ok, X509_STORE_CTX *ctx) | |||
454 | } | 454 | } |
455 | if (cert_error == X509_V_OK && ok == 2) | 455 | if (cert_error == X509_V_OK && ok == 2) |
456 | policies_print(NULL, ctx); | 456 | policies_print(NULL, ctx); |
457 | if (!verify_config.verbose) | 457 | if (!cfg.verbose) |
458 | ERR_clear_error(); | 458 | ERR_clear_error(); |
459 | return (ok); | 459 | return (ok); |
460 | } | 460 | } |