summaryrefslogtreecommitdiff
path: root/src/usr.bin/openssl/s_server.c
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--src/usr.bin/openssl/s_server.c40
1 files changed, 9 insertions, 31 deletions
diff --git a/src/usr.bin/openssl/s_server.c b/src/usr.bin/openssl/s_server.c
index 0272abe43b..5989e0db90 100644
--- a/src/usr.bin/openssl/s_server.c
+++ b/src/usr.bin/openssl/s_server.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: s_server.c,v 1.16 2015/09/10 16:01:06 jsing Exp $ */ 1/* $OpenBSD: s_server.c,v 1.17 2015/09/11 14:30:23 bcook Exp $ */
2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 2/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
3 * All rights reserved. 3 * All rights reserved.
4 * 4 *
@@ -226,9 +226,6 @@ static int s_quiet = 0;
226static char *keymatexportlabel = NULL; 226static char *keymatexportlabel = NULL;
227static int keymatexportlen = 20; 227static int keymatexportlen = 20;
228 228
229#ifndef OPENSSL_NO_ENGINE
230static char *engine_id = NULL;
231#endif
232static const char *session_id_prefix = NULL; 229static const char *session_id_prefix = NULL;
233 230
234static int enable_timeouts = 0; 231static int enable_timeouts = 0;
@@ -262,9 +259,6 @@ s_server_init(void)
262 s_debug = 0; 259 s_debug = 0;
263 s_msg = 0; 260 s_msg = 0;
264 s_quiet = 0; 261 s_quiet = 0;
265#ifndef OPENSSL_NO_ENGINE
266 engine_id = NULL;
267#endif
268} 262}
269 263
270static void 264static void
@@ -286,12 +280,12 @@ sv_usage(void)
286 BIO_printf(bio_err, " -certform arg - certificate format (PEM or DER) PEM default\n"); 280 BIO_printf(bio_err, " -certform arg - certificate format (PEM or DER) PEM default\n");
287 BIO_printf(bio_err, " -key arg - Private Key file to use, in cert file if\n"); 281 BIO_printf(bio_err, " -key arg - Private Key file to use, in cert file if\n");
288 BIO_printf(bio_err, " not specified (default is %s)\n", TEST_CERT); 282 BIO_printf(bio_err, " not specified (default is %s)\n", TEST_CERT);
289 BIO_printf(bio_err, " -keyform arg - key format (PEM, DER or ENGINE) PEM default\n"); 283 BIO_printf(bio_err, " -keyform arg - key format (PEM or DER) PEM default\n");
290 BIO_printf(bio_err, " -pass arg - private key file pass phrase source\n"); 284 BIO_printf(bio_err, " -pass arg - private key file pass phrase source\n");
291 BIO_printf(bio_err, " -dcert arg - second certificate file to use (usually for DSA)\n"); 285 BIO_printf(bio_err, " -dcert arg - second certificate file to use (usually for DSA)\n");
292 BIO_printf(bio_err, " -dcertform x - second certificate format (PEM or DER) PEM default\n"); 286 BIO_printf(bio_err, " -dcertform x - second certificate format (PEM or DER) PEM default\n");
293 BIO_printf(bio_err, " -dkey arg - second private key file to use (usually for DSA)\n"); 287 BIO_printf(bio_err, " -dkey arg - second private key file to use (usually for DSA)\n");
294 BIO_printf(bio_err, " -dkeyform arg - second key format (PEM, DER or ENGINE) PEM default\n"); 288 BIO_printf(bio_err, " -dkeyform arg - second key format (PEM or DER) PEM default\n");
295 BIO_printf(bio_err, " -dpass arg - second private key file pass phrase source\n"); 289 BIO_printf(bio_err, " -dpass arg - second private key file pass phrase source\n");
296 BIO_printf(bio_err, " -dhparam arg - DH parameter file to use, in cert file if not specified\n"); 290 BIO_printf(bio_err, " -dhparam arg - DH parameter file to use, in cert file if not specified\n");
297 BIO_printf(bio_err, " or a default set of parameters is used\n"); 291 BIO_printf(bio_err, " or a default set of parameters is used\n");
@@ -331,9 +325,6 @@ sv_usage(void)
331 BIO_printf(bio_err, " -WWW - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n"); 325 BIO_printf(bio_err, " -WWW - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
332 BIO_printf(bio_err, " -HTTP - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n"); 326 BIO_printf(bio_err, " -HTTP - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
333 BIO_printf(bio_err, " with the assumption it contains a complete HTTP response.\n"); 327 BIO_printf(bio_err, " with the assumption it contains a complete HTTP response.\n");
334#ifndef OPENSSL_NO_ENGINE
335 BIO_printf(bio_err, " -engine id - Initialise and use the specified engine\n");
336#endif
337 BIO_printf(bio_err, " -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg'\n"); 328 BIO_printf(bio_err, " -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg'\n");
338 BIO_printf(bio_err, " -servername host - servername for HostName TLS extension\n"); 329 BIO_printf(bio_err, " -servername host - servername for HostName TLS extension\n");
339 BIO_printf(bio_err, " -servername_fatal - on mismatch send fatal alert (default warning alert)\n"); 330 BIO_printf(bio_err, " -servername_fatal - on mismatch send fatal alert (default warning alert)\n");
@@ -598,7 +589,6 @@ s_server_main(int argc, char *argv[])
598 int state = 0; 589 int state = 0;
599 const SSL_METHOD *meth = NULL; 590 const SSL_METHOD *meth = NULL;
600 int socket_type = SOCK_STREAM; 591 int socket_type = SOCK_STREAM;
601 ENGINE *e = NULL;
602 int s_cert_format = FORMAT_PEM, s_key_format = FORMAT_PEM; 592 int s_cert_format = FORMAT_PEM, s_key_format = FORMAT_PEM;
603 char *passarg = NULL, *pass = NULL; 593 char *passarg = NULL, *pass = NULL;
604 char *dpassarg = NULL, *dpass = NULL; 594 char *dpassarg = NULL, *dpass = NULL;
@@ -832,13 +822,6 @@ s_server_main(int argc, char *argv[])
832 goto bad; 822 goto bad;
833 session_id_prefix = *(++argv); 823 session_id_prefix = *(++argv);
834 } 824 }
835#ifndef OPENSSL_NO_ENGINE
836 else if (strcmp(*argv, "-engine") == 0) {
837 if (--argc < 1)
838 goto bad;
839 engine_id = *(++argv);
840 }
841#endif
842 else if (strcmp(*argv, "-servername") == 0) { 825 else if (strcmp(*argv, "-servername") == 0) {
843 if (--argc < 1) 826 if (--argc < 1)
844 goto bad; 827 goto bad;
@@ -899,10 +882,6 @@ bad:
899 goto end; 882 goto end;
900 } 883 }
901 884
902#ifndef OPENSSL_NO_ENGINE
903 e = setup_engine(bio_err, engine_id, 1);
904#endif
905
906 if (!app_passwd(bio_err, passarg, dpassarg, &pass, &dpass)) { 885 if (!app_passwd(bio_err, passarg, dpassarg, &pass, &dpass)) {
907 BIO_printf(bio_err, "Error getting password\n"); 886 BIO_printf(bio_err, "Error getting password\n");
908 goto end; 887 goto end;
@@ -913,28 +892,28 @@ bad:
913 s_key_file2 = s_cert_file2; 892 s_key_file2 = s_cert_file2;
914 893
915 if (nocert == 0) { 894 if (nocert == 0) {
916 s_key = load_key(bio_err, s_key_file, s_key_format, 0, pass, e, 895 s_key = load_key(bio_err, s_key_file, s_key_format, 0, pass,
917 "server certificate private key file"); 896 "server certificate private key file");
918 if (!s_key) { 897 if (!s_key) {
919 ERR_print_errors(bio_err); 898 ERR_print_errors(bio_err);
920 goto end; 899 goto end;
921 } 900 }
922 s_cert = load_cert(bio_err, s_cert_file, s_cert_format, 901 s_cert = load_cert(bio_err, s_cert_file, s_cert_format,
923 NULL, e, "server certificate file"); 902 NULL, "server certificate file");
924 903
925 if (!s_cert) { 904 if (!s_cert) {
926 ERR_print_errors(bio_err); 905 ERR_print_errors(bio_err);
927 goto end; 906 goto end;
928 } 907 }
929 if (tlsextcbp.servername) { 908 if (tlsextcbp.servername) {
930 s_key2 = load_key(bio_err, s_key_file2, s_key_format, 0, pass, e, 909 s_key2 = load_key(bio_err, s_key_file2, s_key_format, 0, pass,
931 "second server certificate private key file"); 910 "second server certificate private key file");
932 if (!s_key2) { 911 if (!s_key2) {
933 ERR_print_errors(bio_err); 912 ERR_print_errors(bio_err);
934 goto end; 913 goto end;
935 } 914 }
936 s_cert2 = load_cert(bio_err, s_cert_file2, s_cert_format, 915 s_cert2 = load_cert(bio_err, s_cert_file2, s_cert_format,
937 NULL, e, "second server certificate file"); 916 NULL, "second server certificate file");
938 917
939 if (!s_cert2) { 918 if (!s_cert2) {
940 ERR_print_errors(bio_err); 919 ERR_print_errors(bio_err);
@@ -966,14 +945,13 @@ bad:
966 s_dkey_file = s_dcert_file; 945 s_dkey_file = s_dcert_file;
967 946
968 s_dkey = load_key(bio_err, s_dkey_file, s_dkey_format, 947 s_dkey = load_key(bio_err, s_dkey_file, s_dkey_format,
969 0, dpass, e, 948 0, dpass, "second certificate private key file");
970 "second certificate private key file");
971 if (!s_dkey) { 949 if (!s_dkey) {
972 ERR_print_errors(bio_err); 950 ERR_print_errors(bio_err);
973 goto end; 951 goto end;
974 } 952 }
975 s_dcert = load_cert(bio_err, s_dcert_file, s_dcert_format, 953 s_dcert = load_cert(bio_err, s_dcert_file, s_dcert_format,
976 NULL, e, "second server certificate file"); 954 NULL, "second server certificate file");
977 955
978 if (!s_dcert) { 956 if (!s_dcert) {
979 ERR_print_errors(bio_err); 957 ERR_print_errors(bio_err);