From 042de14de6bff7126905d195e21ff1dc271dd087 Mon Sep 17 00:00:00 2001 From: bcook <> Date: Thu, 10 Sep 2015 06:36:45 +0000 Subject: Fix shadowed verify_error in s_server by removing the unused global. 's_time -verify 1' will now actually verify the peer certificate. ok beck@ --- src/usr.bin/openssl/s_time.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) (limited to 'src/usr.bin/openssl/s_time.c') diff --git a/src/usr.bin/openssl/s_time.c b/src/usr.bin/openssl/s_time.c index 87a0a20382..ee4e584bd9 100644 --- a/src/usr.bin/openssl/s_time.c +++ b/src/usr.bin/openssl/s_time.c @@ -1,4 +1,4 @@ -/* $OpenBSD: s_time.c,v 1.9 2015/08/22 16:36:05 jsing Exp $ */ +/* $OpenBSD: s_time.c,v 1.10 2015/09/10 06:36:45 bcook Exp $ */ /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * @@ -256,7 +256,6 @@ s_time_main(int argc, char **argv) s_time_meth = SSLv23_client_method(); verify_depth = 0; - verify_error = X509_V_OK; memset(&s_time_config, 0, sizeof(s_time_config)); @@ -299,6 +298,8 @@ s_time_main(int argc, char **argv) } } + SSL_CTX_set_verify(tm_ctx, s_time_config.verify, NULL); + if (!set_cert_stuff(tm_ctx, s_time_config.certfile, s_time_config.keyfile)) goto end; @@ -491,6 +492,7 @@ doConnection(SSL * scon) struct pollfd pfd[1]; SSL *serverCon; BIO *conn; + long verify_error; int i; if ((conn = BIO_new(BIO_s_connect())) == NULL) @@ -524,6 +526,7 @@ doConnection(SSL * scon) } if (i <= 0) { BIO_printf(bio_err, "ERROR\n"); + verify_error = SSL_get_verify_result(serverCon); if (verify_error != X509_V_OK) BIO_printf(bio_err, "verify error:%s\n", X509_verify_cert_error_string(verify_error)); -- cgit v1.2.3-55-g6feb