提交 bde136c8 编写于 作者: F FdaSilvaYY 提交者: Matt Caswell

Few cleanups in s_client, s_server apps.

Discard useless static engine_id
Add a const qualifier
Fix some spelling
Reviewed-by: NRichard Levitte <levitte@openssl.org>
Reviewed-by: NMatt Caswell <matt@openssl.org>
上级 d2dfd482
...@@ -1413,7 +1413,7 @@ int save_serial(char *serialfile, char *suffix, BIGNUM *serial, ...@@ -1413,7 +1413,7 @@ int save_serial(char *serialfile, char *suffix, BIGNUM *serial,
int rotate_serial(char *serialfile, char *new_suffix, char *old_suffix) int rotate_serial(char *serialfile, char *new_suffix, char *old_suffix)
{ {
char buf[5][BSIZE]; char buf[2][BSIZE];
int i, j; int i, j;
i = strlen(serialfile) + strlen(old_suffix); i = strlen(serialfile) + strlen(old_suffix);
...@@ -1782,6 +1782,7 @@ int bio_to_mem(unsigned char **out, int maxlen, BIO *in) ...@@ -1782,6 +1782,7 @@ int bio_to_mem(unsigned char **out, int maxlen, BIO *in)
BIO *mem; BIO *mem;
int len, ret; int len, ret;
unsigned char tbuf[1024]; unsigned char tbuf[1024];
mem = BIO_new(BIO_s_mem()); mem = BIO_new(BIO_s_mem());
if (mem == NULL) if (mem == NULL)
return -1; return -1;
......
...@@ -242,7 +242,7 @@ typedef struct srp_arg_st { ...@@ -242,7 +242,7 @@ typedef struct srp_arg_st {
int msg; /* copy from c_msg */ int msg; /* copy from c_msg */
int debug; /* copy from c_debug */ int debug; /* copy from c_debug */
int amp; /* allow more groups */ int amp; /* allow more groups */
int strength /* minimal size for N */ ; int strength; /* minimal size for N */
} SRP_ARG; } SRP_ARG;
# define SRP_NUMBER_ITERATIONS_FOR_PRIME 64 # define SRP_NUMBER_ITERATIONS_FOR_PRIME 64
...@@ -276,7 +276,7 @@ static int srp_Verify_N_and_g(const BIGNUM *N, const BIGNUM *g) ...@@ -276,7 +276,7 @@ static int srp_Verify_N_and_g(const BIGNUM *N, const BIGNUM *g)
* The callback is only called for a non default group. * The callback is only called for a non default group.
* *
* An application does not need the call back at all if * An application does not need the call back at all if
* only the stanard groups are used. In real life situations, * only the standard groups are used. In real life situations,
* client and server already share well known groups, * client and server already share well known groups,
* thus there is no need to verify them. * thus there is no need to verify them.
* Furthermore, in case that a server actually proposes a group that * Furthermore, in case that a server actually proposes a group that
...@@ -549,8 +549,14 @@ typedef enum OPTION_choice { ...@@ -549,8 +549,14 @@ typedef enum OPTION_choice {
OPT_DEBUG, OPT_TLSEXTDEBUG, OPT_STATUS, OPT_WDEBUG, OPT_DEBUG, OPT_TLSEXTDEBUG, OPT_STATUS, OPT_WDEBUG,
OPT_MSG, OPT_MSGFILE, OPT_ENGINE, OPT_TRACE, OPT_SECURITY_DEBUG, OPT_MSG, OPT_MSGFILE, OPT_ENGINE, OPT_TRACE, OPT_SECURITY_DEBUG,
OPT_SECURITY_DEBUG_VERBOSE, OPT_SHOWCERTS, OPT_NBIO_TEST, OPT_STATE, OPT_SECURITY_DEBUG_VERBOSE, OPT_SHOWCERTS, OPT_NBIO_TEST, OPT_STATE,
OPT_PSK_IDENTITY, OPT_PSK, OPT_SRPUSER, OPT_SRPPASS, OPT_SRP_STRENGTH, #ifndef OPENSSL_NO_PSK
OPT_SRP_LATEUSER, OPT_SRP_MOREGROUPS, OPT_SSL3, OPT_SSL_CONFIG, OPT_PSK_IDENTITY, OPT_PSK,
#endif
#ifndef OPENSSL_NO_SRP
OPT_SRPUSER, OPT_SRPPASS, OPT_SRP_STRENGTH, OPT_SRP_LATEUSER,
OPT_SRP_MOREGROUPS,
#endif
OPT_SSL3, OPT_SSL_CONFIG,
OPT_TLS1_2, OPT_TLS1_1, OPT_TLS1, OPT_DTLS, OPT_DTLS1, OPT_TLS1_2, OPT_TLS1_1, OPT_TLS1, OPT_DTLS, OPT_DTLS1,
OPT_DTLS1_2, OPT_TIMEOUT, OPT_MTU, OPT_KEYFORM, OPT_PASS, OPT_DTLS1_2, OPT_TIMEOUT, OPT_MTU, OPT_KEYFORM, OPT_PASS,
OPT_CERT_CHAIN, OPT_CAPATH, OPT_NOCAPATH, OPT_CHAINCAPATH, OPT_VERIFYCAPATH, OPT_CERT_CHAIN, OPT_CAPATH, OPT_NOCAPATH, OPT_CHAINCAPATH, OPT_VERIFYCAPATH,
...@@ -711,7 +717,7 @@ OPTIONS s_client_options[] = { ...@@ -711,7 +717,7 @@ OPTIONS s_client_options[] = {
{"psk", OPT_PSK, 's', "PSK in hex (without 0x)"}, {"psk", OPT_PSK, 's', "PSK in hex (without 0x)"},
#endif #endif
#ifndef OPENSSL_NO_SRP #ifndef OPENSSL_NO_SRP
{"srpuser", OPT_SRPUSER, 's', "SRP authentification for 'user'"}, {"srpuser", OPT_SRPUSER, 's', "SRP authentication for 'user'"},
{"srppass", OPT_SRPPASS, 's', "Password for 'user'"}, {"srppass", OPT_SRPPASS, 's', "Password for 'user'"},
{"srp_lateuser", OPT_SRP_LATEUSER, '-', {"srp_lateuser", OPT_SRP_LATEUSER, '-',
"SRP username into second ClientHello message"}, "SRP username into second ClientHello message"},
...@@ -733,7 +739,7 @@ OPTIONS s_client_options[] = { ...@@ -733,7 +739,7 @@ OPTIONS s_client_options[] = {
{"noct", OPT_NOCT, '-', "Do not request or parse SCTs (default)"}, {"noct", OPT_NOCT, '-', "Do not request or parse SCTs (default)"},
{"ctlogfile", OPT_CTLOG_FILE, '<', "CT log list CONF file"}, {"ctlogfile", OPT_CTLOG_FILE, '<', "CT log list CONF file"},
#endif #endif
{NULL} {NULL, OPT_EOF, 0x00, NULL}
}; };
typedef enum PROTOCOL_choice { typedef enum PROTOCOL_choice {
...@@ -749,7 +755,7 @@ typedef enum PROTOCOL_choice { ...@@ -749,7 +755,7 @@ typedef enum PROTOCOL_choice {
PROTO_IRC PROTO_IRC
} PROTOCOL_CHOICE; } PROTOCOL_CHOICE;
static OPT_PAIR services[] = { static const OPT_PAIR services[] = {
{"smtp", PROTO_SMTP}, {"smtp", PROTO_SMTP},
{"pop3", PROTO_POP3}, {"pop3", PROTO_POP3},
{"imap", PROTO_IMAP}, {"imap", PROTO_IMAP},
...@@ -758,7 +764,7 @@ static OPT_PAIR services[] = { ...@@ -758,7 +764,7 @@ static OPT_PAIR services[] = {
{"xmpp-server", PROTO_XMPP_SERVER}, {"xmpp-server", PROTO_XMPP_SERVER},
{"telnet", PROTO_TELNET}, {"telnet", PROTO_TELNET},
{"irc", PROTO_IRC}, {"irc", PROTO_IRC},
{NULL} {NULL, 0}
}; };
int s_client_main(int argc, char **argv) int s_client_main(int argc, char **argv)
...@@ -1034,7 +1040,6 @@ int s_client_main(int argc, char **argv) ...@@ -1034,7 +1040,6 @@ int s_client_main(int argc, char **argv)
BIO_printf(bio_err, "Error getting client auth engine\n"); BIO_printf(bio_err, "Error getting client auth engine\n");
goto opthelp; goto opthelp;
} }
break;
#endif #endif
break; break;
case OPT_RAND: case OPT_RAND:
...@@ -1098,10 +1103,6 @@ int s_client_main(int argc, char **argv) ...@@ -1098,10 +1103,6 @@ int s_client_main(int argc, char **argv)
goto end; goto end;
} }
break; break;
#else
case OPT_PSK_IDENTITY:
case OPT_PSK:
break;
#endif #endif
#ifndef OPENSSL_NO_SRP #ifndef OPENSSL_NO_SRP
case OPT_SRPUSER: case OPT_SRPUSER:
...@@ -1131,13 +1132,6 @@ int s_client_main(int argc, char **argv) ...@@ -1131,13 +1132,6 @@ int s_client_main(int argc, char **argv)
if (min_version < TLS1_VERSION) if (min_version < TLS1_VERSION)
min_version = TLS1_VERSION; min_version = TLS1_VERSION;
break; break;
#else
case OPT_SRPUSER:
case OPT_SRPPASS:
case OPT_SRP_STRENGTH:
case OPT_SRP_LATEUSER:
case OPT_SRP_MOREGROUPS:
break;
#endif #endif
case OPT_SSL_CONFIG: case OPT_SSL_CONFIG:
ssl_config = opt_arg(); ssl_config = opt_arg();
...@@ -1700,9 +1694,9 @@ int s_client_main(int argc, char **argv) ...@@ -1700,9 +1694,9 @@ int s_client_main(int argc, char **argv)
goto end; goto end;
} }
} else if (dane_tlsa_rrset != NULL) { } else if (dane_tlsa_rrset != NULL) {
BIO_printf(bio_err, "%s: DANE TLSA authentication requires the " BIO_printf(bio_err, "%s: DANE TLSA authentication requires the "
"-dane_tlsa_domain option.\n", prog); "-dane_tlsa_domain option.\n", prog);
goto end; goto end;
} }
re_start: re_start:
...@@ -2572,6 +2566,7 @@ static void print_stuff(BIO *bio, SSL *s, int full) ...@@ -2572,6 +2566,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
SSL_CIPHER_get_version(c), SSL_CIPHER_get_name(c)); SSL_CIPHER_get_version(c), SSL_CIPHER_get_name(c));
if (peer != NULL) { if (peer != NULL) {
EVP_PKEY *pktmp; EVP_PKEY *pktmp;
pktmp = X509_get0_pubkey(peer); pktmp = X509_get0_pubkey(peer);
BIO_printf(bio, "Server public key is %d bit\n", BIO_printf(bio, "Server public key is %d bit\n",
EVP_PKEY_bits(pktmp)); EVP_PKEY_bits(pktmp));
......
...@@ -146,9 +146,6 @@ static int async = 0; ...@@ -146,9 +146,6 @@ static int async = 0;
static unsigned int split_send_fragment = 0; static unsigned int split_send_fragment = 0;
static unsigned int max_pipelines = 0; static unsigned int max_pipelines = 0;
#ifndef OPENSSL_NO_ENGINE
static char *engine_id = NULL;
#endif
static const char *session_id_prefix = NULL; static const char *session_id_prefix = NULL;
#ifndef OPENSSL_NO_DTLS #ifndef OPENSSL_NO_DTLS
...@@ -305,9 +302,6 @@ static void s_server_init(void) ...@@ -305,9 +302,6 @@ static void s_server_init(void)
async = 0; async = 0;
split_send_fragment = 0; split_send_fragment = 0;
max_pipelines = 0; max_pipelines = 0;
#ifndef OPENSSL_NO_ENGINE
engine_id = NULL;
#endif
} }
static int local_argc = 0; static int local_argc = 0;
...@@ -919,12 +913,12 @@ OPTIONS s_server_options[] = { ...@@ -919,12 +913,12 @@ OPTIONS s_server_options[] = {
#ifndef OPENSSL_NO_ENGINE #ifndef OPENSSL_NO_ENGINE
{"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"}, {"engine", OPT_ENGINE, 's', "Use engine, possibly a hardware device"},
#endif #endif
{NULL} {NULL, OPT_EOF, 0, NULL}
}; };
int s_server_main(int argc, char *argv[]) int s_server_main(int argc, char *argv[])
{ {
ENGINE *e = NULL; ENGINE *engine = NULL;
EVP_PKEY *s_key = NULL, *s_dkey = NULL; EVP_PKEY *s_key = NULL, *s_dkey = NULL;
SSL_CONF_CTX *cctx = NULL; SSL_CONF_CTX *cctx = NULL;
const SSL_METHOD *meth = TLS_server_method(); const SSL_METHOD *meth = TLS_server_method();
...@@ -1396,7 +1390,7 @@ int s_server_main(int argc, char *argv[]) ...@@ -1396,7 +1390,7 @@ int s_server_main(int argc, char *argv[])
session_id_prefix = opt_arg(); session_id_prefix = opt_arg();
break; break;
case OPT_ENGINE: case OPT_ENGINE:
e = setup_engine(opt_arg(), 1); engine = setup_engine(opt_arg(), 1);
break; break;
case OPT_RAND: case OPT_RAND:
inrand = opt_arg(); inrand = opt_arg();
...@@ -1502,7 +1496,7 @@ int s_server_main(int argc, char *argv[]) ...@@ -1502,7 +1496,7 @@ int s_server_main(int argc, char *argv[])
goto end; goto end;
if (nocert == 0) { if (nocert == 0) {
s_key = load_key(s_key_file, s_key_format, 0, pass, e, s_key = load_key(s_key_file, s_key_format, 0, pass, engine,
"server certificate private key file"); "server certificate private key file");
if (!s_key) { if (!s_key) {
ERR_print_errors(bio_err); ERR_print_errors(bio_err);
...@@ -1523,7 +1517,7 @@ int s_server_main(int argc, char *argv[]) ...@@ -1523,7 +1517,7 @@ int s_server_main(int argc, char *argv[])
} }
if (tlsextcbp.servername) { if (tlsextcbp.servername) {
s_key2 = load_key(s_key_file2, s_key_format, 0, pass, e, s_key2 = load_key(s_key_file2, s_key_format, 0, pass, engine,
"second server certificate private key file"); "second server certificate private key file");
if (!s_key2) { if (!s_key2) {
ERR_print_errors(bio_err); ERR_print_errors(bio_err);
...@@ -1582,7 +1576,7 @@ int s_server_main(int argc, char *argv[]) ...@@ -1582,7 +1576,7 @@ int s_server_main(int argc, char *argv[])
s_dkey_file = s_dcert_file; s_dkey_file = s_dcert_file;
s_dkey = load_key(s_dkey_file, s_dkey_format, s_dkey = load_key(s_dkey_file, s_dkey_format,
0, dpass, e, "second certificate private key file"); 0, dpass, engine, "second certificate private key file");
if (!s_dkey) { if (!s_dkey) {
ERR_print_errors(bio_err); ERR_print_errors(bio_err);
goto end; goto end;
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册