X-Git-Url: http://git.ipfire.org/?a=blobdiff_plain;f=test%2Fssltest_old.c;h=8368bd24099629cf0def40d3c976cfe9cf6b6bed;hb=b425001010044adbdbcd98f8682694b30b73bbf4;hp=90f16056aa3d16077678871c1fde345b35c94559;hpb=63215d04492fd6ffadced26d249656b692416e6a;p=thirdparty%2Fopenssl.git diff --git a/test/ssltest_old.c b/test/ssltest_old.c index 90f16056aa..8368bd2409 100644 --- a/test/ssltest_old.c +++ b/test/ssltest_old.c @@ -1,5 +1,5 @@ /* - * Copyright 1995-2018 The OpenSSL Project Authors. All Rights Reserved. + * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved. * Copyright (c) 2002, Oracle and/or its affiliates. All rights reserved * Copyright 2005 Nokia. All rights reserved. * @@ -727,6 +727,7 @@ static void sv_usage(void) fprintf(stderr, " -should_reuse - The expected state of reusing the session\n"); fprintf(stderr, " -no_ticket - do not issue TLS session ticket\n"); fprintf(stderr, " -provider - Load the given provider into the library context\n"); + fprintf(stderr, " -config - Load the given config file into the library context\n"); } static void print_key_details(BIO *out, EVP_PKEY *key) @@ -777,7 +778,7 @@ static void print_details(SSL *c_ssl, const char *prefix) prefix, SSL_get_version(c_ssl), SSL_CIPHER_get_version(ciph), SSL_CIPHER_get_name(ciph)); - cert = SSL_get_peer_certificate(c_ssl); + cert = SSL_get0_peer_certificate(c_ssl); if (cert != NULL) { EVP_PKEY* pubkey = X509_get0_pubkey(cert); @@ -785,7 +786,6 @@ static void print_details(SSL *c_ssl, const char *prefix) BIO_puts(bio_stdout, ", "); print_key_details(bio_stdout, pubkey); } - X509_free(cert); } if (SSL_get_peer_tmp_key(c_ssl, &pkey)) { BIO_puts(bio_stdout, ", temp key: "); @@ -926,7 +926,7 @@ int main(int argc, char *argv[]) char *arg = NULL, *argn = NULL; const char *provider = NULL, *config = NULL; OSSL_PROVIDER *thisprov = NULL, *defctxnull = NULL; - OPENSSL_CTX *libctx = NULL; + OSSL_LIB_CTX *libctx = NULL; verbose = 0; debug = 0; @@ -1192,6 +1192,10 @@ int main(int argc, char *argv[]) if (--argc < 1) goto bad; provider = *(++argv); + } else if (strcmp(*argv, "-config") == 0) { + if (--argc < 1) + goto bad; + config = *(++argv); } else { int rv; arg = argv[0]; @@ -1363,18 +1367,22 @@ int main(int argc, char *argv[]) defctxnull = OSSL_PROVIDER_load(NULL, "null"); if (defctxnull == NULL) goto end; - libctx = OPENSSL_CTX_new(); + libctx = OSSL_LIB_CTX_new(); if (libctx == NULL) goto end; + if (config != NULL + && !OSSL_LIB_CTX_load_config(libctx, config)) + goto end; + thisprov = OSSL_PROVIDER_load(libctx, provider); if (thisprov == NULL) goto end; } - c_ctx = SSL_CTX_new_with_libctx(libctx, NULL, meth); - s_ctx = SSL_CTX_new_with_libctx(libctx, NULL, meth); - s_ctx2 = SSL_CTX_new_with_libctx(libctx, NULL, meth); /* no SSL_CTX_dup! */ + c_ctx = SSL_CTX_new_ex(libctx, NULL, meth); + s_ctx = SSL_CTX_new_ex(libctx, NULL, meth); + s_ctx2 = SSL_CTX_new_ex(libctx, NULL, meth); /* no SSL_CTX_dup! */ if ((c_ctx == NULL) || (s_ctx == NULL) || (s_ctx2 == NULL)) { ERR_print_errors(bio_err); goto end; @@ -1883,7 +1891,7 @@ int main(int argc, char *argv[]) OSSL_PROVIDER_unload(defctxnull); OSSL_PROVIDER_unload(thisprov); - OPENSSL_CTX_free(libctx); + OSSL_LIB_CTX_free(libctx); BIO_free(bio_err); EXIT(ret);