mirror of
https://github.com/QuasarApp/openssl.git
synced 2025-04-29 03:04:37 +00:00
RT4232: Extra space in help message.
It turns out that -pause calls the undocumented function SSL_set_debug. That just sets flag inside the SSL structure. That flag, despite the command is never used. So remove the flag, the field, and the function. Reviewed-by: Richard Levitte <levitte@openssl.org>
This commit is contained in:
parent
a7cf07b496
commit
3a4e9367d8
@ -189,7 +189,6 @@ static int async = 0;
|
|||||||
static int c_nbio = 0;
|
static int c_nbio = 0;
|
||||||
static int c_tlsextdebug = 0;
|
static int c_tlsextdebug = 0;
|
||||||
static int c_status_req = 0;
|
static int c_status_req = 0;
|
||||||
static int c_Pause = 0;
|
|
||||||
static int c_debug = 0;
|
static int c_debug = 0;
|
||||||
static int c_msg = 0;
|
static int c_msg = 0;
|
||||||
static int c_showcerts = 0;
|
static int c_showcerts = 0;
|
||||||
@ -619,7 +618,7 @@ typedef enum OPTION_choice {
|
|||||||
OPT_CERTFORM, OPT_CRLFORM, OPT_VERIFY_RET_ERROR, OPT_VERIFY_QUIET,
|
OPT_CERTFORM, OPT_CRLFORM, OPT_VERIFY_RET_ERROR, OPT_VERIFY_QUIET,
|
||||||
OPT_BRIEF, OPT_PREXIT, OPT_CRLF, OPT_QUIET, OPT_NBIO,
|
OPT_BRIEF, OPT_PREXIT, OPT_CRLF, OPT_QUIET, OPT_NBIO,
|
||||||
OPT_SSL_CLIENT_ENGINE, OPT_RAND, OPT_IGN_EOF, OPT_NO_IGN_EOF,
|
OPT_SSL_CLIENT_ENGINE, OPT_RAND, OPT_IGN_EOF, OPT_NO_IGN_EOF,
|
||||||
OPT_PAUSE, OPT_DEBUG, OPT_TLSEXTDEBUG, OPT_STATUS, OPT_WDEBUG,
|
OPT_DEBUG, OPT_TLSEXTDEBUG, OPT_STATUS, OPT_WDEBUG,
|
||||||
OPT_MSG, OPT_MSGFILE, OPT_ENGINE, OPT_TRACE, OPT_SECURITY_DEBUG,
|
OPT_MSG, OPT_MSGFILE, OPT_ENGINE, OPT_TRACE, OPT_SECURITY_DEBUG,
|
||||||
OPT_SECURITY_DEBUG_VERBOSE, OPT_SHOWCERTS, OPT_NBIO_TEST, OPT_STATE,
|
OPT_SECURITY_DEBUG_VERBOSE, OPT_SHOWCERTS, OPT_NBIO_TEST, OPT_STATE,
|
||||||
OPT_PSK_IDENTITY, OPT_PSK, OPT_SRPUSER, OPT_SRPPASS, OPT_SRP_STRENGTH,
|
OPT_PSK_IDENTITY, OPT_PSK, OPT_SRPUSER, OPT_SRPPASS, OPT_SRP_STRENGTH,
|
||||||
@ -666,7 +665,6 @@ OPTIONS s_client_options[] = {
|
|||||||
"DANE TLSA rrdata presentation form"},
|
"DANE TLSA rrdata presentation form"},
|
||||||
{"reconnect", OPT_RECONNECT, '-',
|
{"reconnect", OPT_RECONNECT, '-',
|
||||||
"Drop and re-make the connection with the same Session-ID"},
|
"Drop and re-make the connection with the same Session-ID"},
|
||||||
{"pause", OPT_PAUSE, '-', "Sleep after each read and write system call"},
|
|
||||||
{"showcerts", OPT_SHOWCERTS, '-', "Show all certificates in the chain"},
|
{"showcerts", OPT_SHOWCERTS, '-', "Show all certificates in the chain"},
|
||||||
{"debug", OPT_DEBUG, '-', "Extra output"},
|
{"debug", OPT_DEBUG, '-', "Extra output"},
|
||||||
{"msg", OPT_MSG, '-', "Show protocol messages"},
|
{"msg", OPT_MSG, '-', "Show protocol messages"},
|
||||||
@ -864,7 +862,6 @@ int s_client_main(int argc, char **argv)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
prog = opt_progname(argv[0]);
|
prog = opt_progname(argv[0]);
|
||||||
c_Pause = 0;
|
|
||||||
c_quiet = 0;
|
c_quiet = 0;
|
||||||
c_ign_eof = 0;
|
c_ign_eof = 0;
|
||||||
c_debug = 0;
|
c_debug = 0;
|
||||||
@ -1014,9 +1011,6 @@ int s_client_main(int argc, char **argv)
|
|||||||
case OPT_NO_IGN_EOF:
|
case OPT_NO_IGN_EOF:
|
||||||
c_ign_eof = 0;
|
c_ign_eof = 0;
|
||||||
break;
|
break;
|
||||||
case OPT_PAUSE:
|
|
||||||
c_Pause = 1;
|
|
||||||
break;
|
|
||||||
case OPT_DEBUG:
|
case OPT_DEBUG:
|
||||||
c_debug = 1;
|
c_debug = 1;
|
||||||
break;
|
break;
|
||||||
@ -1602,9 +1596,6 @@ int s_client_main(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
if (c_Pause & 0x01)
|
|
||||||
SSL_set_debug(con, 1);
|
|
||||||
|
|
||||||
if (socket_type == SOCK_DGRAM) {
|
if (socket_type == SOCK_DGRAM) {
|
||||||
|
|
||||||
sbio = BIO_new_dgram(s, BIO_NOCLOSE);
|
sbio = BIO_new_dgram(s, BIO_NOCLOSE);
|
||||||
@ -1654,7 +1645,6 @@ int s_client_main(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (c_debug) {
|
if (c_debug) {
|
||||||
SSL_set_debug(con, 1);
|
|
||||||
BIO_set_callback(sbio, bio_dump_callback);
|
BIO_set_callback(sbio, bio_dump_callback);
|
||||||
BIO_set_callback_arg(sbio, (char *)bio_c_out);
|
BIO_set_callback_arg(sbio, (char *)bio_c_out);
|
||||||
}
|
}
|
||||||
|
@ -2098,7 +2098,6 @@ static int sv_body(char *hostname, int s, int stype, unsigned char *context)
|
|||||||
/* SSL_set_fd(con,s); */
|
/* SSL_set_fd(con,s); */
|
||||||
|
|
||||||
if (s_debug) {
|
if (s_debug) {
|
||||||
SSL_set_debug(con, 1);
|
|
||||||
BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
|
BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
|
||||||
BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
|
BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
|
||||||
}
|
}
|
||||||
@ -2651,7 +2650,6 @@ static int www_body(char *hostname, int s, int stype, unsigned char *context)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (s_debug) {
|
if (s_debug) {
|
||||||
SSL_set_debug(con, 1);
|
|
||||||
BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
|
BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
|
||||||
BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
|
BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
|
||||||
}
|
}
|
||||||
@ -3013,7 +3011,6 @@ static int rev_body(char *hostname, int s, int stype, unsigned char *context)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (s_debug) {
|
if (s_debug) {
|
||||||
SSL_set_debug(con, 1);
|
|
||||||
BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
|
BIO_set_callback(SSL_get_rbio(con), bio_dump_callback);
|
||||||
BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
|
BIO_set_callback_arg(SSL_get_rbio(con), (char *)bio_s_out);
|
||||||
}
|
}
|
||||||
|
@ -52,7 +52,6 @@ B<openssl> B<s_client>
|
|||||||
[B<-verify_name name>]
|
[B<-verify_name name>]
|
||||||
[B<-x509_strict>]
|
[B<-x509_strict>]
|
||||||
[B<-reconnect>]
|
[B<-reconnect>]
|
||||||
[B<-pause>]
|
|
||||||
[B<-showcerts>]
|
[B<-showcerts>]
|
||||||
[B<-debug>]
|
[B<-debug>]
|
||||||
[B<-msg>]
|
[B<-msg>]
|
||||||
@ -226,10 +225,6 @@ L<verify(1)> manual page for details.
|
|||||||
reconnects to the same server 5 times using the same session ID, this can
|
reconnects to the same server 5 times using the same session ID, this can
|
||||||
be used as a test that session caching is working.
|
be used as a test that session caching is working.
|
||||||
|
|
||||||
=item B<-pause>
|
|
||||||
|
|
||||||
pauses 1 second between each read and write call.
|
|
||||||
|
|
||||||
=item B<-showcerts>
|
=item B<-showcerts>
|
||||||
|
|
||||||
display the whole server certificate chain: normally only the server
|
display the whole server certificate chain: normally only the server
|
||||||
|
@ -1810,7 +1810,6 @@ void SSL_set_not_resumable_session_callback(SSL *ssl,
|
|||||||
int
|
int
|
||||||
is_forward_secure));
|
is_forward_secure));
|
||||||
|
|
||||||
void SSL_set_debug(SSL *s, int debug);
|
|
||||||
__owur int SSL_cache_hit(SSL *s);
|
__owur int SSL_cache_hit(SSL *s);
|
||||||
__owur int SSL_is_server(SSL *s);
|
__owur int SSL_is_server(SSL *s);
|
||||||
|
|
||||||
|
@ -3052,8 +3052,6 @@ SSL *SSL_dup(SSL *s)
|
|||||||
|
|
||||||
SSL_set_info_callback(ret, SSL_get_info_callback(s));
|
SSL_set_info_callback(ret, SSL_get_info_callback(s));
|
||||||
|
|
||||||
ret->debug = s->debug;
|
|
||||||
|
|
||||||
/* copy app data, a little dangerous perhaps */
|
/* copy app data, a little dangerous perhaps */
|
||||||
if (!CRYPTO_dup_ex_data(CRYPTO_EX_INDEX_SSL, &ret->ex_data, &s->ex_data))
|
if (!CRYPTO_dup_ex_data(CRYPTO_EX_INDEX_SSL, &ret->ex_data, &s->ex_data))
|
||||||
goto err;
|
goto err;
|
||||||
@ -3665,11 +3663,6 @@ int ssl_handshake_hash(SSL *s, unsigned char *out, int outlen)
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
void SSL_set_debug(SSL *s, int debug)
|
|
||||||
{
|
|
||||||
s->debug = debug;
|
|
||||||
}
|
|
||||||
|
|
||||||
int SSL_cache_hit(SSL *s)
|
int SSL_cache_hit(SSL *s)
|
||||||
{
|
{
|
||||||
return s->hit;
|
return s->hit;
|
||||||
|
@ -1065,11 +1065,6 @@ struct ssl_st {
|
|||||||
unsigned int max_psk_len);
|
unsigned int max_psk_len);
|
||||||
# endif
|
# endif
|
||||||
SSL_CTX *ctx;
|
SSL_CTX *ctx;
|
||||||
/*
|
|
||||||
* set this flag to 1 and a sleep(1) is put into all SSL_read() and
|
|
||||||
* SSL_write() calls, good for nbio debuging :-)
|
|
||||||
*/
|
|
||||||
int debug;
|
|
||||||
/* extra application data */
|
/* extra application data */
|
||||||
long verify_result;
|
long verify_result;
|
||||||
CRYPTO_EX_DATA ex_data;
|
CRYPTO_EX_DATA ex_data;
|
||||||
|
@ -295,7 +295,7 @@ SSL_srp_server_param_with_username 336 1_1_0 EXIST:!VMS:FUNCTION:SRP
|
|||||||
SSL_srp_server_param_with_un 336 1_1_0 EXIST:VMS:FUNCTION:SRP
|
SSL_srp_server_param_with_un 336 1_1_0 EXIST:VMS:FUNCTION:SRP
|
||||||
SRP_have_to_put_srp_username 337 1_1_0 NOEXIST::FUNCTION:
|
SRP_have_to_put_srp_username 337 1_1_0 NOEXIST::FUNCTION:
|
||||||
SSL_SRP_CTX_free 338 1_1_0 EXIST::FUNCTION:SRP
|
SSL_SRP_CTX_free 338 1_1_0 EXIST::FUNCTION:SRP
|
||||||
SSL_set_debug 339 1_1_0 EXIST::FUNCTION:
|
SSL_set_debug 339 1_1_0 NOEXIST::FUNCTION:
|
||||||
SSL_SESSION_get0_peer 340 1_1_0 EXIST::FUNCTION:
|
SSL_SESSION_get0_peer 340 1_1_0 EXIST::FUNCTION:
|
||||||
TLSv1_2_client_method 341 1_1_0 EXIST::FUNCTION:
|
TLSv1_2_client_method 341 1_1_0 EXIST::FUNCTION:
|
||||||
SSL_SESSION_set1_id_context 342 1_1_0 EXIST::FUNCTION:
|
SSL_SESSION_set1_id_context 342 1_1_0 EXIST::FUNCTION:
|
||||||
|
Loading…
x
Reference in New Issue
Block a user