From 2cd76d8919b12d9263d1a51a1a03c27bb2df7886 Mon Sep 17 00:00:00 2001 From: afresh1 Date: Sun, 20 Apr 2014 19:23:08 +0000 Subject: Remove unused/never installed libssl tools and docs and references to them Sure deraadt --- .../src/doc/ssl/SSL_CTX_load_verify_locations.pod | 17 +++++++++++++++-- 1 file changed, 15 insertions(+), 2 deletions(-) (limited to 'lib/libssl/src/doc/ssl') diff --git a/lib/libssl/src/doc/ssl/SSL_CTX_load_verify_locations.pod b/lib/libssl/src/doc/ssl/SSL_CTX_load_verify_locations.pod index de010652850..cd78dd285fb 100644 --- a/lib/libssl/src/doc/ssl/SSL_CTX_load_verify_locations.pod +++ b/lib/libssl/src/doc/ssl/SSL_CTX_load_verify_locations.pod @@ -40,7 +40,6 @@ If more than one CA certificate with the same name hash value exist, the extension must be different (e.g. 9d66eef0.0, 9d66eef0.1 etc). The search is performed in the ordering of the extension number, regardless of other properties of the certificates. -Use the B utility to create the necessary links. The certificates in B are only looked up when required, e.g. when building the certificate chain or when actually performing the verification @@ -92,7 +91,21 @@ Prepare the directory /some/where/certs containing several CA certificates for use as B: cd /some/where/certs - c_rehash . + rm -f *.[0-9]* *.r[0-9]* + for c in *.pem; do + [ "$c" = "*.pem" ] && continue + hash=$(openssl x509 -noout -hash -in "$c") + if egrep -q -- '-BEGIN( X509 | TRUSTED | )CERTIFICATE-' "$c"; then + suf=0 + while [ -e $hash.$suf ]; do suf=$(( $suf + 1 )); done + ln -s "$c" $hash.$suf + fi + if egrep -q -- '-BEGIN X509 CRL-' "$c"; then + suf=0 + while [ -e $hash.r$suf ]; do suf=$(( $suf + 1 )); done + ln -s "$c" $hash.r$suf + fi + done =head1 RETURN VALUES -- cgit v1.2.3-59-g8ed1b