test_verify: ../apps/openssl$(EXE_EXT)
@echo $(START) $@ -- expect some failures and expired certificates
- OPENSSL_CONF=/dev/null ../util/shlib_wrap.sh ../apps/openssl verify -CApath ../certs/demo ../certs/demo/*.pem
+ ../util/shlib_wrap.sh ../apps/openssl verify -CApath ../certs/demo ../certs/demo/*.pem
test_dh: $(DHTEST)$(EXE_EXT)
@echo $(START) $@
@sh ./testsslproxy keyP2.ss certP2.ss intP2.ss
test_ca: ../apps/openssl$(EXE_EXT) testca CAss.cnf Uss.cnf
- @if OPENSSL_CONF=/dev/null ../util/shlib_wrap.sh ../apps/openssl no-rsa; then \
+ @if ../util/shlib_wrap.sh ../apps/openssl no-rsa; then \
echo SKIP $@ -- requires RSA; \
else \
echo $(START) $@; \
fi
test_tsa: ../apps/openssl$(EXE_EXT) testtsa CAtsa.cnf ../util/shlib_wrap.sh
- @if OPENSSL_CONF=/dev/null ../util/shlib_wrap.sh ../apps/openssl no-rsa; then \
+ @if ../util/shlib_wrap.sh ../apps/openssl no-rsa; then \
echo SKIP $@ -- requires RSA; \
else \
echo $(START) $@; \
test_cms: ../apps/openssl$(EXE_EXT) cms-test.pl smcont.txt
@echo $(START) $@
- OPENSSL_CONFIG=/dev/null $(PERL) cms-test.pl
+ $(PERL) cms-test.pl
test_srp: $(SRPTEST)$(EXE_EXT)
@echo $(START) $@
#!/bin/sh
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
cmd='../util/shlib_wrap.sh ../apps/openssl crl'
if [ "$1"x != "x" ]; then
SSLEAY_CONFIG="-config CAss.cnf"
OPENSSL="`pwd`/../util/opensslwrap.sh"
-OPENSSL_CONFIG=/dev/null $PERL ../apps/CA.pl -newca </dev/null
+$PERL ../apps/CA.pl -newca </dev/null
SSLEAY_CONFIG="-config Uss.cnf"
$PERL ../apps/CA.pl -newreq
testsrc=testenc
test=./p
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
cmd="../util/shlib_wrap.sh ../apps/openssl"
cat $testsrc >$test;
T=testcert
KEY=512
CA=../certs/testca.pem
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
/bin/rm -f $T.1 $T.2 $T.key
x509cmd="../util/shlib_wrap.sh ../apps/openssl x509 $digest"
verifycmd="../util/shlib_wrap.sh ../apps/openssl verify"
dummycnf="../apps/openssl.cnf"
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
CAkey="keyCA.ss"
CAcert="certCA.ss"
else
cert="$2"
fi
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
ssltest="../util/shlib_wrap.sh ./ssltest -key $key -cert $cert -c_key $key -c_cert $cert"
if ../util/shlib_wrap.sh ../apps/openssl x509 -in $cert -text -noout | fgrep 'DSA Public Key' >/dev/null; then
ktype=$2
ptype=$3
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
if ../util/shlib_wrap.sh ../apps/openssl no-$ktype; then
echo skipping $ktype $ptype conversion test
exit 0
#!/bin/sh
cmd='../util/shlib_wrap.sh ../apps/openssl'
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
ocspdir="ocsp-tests"
# 17 December 2012 so we don't get certificate expiry errors.
check_time="-attime 1355875200"
#!/bin/sh
cmd='../util/shlib_wrap.sh ../apps/openssl pkcs7'
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
if [ "$1"x != "x" ]; then
t=$1
#!/bin/sh
cmd='../util/shlib_wrap.sh ../apps/openssl pkcs7'
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
if [ "$1"x != "x" ]; then
t=$1
#!/bin/sh
cmd='../util/shlib_wrap.sh ../apps/openssl req -config ../apps/openssl.cnf'
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
if [ "$1"x != "x" ]; then
t=$1
#!/bin/sh
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
cmd='../util/shlib_wrap.sh ../apps/openssl sess_id'
if [ "$1"x != "x" ]; then
#!/bin/sh
-OPENSSL_CONF=/dev/null ; export OPENSSL_CONF
cmd='../util/shlib_wrap.sh ../apps/openssl x509'
if [ "$1"x != "x" ]; then