OPT_TLS1,
OPT_TLS1_1,
OPT_TLS1_2,
+ OPT_PSK,
OPT_V, OPT_UPPER_V, OPT_S
} OPTION_CHOICE;
#endif
#ifndef OPENSSL_NO_SSL3
{"ssl3", OPT_SSL3, '-', "SSL3 mode"},
+#endif
+#ifndef OPENSSL_NO_PSK
+ {"psk", OPT_PSK, '-', "include ciphersuites requiring PSK"},
#endif
{NULL}
};
+static unsigned int dummy_psk(SSL *ssl, const char *hint, char *identity,
+ unsigned int max_identity_len,
+ unsigned char *psk,
+ unsigned int max_psk_len)
+{
+ return 0;
+}
+
int ciphers_main(int argc, char **argv)
{
SSL_CTX *ctx = NULL;
int ret = 1, i, verbose = 0, Verbose = 0, use_supported = 0;
#ifndef OPENSSL_NO_SSL_TRACE
int stdname = 0;
+#endif
+#ifndef OPENSSL_NO_PSK
+ int psk = 0;
#endif
const char *p;
char *ciphers = NULL, *prog;
case OPT_TLS1_2:
meth = TLSv1_2_client_method();
break;
+ case OPT_PSK:
+#ifndef OPENSSL_NO_PSK
+ psk = 1;
+#endif
+ break;
}
}
argv = opt_rest();
ctx = SSL_CTX_new(meth);
if (ctx == NULL)
goto err;
+#ifndef OPENSSL_NO_PSK
+ if (psk)
+ SSL_CTX_set_psk_client_callback(ctx, dummy_psk);
+#endif
if (ciphers != NULL) {
if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
BIO_printf(bio_err, "Error in cipher list\n");