Compare commits
	
		
			2069 Commits
		
	
	
		
			FIPS_TEST_
			...
			OpenSSL_0_
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					b873409efe | ||
| 
						 | 
					f89250f2f2 | ||
| 
						 | 
					1dc6a5441a | ||
| 
						 | 
					a4aa188799 | ||
| 
						 | 
					50befdb659 | ||
| 
						 | 
					46bf0ba876 | ||
| 
						 | 
					4b4c0a1921 | ||
| 
						 | 
					df70302441 | ||
| 
						 | 
					9c6c664041 | ||
| 
						 | 
					11f719da38 | ||
| 
						 | 
					72f1815391 | ||
| 
						 | 
					e42a2abadc | ||
| 
						 | 
					ec2fede946 | ||
| 
						 | 
					63f3c9e715 | ||
| 
						 | 
					c22e2dd6e5 | ||
| 
						 | 
					7fae32f6d6 | ||
| 
						 | 
					5260f1a483 | ||
| 
						 | 
					1cb10d9c7d | ||
| 
						 | 
					62abc80540 | ||
| 
						 | 
					722fa14271 | ||
| 
						 | 
					a2ca66f37c | ||
| 
						 | 
					6a04b0d5a4 | ||
| 
						 | 
					1acca28263 | ||
| 
						 | 
					d510c6489e | ||
| 
						 | 
					b82924741b | ||
| 
						 | 
					cbb6ccabb0 | ||
| 
						 | 
					e369af3600 | ||
| 
						 | 
					15b7f5bf88 | ||
| 
						 | 
					9880f63038 | ||
| 
						 | 
					af32df0a8e | ||
| 
						 | 
					bfb7bf1a28 | ||
| 
						 | 
					f33636faf7 | ||
| 
						 | 
					94f735cade | ||
| 
						 | 
					36216218ca | ||
| 
						 | 
					115eaf4886 | ||
| 
						 | 
					53ce5647d4 | ||
| 
						 | 
					4d2efa29f6 | ||
| 
						 | 
					cd332a0750 | ||
| 
						 | 
					2ed80d14d7 | ||
| 
						 | 
					d286606301 | ||
| 
						 | 
					3f4d81e88b | ||
| 
						 | 
					dc5dfe431c | ||
| 
						 | 
					c6a876473c | ||
| 
						 | 
					5a7fc89394 | ||
| 
						 | 
					116fd3732a | ||
| 
						 | 
					1bb01b1b5f | ||
| 
						 | 
					699d78ce98 | ||
| 
						 | 
					43d613ec18 | ||
| 
						 | 
					96e1015eec | ||
| 
						 | 
					cf4b01a766 | ||
| 
						 | 
					45d129511f | ||
| 
						 | 
					0976adac8f | ||
| 
						 | 
					db5b0d9309 | ||
| 
						 | 
					aeeedc8acc | ||
| 
						 | 
					c903866420 | ||
| 
						 | 
					9b208659aa | ||
| 
						 | 
					f54fab0fef | ||
| 
						 | 
					b30aaafbe5 | ||
| 
						 | 
					fee8d86d7a | ||
| 
						 | 
					bf3e53a7fa | ||
| 
						 | 
					44a8fced97 | ||
| 
						 | 
					4ff07f4c71 | ||
| 
						 | 
					1c5f396d36 | ||
| 
						 | 
					9fcaaef34f | ||
| 
						 | 
					b9a73f5481 | ||
| 
						 | 
					bff5319d90 | ||
| 
						 | 
					fc4bd2f287 | ||
| 
						 | 
					4c836c96c4 | ||
| 
						 | 
					6e14e7fc19 | ||
| 
						 | 
					fc15c44049 | ||
| 
						 | 
					445598b35e | ||
| 
						 | 
					338a5e7e54 | ||
| 
						 | 
					6a431cd293 | ||
| 
						 | 
					1b7024fb69 | ||
| 
						 | 
					5021f6314e | ||
| 
						 | 
					21d24dd38a | ||
| 
						 | 
					681d11b6fd | ||
| 
						 | 
					8c387e62b2 | ||
| 
						 | 
					a117329c5a | ||
| 
						 | 
					f39dbff498 | ||
| 
						 | 
					f6fefb0cb6 | ||
| 
						 | 
					febfaa53f4 | ||
| 
						 | 
					cfed221c2d | ||
| 
						 | 
					c2014ae252 | ||
| 
						 | 
					c3d317b4de | ||
| 
						 | 
					a214feb26b | ||
| 
						 | 
					7a3a82dbbd | ||
| 
						 | 
					02fef91630 | ||
| 
						 | 
					0b8cd5acd6 | ||
| 
						 | 
					97f4e235a1 | ||
| 
						 | 
					cfd2aeeb7c | ||
| 
						 | 
					a0fdc4c6d6 | ||
| 
						 | 
					b5def0243e | ||
| 
						 | 
					357f6d8add | ||
| 
						 | 
					19a71e8c16 | ||
| 
						 | 
					7faa66433f | ||
| 
						 | 
					1a0498769f | ||
| 
						 | 
					a4dde82423 | ||
| 
						 | 
					eba0aa995d | ||
| 
						 | 
					c9e6fffa53 | ||
| 
						 | 
					85dcce7c63 | ||
| 
						 | 
					2ed29615cb | ||
| 
						 | 
					d7080d624b | ||
| 
						 | 
					5d7c8a48db | ||
| 
						 | 
					00e86a74bd | ||
| 
						 | 
					9e6857a358 | ||
| 
						 | 
					715258486c | ||
| 
						 | 
					2daec41e25 | ||
| 
						 | 
					8519635923 | ||
| 
						 | 
					d0bdfdd830 | ||
| 
						 | 
					4b98488eb0 | ||
| 
						 | 
					0e2458e187 | ||
| 
						 | 
					326de18955 | ||
| 
						 | 
					1fcfd61ee7 | ||
| 
						 | 
					121f386ec7 | ||
| 
						 | 
					9fb10cfe6b | ||
| 
						 | 
					a20a6366c8 | ||
| 
						 | 
					54985b5061 | ||
| 
						 | 
					b09db677d5 | ||
| 
						 | 
					cdc596567d | ||
| 
						 | 
					70d923fb03 | ||
| 
						 | 
					def1490717 | ||
| 
						 | 
					7697d9b587 | ||
| 
						 | 
					0345354fe0 | ||
| 
						 | 
					90aef4431b | ||
| 
						 | 
					602689074a | ||
| 
						 | 
					810d2c7f6e | ||
| 
						 | 
					0a9b8dd1b4 | ||
| 
						 | 
					bfce4e5d6e | ||
| 
						 | 
					4a1190beca | ||
| 
						 | 
					047ec5d196 | ||
| 
						 | 
					bb59889305 | ||
| 
						 | 
					141a5482fd | ||
| 
						 | 
					de2422affb | ||
| 
						 | 
					897169fdf0 | ||
| 
						 | 
					410a49a4fa | ||
| 
						 | 
					82ba68c42d | ||
| 
						 | 
					4b258e73ae | ||
| 
						 | 
					6ac2f67882 | ||
| 
						 | 
					bea1d1cbd8 | ||
| 
						 | 
					61e6e80fe5 | ||
| 
						 | 
					2ce540743e | ||
| 
						 | 
					8e928aab02 | ||
| 
						 | 
					105e52bf23 | ||
| 
						 | 
					492a5010a4 | ||
| 
						 | 
					53b0b0a330 | ||
| 
						 | 
					677c117419 | ||
| 
						 | 
					bb50d30f35 | ||
| 
						 | 
					8323996d99 | ||
| 
						 | 
					ee14e33c35 | ||
| 
						 | 
					1bcb94a721 | ||
| 
						 | 
					9658c634a2 | ||
| 
						 | 
					7ee8b27267 | ||
| 
						 | 
					e4ea6f0c76 | ||
| 
						 | 
					a2c00fb210 | ||
| 
						 | 
					d06ae0fff7 | ||
| 
						 | 
					afa2ea204e | ||
| 
						 | 
					0b6394c738 | ||
| 
						 | 
					70ddf8ecca | ||
| 
						 | 
					9febee0272 | ||
| 
						 | 
					a721216f0f | ||
| 
						 | 
					47f689ac09 | ||
| 
						 | 
					f51f374199 | ||
| 
						 | 
					3c1128f43f | ||
| 
						 | 
					8185c9457e | ||
| 
						 | 
					c61f0cbffb | ||
| 
						 | 
					d90605dd00 | ||
| 
						 | 
					e56334998c | ||
| 
						 | 
					9ad5c5e4f9 | ||
| 
						 | 
					4bc24cf01d | ||
| 
						 | 
					79f57768ff | ||
| 
						 | 
					d79eb9299a | ||
| 
						 | 
					fff69a7d8c | ||
| 
						 | 
					a375025e4d | ||
| 
						 | 
					d471adf351 | ||
| 
						 | 
					2fb8642eea | ||
| 
						 | 
					c44d95c1a7 | ||
| 
						 | 
					0da40f0ffc | ||
| 
						 | 
					7f722c95f8 | ||
| 
						 | 
					4268216005 | ||
| 
						 | 
					17540b77e0 | ||
| 
						 | 
					b70e4d3e90 | ||
| 
						 | 
					d9519a4032 | ||
| 
						 | 
					5ac9786807 | ||
| 
						 | 
					0b05204c4e | ||
| 
						 | 
					a4bfeff254 | ||
| 
						 | 
					43433b3852 | ||
| 
						 | 
					020a4782bd | ||
| 
						 | 
					cadbbd51c8 | ||
| 
						 | 
					ff7b021040 | ||
| 
						 | 
					e7e4d506d6 | ||
| 
						 | 
					9204e7ef0d | ||
| 
						 | 
					257df40f00 | ||
| 
						 | 
					a44c9b9c33 | ||
| 
						 | 
					1cbd7456aa | ||
| 
						 | 
					e1e39a2451 | ||
| 
						 | 
					01de6e21cc | ||
| 
						 | 
					05689a132c | ||
| 
						 | 
					1643edc63c | ||
| 
						 | 
					1546fb780b | ||
| 
						 | 
					b7d222c519 | ||
| 
						 | 
					a93cc7c573 | ||
| 
						 | 
					8988407a0b | ||
| 
						 | 
					b2afc0a9dc | ||
| 
						 | 
					a8655eb21a | ||
| 
						 | 
					f751dc4759 | ||
| 
						 | 
					fbe621d08f | ||
| 
						 | 
					2e9fd4301f | ||
| 
						 | 
					1638ce7212 | ||
| 
						 | 
					7ecd974f5f | ||
| 
						 | 
					db731da802 | ||
| 
						 | 
					5864fd2061 | ||
| 
						 | 
					ff58eaa4b6 | ||
| 
						 | 
					76c61a5d1a | ||
| 
						 | 
					4ea7019165 | ||
| 
						 | 
					59b1129e0a | ||
| 
						 | 
					fb092ef4fc | ||
| 
						 | 
					6351adecb4 | ||
| 
						 | 
					8964efc413 | ||
| 
						 | 
					430b637bd5 | ||
| 
						 | 
					ca3b81c858 | ||
| 
						 | 
					031cbecf86 | ||
| 
						 | 
					1213e6c3c2 | ||
| 
						 | 
					32619893b4 | ||
| 
						 | 
					40e0de0395 | ||
| 
						 | 
					5f9345a2f0 | ||
| 
						 | 
					33ccde59a1 | ||
| 
						 | 
					1909df070f | ||
| 
						 | 
					c23a745820 | ||
| 
						 | 
					924b117422 | ||
| 
						 | 
					24b2806097 | ||
| 
						 | 
					99f5093347 | ||
| 
						 | 
					be88529753 | ||
| 
						 | 
					b3a959a337 | ||
| 
						 | 
					2928cb4c82 | ||
| 
						 | 
					a33e6702a0 | ||
| 
						 | 
					35a65e814b | ||
| 
						 | 
					7ad132b133 | ||
| 
						 | 
					2708813166 | ||
| 
						 | 
					affe98998a | ||
| 
						 | 
					66e8211c0b | ||
| 
						 | 
					dd2dee60f3 | ||
| 
						 | 
					6495179af6 | ||
| 
						 | 
					61b8c79d15 | ||
| 
						 | 
					42aa3ec4f2 | ||
| 
						 | 
					bb152dae8f | ||
| 
						 | 
					c42ab44087 | ||
| 
						 | 
					42e10c3fd6 | ||
| 
						 | 
					c571a3e984 | ||
| 
						 | 
					e55988bb60 | ||
| 
						 | 
					34b5ba3b60 | ||
| 
						 | 
					629ac4b4ca | ||
| 
						 | 
					75f0bc4f44 | ||
| 
						 | 
					71a2440ee5 | ||
| 
						 | 
					04e40739f7 | ||
| 
						 | 
					48bcdad0d5 | ||
| 
						 | 
					f7d2402cab | ||
| 
						 | 
					808f55351a | ||
| 
						 | 
					c06271bc35 | ||
| 
						 | 
					92e5882aca | ||
| 
						 | 
					afa0580cd5 | ||
| 
						 | 
					4baee3031c | ||
| 
						 | 
					db7a72b224 | ||
| 
						 | 
					b71e69ad8e | ||
| 
						 | 
					f856173c43 | ||
| 
						 | 
					d742f9ebbd | ||
| 
						 | 
					36dd4cba3d | ||
| 
						 | 
					3978429ad5 | ||
| 
						 | 
					885945d6e1 | ||
| 
						 | 
					e22e770147 | ||
| 
						 | 
					e0c0203341 | ||
| 
						 | 
					e1eec61e26 | ||
| 
						 | 
					296fa128c9 | ||
| 
						 | 
					6dde222aae | ||
| 
						 | 
					391ac37018 | ||
| 
						 | 
					8d038a08fb | ||
| 
						 | 
					747c6ffda4 | ||
| 
						 | 
					d4cddc54f0 | ||
| 
						 | 
					eb7112c18e | ||
| 
						 | 
					fef9e07930 | ||
| 
						 | 
					8ab27e6ef7 | ||
| 
						 | 
					6415055590 | ||
| 
						 | 
					556e27b14f | ||
| 
						 | 
					af0c009d70 | ||
| 
						 | 
					0b1cf4a139 | ||
| 
						 | 
					a9101cdcaa | ||
| 
						 | 
					e351e2a7cf | ||
| 
						 | 
					215276243d | ||
| 
						 | 
					ddb7832852 | ||
| 
						 | 
					2fad41d155 | ||
| 
						 | 
					b9c3d9168f | ||
| 
						 | 
					4f2fc3c2dd | ||
| 
						 | 
					48819f4d54 | ||
| 
						 | 
					b0cbdd3eba | ||
| 
						 | 
					5016107550 | ||
| 
						 | 
					25d5d15fd5 | ||
| 
						 | 
					725713f74a | ||
| 
						 | 
					73eb0972cf | ||
| 
						 | 
					6720779c7e | ||
| 
						 | 
					b2a2c6af2a | ||
| 
						 | 
					272993bac4 | ||
| 
						 | 
					58532ae047 | ||
| 
						 | 
					4e7f6d380d | ||
| 
						 | 
					f0be325f88 | ||
| 
						 | 
					b66af23aa9 | ||
| 
						 | 
					29d0c13e97 | ||
| 
						 | 
					8a4e81a269 | ||
| 
						 | 
					843fc7b681 | ||
| 
						 | 
					6dcb6bf1c1 | ||
| 
						 | 
					1061c3cb3c | ||
| 
						 | 
					0d0f15d8d1 | ||
| 
						 | 
					a72ce94213 | ||
| 
						 | 
					f71d59c70e | ||
| 
						 | 
					3309f8313c | ||
| 
						 | 
					6cc5f194a7 | ||
| 
						 | 
					096327a99a | ||
| 
						 | 
					cc10bcf25e | ||
| 
						 | 
					875ac0ec00 | ||
| 
						 | 
					bf240f063a | ||
| 
						 | 
					dd016b0570 | ||
| 
						 | 
					244788464a | ||
| 
						 | 
					a95808334e | ||
| 
						 | 
					b3cebd5acf | ||
| 
						 | 
					7b775145e4 | ||
| 
						 | 
					7183aa6b9d | ||
| 
						 | 
					eebefe35e7 | ||
| 
						 | 
					1db0bbdc76 | ||
| 
						 | 
					e643112dd8 | ||
| 
						 | 
					21c4b25959 | ||
| 
						 | 
					41cf2c3aef | ||
| 
						 | 
					0e3a930fb4 | ||
| 
						 | 
					0c214e0153 | ||
| 
						 | 
					6c61cfbe03 | ||
| 
						 | 
					2ee77d36a0 | ||
| 
						 | 
					24f441e0bb | ||
| 
						 | 
					740da44f20 | ||
| 
						 | 
					72033fde7b | ||
| 
						 | 
					9adf3fcf9a | ||
| 
						 | 
					65f7456652 | ||
| 
						 | 
					8794569a08 | ||
| 
						 | 
					f8731bc2fd | ||
| 
						 | 
					195d6bf760 | ||
| 
						 | 
					dacd94b9c8 | ||
| 
						 | 
					8070cb5f87 | ||
| 
						 | 
					f7d514f449 | ||
| 
						 | 
					6d50bce79f | ||
| 
						 | 
					3cf0a38b3e | ||
| 
						 | 
					91a1d08a4c | ||
| 
						 | 
					85e776885b | ||
| 
						 | 
					fc4015329f | ||
| 
						 | 
					6ec9ff83f3 | ||
| 
						 | 
					db45308477 | ||
| 
						 | 
					1c7c69a8a5 | ||
| 
						 | 
					24ad061037 | ||
| 
						 | 
					92f96fa721 | ||
| 
						 | 
					0d1e362363 | ||
| 
						 | 
					a0bf2c86ab | ||
| 
						 | 
					6a662a45f3 | ||
| 
						 | 
					24d0524f31 | ||
| 
						 | 
					c081817c95 | ||
| 
						 | 
					46a1f2487e | ||
| 
						 | 
					ac02a4b68a | ||
| 
						 | 
					4ba063d3c5 | ||
| 
						 | 
					e0e0818e4b | ||
| 
						 | 
					82a5049f6a | ||
| 
						 | 
					d027b75b73 | ||
| 
						 | 
					87421d3fc5 | ||
| 
						 | 
					87d14a3625 | ||
| 
						 | 
					cc0931e36b | ||
| 
						 | 
					22152d6885 | ||
| 
						 | 
					102bcbce8d | ||
| 
						 | 
					8655de423d | ||
| 
						 | 
					c4b2eb24b3 | ||
| 
						 | 
					03e3fbb702 | ||
| 
						 | 
					bc7ee385f5 | ||
| 
						 | 
					1e368ab08f | ||
| 
						 | 
					2c77c5c8db | ||
| 
						 | 
					1eb38c563f | ||
| 
						 | 
					fa657871ed | ||
| 
						 | 
					09dac71a45 | ||
| 
						 | 
					be70b3adce | ||
| 
						 | 
					6d12b1f82b | ||
| 
						 | 
					7116a41129 | ||
| 
						 | 
					7143acab25 | ||
| 
						 | 
					11d4086d8e | ||
| 
						 | 
					32cd1da62e | ||
| 
						 | 
					d430f56de6 | ||
| 
						 | 
					957ebe98fb | ||
| 
						 | 
					9d09fc8485 | ||
| 
						 | 
					8ea4531718 | ||
| 
						 | 
					881611678e | ||
| 
						 | 
					a3dc628d86 | ||
| 
						 | 
					3c159fc1a5 | ||
| 
						 | 
					6056afd223 | ||
| 
						 | 
					54db796991 | ||
| 
						 | 
					119e912a83 | ||
| 
						 | 
					f4a4a0fdc7 | ||
| 
						 | 
					9ad765173f | ||
| 
						 | 
					c8e3c1a9b5 | ||
| 
						 | 
					ae378b769a | ||
| 
						 | 
					4de4e35459 | ||
| 
						 | 
					5537a83e56 | ||
| 
						 | 
					c850d322a6 | ||
| 
						 | 
					b8be571868 | ||
| 
						 | 
					acd43bf38c | ||
| 
						 | 
					5eaf173647 | ||
| 
						 | 
					7890b562bc | ||
| 
						 | 
					7258d33794 | ||
| 
						 | 
					263979a2a3 | ||
| 
						 | 
					2c6d83354d | ||
| 
						 | 
					a188fc01fe | ||
| 
						 | 
					1948f9e042 | ||
| 
						 | 
					f7ffc3a6c9 | ||
| 
						 | 
					4d6af5c5d2 | ||
| 
						 | 
					efed63d783 | ||
| 
						 | 
					7e351bb560 | ||
| 
						 | 
					0067580321 | ||
| 
						 | 
					82e0073624 | ||
| 
						 | 
					7e541b1a7f | ||
| 
						 | 
					2ae47ddbc2 | ||
| 
						 | 
					3e8b8b8990 | ||
| 
						 | 
					05bbbe9204 | ||
| 
						 | 
					a073129293 | ||
| 
						 | 
					93fc0e0e40 | ||
| 
						 | 
					84f1c14396 | ||
| 
						 | 
					f10986bab4 | ||
| 
						 | 
					6cb5746b65 | ||
| 
						 | 
					0061aa9f32 | ||
| 
						 | 
					3926bbcf6d | ||
| 
						 | 
					b5cee977c2 | ||
| 
						 | 
					ae3b60ba99 | ||
| 
						 | 
					d4ba6424a1 | ||
| 
						 | 
					92a97e52a0 | ||
| 
						 | 
					78dcaa0609 | ||
| 
						 | 
					65b4c34d86 | ||
| 
						 | 
					d8486c312c | ||
| 
						 | 
					8d4baaf2f0 | ||
| 
						 | 
					50fb940f05 | ||
| 
						 | 
					63e3676e68 | ||
| 
						 | 
					1dac2cae68 | ||
| 
						 | 
					d886975835 | ||
| 
						 | 
					22872a5363 | ||
| 
						 | 
					82b6b541b1 | ||
| 
						 | 
					60a989a76e | ||
| 
						 | 
					18394ed50f | ||
| 
						 | 
					3416d11926 | ||
| 
						 | 
					c1f1a03d0c | ||
| 
						 | 
					278a447ee8 | ||
| 
						 | 
					8ceee689c7 | ||
| 
						 | 
					356f164f52 | ||
| 
						 | 
					203ef9988c | ||
| 
						 | 
					9f51bdae00 | ||
| 
						 | 
					59c4f46f0f | ||
| 
						 | 
					f9ab6255e7 | ||
| 
						 | 
					a89b665b9b | ||
| 
						 | 
					a7949b8da3 | ||
| 
						 | 
					b0b4adc3af | ||
| 
						 | 
					6e19895972 | ||
| 
						 | 
					d24f1cbf35 | ||
| 
						 | 
					b8febed96a | ||
| 
						 | 
					82687bb4c3 | ||
| 
						 | 
					6506b7754a | ||
| 
						 | 
					2eb8e5e62a | ||
| 
						 | 
					c713a4c04d | ||
| 
						 | 
					0cefa0f942 | ||
| 
						 | 
					834c85ef0c | ||
| 
						 | 
					0c8c8eab58 | ||
| 
						 | 
					bc06baca76 | ||
| 
						 | 
					9eeb779e8f | ||
| 
						 | 
					fe171f9c3e | ||
| 
						 | 
					5e613d5411 | ||
| 
						 | 
					56e930eb03 | ||
| 
						 | 
					4a052f0bb9 | ||
| 
						 | 
					f34e79f27b | ||
| 
						 | 
					ef1fe9094c | ||
| 
						 | 
					c25e8ee9b3 | ||
| 
						 | 
					4525a048ec | ||
| 
						 | 
					f421a52f56 | ||
| 
						 | 
					17a79eec0c | ||
| 
						 | 
					1eda14b44f | ||
| 
						 | 
					aa9b502619 | ||
| 
						 | 
					aaf45e6464 | ||
| 
						 | 
					be83c31cdd | ||
| 
						 | 
					76a41eec2b | ||
| 
						 | 
					ab9c0ec9fc | ||
| 
						 | 
					cf6a1dea19 | ||
| 
						 | 
					ea5b3f5e62 | ||
| 
						 | 
					c3c658e1c0 | ||
| 
						 | 
					5d013b6b32 | ||
| 
						 | 
					ee91323f52 | ||
| 
						 | 
					4fae868811 | ||
| 
						 | 
					354f92d66a | ||
| 
						 | 
					c3484e0268 | ||
| 
						 | 
					6b0be9c73d | ||
| 
						 | 
					02312a91ca | ||
| 
						 | 
					744f6b648e | ||
| 
						 | 
					f1502a491e | ||
| 
						 | 
					b70871b675 | ||
| 
						 | 
					9de450b545 | ||
| 
						 | 
					cc53036744 | ||
| 
						 | 
					4610d8dc00 | ||
| 
						 | 
					5d7dfefe82 | ||
| 
						 | 
					5e8e7054f7 | ||
| 
						 | 
					9a542ea01d | ||
| 
						 | 
					1939f83709 | ||
| 
						 | 
					b7c114f044 | ||
| 
						 | 
					ede1351997 | ||
| 
						 | 
					7786ed6a64 | ||
| 
						 | 
					bdd08277b8 | ||
| 
						 | 
					2bf4faa7e4 | ||
| 
						 | 
					2e5e604b0c | ||
| 
						 | 
					ed4cd027f3 | ||
| 
						 | 
					bab19a2ac2 | ||
| 
						 | 
					582eb96d15 | ||
| 
						 | 
					2649ce1ebc | ||
| 
						 | 
					7070cdba4e | ||
| 
						 | 
					e885de28b1 | ||
| 
						 | 
					3038649ab2 | ||
| 
						 | 
					3e4da3f7cb | ||
| 
						 | 
					53b5d04715 | ||
| 
						 | 
					defede6080 | ||
| 
						 | 
					1472f1427e | ||
| 
						 | 
					00d1ecb1da | ||
| 
						 | 
					739e0e934a | ||
| 
						 | 
					6ae9770d34 | ||
| 
						 | 
					bec7184768 | ||
| 
						 | 
					442ac8d259 | ||
| 
						 | 
					657b02d0cf | ||
| 
						 | 
					b50ef8b216 | ||
| 
						 | 
					1b690c1a8b | ||
| 
						 | 
					2873a53f5f | ||
| 
						 | 
					04a781e844 | ||
| 
						 | 
					68be98d1a6 | ||
| 
						 | 
					0bbbadf3f5 | ||
| 
						 | 
					c0c1ce125a | ||
| 
						 | 
					105861186f | ||
| 
						 | 
					4a9d335bb4 | ||
| 
						 | 
					162f1e08f8 | ||
| 
						 | 
					0484ff5ec1 | ||
| 
						 | 
					4acc2fed6c | ||
| 
						 | 
					0369804ffa | ||
| 
						 | 
					33d7b5ec07 | ||
| 
						 | 
					4b38f35e72 | ||
| 
						 | 
					82c2773423 | ||
| 
						 | 
					ded27f709c | ||
| 
						 | 
					30dc3e112b | ||
| 
						 | 
					371b262f96 | ||
| 
						 | 
					b3fb2492d5 | ||
| 
						 | 
					93b810637b | ||
| 
						 | 
					cc62974182 | ||
| 
						 | 
					9413788571 | ||
| 
						 | 
					e8387db0c4 | ||
| 
						 | 
					81f28ca567 | ||
| 
						 | 
					1b32943215 | ||
| 
						 | 
					a231d99d4c | ||
| 
						 | 
					714044cc03 | ||
| 
						 | 
					5598b99fb3 | ||
| 
						 | 
					6899d9bbf6 | ||
| 
						 | 
					cf876a9893 | ||
| 
						 | 
					8b8a2928af | ||
| 
						 | 
					031774468c | ||
| 
						 | 
					dd28d12add | ||
| 
						 | 
					6c61ee8fe3 | ||
| 
						 | 
					b86ebb55ff | ||
| 
						 | 
					66956eaba3 | ||
| 
						 | 
					444ff35029 | ||
| 
						 | 
					ff2549be1d | ||
| 
						 | 
					2557c6a812 | ||
| 
						 | 
					aae48de0f7 | ||
| 
						 | 
					766708f24b | ||
| 
						 | 
					fbeb4a9d15 | ||
| 
						 | 
					24fc4f656c | ||
| 
						 | 
					c3c3b28818 | ||
| 
						 | 
					06e2670a57 | ||
| 
						 | 
					3798a4d059 | ||
| 
						 | 
					5b8246d6eb | ||
| 
						 | 
					2e24bc421d | ||
| 
						 | 
					f244ed3ed2 | ||
| 
						 | 
					50a095ed16 | ||
| 
						 | 
					37aff2199e | ||
| 
						 | 
					309aa5fbf3 | ||
| 
						 | 
					5f40948714 | ||
| 
						 | 
					c22050be29 | ||
| 
						 | 
					54ca55fd81 | ||
| 
						 | 
					d0e79d7e2c | ||
| 
						 | 
					c1003dfd15 | ||
| 
						 | 
					98809a1458 | ||
| 
						 | 
					ccc3df8c33 | ||
| 
						 | 
					593a6dbe19 | ||
| 
						 | 
					efbe446f1a | ||
| 
						 | 
					725745d105 | ||
| 
						 | 
					c0e94f8292 | ||
| 
						 | 
					ef4bd0167c | ||
| 
						 | 
					7a8a3ef4f6 | ||
| 
						 | 
					98c7b0367d | ||
| 
						 | 
					9e5dea0ffd | ||
| 
						 | 
					cb4823fdd6 | ||
| 
						 | 
					17bb051628 | ||
| 
						 | 
					59f44e810b | ||
| 
						 | 
					7a014dceb6 | ||
| 
						 | 
					1ff44a99a4 | ||
| 
						 | 
					6cf61614e4 | ||
| 
						 | 
					82e448b92b | ||
| 
						 | 
					b172352b52 | ||
| 
						 | 
					95b14fd803 | ||
| 
						 | 
					553d2e3280 | ||
| 
						 | 
					82fb4ee89d | ||
| 
						 | 
					389fef6c9c | ||
| 
						 | 
					b6622f9623 | ||
| 
						 | 
					7f5448e3a8 | ||
| 
						 | 
					5d965f0783 | ||
| 
						 | 
					b14713c231 | ||
| 
						 | 
					637e0ba420 | ||
| 
						 | 
					9ac37cb018 | ||
| 
						 | 
					fb7751b44f | ||
| 
						 | 
					e333a8d673 | ||
| 
						 | 
					89a6daac00 | ||
| 
						 | 
					7e42945918 | ||
| 
						 | 
					b61a87b26c | ||
| 
						 | 
					2c6b141931 | ||
| 
						 | 
					af13c50d51 | ||
| 
						 | 
					65c2397fce | ||
| 
						 | 
					16e7efe3c8 | ||
| 
						 | 
					c2b78c31d6 | ||
| 
						 | 
					a1dc0336dd | ||
| 
						 | 
					d99a35f275 | ||
| 
						 | 
					949fbf073a | ||
| 
						 | 
					6156be4da3 | ||
| 
						 | 
					d7d4325655 | ||
| 
						 | 
					9f81ffe433 | ||
| 
						 | 
					8164930816 | ||
| 
						 | 
					2a8834cf89 | ||
| 
						 | 
					e6e11f4ec3 | ||
| 
						 | 
					452e41562c | ||
| 
						 | 
					8c6dd96aed | ||
| 
						 | 
					23a4ccd178 | ||
| 
						 | 
					2b4d877a27 | ||
| 
						 | 
					d916f92d6f | ||
| 
						 | 
					b9b5134e19 | ||
| 
						 | 
					9ef6fdab63 | ||
| 
						 | 
					3a0b6de4d0 | ||
| 
						 | 
					08896dc0bd | ||
| 
						 | 
					ef62799783 | ||
| 
						 | 
					8196257f00 | ||
| 
						 | 
					ac923d3377 | ||
| 
						 | 
					0ec529ac82 | ||
| 
						 | 
					d5b0c872d8 | ||
| 
						 | 
					2e8026b65a | ||
| 
						 | 
					381a9f04a0 | ||
| 
						 | 
					d7050b4424 | ||
| 
						 | 
					91ca332058 | ||
| 
						 | 
					ff095a8ac8 | ||
| 
						 | 
					ae37f9f3a2 | ||
| 
						 | 
					95d66bd867 | ||
| 
						 | 
					6d73e9d8e8 | ||
| 
						 | 
					fb5a4bbaa7 | ||
| 
						 | 
					d402f6b66f | ||
| 
						 | 
					36a38a7a27 | ||
| 
						 | 
					2a4dc7e505 | ||
| 
						 | 
					4e92353d23 | ||
| 
						 | 
					0badc909ae | ||
| 
						 | 
					3cc52ee97a | ||
| 
						 | 
					822da9ccc3 | ||
| 
						 | 
					96e20179e4 | ||
| 
						 | 
					1dfa26bd84 | ||
| 
						 | 
					9e6c97703c | ||
| 
						 | 
					a0f6e0c1e7 | ||
| 
						 | 
					edaa7a599a | ||
| 
						 | 
					3b95629db1 | ||
| 
						 | 
					afff063a14 | ||
| 
						 | 
					e1246e1ad7 | ||
| 
						 | 
					df0b451d91 | ||
| 
						 | 
					07cb0a82d1 | ||
| 
						 | 
					f2671f8ac4 | ||
| 
						 | 
					43e9e1a160 | ||
| 
						 | 
					d0969d24cf | ||
| 
						 | 
					cf51a0dccb | ||
| 
						 | 
					48b30bf0e2 | ||
| 
						 | 
					17b08b6a64 | ||
| 
						 | 
					197ab47bdd | ||
| 
						 | 
					e8cce0babe | ||
| 
						 | 
					11d655ef40 | ||
| 
						 | 
					1da61e8051 | ||
| 
						 | 
					da6ce18279 | ||
| 
						 | 
					98f43a173b | ||
| 
						 | 
					c202eda634 | ||
| 
						 | 
					f78bcb8945 | ||
| 
						 | 
					2a918d4cc0 | ||
| 
						 | 
					2c83b24cad | ||
| 
						 | 
					e75445f688 | ||
| 
						 | 
					df51d79ec4 | ||
| 
						 | 
					c21a427a14 | ||
| 
						 | 
					c6e4ef2c6e | ||
| 
						 | 
					6450908a35 | ||
| 
						 | 
					a91cb2103d | ||
| 
						 | 
					3acd3158e9 | ||
| 
						 | 
					8a04c6f894 | ||
| 
						 | 
					745565c69f | ||
| 
						 | 
					fbc4a24633 | ||
| 
						 | 
					4775a89760 | ||
| 
						 | 
					3008a7d819 | ||
| 
						 | 
					233f758523 | ||
| 
						 | 
					3af16cf694 | ||
| 
						 | 
					985b5ee735 | ||
| 
						 | 
					4df7ade829 | ||
| 
						 | 
					932858d5f9 | ||
| 
						 | 
					c4b3503b4b | ||
| 
						 | 
					f871545f7f | ||
| 
						 | 
					136b5dc7c7 | ||
| 
						 | 
					759b287f15 | ||
| 
						 | 
					5fffb5b3d9 | ||
| 
						 | 
					17620eec4c | ||
| 
						 | 
					059230b320 | ||
| 
						 | 
					19dac35e5f | ||
| 
						 | 
					f5fe2a9f6c | ||
| 
						 | 
					d36e9d160b | ||
| 
						 | 
					e58e78cab2 | ||
| 
						 | 
					b0080e3817 | ||
| 
						 | 
					4d67d79273 | ||
| 
						 | 
					83ece9f028 | ||
| 
						 | 
					cec136c30d | ||
| 
						 | 
					ded8aff2c8 | ||
| 
						 | 
					76a268a43f | ||
| 
						 | 
					6563b02980 | ||
| 
						 | 
					32d4496c1e | ||
| 
						 | 
					0b26e53c59 | ||
| 
						 | 
					7cf69ed544 | ||
| 
						 | 
					8b634ba029 | ||
| 
						 | 
					526228b78e | ||
| 
						 | 
					34d01a3b20 | ||
| 
						 | 
					856f3005de | ||
| 
						 | 
					6e2a14002e | ||
| 
						 | 
					7852c6b075 | ||
| 
						 | 
					2c5f3606d1 | ||
| 
						 | 
					1649489834 | ||
| 
						 | 
					b51291cba8 | ||
| 
						 | 
					b29b576957 | ||
| 
						 | 
					abe389fd28 | ||
| 
						 | 
					e7e7f5de4b | ||
| 
						 | 
					3dfa7416cd | ||
| 
						 | 
					d733ef7a69 | ||
| 
						 | 
					17e01d24bb | ||
| 
						 | 
					f67f815624 | ||
| 
						 | 
					ab8fe43fa2 | ||
| 
						 | 
					5e4c2225ed | ||
| 
						 | 
					167d2a1411 | ||
| 
						 | 
					3f4802a14e | ||
| 
						 | 
					9aecc3e5ff | ||
| 
						 | 
					b8a4a5bcba | ||
| 
						 | 
					6daac534d7 | ||
| 
						 | 
					79649d380e | ||
| 
						 | 
					51ebaa9f82 | ||
| 
						 | 
					efaa569c3b | ||
| 
						 | 
					15684f58c2 | ||
| 
						 | 
					0e6c24ae4b | ||
| 
						 | 
					0dc1b3c1fb | ||
| 
						 | 
					1e53b797f6 | ||
| 
						 | 
					1ddf691244 | ||
| 
						 | 
					78074baadd | ||
| 
						 | 
					7457642b8c | ||
| 
						 | 
					d1e107702b | ||
| 
						 | 
					19503ca653 | ||
| 
						 | 
					14089b1d0f | ||
| 
						 | 
					0b8eca58b9 | ||
| 
						 | 
					c2f425a06a | ||
| 
						 | 
					4930f8bbd9 | ||
| 
						 | 
					a5668db68b | ||
| 
						 | 
					996b80f990 | ||
| 
						 | 
					1998f60546 | ||
| 
						 | 
					13a4808ca4 | ||
| 
						 | 
					a176be48a2 | ||
| 
						 | 
					f47bce27e3 | ||
| 
						 | 
					f86d65110d | ||
| 
						 | 
					4730ea8a38 | ||
| 
						 | 
					3e82dfdf2d | ||
| 
						 | 
					b7d0d35a13 | ||
| 
						 | 
					e12ceb2c92 | ||
| 
						 | 
					e8d23950a0 | ||
| 
						 | 
					d7c86198d9 | ||
| 
						 | 
					76428da729 | ||
| 
						 | 
					6bf4ca0840 | ||
| 
						 | 
					efa59b8d59 | ||
| 
						 | 
					e1a2bfaaa6 | ||
| 
						 | 
					48f48d96ce | ||
| 
						 | 
					085cb7cac0 | ||
| 
						 | 
					9874ff33c3 | ||
| 
						 | 
					73cfd9cce9 | ||
| 
						 | 
					3166d16f06 | ||
| 
						 | 
					26b82246b1 | ||
| 
						 | 
					277ba3ebd2 | ||
| 
						 | 
					3e9b2042d9 | ||
| 
						 | 
					5d577d7eb0 | ||
| 
						 | 
					05ee0523c1 | ||
| 
						 | 
					43f392c9a1 | ||
| 
						 | 
					01cb2049e3 | ||
| 
						 | 
					a224fe14e9 | ||
| 
						 | 
					00d5a5ff55 | ||
| 
						 | 
					420312cec5 | ||
| 
						 | 
					3c17fa3325 | ||
| 
						 | 
					e3424084a0 | ||
| 
						 | 
					d9a55422c7 | ||
| 
						 | 
					374941f727 | ||
| 
						 | 
					caeb429055 | ||
| 
						 | 
					b00c36e366 | ||
| 
						 | 
					1f9a128519 | ||
| 
						 | 
					18df6b30b1 | ||
| 
						 | 
					0d399f97dd | ||
| 
						 | 
					3fdc2c906d | ||
| 
						 | 
					a78ded0b61 | ||
| 
						 | 
					0a629ddbd6 | ||
| 
						 | 
					353cb367e4 | ||
| 
						 | 
					6252f3bc7c | ||
| 
						 | 
					4e319926d7 | ||
| 
						 | 
					e4f456918f | ||
| 
						 | 
					c342341ea1 | ||
| 
						 | 
					9d396bee8e | ||
| 
						 | 
					a9427c2536 | ||
| 
						 | 
					7a746ecf3e | ||
| 
						 | 
					aca8bf43ce | ||
| 
						 | 
					7de0df694f | ||
| 
						 | 
					15d3cd4680 | ||
| 
						 | 
					da4fb3cb39 | ||
| 
						 | 
					e10051ef3f | ||
| 
						 | 
					c60dca1f95 | ||
| 
						 | 
					188abf7e2a | ||
| 
						 | 
					f021b7cca6 | ||
| 
						 | 
					c126b73a4a | ||
| 
						 | 
					3f03b3569d | ||
| 
						 | 
					07dd3bfcd4 | ||
| 
						 | 
					37afdc953e | ||
| 
						 | 
					044855e146 | ||
| 
						 | 
					12379c82ba | ||
| 
						 | 
					be98d6b9ad | ||
| 
						 | 
					910b484975 | ||
| 
						 | 
					1fde5b65c6 | ||
| 
						 | 
					c40bc0b11f | ||
| 
						 | 
					7a0c01b41a | ||
| 
						 | 
					6fe9c925d2 | ||
| 
						 | 
					1ebdc48d5a | ||
| 
						 | 
					395a6c69bd | ||
| 
						 | 
					0d658ddf25 | ||
| 
						 | 
					cefa7ce284 | ||
| 
						 | 
					ee4041b8bd | ||
| 
						 | 
					a17f351b56 | ||
| 
						 | 
					4fcf8d8b07 | ||
| 
						 | 
					b7650eb21e | ||
| 
						 | 
					69120ad199 | ||
| 
						 | 
					1eee8a4226 | ||
| 
						 | 
					98448a53c8 | ||
| 
						 | 
					241d088156 | ||
| 
						 | 
					a22a8dd7dd | ||
| 
						 | 
					e26ad0c4fd | ||
| 
						 | 
					6e7559ac7f | ||
| 
						 | 
					9feda63955 | ||
| 
						 | 
					1ed81ff731 | ||
| 
						 | 
					b2dc2e6dac | ||
| 
						 | 
					1b787fc04c | ||
| 
						 | 
					9a6401acdf | ||
| 
						 | 
					c40fcc1e40 | ||
| 
						 | 
					f908ca4db4 | ||
| 
						 | 
					72f6453c48 | ||
| 
						 | 
					eca7b90771 | ||
| 
						 | 
					7eb90ccefb | ||
| 
						 | 
					6ed534782f | ||
| 
						 | 
					1ee27238f7 | ||
| 
						 | 
					59689735a6 | ||
| 
						 | 
					1be16287ee | ||
| 
						 | 
					9fe4b73d97 | ||
| 
						 | 
					73cb37295d | ||
| 
						 | 
					1f35508ae6 | ||
| 
						 | 
					3e2a74c294 | ||
| 
						 | 
					a34922c476 | ||
| 
						 | 
					84be7091fd | ||
| 
						 | 
					f82c1f0dd8 | ||
| 
						 | 
					dc0cb7e74f | ||
| 
						 | 
					ab31dbc482 | ||
| 
						 | 
					36e9d3ee91 | ||
| 
						 | 
					cc8c0f6b46 | ||
| 
						 | 
					3eac70a356 | ||
| 
						 | 
					5f3ad8f82c | ||
| 
						 | 
					367316c723 | ||
| 
						 | 
					d34353cc91 | ||
| 
						 | 
					6287fa5396 | ||
| 
						 | 
					a00c3c4019 | ||
| 
						 | 
					f4677b7960 | ||
| 
						 | 
					92308905dd | ||
| 
						 | 
					6f32fc5c4e | ||
| 
						 | 
					e607e731eb | ||
| 
						 | 
					f17c45611e | ||
| 
						 | 
					1ff7b6492b | ||
| 
						 | 
					20900d6801 | ||
| 
						 | 
					4b253d904d | ||
| 
						 | 
					a51c8c64e0 | ||
| 
						 | 
					c153422388 | ||
| 
						 | 
					7f065cfdbd | ||
| 
						 | 
					667fbc0847 | ||
| 
						 | 
					6ba7bd5697 | ||
| 
						 | 
					2cad035c01 | ||
| 
						 | 
					2a76c68842 | ||
| 
						 | 
					1b00f4bc37 | ||
| 
						 | 
					be62eb6d93 | ||
| 
						 | 
					5f3878f1e3 | ||
| 
						 | 
					a523e997d3 | ||
| 
						 | 
					fe43caa4a4 | ||
| 
						 | 
					792e614144 | ||
| 
						 | 
					ce2b87d88a | ||
| 
						 | 
					f092a073a7 | ||
| 
						 | 
					6fa4cd7136 | ||
| 
						 | 
					505ed2b076 | ||
| 
						 | 
					cef3e62d2b | ||
| 
						 | 
					40ea9ff9e8 | ||
| 
						 | 
					a97a6b03bc | ||
| 
						 | 
					516f76fd2c | ||
| 
						 | 
					5a02ac6e5b | ||
| 
						 | 
					14d4074ee1 | ||
| 
						 | 
					d9f16c405c | ||
| 
						 | 
					bfc6482a7a | ||
| 
						 | 
					5aa032033e | ||
| 
						 | 
					2d59f9938f | ||
| 
						 | 
					c0ce8fe755 | ||
| 
						 | 
					55eff40084 | ||
| 
						 | 
					e5a251843d | ||
| 
						 | 
					fe46b0de29 | ||
| 
						 | 
					a581439bb1 | ||
| 
						 | 
					a43337e8c4 | ||
| 
						 | 
					33c51ec143 | ||
| 
						 | 
					448da15fbf | ||
| 
						 | 
					a1bb2d6c2f | ||
| 
						 | 
					81dde5e8fe | ||
| 
						 | 
					b84e441861 | ||
| 
						 | 
					08e012bbec | ||
| 
						 | 
					b46acc392b | ||
| 
						 | 
					28af6367b8 | ||
| 
						 | 
					2c17b493b1 | ||
| 
						 | 
					ea725a66c9 | ||
| 
						 | 
					1532493dab | ||
| 
						 | 
					3795297af8 | ||
| 
						 | 
					33fd33d423 | ||
| 
						 | 
					4e98f8863f | ||
| 
						 | 
					582ef3dbdb | ||
| 
						 | 
					6a933782fa | ||
| 
						 | 
					d1c2778e93 | ||
| 
						 | 
					8d64abacc6 | ||
| 
						 | 
					9af6802943 | ||
| 
						 | 
					c10f53a897 | ||
| 
						 | 
					2124e869a8 | ||
| 
						 | 
					3b668eedda | ||
| 
						 | 
					7471431322 | ||
| 
						 | 
					1542de4eed | ||
| 
						 | 
					b6c2bffbdf | ||
| 
						 | 
					ff09931e22 | ||
| 
						 | 
					155c70b882 | ||
| 
						 | 
					7c49452973 | ||
| 
						 | 
					312539ae9f | ||
| 
						 | 
					cc40dcce58 | ||
| 
						 | 
					5790921aea | ||
| 
						 | 
					df84c11407 | ||
| 
						 | 
					b76306c983 | ||
| 
						 | 
					cdffc716c9 | ||
| 
						 | 
					5dffc13f55 | ||
| 
						 | 
					a5873a8d3d | ||
| 
						 | 
					4db3e88459 | ||
| 
						 | 
					ab073bad4f | ||
| 
						 | 
					cfe04f607d | ||
| 
						 | 
					c0e9f540e0 | ||
| 
						 | 
					7c97aacbe8 | ||
| 
						 | 
					36b8f87566 | ||
| 
						 | 
					d875413a0b | ||
| 
						 | 
					155ad6d219 | ||
| 
						 | 
					138f20433e | ||
| 
						 | 
					7747c67861 | ||
| 
						 | 
					237a6f06b6 | ||
| 
						 | 
					fe99beb82a | ||
| 
						 | 
					736a77f275 | ||
| 
						 | 
					94539213a1 | ||
| 
						 | 
					c5c4246319 | ||
| 
						 | 
					2e6d8a8991 | ||
| 
						 | 
					e852835da6 | ||
| 
						 | 
					d245c32529 | ||
| 
						 | 
					964d58bcb0 | ||
| 
						 | 
					52702f6f92 | ||
| 
						 | 
					05794d983f | ||
| 
						 | 
					364f36f851 | ||
| 
						 | 
					9b809d6278 | ||
| 
						 | 
					bbefea3387 | ||
| 
						 | 
					d83dde6180 | ||
| 
						 | 
					63e1319d0f | ||
| 
						 | 
					8067d34b3a | ||
| 
						 | 
					e3f2860e73 | ||
| 
						 | 
					92eb44d238 | ||
| 
						 | 
					f4179bead4 | ||
| 
						 | 
					fced277486 | ||
| 
						 | 
					3d1be455ce | ||
| 
						 | 
					dee4d129cb | ||
| 
						 | 
					0067bd77a8 | ||
| 
						 | 
					d98904e5a7 | ||
| 
						 | 
					96a259e81e | ||
| 
						 | 
					59f3477b82 | ||
| 
						 | 
					f947b818bf | ||
| 
						 | 
					3fa1a444ce | ||
| 
						 | 
					a2dc9b6be2 | ||
| 
						 | 
					16349eeceb | ||
| 
						 | 
					aecf1c1f96 | ||
| 
						 | 
					4ea574fdf3 | ||
| 
						 | 
					cf8115deb0 | ||
| 
						 | 
					d25cbda074 | ||
| 
						 | 
					5d582fd516 | ||
| 
						 | 
					8ec86dcf04 | ||
| 
						 | 
					6d3b70c8da | ||
| 
						 | 
					0a4fda742b | ||
| 
						 | 
					3745e57bf9 | ||
| 
						 | 
					b7e7aa00de | ||
| 
						 | 
					1098fd48ce | ||
| 
						 | 
					393906d9be | ||
| 
						 | 
					446881468c | ||
| 
						 | 
					cfb95ba9f6 | ||
| 
						 | 
					c198c26226 | ||
| 
						 | 
					54d6ddba69 | ||
| 
						 | 
					1af12ff1d1 | ||
| 
						 | 
					bd72b8eca6 | ||
| 
						 | 
					200d00c854 | ||
| 
						 | 
					669b912dea | ||
| 
						 | 
					36a4a67b2b | ||
| 
						 | 
					3413424f01 | ||
| 
						 | 
					80fc840d89 | ||
| 
						 | 
					6455100f7a | ||
| 
						 | 
					b7c8b4fc95 | ||
| 
						 | 
					f58d0f70b6 | ||
| 
						 | 
					8f59c61d1d | ||
| 
						 | 
					fd43ae3fe4 | ||
| 
						 | 
					cdd0f3b328 | ||
| 
						 | 
					f9f6f0e9f0 | ||
| 
						 | 
					405f382144 | ||
| 
						 | 
					a750273546 | ||
| 
						 | 
					ddc5f6f328 | ||
| 
						 | 
					4231b356aa | ||
| 
						 | 
					df1f7b4b02 | ||
| 
						 | 
					0b7545b239 | ||
| 
						 | 
					3a72137211 | ||
| 
						 | 
					e5d289cc03 | ||
| 
						 | 
					0ff3766b0e | ||
| 
						 | 
					3562202306 | ||
| 
						 | 
					2bf4b96aef | ||
| 
						 | 
					811e08a2c5 | ||
| 
						 | 
					dd6e90465d | ||
| 
						 | 
					a86c626802 | ||
| 
						 | 
					705c3dec2c | ||
| 
						 | 
					4afcee8b4b | ||
| 
						 | 
					9627017f9c | ||
| 
						 | 
					e0f6c15418 | ||
| 
						 | 
					ecc20b75f8 | ||
| 
						 | 
					540e455e3a | ||
| 
						 | 
					14748adb09 | ||
| 
						 | 
					ff2ab9e6bb | ||
| 
						 | 
					cc5cc3bb8f | ||
| 
						 | 
					1f3206216b | ||
| 
						 | 
					f113bb9f4e | ||
| 
						 | 
					4681147bb3 | ||
| 
						 | 
					52c3f232e4 | ||
| 
						 | 
					3dc466424e | ||
| 
						 | 
					353415cc81 | ||
| 
						 | 
					1a12ce8ea5 | ||
| 
						 | 
					0278e15fa3 | ||
| 
						 | 
					f01f085cb9 | ||
| 
						 | 
					bca68e90cc | ||
| 
						 | 
					a3f67ec18d | ||
| 
						 | 
					56ef1cbc40 | ||
| 
						 | 
					a1411093f0 | ||
| 
						 | 
					f35f7d9fbb | ||
| 
						 | 
					dfbf646ac4 | ||
| 
						 | 
					591371566e | ||
| 
						 | 
					5799b72178 | ||
| 
						 | 
					1cfe6842d5 | ||
| 
						 | 
					f4c98a6a3d | ||
| 
						 | 
					4aefb1dd98 | ||
| 
						 | 
					aa03989791 | ||
| 
						 | 
					a865b2c320 | ||
| 
						 | 
					694ce314a8 | ||
| 
						 | 
					94299a36a6 | ||
| 
						 | 
					3aaeb5c1e5 | ||
| 
						 | 
					80ec6cc806 | ||
| 
						 | 
					3d83320279 | ||
| 
						 | 
					4ab252d198 | ||
| 
						 | 
					058ffd7623 | ||
| 
						 | 
					0330a13aea | ||
| 
						 | 
					467325b81d | ||
| 
						 | 
					00f716bbe6 | ||
| 
						 | 
					2f2f032497 | ||
| 
						 | 
					feb200bbb3 | ||
| 
						 | 
					3894667036 | ||
| 
						 | 
					203ac694e3 | ||
| 
						 | 
					bb592c75e7 | ||
| 
						 | 
					777d717c40 | ||
| 
						 | 
					143d84590f | ||
| 
						 | 
					a29669d78d | ||
| 
						 | 
					e5be1e1696 | ||
| 
						 | 
					9e47c34729 | ||
| 
						 | 
					cb896f8923 | ||
| 
						 | 
					cec9bce126 | ||
| 
						 | 
					3f79793b7e | ||
| 
						 | 
					0d01d8a735 | ||
| 
						 | 
					2c0fa03dc6 | ||
| 
						 | 
					d3b3a6d389 | ||
| 
						 | 
					fc260b09a1 | ||
| 
						 | 
					b3c79a8a27 | ||
| 
						 | 
					f0ecefc0c0 | ||
| 
						 | 
					b0118409a9 | ||
| 
						 | 
					5f23288692 | ||
| 
						 | 
					45c58c7d10 | ||
| 
						 | 
					112591be76 | ||
| 
						 | 
					1b8daa3693 | ||
| 
						 | 
					1cdbc755ee | ||
| 
						 | 
					aa9c7e4b8c | ||
| 
						 | 
					6be69a168f | ||
| 
						 | 
					eaf76feeb6 | ||
| 
						 | 
					03e79ed05e | ||
| 
						 | 
					56bef2df4f | ||
| 
						 | 
					10d3886c51 | ||
| 
						 | 
					f1c0cf5b70 | ||
| 
						 | 
					2a7ac69ee4 | ||
| 
						 | 
					d13ea8e184 | ||
| 
						 | 
					1820b04bb2 | ||
| 
						 | 
					439b7ef463 | ||
| 
						 | 
					a25fb95bd6 | ||
| 
						 | 
					6168067160 | ||
| 
						 | 
					c3031a4610 | ||
| 
						 | 
					1099a94063 | ||
| 
						 | 
					812d8a176c | ||
| 
						 | 
					db533c96e3 | ||
| 
						 | 
					8831eb7624 | ||
| 
						 | 
					3c8f315021 | ||
| 
						 | 
					0f2e636602 | ||
| 
						 | 
					98bd148b1a | ||
| 
						 | 
					292248b8c2 | ||
| 
						 | 
					d3eef3e5af | ||
| 
						 | 
					c5fbf8c1ba | ||
| 
						 | 
					1ed2d8f512 | ||
| 
						 | 
					d140890259 | ||
| 
						 | 
					eb492df2bb | ||
| 
						 | 
					2c16e78400 | ||
| 
						 | 
					bf2b87aea3 | ||
| 
						 | 
					1dff425999 | ||
| 
						 | 
					501af5ba89 | ||
| 
						 | 
					31d6e7b7ba | ||
| 
						 | 
					b983322bfb | ||
| 
						 | 
					339654e163 | ||
| 
						 | 
					5ca48cc853 | ||
| 
						 | 
					79996e3335 | ||
| 
						 | 
					173acc185c | ||
| 
						 | 
					a985ecdd17 | ||
| 
						 | 
					fb4c24b6e7 | ||
| 
						 | 
					1366f6b9bd | ||
| 
						 | 
					e13546f739 | ||
| 
						 | 
					d6c813daff | ||
| 
						 | 
					e3818a4c4b | ||
| 
						 | 
					415fe2abe9 | ||
| 
						 | 
					5bbdaaf4b7 | ||
| 
						 | 
					bf1f1a5759 | ||
| 
						 | 
					8e42429c9d | ||
| 
						 | 
					c43c2285f6 | ||
| 
						 | 
					94b2c29f9d | ||
| 
						 | 
					090f931a35 | ||
| 
						 | 
					6b8be6da76 | ||
| 
						 | 
					7ec2d392e7 | ||
| 
						 | 
					e88f66bb49 | ||
| 
						 | 
					28a2759ab8 | ||
| 
						 | 
					3edad44d6e | ||
| 
						 | 
					9e7459fc5d | ||
| 
						 | 
					b98f5ef42b | ||
| 
						 | 
					a6d4f79f24 | ||
| 
						 | 
					efcb7a75fc | ||
| 
						 | 
					30aa23fea2 | ||
| 
						 | 
					c9e045041e | ||
| 
						 | 
					fd6fa9c0b2 | ||
| 
						 | 
					9f70d09275 | ||
| 
						 | 
					3fb0f01001 | ||
| 
						 | 
					216ac24bd3 | ||
| 
						 | 
					2035af2091 | ||
| 
						 | 
					19398a175a | ||
| 
						 | 
					fa369ddbe7 | ||
| 
						 | 
					294ba3c282 | ||
| 
						 | 
					2923e91a98 | ||
| 
						 | 
					7c52b7706f | ||
| 
						 | 
					ddec587581 | ||
| 
						 | 
					4f466f8e81 | ||
| 
						 | 
					1502cda142 | ||
| 
						 | 
					ce2b5d7574 | ||
| 
						 | 
					f1c65db80b | ||
| 
						 | 
					496970b233 | ||
| 
						 | 
					3b0e61a812 | ||
| 
						 | 
					e84b0d709b | ||
| 
						 | 
					16241f0ea4 | ||
| 
						 | 
					518af4e3ae | ||
| 
						 | 
					fe01f90a1c | ||
| 
						 | 
					99a376df16 | ||
| 
						 | 
					831ffcb705 | ||
| 
						 | 
					5f297c4504 | ||
| 
						 | 
					d7623ff9f3 | ||
| 
						 | 
					df9b5405e8 | ||
| 
						 | 
					180eb5b3c2 | ||
| 
						 | 
					af7d49aaff | ||
| 
						 | 
					187b655bc2 | ||
| 
						 | 
					8612cb9239 | ||
| 
						 | 
					b2f3fafa6a | ||
| 
						 | 
					483dab147d | ||
| 
						 | 
					f39b8e697c | ||
| 
						 | 
					7d610299c9 | ||
| 
						 | 
					25550b2dd4 | ||
| 
						 | 
					5c676c47cd | ||
| 
						 | 
					e77f9d5e78 | ||
| 
						 | 
					9c04747623 | ||
| 
						 | 
					e66deb6817 | ||
| 
						 | 
					cc9a645a02 | ||
| 
						 | 
					18fb9d807e | ||
| 
						 | 
					a1cc568288 | ||
| 
						 | 
					2ea3cd8abc | ||
| 
						 | 
					095db72024 | ||
| 
						 | 
					11eb172b6e | ||
| 
						 | 
					4b60f4b175 | ||
| 
						 | 
					0794f3a798 | ||
| 
						 | 
					2b8e7b5061 | ||
| 
						 | 
					6f57311da0 | ||
| 
						 | 
					98b09d3949 | ||
| 
						 | 
					231a737a82 | ||
| 
						 | 
					236860735e | ||
| 
						 | 
					ac1ef7ec72 | ||
| 
						 | 
					5f761514e1 | ||
| 
						 | 
					32f1f622f6 | ||
| 
						 | 
					5f95651316 | ||
| 
						 | 
					ccac657556 | ||
| 
						 | 
					a9c23ea079 | ||
| 
						 | 
					33ffe2a7f7 | ||
| 
						 | 
					7c717aafc6 | ||
| 
						 | 
					225aeb171e | ||
| 
						 | 
					ffe181c366 | ||
| 
						 | 
					fd4e79a9ed | ||
| 
						 | 
					299e174d2d | ||
| 
						 | 
					ce62fc6eae | ||
| 
						 | 
					43490dfb89 | ||
| 
						 | 
					a523276786 | ||
| 
						 | 
					074471ab0c | ||
| 
						 | 
					d761421e1d | ||
| 
						 | 
					2339c5d722 | ||
| 
						 | 
					dd00266757 | ||
| 
						 | 
					bb99ce5f80 | ||
| 
						 | 
					49f42ec0f6 | ||
| 
						 | 
					91d509f0d9 | ||
| 
						 | 
					d5e858c55f | ||
| 
						 | 
					fb8fcce2ac | ||
| 
						 | 
					d4736ae701 | ||
| 
						 | 
					3e1158522a | ||
| 
						 | 
					57191f86d9 | ||
| 
						 | 
					0a89c575de | ||
| 
						 | 
					4c860910df | ||
| 
						 | 
					0fc3d51b7d | ||
| 
						 | 
					c4b0d7879e | ||
| 
						 | 
					aab1ec3f36 | ||
| 
						 | 
					fbfa11fb29 | ||
| 
						 | 
					284498fcef | ||
| 
						 | 
					07d9808496 | ||
| 
						 | 
					4ab0088bfe | ||
| 
						 | 
					3bd1690bfb | ||
| 
						 | 
					29f4b05954 | ||
| 
						 | 
					48ca0c99b2 | ||
| 
						 | 
					015052cf7b | ||
| 
						 | 
					9ce3ee47ba | ||
| 
						 | 
					2e3fd54337 | ||
| 
						 | 
					625782f7ee | ||
| 
						 | 
					1c90899eef | ||
| 
						 | 
					4f2b7d48b1 | ||
| 
						 | 
					458c3900e1 | ||
| 
						 | 
					ba75b4e750 | ||
| 
						 | 
					ab011d51be | ||
| 
						 | 
					898d9b1a87 | ||
| 
						 | 
					4f9a9d2b79 | ||
| 
						 | 
					346f2f93e1 | ||
| 
						 | 
					25b0e072dd | ||
| 
						 | 
					dc13c882fb | ||
| 
						 | 
					12a52467c8 | ||
| 
						 | 
					22e6c73dcc | ||
| 
						 | 
					53b9696f3f | ||
| 
						 | 
					7e4fe4662b | ||
| 
						 | 
					18fd413f37 | ||
| 
						 | 
					80ed5f84de | ||
| 
						 | 
					b48111df7c | ||
| 
						 | 
					73e3edd70d | ||
| 
						 | 
					d4cfbdf2c0 | ||
| 
						 | 
					294f03a812 | ||
| 
						 | 
					272f9f3d27 | ||
| 
						 | 
					927a28ba3b | ||
| 
						 | 
					a938c4284e | ||
| 
						 | 
					7a44a0cee7 | ||
| 
						 | 
					82430309ac | ||
| 
						 | 
					c2079de880 | ||
| 
						 | 
					967ead7269 | ||
| 
						 | 
					c9255df519 | ||
| 
						 | 
					27c824a1c9 | ||
| 
						 | 
					5b96d1ccf9 | ||
| 
						 | 
					29c0866b38 | ||
| 
						 | 
					0214ea0dfe | ||
| 
						 | 
					80355002a1 | ||
| 
						 | 
					0e36825228 | ||
| 
						 | 
					95a8f1469f | ||
| 
						 | 
					afdbadc704 | ||
| 
						 | 
					004cc26abf | ||
| 
						 | 
					35a924c576 | ||
| 
						 | 
					99279ac97a | ||
| 
						 | 
					87605ca1e2 | ||
| 
						 | 
					7cc586f117 | ||
| 
						 | 
					c263a6092c | ||
| 
						 | 
					f92fd85400 | ||
| 
						 | 
					e71520ddd6 | ||
| 
						 | 
					275f34b5d2 | ||
| 
						 | 
					50fbb6ed36 | ||
| 
						 | 
					34fdacbd35 | ||
| 
						 | 
					77f2d20dbc | ||
| 
						 | 
					0dbfbf26cb | ||
| 
						 | 
					2863a6878f | ||
| 
						 | 
					ae46e91e4d | ||
| 
						 | 
					865a90eb4f | ||
| 
						 | 
					0269c4507c | ||
| 
						 | 
					a5d3574984 | ||
| 
						 | 
					1040deb0c5 | ||
| 
						 | 
					05ea800faf | ||
| 
						 | 
					341f87862c | ||
| 
						 | 
					f805d30769 | ||
| 
						 | 
					4fb9472cc2 | ||
| 
						 | 
					a8098740c6 | ||
| 
						 | 
					e3af0d041e | ||
| 
						 | 
					28cfda9f30 | ||
| 
						 | 
					a313e23fff | ||
| 
						 | 
					4d2a292e8a | ||
| 
						 | 
					5a84b7fc2d | ||
| 
						 | 
					d8e660a6dc | ||
| 
						 | 
					761f3b403b | ||
| 
						 | 
					4570d29404 | ||
| 
						 | 
					14346b3456 | ||
| 
						 | 
					769f58aaaa | ||
| 
						 | 
					a166e96d16 | ||
| 
						 | 
					8dd8ce1dc3 | ||
| 
						 | 
					4c5979a107 | ||
| 
						 | 
					649ab2dcfa | ||
| 
						 | 
					71fc9b37ae | ||
| 
						 | 
					283aedf498 | ||
| 
						 | 
					1a56614af2 | ||
| 
						 | 
					693c33e407 | ||
| 
						 | 
					d9a9aa027d | ||
| 
						 | 
					b22250bb67 | ||
| 
						 | 
					d446120527 | ||
| 
						 | 
					bb9d68489c | ||
| 
						 | 
					affaea59fe | ||
| 
						 | 
					81fc4c93ef | ||
| 
						 | 
					8957121c14 | ||
| 
						 | 
					50241bc84e | ||
| 
						 | 
					e7f077f1ba | ||
| 
						 | 
					c3b82c7610 | ||
| 
						 | 
					2c12e7f6f5 | ||
| 
						 | 
					8db10d9ac4 | ||
| 
						 | 
					c3cc4662af | ||
| 
						 | 
					22892f9803 | ||
| 
						 | 
					27eb115fb6 | ||
| 
						 | 
					51a596ef4f | ||
| 
						 | 
					97de8bd1e0 | ||
| 
						 | 
					1cb7e5be5b | ||
| 
						 | 
					84dd04e761 | ||
| 
						 | 
					2ac061e487 | ||
| 
						 | 
					7cdb81582c | ||
| 
						 | 
					8f33b40302 | ||
| 
						 | 
					e600614ef5 | ||
| 
						 | 
					02581dea1f | ||
| 
						 | 
					40ad08bcc2 | ||
| 
						 | 
					9c4456a13f | ||
| 
						 | 
					f4d0392faa | ||
| 
						 | 
					45ba6cfe03 | ||
| 
						 | 
					4f23a0c797 | ||
| 
						 | 
					f6c32bbf2b | ||
| 
						 | 
					d040c951f0 | ||
| 
						 | 
					69abfb0e33 | ||
| 
						 | 
					9a1daf8482 | ||
| 
						 | 
					9de6dc3af3 | ||
| 
						 | 
					248834dcaa | ||
| 
						 | 
					11a7da7c9f | ||
| 
						 | 
					9fea0b9937 | ||
| 
						 | 
					6fd3f3260d | ||
| 
						 | 
					d9e262443c | ||
| 
						 | 
					51c3bb3b98 | ||
| 
						 | 
					7d608f9e32 | ||
| 
						 | 
					295de18c8a | ||
| 
						 | 
					3370b694b9 | ||
| 
						 | 
					3380c52f15 | ||
| 
						 | 
					1364e6f1ac | ||
| 
						 | 
					c5ac2aa62c | ||
| 
						 | 
					392a0345de | ||
| 
						 | 
					5c2fc73e7b | ||
| 
						 | 
					402b951804 | ||
| 
						 | 
					5848d13fed | ||
| 
						 | 
					5dd24ead57 | ||
| 
						 | 
					d2cb94952a | ||
| 
						 | 
					0615396d2d | ||
| 
						 | 
					82877ea449 | ||
| 
						 | 
					81fae49db9 | ||
| 
						 | 
					74ff8dc975 | ||
| 
						 | 
					ac319217d0 | ||
| 
						 | 
					cdb13ae8d0 | ||
| 
						 | 
					ab700807d9 | ||
| 
						 | 
					744b91bb9f | ||
| 
						 | 
					d69f85bf15 | ||
| 
						 | 
					52ee969e29 | ||
| 
						 | 
					55f0501201 | ||
| 
						 | 
					b2710ee19a | ||
| 
						 | 
					bbfcc4724d | ||
| 
						 | 
					c31cc72d79 | ||
| 
						 | 
					d1049ad93e | ||
| 
						 | 
					5f4cc234fb | ||
| 
						 | 
					d31a13953c | ||
| 
						 | 
					28f5873179 | ||
| 
						 | 
					8f813338f1 | ||
| 
						 | 
					6555dfa486 | ||
| 
						 | 
					5eee0253e5 | ||
| 
						 | 
					594c723f98 | ||
| 
						 | 
					f418265865 | ||
| 
						 | 
					53707e2eec | ||
| 
						 | 
					fde794e898 | ||
| 
						 | 
					082f19b42d | ||
| 
						 | 
					e31c620686 | ||
| 
						 | 
					570253315f | ||
| 
						 | 
					5dcdac6e4e | ||
| 
						 | 
					eea3fce854 | ||
| 
						 | 
					215c49d032 | ||
| 
						 | 
					923df53e25 | ||
| 
						 | 
					1a684d0020 | ||
| 
						 | 
					dc3b721fa0 | ||
| 
						 | 
					4479ce9c1c | ||
| 
						 | 
					4a0d3530e0 | ||
| 
						 | 
					9907d2992d | ||
| 
						 | 
					9d9224f184 | ||
| 
						 | 
					78d4d87e39 | ||
| 
						 | 
					6211633273 | ||
| 
						 | 
					3a4cf918bf | ||
| 
						 | 
					e25eb309ec | ||
| 
						 | 
					ffa2b2aa7d | ||
| 
						 | 
					a77a95584d | ||
| 
						 | 
					68bb98159f | ||
| 
						 | 
					8e6905d238 | ||
| 
						 | 
					1a8521ff24 | ||
| 
						 | 
					9d5460d72d | ||
| 
						 | 
					35e59297fc | ||
| 
						 | 
					9b945233b1 | ||
| 
						 | 
					b065dc2eee | ||
| 
						 | 
					66c4bb1a70 | ||
| 
						 | 
					36abe6fe61 | ||
| 
						 | 
					3c786aa6c8 | ||
| 
						 | 
					e5cce6d356 | ||
| 
						 | 
					723b7d81e4 | ||
| 
						 | 
					a3ddd7358b | ||
| 
						 | 
					45c027f31f | ||
| 
						 | 
					3b62e9eb0d | ||
| 
						 | 
					34a8c7ec87 | ||
| 
						 | 
					d4a6240005 | ||
| 
						 | 
					5c6f76da0a | ||
| 
						 | 
					4636341b05 | ||
| 
						 | 
					be3b770d8f | ||
| 
						 | 
					af32387b3f | ||
| 
						 | 
					115fc340cb | ||
| 
						 | 
					900f7a8776 | ||
| 
						 | 
					4877e30504 | ||
| 
						 | 
					4656ec3852 | ||
| 
						 | 
					e336441197 | ||
| 
						 | 
					20d6182f33 | ||
| 
						 | 
					aa145866f9 | ||
| 
						 | 
					fdff41e166 | ||
| 
						 | 
					07b4bc3979 | ||
| 
						 | 
					0c66d3ae37 | ||
| 
						 | 
					bd869183d5 | ||
| 
						 | 
					7e2bf83100 | ||
| 
						 | 
					25e52a78fb | ||
| 
						 | 
					47c4bb2ddf | ||
| 
						 | 
					951dfbb13a | ||
| 
						 | 
					81780a3b62 | ||
| 
						 | 
					c574d0cdf2 | ||
| 
						 | 
					c987c3f999 | ||
| 
						 | 
					1a5e414863 | ||
| 
						 | 
					ec3639385e | ||
| 
						 | 
					f01cfca6a4 | ||
| 
						 | 
					7d5af5e0fa | ||
| 
						 | 
					8fdb296cbd | ||
| 
						 | 
					879b30aaa3 | ||
| 
						 | 
					40ddcb717a | ||
| 
						 | 
					da1841a075 | ||
| 
						 | 
					0a0a10d127 | ||
| 
						 | 
					df20b6e79b | ||
| 
						 | 
					f4f1dc39e0 | ||
| 
						 | 
					340b4dd7df | ||
| 
						 | 
					4b9dcd821f | ||
| 
						 | 
					669c5c9380 | ||
| 
						 | 
					7f9aa6c59b | ||
| 
						 | 
					d9c06b56ca | ||
| 
						 | 
					d045e1d77e | ||
| 
						 | 
					6d14cc7ec1 | ||
| 
						 | 
					eb499b2854 | ||
| 
						 | 
					65a82ef6d7 | ||
| 
						 | 
					616f581650 | ||
| 
						 | 
					57e802656f | ||
| 
						 | 
					5d7f15daf8 | ||
| 
						 | 
					ec67e3b7e4 | ||
| 
						 | 
					0d3ff3c073 | ||
| 
						 | 
					325e48867c | ||
| 
						 | 
					8de95bc05b | ||
| 
						 | 
					5e3003bb52 | ||
| 
						 | 
					e6e3f38bfa | ||
| 
						 | 
					aa17ab7e57 | ||
| 
						 | 
					35908bd040 | ||
| 
						 | 
					4a9cfd763e | ||
| 
						 | 
					0e73294e26 | ||
| 
						 | 
					b610f46bae | ||
| 
						 | 
					1921a1adb2 | ||
| 
						 | 
					6d2cd23f40 | ||
| 
						 | 
					14fb67f28a | ||
| 
						 | 
					c552680473 | ||
| 
						 | 
					edbf9f878d | ||
| 
						 | 
					2745ddfc33 | ||
| 
						 | 
					808606034a | ||
| 
						 | 
					e18eef3d7a | ||
| 
						 | 
					e78fc11a95 | ||
| 
						 | 
					83231cb376 | ||
| 
						 | 
					986ad56124 | ||
| 
						 | 
					b723a7b11b | ||
| 
						 | 
					1b6b67b17e | ||
| 
						 | 
					1ee3236f72 | ||
| 
						 | 
					b03a4917be | ||
| 
						 | 
					84971b39f5 | ||
| 
						 | 
					5ab3e743f3 | ||
| 
						 | 
					1c5dc844e7 | ||
| 
						 | 
					f871949efd | ||
| 
						 | 
					eb2ec6bee9 | ||
| 
						 | 
					df22f59f6e | ||
| 
						 | 
					db0edc3273 | ||
| 
						 | 
					6300c14248 | ||
| 
						 | 
					d4426e79a7 | ||
| 
						 | 
					b095418d20 | ||
| 
						 | 
					d6fd880481 | ||
| 
						 | 
					cbb0b734c7 | ||
| 
						 | 
					f4bcd70f27 | ||
| 
						 | 
					6e16b45d9d | ||
| 
						 | 
					e09e7ab362 | ||
| 
						 | 
					d5cc2f19cd | ||
| 
						 | 
					b7a80146f4 | ||
| 
						 | 
					5586a71a6e | ||
| 
						 | 
					81418b7c77 | ||
| 
						 | 
					8bd0c77ae3 | ||
| 
						 | 
					e2217e7ed5 | ||
| 
						 | 
					51b75ea7ef | ||
| 
						 | 
					41d4d6721c | ||
| 
						 | 
					9d01d50459 | ||
| 
						 | 
					e27c67c5c5 | ||
| 
						 | 
					e7decd5f4d | ||
| 
						 | 
					38a3178185 | ||
| 
						 | 
					58828ae573 | ||
| 
						 | 
					6b5f5e3508 | ||
| 
						 | 
					f0ec771933 | ||
| 
						 | 
					22d1087e16 | ||
| 
						 | 
					9f85fcefdc | ||
| 
						 | 
					269d2575cd | ||
| 
						 | 
					0b8ed5de2d | ||
| 
						 | 
					c22684eac9 | ||
| 
						 | 
					c42cd4b831 | ||
| 
						 | 
					4d018f7067 | ||
| 
						 | 
					46eaf3b0cc | ||
| 
						 | 
					9df2a00b94 | ||
| 
						 | 
					fbcf4bc1f2 | ||
| 
						 | 
					ca08c064bb | ||
| 
						 | 
					02df47d349 | ||
| 
						 | 
					41c39e3366 | ||
| 
						 | 
					45803988ce | ||
| 
						 | 
					28251e7ff9 | ||
| 
						 | 
					217382d584 | ||
| 
						 | 
					82a2cb6f51 | ||
| 
						 | 
					611ed5f312 | ||
| 
						 | 
					27fbb5dbf4 | ||
| 
						 | 
					db8d9b7cf1 | ||
| 
						 | 
					60ec950517 | ||
| 
						 | 
					2cd4ebc01f | ||
| 
						 | 
					5f4dcaf781 | ||
| 
						 | 
					c55d882fab | ||
| 
						 | 
					8dc7450068 | ||
| 
						 | 
					2e885232c2 | ||
| 
						 | 
					970d9b3795 | ||
| 
						 | 
					2f58af0d85 | ||
| 
						 | 
					0ae50f19da | ||
| 
						 | 
					c4ac37361e | ||
| 
						 | 
					3152861e81 | ||
| 
						 | 
					a14afd0804 | ||
| 
						 | 
					25d5d1a60d | ||
| 
						 | 
					6ff58b9240 | ||
| 
						 | 
					99237262d4 | ||
| 
						 | 
					29982dfd15 | ||
| 
						 | 
					6c4da94687 | ||
| 
						 | 
					6986d0e6eb | ||
| 
						 | 
					bc9320452c | ||
| 
						 | 
					23d43aae27 | ||
| 
						 | 
					de71735e7c | ||
| 
						 | 
					05decf3638 | ||
| 
						 | 
					95bffa1a1f | ||
| 
						 | 
					974d52fdb8 | ||
| 
						 | 
					7614f0e55e | ||
| 
						 | 
					0632284f79 | ||
| 
						 | 
					ad4a89f070 | ||
| 
						 | 
					6104c49f31 | ||
| 
						 | 
					07fc760999 | ||
| 
						 | 
					cf6bc84148 | ||
| 
						 | 
					36d51bea93 | ||
| 
						 | 
					fc12885b1b | ||
| 
						 | 
					ec7033745e | ||
| 
						 | 
					9e31e63147 | ||
| 
						 | 
					feef17fd88 | ||
| 
						 | 
					817f011191 | ||
| 
						 | 
					98c045cf3a | ||
| 
						 | 
					8860f3a82a | ||
| 
						 | 
					43e9f4ca2f | ||
| 
						 | 
					586f843c76 | ||
| 
						 | 
					7cfc9e6d8c | ||
| 
						 | 
					4952ed0fa4 | ||
| 
						 | 
					a084185d76 | ||
| 
						 | 
					914b80d276 | ||
| 
						 | 
					282557da52 | ||
| 
						 | 
					5f649d583c | ||
| 
						 | 
					b98225ebf5 | ||
| 
						 | 
					abb0c2bba4 | ||
| 
						 | 
					b3bdb474a9 | ||
| 
						 | 
					d796e6acb7 | ||
| 
						 | 
					d3afc92bc9 | ||
| 
						 | 
					35a97b4b7b | ||
| 
						 | 
					f59463aad3 | ||
| 
						 | 
					ed656499c4 | ||
| 
						 | 
					63533e9a22 | ||
| 
						 | 
					20f7053254 | ||
| 
						 | 
					8b8ef74d39 | ||
| 
						 | 
					3bfe024d8d | ||
| 
						 | 
					063333e03d | ||
| 
						 | 
					0a0918ff38 | ||
| 
						 | 
					802c014656 | ||
| 
						 | 
					860841794d | ||
| 
						 | 
					2a87c31237 | ||
| 
						 | 
					da5f7fdcee | ||
| 
						 | 
					d8b408b1de | ||
| 
						 | 
					64932f9e4a | ||
| 
						 | 
					5a20efcf17 | ||
| 
						 | 
					2a2857bbc8 | ||
| 
						 | 
					1bef284ab1 | ||
| 
						 | 
					d8d0b6434f | ||
| 
						 | 
					416b6fd115 | ||
| 
						 | 
					f685cf920b | ||
| 
						 | 
					54f51116b2 | ||
| 
						 | 
					b0d90958fc | ||
| 
						 | 
					049ced2c2f | ||
| 
						 | 
					844b0e603b | ||
| 
						 | 
					75ef751e23 | ||
| 
						 | 
					c4f6e56fca | ||
| 
						 | 
					ff86d3d894 | ||
| 
						 | 
					85b4c03e33 | ||
| 
						 | 
					efaf159af6 | ||
| 
						 | 
					daa657fb78 | ||
| 
						 | 
					4685663d73 | ||
| 
						 | 
					ed1f716022 | ||
| 
						 | 
					d3205a4898 | ||
| 
						 | 
					86731ce2c6 | ||
| 
						 | 
					1399309624 | ||
| 
						 | 
					cb59297438 | ||
| 
						 | 
					5824f6bc06 | ||
| 
						 | 
					5ce7090d54 | ||
| 
						 | 
					7306ab29bc | ||
| 
						 | 
					3a8b42f291 | ||
| 
						 | 
					e4c25383f2 | ||
| 
						 | 
					e734dcc2c7 | ||
| 
						 | 
					0fce007b8e | ||
| 
						 | 
					5a053a3a07 | ||
| 
						 | 
					3b2ba5f7fb | ||
| 
						 | 
					7f622f6c04 | ||
| 
						 | 
					801136bcc2 | ||
| 
						 | 
					3c0e39c539 | ||
| 
						 | 
					19fddebf0e | ||
| 
						 | 
					9eaf7e14c7 | ||
| 
						 | 
					0e441bc103 | ||
| 
						 | 
					cd9911fdf8 | ||
| 
						 | 
					6086422193 | ||
| 
						 | 
					9ddb11f11c | ||
| 
						 | 
					7a20cabd03 | ||
| 
						 | 
					9dc4ca4507 | ||
| 
						 | 
					62fea98b4f | ||
| 
						 | 
					7ae4eac5b6 | ||
| 
						 | 
					fcf8ae5e2b | ||
| 
						 | 
					55b9a7938b | ||
| 
						 | 
					cf1546a60e | ||
| 
						 | 
					e7eec05af0 | ||
| 
						 | 
					98e986141b | ||
| 
						 | 
					d7e35e0371 | ||
| 
						 | 
					222f224664 | ||
| 
						 | 
					62b6cd007f | ||
| 
						 | 
					1682e8fb12 | ||
| 
						 | 
					984aefe0e8 | ||
| 
						 | 
					2d54cc69c9 | ||
| 
						 | 
					2dd8278de8 | ||
| 
						 | 
					e0d8ac972e | ||
| 
						 | 
					ec03812fb0 | ||
| 
						 | 
					93cf2b17bf | ||
| 
						 | 
					77ef1a989d | ||
| 
						 | 
					423c7ac6c6 | ||
| 
						 | 
					2c368ef148 | ||
| 
						 | 
					b3c7162fd0 | ||
| 
						 | 
					67865069eb | ||
| 
						 | 
					1896a9be60 | ||
| 
						 | 
					b5b2c037c1 | ||
| 
						 | 
					1957924d51 | ||
| 
						 | 
					104a66f256 | ||
| 
						 | 
					3de6d65ea3 | ||
| 
						 | 
					fdb0a6e004 | ||
| 
						 | 
					87b857b6bf | ||
| 
						 | 
					b18165301d | ||
| 
						 | 
					097e65944a | ||
| 
						 | 
					0cdd29ea78 | ||
| 
						 | 
					7dec24688f | ||
| 
						 | 
					e62fa54811 | ||
| 
						 | 
					1614174e79 | ||
| 
						 | 
					f95d097359 | ||
| 
						 | 
					3c6ab9aad9 | ||
| 
						 | 
					4913b88f70 | ||
| 
						 | 
					273157153c | ||
| 
						 | 
					fb5156ff38 | ||
| 
						 | 
					2a824402f3 | ||
| 
						 | 
					86a249fe4f | ||
| 
						 | 
					6cae8221c9 | ||
| 
						 | 
					750cb3d248 | ||
| 
						 | 
					f254b540b8 | ||
| 
						 | 
					11024f252e | ||
| 
						 | 
					9d5cba17ba | ||
| 
						 | 
					1d01c9d43d | ||
| 
						 | 
					e32ea81876 | ||
| 
						 | 
					ef8a18f49b | ||
| 
						 | 
					b914049c53 | ||
| 
						 | 
					dabaea8048 | ||
| 
						 | 
					09c1a425a9 | ||
| 
						 | 
					8c6fed007f | ||
| 
						 | 
					2e39604021 | ||
| 
						 | 
					fbfb947b21 | ||
| 
						 | 
					8b963f4ba4 | ||
| 
						 | 
					9152f07eaf | ||
| 
						 | 
					35f70c09f5 | ||
| 
						 | 
					cc4cba7b5d | ||
| 
						 | 
					6b695fefd0 | ||
| 
						 | 
					910d193029 | ||
| 
						 | 
					f18dd687c8 | ||
| 
						 | 
					50d5376698 | ||
| 
						 | 
					5b9b62a7db | ||
| 
						 | 
					c0e29e5b01 | ||
| 
						 | 
					2f03129d46 | ||
| 
						 | 
					b44e2d3416 | ||
| 
						 | 
					564915681c | ||
| 
						 | 
					a24b7eeb87 | ||
| 
						 | 
					0215c01861 | ||
| 
						 | 
					beae6324e5 | ||
| 
						 | 
					71a61c573e | ||
| 
						 | 
					6b3b632767 | ||
| 
						 | 
					2a2fa04b7b | ||
| 
						 | 
					79b81d194b | ||
| 
						 | 
					ef04c9aff8 | ||
| 
						 | 
					7f85197c10 | ||
| 
						 | 
					ff0bfe64af | ||
| 
						 | 
					44b3a3a5e6 | ||
| 
						 | 
					7e3033aa93 | ||
| 
						 | 
					8bdbf50772 | ||
| 
						 | 
					ec33a76641 | ||
| 
						 | 
					00ce9376c7 | ||
| 
						 | 
					46e7a9797e | ||
| 
						 | 
					7006c4ac88 | ||
| 
						 | 
					a50a2126cf | ||
| 
						 | 
					07f7b4b470 | ||
| 
						 | 
					7e726e42f4 | ||
| 
						 | 
					40ba0257de | ||
| 
						 | 
					3fbd5f9fea | ||
| 
						 | 
					57b2246d35 | ||
| 
						 | 
					2a5b22d6f9 | ||
| 
						 | 
					f247dc7522 | ||
| 
						 | 
					e6531253e2 | ||
| 
						 | 
					c938babf00 | ||
| 
						 | 
					bf3900020f | ||
| 
						 | 
					586df3bb7f | ||
| 
						 | 
					c4b13b0268 | ||
| 
						 | 
					daef72316f | ||
| 
						 | 
					1f93c96e63 | ||
| 
						 | 
					8aa9c79276 | ||
| 
						 | 
					09a7f2e734 | ||
| 
						 | 
					b2d27e376d | ||
| 
						 | 
					644c4af11e | ||
| 
						 | 
					ca3dc3a0a0 | ||
| 
						 | 
					2b975dfd5b | ||
| 
						 | 
					0932892278 | ||
| 
						 | 
					fe0b3d98c2 | ||
| 
						 | 
					8d56c8b51c | ||
| 
						 | 
					d8e6409336 | ||
| 
						 | 
					a4ae746656 | ||
| 
						 | 
					331a0a7b9b | ||
| 
						 | 
					c630a3e8d6 | ||
| 
						 | 
					7435d89edf | ||
| 
						 | 
					14557c8be4 | ||
| 
						 | 
					98b4995bad | ||
| 
						 | 
					3000bdcc3a | ||
| 
						 | 
					cbe77a6753 | ||
| 
						 | 
					c58a1f76f8 | ||
| 
						 | 
					ecf2875ebf | ||
| 
						 | 
					ce2c19e357 | ||
| 
						 | 
					1b1081a3ed | ||
| 
						 | 
					37b200389a | ||
| 
						 | 
					6b5a8f3a22 | ||
| 
						 | 
					0b18d8b0c7 | ||
| 
						 | 
					3d187ede47 | ||
| 
						 | 
					f3b9c34515 | ||
| 
						 | 
					c923394924 | ||
| 
						 | 
					d9dbd24db5 | ||
| 
						 | 
					b135819d71 | ||
| 
						 | 
					cbcbd07da2 | ||
| 
						 | 
					24f6ab73a7 | ||
| 
						 | 
					5e88347e1b | ||
| 
						 | 
					cac0d4ee6f | ||
| 
						 | 
					428759b3d4 | ||
| 
						 | 
					898d3ecce0 | ||
| 
						 | 
					004f16f6c4 | ||
| 
						 | 
					4e2a0e58f2 | ||
| 
						 | 
					39d29195a7 | ||
| 
						 | 
					727c9b8027 | ||
| 
						 | 
					bd4e9b0512 | ||
| 
						 | 
					7844ff735f | ||
| 
						 | 
					49e96badcf | ||
| 
						 | 
					eb6a81bacc | ||
| 
						 | 
					6687f12988 | ||
| 
						 | 
					fcd12fc0f1 | ||
| 
						 | 
					0fb4d54068 | ||
| 
						 | 
					830a468a23 | ||
| 
						 | 
					af3ca7b4a9 | ||
| 
						 | 
					7a6bb17255 | ||
| 
						 | 
					bc6d459a6e | ||
| 
						 | 
					ff7f34e353 | ||
| 
						 | 
					2e3d79aaec | ||
| 
						 | 
					8a41bcc934 | ||
| 
						 | 
					e2414b41ad | ||
| 
						 | 
					266958bce7 | ||
| 
						 | 
					bc5354cbf0 | ||
| 
						 | 
					cc4997843e | ||
| 
						 | 
					ab95eac286 | ||
| 
						 | 
					1cd76233d1 | ||
| 
						 | 
					3d5afc8b83 | ||
| 
						 | 
					d28b7799dd | ||
| 
						 | 
					b0fb889c29 | ||
| 
						 | 
					460e80bd1d | ||
| 
						 | 
					bc1e96e942 | ||
| 
						 | 
					7ea61df414 | ||
| 
						 | 
					431712293d | ||
| 
						 | 
					335ed97263 | ||
| 
						 | 
					e00b165e9b | ||
| 
						 | 
					5467ddf0e1 | ||
| 
						 | 
					7a37dd92ed | ||
| 
						 | 
					d0c11e9d72 | ||
| 
						 | 
					5ec52fee2c | ||
| 
						 | 
					5026bc13bb | ||
| 
						 | 
					c7d27e5247 | ||
| 
						 | 
					b7d7af7ea9 | ||
| 
						 | 
					39663d2c40 | ||
| 
						 | 
					000299a0e6 | ||
| 
						 | 
					0a47d82b9b | ||
| 
						 | 
					198bcece58 | ||
| 
						 | 
					053677d124 | ||
| 
						 | 
					804072f014 | ||
| 
						 | 
					e9429b43ce | ||
| 
						 | 
					3d37d5e24a | ||
| 
						 | 
					2728a1b4f3 | ||
| 
						 | 
					adb040d4cb | ||
| 
						 | 
					479d7934c0 | ||
| 
						 | 
					22d1acd5ac | ||
| 
						 | 
					b257c152c6 | ||
| 
						 | 
					77b97ee0d7 | ||
| 
						 | 
					e2ac4732cd | ||
| 
						 | 
					e8f665b495 | ||
| 
						 | 
					55f3ef29ea | ||
| 
						 | 
					c2d78c9623 | ||
| 
						 | 
					a4578a5413 | ||
| 
						 | 
					e884fcf785 | ||
| 
						 | 
					a2c32e2d7f | ||
| 
						 | 
					80b168a5a9 | ||
| 
						 | 
					e96025755d | ||
| 
						 | 
					9426364be9 | ||
| 
						 | 
					c9028b0ab5 | ||
| 
						 | 
					b4d2858f95 | ||
| 
						 | 
					dea446d995 | ||
| 
						 | 
					5cd94f9e9d | ||
| 
						 | 
					429168e7ee | ||
| 
						 | 
					499fca2db3 | ||
| 
						 | 
					cad811fc41 | ||
| 
						 | 
					a28a5d9c62 | ||
| 
						 | 
					3f791ca818 | ||
| 
						 | 
					69f6a9f007 | ||
| 
						 | 
					4eeee0c59f | ||
| 
						 | 
					a5afa6c95f | ||
| 
						 | 
					625dacb93d | ||
| 
						 | 
					62e9c2e091 | ||
| 
						 | 
					e4106a4e24 | ||
| 
						 | 
					0ebfcc8f92 | ||
| 
						 | 
					c61f571ce0 | ||
| 
						 | 
					a506b8c7dd | ||
| 
						 | 
					e5cd536894 | ||
| 
						 | 
					60192e96b8 | ||
| 
						 | 
					629ea39a88 | ||
| 
						 | 
					7d9e1321c7 | ||
| 
						 | 
					83af7422a0 | ||
| 
						 | 
					ce8945f35c | ||
| 
						 | 
					dd890f0776 | ||
| 
						 | 
					af4ac437ab | ||
| 
						 | 
					85991994df | ||
| 
						 | 
					607585fdaf | ||
| 
						 | 
					b325518f45 | ||
| 
						 | 
					2f596aeef5 | ||
| 
						 | 
					b172dec864 | ||
| 
						 | 
					69762c75fa | ||
| 
						 | 
					61391e2314 | ||
| 
						 | 
					36b29660ce | ||
| 
						 | 
					4976983f30 | ||
| 
						 | 
					4b23506594 | ||
| 
						 | 
					31e4ad25ba | ||
| 
						 | 
					225f4daf15 | ||
| 
						 | 
					82d3dda8a1 | ||
| 
						 | 
					b9927cfa2d | ||
| 
						 | 
					fe8bf9560d | ||
| 
						 | 
					af6cafc603 | ||
| 
						 | 
					e4c9b85e65 | ||
| 
						 | 
					447aa49007 | ||
| 
						 | 
					15da07d436 | ||
| 
						 | 
					fe977f7512 | ||
| 
						 | 
					886ed3544b | ||
| 
						 | 
					e476f94212 | ||
| 
						 | 
					aff2922f9a | ||
| 
						 | 
					bbbd67108f | ||
| 
						 | 
					f32e0035a3 | ||
| 
						 | 
					7f246621b5 | ||
| 
						 | 
					b67d988915 | ||
| 
						 | 
					7b1e7706d8 | ||
| 
						 | 
					cd74dda72a | ||
| 
						 | 
					851e31ff07 | ||
| 
						 | 
					032bb2a2c5 | ||
| 
						 | 
					decc9ffc18 | ||
| 
						 | 
					fa96ed06d2 | ||
| 
						 | 
					43133041c9 | ||
| 
						 | 
					e0ee5ea962 | ||
| 
						 | 
					3f4657d131 | ||
| 
						 | 
					f5634286a3 | ||
| 
						 | 
					97d37c1c1e | ||
| 
						 | 
					739b139cb2 | ||
| 
						 | 
					0bc9920ad4 | ||
| 
						 | 
					3f516ce837 | ||
| 
						 | 
					67ffa18cce | ||
| 
						 | 
					9f197f9da5 | ||
| 
						 | 
					3dc2cc36e9 | ||
| 
						 | 
					788e67e227 | ||
| 
						 | 
					ca3e683747 | ||
| 
						 | 
					c50226594d | ||
| 
						 | 
					38a1757168 | ||
| 
						 | 
					51ff6bde38 | ||
| 
						 | 
					4104a57107 | ||
| 
						 | 
					28e4fe34e4 | ||
| 
						 | 
					c800a070b5 | ||
| 
						 | 
					b0c0f20071 | ||
| 
						 | 
					53d8996764 | ||
| 
						 | 
					32b1843ec6 | ||
| 
						 | 
					8712009778 | ||
| 
						 | 
					b8994f44e7 | ||
| 
						 | 
					f468e3824a | ||
| 
						 | 
					ea1b02db6a | ||
| 
						 | 
					2c4b354d32 | ||
| 
						 | 
					25a66ee3cb | ||
| 
						 | 
					0978dec131 | ||
| 
						 | 
					91b17fbad4 | ||
| 
						 | 
					ce92b6eb9c | ||
| 
						 | 
					7abbffc3fb | ||
| 
						 | 
					9dd8405341 | ||
| 
						 | 
					46a643763d | ||
| 
						 | 
					92c4468572 | ||
| 
						 | 
					10cde5010d | ||
| 
						 | 
					c4cd925cc0 | ||
| 
						 | 
					f210eb7b89 | ||
| 
						 | 
					734540f887 | ||
| 
						 | 
					804515425a | ||
| 
						 | 
					81a86fcf17 | ||
| 
						 | 
					a534bb09d3 | ||
| 
						 | 
					b6995add5c | ||
| 
						 | 
					8ccd06c66c | ||
| 
						 | 
					fe86616c72 | ||
| 
						 | 
					ba2ba27008 | ||
| 
						 | 
					f795123c4a | ||
| 
						 | 
					c596c795bf | ||
| 
						 | 
					3f19bbf4e3 | ||
| 
						 | 
					b874ce4dc2 | ||
| 
						 | 
					c6c2e3135d | ||
| 
						 | 
					4b26fe30de | ||
| 
						 | 
					4a8224b598 | ||
| 
						 | 
					8afca8d9c6 | ||
| 
						 | 
					35e8510e60 | ||
| 
						 | 
					8b15c74018 | ||
| 
						 | 
					3afa6cf866 | ||
| 
						 | 
					e19e549041 | ||
| 
						 | 
					d7561ac576 | ||
| 
						 | 
					7870774162 | ||
| 
						 | 
					fbeaa3c47d | ||
| 
						 | 
					ee2262b8d7 | ||
| 
						 | 
					b0ac0a8ef8 | ||
| 
						 | 
					0f4499360e | ||
| 
						 | 
					7dc17a6cf0 | ||
| 
						 | 
					b6223d2f70 | ||
| 
						 | 
					4213cdaf5d | ||
| 
						 | 
					39b4c974ee | ||
| 
						 | 
					256b5d5877 | ||
| 
						 | 
					508f56f17c | ||
| 
						 | 
					5d0d60e2f5 | ||
| 
						 | 
					57ee007035 | ||
| 
						 | 
					82e8cb403a | ||
| 
						 | 
					abee01c6f8 | ||
| 
						 | 
					48665b7c99 | ||
| 
						 | 
					2c288b2a7e | ||
| 
						 | 
					831721ef49 | ||
| 
						 | 
					51971f7293 | ||
| 
						 | 
					3d3addb252 | ||
| 
						 | 
					3f8bdd1fdb | ||
| 
						 | 
					6181fd949f | ||
| 
						 | 
					afd61c63c2 | ||
| 
						 | 
					9a2073b4cd | ||
| 
						 | 
					f28468188b | ||
| 
						 | 
					8871d87512 | ||
| 
						 | 
					a2b81188be | ||
| 
						 | 
					f91f6cd5e4 | ||
| 
						 | 
					bd923a7bac | ||
| 
						 | 
					373c88faef | ||
| 
						 | 
					14813d8123 | ||
| 
						 | 
					92f2437f48 | ||
| 
						 | 
					da959761ff | ||
| 
						 | 
					d8cd25aa0d | ||
| 
						 | 
					d63d4f46fc | ||
| 
						 | 
					52161e090d | ||
| 
						 | 
					9e55e06501 | ||
| 
						 | 
					0b6df67fb1 | ||
| 
						 | 
					bf087e1ea1 | ||
| 
						 | 
					885818fb7c | ||
| 
						 | 
					2f370048cb | ||
| 
						 | 
					28dc02a9d8 | ||
| 
						 | 
					54ebaca535 | ||
| 
						 | 
					4fedc91a4a | ||
| 
						 | 
					f734aaa413 | ||
| 
						 | 
					a575d4b9ee | ||
| 
						 | 
					77a87ded3a | ||
| 
						 | 
					b958d2c298 | ||
| 
						 | 
					dc72a195c2 | ||
| 
						 | 
					e2812ff61f | ||
| 
						 | 
					8c2e34e27f | ||
| 
						 | 
					31f3950fbf | ||
| 
						 | 
					75b3654d18 | ||
| 
						 | 
					418f9ac5e3 | ||
| 
						 | 
					ad4afe4edf | ||
| 
						 | 
					c844b971cb | ||
| 
						 | 
					ca9b1c47af | ||
| 
						 | 
					86039d2751 | ||
| 
						 | 
					420a692f04 | ||
| 
						 | 
					1d2a464fe0 | ||
| 
						 | 
					7735dd0750 | ||
| 
						 | 
					bf7b075f0c | 
							
								
								
									
										10
									
								
								.cvsignore
									
									
									
									
									
								
							
							
						
						
									
										10
									
								
								.cvsignore
									
									
									
									
									
								
							@@ -1,5 +1,4 @@
 | 
				
			|||||||
openssl.pc
 | 
					openssl.pc
 | 
				
			||||||
Makefile
 | 
					 | 
				
			||||||
MINFO
 | 
					MINFO
 | 
				
			||||||
makefile.one
 | 
					makefile.one
 | 
				
			||||||
tmp
 | 
					tmp
 | 
				
			||||||
@@ -12,9 +11,10 @@ maketest.log
 | 
				
			|||||||
cctest
 | 
					cctest
 | 
				
			||||||
cctest.c
 | 
					cctest.c
 | 
				
			||||||
cctest.a
 | 
					cctest.a
 | 
				
			||||||
libcrypto.so.*
 | 
					 | 
				
			||||||
libssl.so.*
 | 
					 | 
				
			||||||
libcrypto.sha1
 | 
					 | 
				
			||||||
libcrypto.a.sha1
 | 
					 | 
				
			||||||
*.flc
 | 
					*.flc
 | 
				
			||||||
semantic.cache
 | 
					semantic.cache
 | 
				
			||||||
 | 
					Makefile
 | 
				
			||||||
 | 
					*.so*
 | 
				
			||||||
 | 
					*.dll*
 | 
				
			||||||
 | 
					*.sl*
 | 
				
			||||||
 | 
					*.dylib*
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										77
									
								
								.gitignore
									
									
									
									
										vendored
									
									
										Normal file
									
								
							
							
						
						
									
										77
									
								
								.gitignore
									
									
									
									
										vendored
									
									
										Normal file
									
								
							@@ -0,0 +1,77 @@
 | 
				
			|||||||
 | 
					# Object files
 | 
				
			||||||
 | 
					*.o
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# editor artefacts
 | 
				
			||||||
 | 
					*.swp
 | 
				
			||||||
 | 
					.#*
 | 
				
			||||||
 | 
					#*#
 | 
				
			||||||
 | 
					*~
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Top level excludes
 | 
				
			||||||
 | 
					/Makefile.bak
 | 
				
			||||||
 | 
					/Makefile
 | 
				
			||||||
 | 
					/*.a
 | 
				
			||||||
 | 
					/include
 | 
				
			||||||
 | 
					/*.pc
 | 
				
			||||||
 | 
					/rehash.time
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Most *.c files under test/ are symlinks
 | 
				
			||||||
 | 
					/test/*.c
 | 
				
			||||||
 | 
					# Apart from these
 | 
				
			||||||
 | 
					!/test/asn1test.c
 | 
				
			||||||
 | 
					!/test/methtest.c
 | 
				
			||||||
 | 
					!/test/dummytest.c
 | 
				
			||||||
 | 
					!/test/igetest.c
 | 
				
			||||||
 | 
					!/test/r160test.c
 | 
				
			||||||
 | 
					!/test/fips_algvs.c
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/test/*.ss
 | 
				
			||||||
 | 
					/test/*.srl
 | 
				
			||||||
 | 
					/test/.rnd
 | 
				
			||||||
 | 
					/test/test*.pem
 | 
				
			||||||
 | 
					/test/newkey.pem
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Certificate symbolic links
 | 
				
			||||||
 | 
					*.0
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Links under apps
 | 
				
			||||||
 | 
					/apps/CA.pl
 | 
				
			||||||
 | 
					/apps/md4.c
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Auto generated headers
 | 
				
			||||||
 | 
					/crypto/buildinf.h
 | 
				
			||||||
 | 
					/crypto/opensslconf.h
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Auto generated assembly language source files
 | 
				
			||||||
 | 
					*.s
 | 
				
			||||||
 | 
					!/crypto/bn/asm/pa-risc2.s
 | 
				
			||||||
 | 
					!/crypto/bn/asm/pa-risc2W.s
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Executables
 | 
				
			||||||
 | 
					/apps/openssl
 | 
				
			||||||
 | 
					/test/sha256t
 | 
				
			||||||
 | 
					/test/sha512t
 | 
				
			||||||
 | 
					/test/*test
 | 
				
			||||||
 | 
					/test/fips_aesavs
 | 
				
			||||||
 | 
					/test/fips_desmovs
 | 
				
			||||||
 | 
					/test/fips_dhvs
 | 
				
			||||||
 | 
					/test/fips_drbgvs
 | 
				
			||||||
 | 
					/test/fips_dssvs
 | 
				
			||||||
 | 
					/test/fips_ecdhvs
 | 
				
			||||||
 | 
					/test/fips_ecdsavs
 | 
				
			||||||
 | 
					/test/fips_rngvs
 | 
				
			||||||
 | 
					/test/fips_test_suite
 | 
				
			||||||
 | 
					*.so*
 | 
				
			||||||
 | 
					*.dylib*
 | 
				
			||||||
 | 
					*.dll*
 | 
				
			||||||
 | 
					# Exceptions
 | 
				
			||||||
 | 
					!/test/bctest
 | 
				
			||||||
 | 
					!/crypto/des/times/486-50.sol
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Misc auto generated files
 | 
				
			||||||
 | 
					/tools/c_rehash
 | 
				
			||||||
 | 
					/test/evptests.txt
 | 
				
			||||||
 | 
					lib
 | 
				
			||||||
 | 
					Makefile.save
 | 
				
			||||||
 | 
					*.bak
 | 
				
			||||||
							
								
								
									
										30
									
								
								ACKNOWLEDGMENTS
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										30
									
								
								ACKNOWLEDGMENTS
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,30 @@
 | 
				
			|||||||
 | 
					The OpenSSL project depends on volunteer efforts and financial support from
 | 
				
			||||||
 | 
					the end user community. That support comes in the form of donations and paid
 | 
				
			||||||
 | 
					sponsorships, software support contracts, paid consulting services
 | 
				
			||||||
 | 
					and commissioned software development.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Since all these activities support the continued development and improvement
 | 
				
			||||||
 | 
					of OpenSSL we consider all these clients and customers as sponsors of the
 | 
				
			||||||
 | 
					OpenSSL project.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					We would like to identify and thank the following such sponsors for their past
 | 
				
			||||||
 | 
					or current significant support of the OpenSSL project:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Major support:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						Qualys		http://www.qualys.com/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Very significant support:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						OpenGear:	http://www.opengear.com/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Significant support:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						PSW Group:	http://www.psw.net/
 | 
				
			||||||
 | 
						Acano Ltd.	http://acano.com/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Please note that we ask permission to identify sponsors and that some sponsors
 | 
				
			||||||
 | 
					we consider eligible for inclusion here have requested to remain anonymous.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Additional sponsorship or financial support is always welcome: for more
 | 
				
			||||||
 | 
					information please contact the OpenSSL Software Foundation.
 | 
				
			||||||
							
								
								
									
										309
									
								
								FAQ
									
									
									
									
									
								
							
							
						
						
									
										309
									
								
								FAQ
									
									
									
									
									
								
							@@ -10,6 +10,7 @@ OpenSSL  -  Frequently Asked Questions
 | 
				
			|||||||
* Why aren't tools like 'autoconf' and 'libtool' used?
 | 
					* Why aren't tools like 'autoconf' and 'libtool' used?
 | 
				
			||||||
* What is an 'engine' version?
 | 
					* What is an 'engine' version?
 | 
				
			||||||
* How do I check the authenticity of the OpenSSL distribution?
 | 
					* How do I check the authenticity of the OpenSSL distribution?
 | 
				
			||||||
 | 
					* How does the versioning scheme work?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[LEGAL] Legal questions
 | 
					[LEGAL] Legal questions
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -31,6 +32,9 @@ OpenSSL  -  Frequently Asked Questions
 | 
				
			|||||||
* Why does my browser give a warning about a mismatched hostname?
 | 
					* Why does my browser give a warning about a mismatched hostname?
 | 
				
			||||||
* How do I install a CA certificate into a browser?
 | 
					* How do I install a CA certificate into a browser?
 | 
				
			||||||
* Why is OpenSSL x509 DN output not conformant to RFC2253?
 | 
					* Why is OpenSSL x509 DN output not conformant to RFC2253?
 | 
				
			||||||
 | 
					* What is a "128 bit certificate"? Can I create one with OpenSSL?
 | 
				
			||||||
 | 
					* Why does OpenSSL set the authority key identifier extension incorrectly?
 | 
				
			||||||
 | 
					* How can I set up a bundle of commercial root CA certificates?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[BUILD] Questions about building and testing OpenSSL
 | 
					[BUILD] Questions about building and testing OpenSSL
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -46,6 +50,12 @@ OpenSSL  -  Frequently Asked Questions
 | 
				
			|||||||
* Why does the OpenSSL test suite fail on MacOS X?
 | 
					* Why does the OpenSSL test suite fail on MacOS X?
 | 
				
			||||||
* Why does the OpenSSL test suite fail in BN_sqr test [on a 64-bit platform]?
 | 
					* Why does the OpenSSL test suite fail in BN_sqr test [on a 64-bit platform]?
 | 
				
			||||||
* Why does OpenBSD-i386 build fail on des-586.s with "Unimplemented segment type"?
 | 
					* Why does OpenBSD-i386 build fail on des-586.s with "Unimplemented segment type"?
 | 
				
			||||||
 | 
					* Why does the OpenSSL test suite fail in sha512t on x86 CPU?
 | 
				
			||||||
 | 
					* Why does compiler fail to compile sha512.c?
 | 
				
			||||||
 | 
					* Test suite still fails, what to do?
 | 
				
			||||||
 | 
					* I think I've found a bug, what should I do?
 | 
				
			||||||
 | 
					* I'm SURE I've found a bug, how do I report it?
 | 
				
			||||||
 | 
					* I've found a security issue, how do I report it?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[PROG] Questions about programming with OpenSSL
 | 
					[PROG] Questions about programming with OpenSSL
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -62,6 +72,9 @@ OpenSSL  -  Frequently Asked Questions
 | 
				
			|||||||
* Why doesn't my server application receive a client certificate?
 | 
					* Why doesn't my server application receive a client certificate?
 | 
				
			||||||
* Why does compilation fail due to an undefined symbol NID_uniqueIdentifier?
 | 
					* Why does compilation fail due to an undefined symbol NID_uniqueIdentifier?
 | 
				
			||||||
* I think I've detected a memory leak, is this a bug?
 | 
					* I think I've detected a memory leak, is this a bug?
 | 
				
			||||||
 | 
					* Why does Valgrind complain about the use of uninitialized data?
 | 
				
			||||||
 | 
					* Why doesn't a memory BIO work when a file does?
 | 
				
			||||||
 | 
					* Where are the declarations and implementations of d2i_X509() etc?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
===============================================================================
 | 
					===============================================================================
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -70,11 +83,11 @@ OpenSSL  -  Frequently Asked Questions
 | 
				
			|||||||
* Which is the current version of OpenSSL?
 | 
					* Which is the current version of OpenSSL?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
The current version is available from <URL: http://www.openssl.org>.
 | 
					The current version is available from <URL: http://www.openssl.org>.
 | 
				
			||||||
OpenSSL 0.9.7g was released on April 11, 2005.
 | 
					OpenSSL 1.0.1d was released on Feb 5th, 2013.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
In addition to the current stable release, you can also access daily
 | 
					In addition to the current stable release, you can also access daily
 | 
				
			||||||
snapshots of the OpenSSL development version at <URL:
 | 
					snapshots of the OpenSSL development version at <URL:
 | 
				
			||||||
ftp://ftp.openssl.org/snapshot/>, or get it by anonymous CVS access.
 | 
					ftp://ftp.openssl.org/snapshot/>, or get it by anonymous Git access.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* Where is the documentation?
 | 
					* Where is the documentation?
 | 
				
			||||||
@@ -86,19 +99,19 @@ explains how to install this library.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
OpenSSL includes a command line utility that can be used to perform a
 | 
					OpenSSL includes a command line utility that can be used to perform a
 | 
				
			||||||
variety of cryptographic functions.  It is described in the openssl(1)
 | 
					variety of cryptographic functions.  It is described in the openssl(1)
 | 
				
			||||||
manpage.  Documentation for developers is currently being written.  A
 | 
					manpage.  Documentation for developers is currently being written. Many
 | 
				
			||||||
few manual pages already are available; overviews over libcrypto and
 | 
					manual pages are available; overviews over libcrypto and
 | 
				
			||||||
libssl are given in the crypto(3) and ssl(3) manpages.
 | 
					libssl are given in the crypto(3) and ssl(3) manpages.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
The OpenSSL manpages are installed in /usr/local/ssl/man/ (or a
 | 
					The OpenSSL manpages are installed in /usr/local/ssl/man/ (or a
 | 
				
			||||||
different directory if you specified one as described in INSTALL).
 | 
					different directory if you specified one as described in INSTALL).
 | 
				
			||||||
In addition, you can read the most current versions at
 | 
					In addition, you can read the most current versions at
 | 
				
			||||||
<URL: http://www.openssl.org/docs/>.
 | 
					<URL: http://www.openssl.org/docs/>. Note that the online documents refer
 | 
				
			||||||
 | 
					to the very latest development versions of OpenSSL and may include features
 | 
				
			||||||
For information on parts of libcrypto that are not yet documented, you
 | 
					not present in released versions. If in doubt refer to the documentation
 | 
				
			||||||
might want to read Ariel Glenn's documentation on SSLeay 0.9, OpenSSL's
 | 
					that came with the version of OpenSSL you are using. The pod format
 | 
				
			||||||
predecessor, at <URL: http://www.columbia.edu/~ariel/ssleay/>.  Much
 | 
					documentation is included in each OpenSSL distribution under the docs
 | 
				
			||||||
of this still applies to OpenSSL.
 | 
					directory.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
There is some documentation about certificate extensions and PKCS#12
 | 
					There is some documentation about certificate extensions and PKCS#12
 | 
				
			||||||
in doc/openssl.txt
 | 
					in doc/openssl.txt
 | 
				
			||||||
@@ -119,7 +132,7 @@ OpenSSL.  Information on the OpenSSL mailing lists is available from
 | 
				
			|||||||
* Where can I get a compiled version of OpenSSL?
 | 
					* Where can I get a compiled version of OpenSSL?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
You can finder pointers to binary distributions in
 | 
					You can finder pointers to binary distributions in
 | 
				
			||||||
http://www.openssl.org/related/binaries.html .
 | 
					<URL: http://www.openssl.org/related/binaries.html> .
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Some applications that use OpenSSL are distributed in binary form.
 | 
					Some applications that use OpenSSL are distributed in binary form.
 | 
				
			||||||
When using such an application, you don't need to install OpenSSL
 | 
					When using such an application, you don't need to install OpenSSL
 | 
				
			||||||
@@ -152,11 +165,25 @@ Use MD5 to check that a tarball from a mirror site is identical:
 | 
				
			|||||||
   md5sum TARBALL | awk '{print $1;}' | cmp - TARBALL.md5
 | 
					   md5sum TARBALL | awk '{print $1;}' | cmp - TARBALL.md5
 | 
				
			||||||
 | 
					
 | 
				
			||||||
You can check authenticity using pgp or gpg. You need the OpenSSL team
 | 
					You can check authenticity using pgp or gpg. You need the OpenSSL team
 | 
				
			||||||
member public key used to sign it (download it from a key server). Then
 | 
					member public key used to sign it (download it from a key server, see a
 | 
				
			||||||
 | 
					list of keys at <URL: http://www.openssl.org/about/>). Then
 | 
				
			||||||
just do:
 | 
					just do:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
   pgp TARBALL.asc
 | 
					   pgp TARBALL.asc
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* How does the versioning scheme work?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter 
 | 
				
			||||||
 | 
					releases (e.g. 1.0.1a) can only contain bug and security fixes and no
 | 
				
			||||||
 | 
					new features. Minor releases change the last number (e.g. 1.0.2) and 
 | 
				
			||||||
 | 
					can contain new features that retain binary compatibility. Changes to
 | 
				
			||||||
 | 
					the middle number are considered major releases and neither source nor
 | 
				
			||||||
 | 
					binary compatibility is guaranteed.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Therefore the answer to the common question "when will feature X be
 | 
				
			||||||
 | 
					backported to OpenSSL 1.0.0/0.9.8?" is "never" but it could appear
 | 
				
			||||||
 | 
					in the next minor release.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[LEGAL] =======================================================================
 | 
					[LEGAL] =======================================================================
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* Do I need patent licenses to use OpenSSL?
 | 
					* Do I need patent licenses to use OpenSSL?
 | 
				
			||||||
@@ -166,8 +193,8 @@ you if you want to use OpenSSL.  For information on intellectual
 | 
				
			|||||||
property rights, please consult a lawyer.  The OpenSSL team does not
 | 
					property rights, please consult a lawyer.  The OpenSSL team does not
 | 
				
			||||||
offer legal advice.
 | 
					offer legal advice.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
You can configure OpenSSL so as not to use RC5 and IDEA by using
 | 
					You can configure OpenSSL so as not to use IDEA, MDC2 and RC5 by using
 | 
				
			||||||
 ./config no-rc5 no-idea
 | 
					 ./config no-idea no-mdc2 no-rc5
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* Can I use OpenSSL with GPL software?
 | 
					* Can I use OpenSSL with GPL software?
 | 
				
			||||||
@@ -268,7 +295,7 @@ current directory in this case, but this has changed with 0.9.6a.)
 | 
				
			|||||||
Check out the CA.pl(1) manual page. This provides a simple wrapper round
 | 
					Check out the CA.pl(1) manual page. This provides a simple wrapper round
 | 
				
			||||||
the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
 | 
					the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
 | 
				
			||||||
out the manual pages for the individual utilities and the certificate
 | 
					out the manual pages for the individual utilities and the certificate
 | 
				
			||||||
extensions documentation (currently in doc/openssl.txt).
 | 
					extensions documentation (in ca(1), req(1), x509v3_config(5) )
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* Why can't I create certificate requests?
 | 
					* Why can't I create certificate requests?
 | 
				
			||||||
@@ -383,6 +410,76 @@ interface, the "-nameopt" option could be introduded. See the manual
 | 
				
			|||||||
page of the "openssl x509" commandline tool for details. The old behaviour
 | 
					page of the "openssl x509" commandline tool for details. The old behaviour
 | 
				
			||||||
has however been left as default for the sake of compatibility.
 | 
					has however been left as default for the sake of compatibility.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* What is a "128 bit certificate"? Can I create one with OpenSSL?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The term "128 bit certificate" is a highly misleading marketing term. It does
 | 
				
			||||||
 | 
					*not* refer to the size of the public key in the certificate! A certificate
 | 
				
			||||||
 | 
					containing a 128 bit RSA key would have negligible security.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					There were various other names such as "magic certificates", "SGC
 | 
				
			||||||
 | 
					certificates", "step up certificates" etc.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					You can't generally create such a certificate using OpenSSL but there is no
 | 
				
			||||||
 | 
					need to any more. Nowadays web browsers using unrestricted strong encryption
 | 
				
			||||||
 | 
					are generally available.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					When there were tight restrictions on the export of strong encryption
 | 
				
			||||||
 | 
					software from the US only weak encryption algorithms could be freely exported
 | 
				
			||||||
 | 
					(initially 40 bit and then 56 bit). It was widely recognised that this was
 | 
				
			||||||
 | 
					inadequate. A relaxation of the rules allowed the use of strong encryption but
 | 
				
			||||||
 | 
					only to an authorised server.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Two slighly different techniques were developed to support this, one used by
 | 
				
			||||||
 | 
					Netscape was called "step up", the other used by MSIE was called "Server Gated
 | 
				
			||||||
 | 
					Cryptography" (SGC). When a browser initially connected to a server it would
 | 
				
			||||||
 | 
					check to see if the certificate contained certain extensions and was issued by
 | 
				
			||||||
 | 
					an authorised authority. If these test succeeded it would reconnect using
 | 
				
			||||||
 | 
					strong encryption.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Only certain (initially one) certificate authorities could issue the
 | 
				
			||||||
 | 
					certificates and they generally cost more than ordinary certificates.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Although OpenSSL can create certificates containing the appropriate extensions
 | 
				
			||||||
 | 
					the certificate would not come from a permitted authority and so would not
 | 
				
			||||||
 | 
					be recognized.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The export laws were later changed to allow almost unrestricted use of strong
 | 
				
			||||||
 | 
					encryption so these certificates are now obsolete.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why does OpenSSL set the authority key identifier (AKID) extension incorrectly?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					It doesn't: this extension is often the cause of confusion.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Consider a certificate chain A->B->C so that A signs B and B signs C. Suppose
 | 
				
			||||||
 | 
					certificate C contains AKID.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The purpose of this extension is to identify the authority certificate B. This
 | 
				
			||||||
 | 
					can be done either by including the subject key identifier of B or its issuer
 | 
				
			||||||
 | 
					name and serial number.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					In this latter case because it is identifying certifcate B it must contain the
 | 
				
			||||||
 | 
					issuer name and serial number of B.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					It is often wrongly assumed that it should contain the subject name of B. If it
 | 
				
			||||||
 | 
					did this would be redundant information because it would duplicate the issuer
 | 
				
			||||||
 | 
					name of C.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* How can I set up a bundle of commercial root CA certificates?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The OpenSSL software is shipped without any root CA certificate as the
 | 
				
			||||||
 | 
					OpenSSL project does not have any policy on including or excluding
 | 
				
			||||||
 | 
					any specific CA and does not intend to set up such a policy. Deciding
 | 
				
			||||||
 | 
					about which CAs to support is up to application developers or
 | 
				
			||||||
 | 
					administrators.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Other projects do have other policies so you can for example extract the CA
 | 
				
			||||||
 | 
					bundle used by Mozilla and/or modssl as described in this article:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  <URL: http://www.mail-archive.com/modssl-users@modssl.org/msg16980.html>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[BUILD] =======================================================================
 | 
					[BUILD] =======================================================================
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* Why does the linker complain about undefined symbols?
 | 
					* Why does the linker complain about undefined symbols?
 | 
				
			||||||
@@ -422,7 +519,7 @@ when you run the test suite (using "make test").  The message returned is
 | 
				
			|||||||
"bc: 1 not implemented".
 | 
					"bc: 1 not implemented".
 | 
				
			||||||
 | 
					
 | 
				
			||||||
The best way to deal with this is to find another implementation of bc
 | 
					The best way to deal with this is to find another implementation of bc
 | 
				
			||||||
and compile/install it.  GNU bc (see http://www.gnu.org/software/software.html
 | 
					and compile/install it.  GNU bc (see <URL: http://www.gnu.org/software/software.html>
 | 
				
			||||||
for download instructions) can be safely used, for example.
 | 
					for download instructions) can be safely used, for example.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -433,7 +530,7 @@ that the OpenSSL bntest throws at it.  This gets triggered when you run the
 | 
				
			|||||||
test suite (using "make test").  The message returned is "bc: stack empty".
 | 
					test suite (using "make test").  The message returned is "bc: stack empty".
 | 
				
			||||||
 | 
					
 | 
				
			||||||
The best way to deal with this is to find another implementation of bc
 | 
					The best way to deal with this is to find another implementation of bc
 | 
				
			||||||
and compile/install it.  GNU bc (see http://www.gnu.org/software/software.html
 | 
					and compile/install it.  GNU bc (see <URL: http://www.gnu.org/software/software.html>
 | 
				
			||||||
for download instructions) can be safely used, for example.
 | 
					for download instructions) can be safely used, for example.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -462,7 +559,7 @@ get the best result from OpenSSL.  A bit more complicated solution is the
 | 
				
			|||||||
following:
 | 
					following:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
----- snip:start -----
 | 
					----- snip:start -----
 | 
				
			||||||
  make DIRS=crypto SDIRS=sha "`grep '^CFLAG=' Makefile | \
 | 
					  make DIRS=crypto SDIRS=sha "`grep '^CFLAG=' Makefile.ssl | \
 | 
				
			||||||
       sed -e 's/ -O[0-9] / -O0 /'`"
 | 
					       sed -e 's/ -O[0-9] / -O0 /'`"
 | 
				
			||||||
  rm `ls crypto/*.o crypto/sha/*.o | grep -v 'sha_dgst\.o'`
 | 
					  rm `ls crypto/*.o crypto/sha/*.o | grep -v 'sha_dgst\.o'`
 | 
				
			||||||
  make
 | 
					  make
 | 
				
			||||||
@@ -597,6 +694,78 @@ Reportedly elder *BSD a.out platforms also suffer from this problem and
 | 
				
			|||||||
remedy should be same. Provided binary is statically linked and should be
 | 
					remedy should be same. Provided binary is statically linked and should be
 | 
				
			||||||
working across wider range of *BSD branches, not just OpenBSD.
 | 
					working across wider range of *BSD branches, not just OpenBSD.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why does the OpenSSL test suite fail in sha512t on x86 CPU?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					If the test program in question fails withs SIGILL, Illegal Instruction
 | 
				
			||||||
 | 
					exception, then you more than likely to run SSE2-capable CPU, such as
 | 
				
			||||||
 | 
					Intel P4, under control of kernel which does not support SSE2
 | 
				
			||||||
 | 
					instruction extentions. See accompanying INSTALL file and
 | 
				
			||||||
 | 
					OPENSSL_ia32cap(3) documentation page for further information.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why does compiler fail to compile sha512.c?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OpenSSL SHA-512 implementation depends on compiler support for 64-bit
 | 
				
			||||||
 | 
					integer type. Few elder compilers [ULTRIX cc, SCO compiler to mention a
 | 
				
			||||||
 | 
					couple] lack support for this and therefore are incapable of compiling
 | 
				
			||||||
 | 
					the module in question. The recommendation is to disable SHA-512 by
 | 
				
			||||||
 | 
					adding no-sha512 to ./config [or ./Configure] command line. Another
 | 
				
			||||||
 | 
					possible alternative might be to switch to GCC.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Test suite still fails, what to do?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Another common reason for failure to complete some particular test is
 | 
				
			||||||
 | 
					simply bad code generated by a buggy component in toolchain or deficiency
 | 
				
			||||||
 | 
					in run-time environment. There are few cases documented in PROBLEMS file,
 | 
				
			||||||
 | 
					consult it for possible workaround before you beat the drum. Even if you
 | 
				
			||||||
 | 
					don't find solution or even mention there, do reserve for possibility of
 | 
				
			||||||
 | 
					a compiler bug. Compiler bugs might appear in rather bizarre ways, they
 | 
				
			||||||
 | 
					never make sense, and tend to emerge when you least expect them. In order
 | 
				
			||||||
 | 
					to identify one, drop optimization level, e.g. by editing CFLAG line in
 | 
				
			||||||
 | 
					top-level Makefile, recompile and re-run the test.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* I think I've found a bug, what should I do?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					If you are a new user then it is quite likely you haven't found a bug and
 | 
				
			||||||
 | 
					something is happening you aren't familiar with. Check this FAQ, the associated
 | 
				
			||||||
 | 
					documentation and the mailing lists for similar queries. If you are still
 | 
				
			||||||
 | 
					unsure whether it is a bug or not submit a query to the openssl-users mailing
 | 
				
			||||||
 | 
					list.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* I'm SURE I've found a bug, how do I report it?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Bug reports with no security implications should be sent to the request
 | 
				
			||||||
 | 
					tracker. This can be done by mailing the report to <rt@openssl.org> (or its
 | 
				
			||||||
 | 
					alias <openssl-bugs@openssl.org>), please note that messages sent to the
 | 
				
			||||||
 | 
					request tracker also appear in the public openssl-dev mailing list.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The report should be in plain text. Any patches should be sent as
 | 
				
			||||||
 | 
					plain text attachments because some mailers corrupt patches sent inline.
 | 
				
			||||||
 | 
					If your issue affects multiple versions of OpenSSL check any patches apply
 | 
				
			||||||
 | 
					cleanly and, if possible include patches to each affected version.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The report should be given a meaningful subject line briefly summarising the
 | 
				
			||||||
 | 
					issue. Just "bug in OpenSSL" or "bug in OpenSSL 0.9.8n" is not very helpful.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					By sending reports to the request tracker the bug can then be given a priority
 | 
				
			||||||
 | 
					and assigned to the appropriate maintainer. The history of discussions can be
 | 
				
			||||||
 | 
					accessed and if the issue has been addressed or a reason why not. If patches
 | 
				
			||||||
 | 
					are only sent to openssl-dev they can be mislaid if a team member has to
 | 
				
			||||||
 | 
					wade through months of old messages to review the discussion.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					See also <URL: http://www.openssl.org/support/rt.html>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* I've found a security issue, how do I report it?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					If you think your bug has security implications then please send it to
 | 
				
			||||||
 | 
					openssl-security@openssl.org if you don't get a prompt reply at least 
 | 
				
			||||||
 | 
					acknowledging receipt then resend or mail it directly to one of the
 | 
				
			||||||
 | 
					more active team members (e.g. Steve).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Note that bugs only present in the openssl utility are not in general
 | 
				
			||||||
 | 
					considered to be security issues. 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[PROG] ========================================================================
 | 
					[PROG] ========================================================================
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* Is OpenSSL thread-safe?
 | 
					* Is OpenSSL thread-safe?
 | 
				
			||||||
@@ -608,8 +777,11 @@ libraries.  If your platform is not one of these, consult the INSTALL
 | 
				
			|||||||
file.
 | 
					file.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Multi-threaded applications must provide two callback functions to
 | 
					Multi-threaded applications must provide two callback functions to
 | 
				
			||||||
OpenSSL.  This is described in the threads(3) manpage.
 | 
					OpenSSL by calling CRYPTO_set_locking_callback() and
 | 
				
			||||||
 | 
					CRYPTO_set_id_callback(), for all versions of OpenSSL up to and
 | 
				
			||||||
 | 
					including 0.9.8[abc...]. As of version 1.0.0, CRYPTO_set_id_callback()
 | 
				
			||||||
 | 
					and associated APIs are deprecated by CRYPTO_THREADID_set_callback()
 | 
				
			||||||
 | 
					and friends. This is described in the threads(3) manpage.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* I've compiled a program under Windows and it crashes: why?
 | 
					* I've compiled a program under Windows and it crashes: why?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -629,10 +801,10 @@ your application must link  against the same by which OpenSSL was
 | 
				
			|||||||
built.  If you are using MS Visual C++ (Studio) this can be changed
 | 
					built.  If you are using MS Visual C++ (Studio) this can be changed
 | 
				
			||||||
by:
 | 
					by:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
1.  Select Settings... from the Project Menu.
 | 
					 1. Select Settings... from the Project Menu.
 | 
				
			||||||
2.  Select the C/C++ Tab.
 | 
					 2. Select the C/C++ Tab.
 | 
				
			||||||
3.  Select "Code Generation from the "Category" drop down list box
 | 
					 3. Select "Code Generation from the "Category" drop down list box
 | 
				
			||||||
4.  Select the Appropriate library (see table below) from the "Use
 | 
					 4. Select the Appropriate library (see table below) from the "Use
 | 
				
			||||||
    run-time library" drop down list box.  Perform this step for both
 | 
					    run-time library" drop down list box.  Perform this step for both
 | 
				
			||||||
    your debug and release versions of your application (look at the
 | 
					    your debug and release versions of your application (look at the
 | 
				
			||||||
    top left of the settings panel to change between the two)
 | 
					    top left of the settings panel to change between the two)
 | 
				
			||||||
@@ -651,30 +823,44 @@ by:
 | 
				
			|||||||
Note that debug and release libraries are NOT interchangeable.  If you
 | 
					Note that debug and release libraries are NOT interchangeable.  If you
 | 
				
			||||||
built OpenSSL with /MD your application must use /MD and cannot use /MDd.
 | 
					built OpenSSL with /MD your application must use /MD and cannot use /MDd.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					As per 0.9.8 the above limitation is eliminated for .DLLs. OpenSSL
 | 
				
			||||||
 | 
					.DLLs compiled with some specific run-time option [we insist on the
 | 
				
			||||||
 | 
					default /MD] can be deployed with application compiled with different
 | 
				
			||||||
 | 
					option or even different compiler. But there is a catch! Instead of
 | 
				
			||||||
 | 
					re-compiling OpenSSL toolkit, as you would have to with prior versions,
 | 
				
			||||||
 | 
					you have to compile small C snippet with compiler and/or options of
 | 
				
			||||||
 | 
					your choice. The snippet gets installed as
 | 
				
			||||||
 | 
					<install-root>/include/openssl/applink.c and should be either added to
 | 
				
			||||||
 | 
					your application project or simply #include-d in one [and only one]
 | 
				
			||||||
 | 
					of your application source files. Failure to link this shim module
 | 
				
			||||||
 | 
					into your application manifests itself as fatal "no OPENSSL_Applink"
 | 
				
			||||||
 | 
					run-time error. An explicit reminder is due that in this situation
 | 
				
			||||||
 | 
					[mixing compiler options] it is as important to add CRYPTO_malloc_init
 | 
				
			||||||
 | 
					prior first call to OpenSSL.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* How do I read or write a DER encoded buffer using the ASN1 functions?
 | 
					* How do I read or write a DER encoded buffer using the ASN1 functions?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
You have two options. You can either use a memory BIO in conjunction
 | 
					You have two options. You can either use a memory BIO in conjunction
 | 
				
			||||||
with the i2d_XXX_bio() or d2i_XXX_bio() functions or you can use the
 | 
					with the i2d_*_bio() or d2i_*_bio() functions or you can use the
 | 
				
			||||||
i2d_XXX(), d2i_XXX() functions directly. Since these are often the
 | 
					i2d_*(), d2i_*() functions directly. Since these are often the
 | 
				
			||||||
cause of grief here are some code fragments using PKCS7 as an example:
 | 
					cause of grief here are some code fragments using PKCS7 as an example:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
unsigned char *buf, *p;
 | 
					 unsigned char *buf, *p;
 | 
				
			||||||
int len;
 | 
					 int len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
len = i2d_PKCS7(p7, NULL);
 | 
					 len = i2d_PKCS7(p7, NULL);
 | 
				
			||||||
buf = OPENSSL_malloc(len); /* or Malloc, error checking omitted */
 | 
					 buf = OPENSSL_malloc(len); /* or Malloc, error checking omitted */
 | 
				
			||||||
p = buf;
 | 
					 p = buf;
 | 
				
			||||||
i2d_PKCS7(p7, &p);
 | 
					 i2d_PKCS7(p7, &p);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
At this point buf contains the len bytes of the DER encoding of
 | 
					At this point buf contains the len bytes of the DER encoding of
 | 
				
			||||||
p7.
 | 
					p7.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
The opposite assumes we already have len bytes in buf:
 | 
					The opposite assumes we already have len bytes in buf:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
unsigned char *p;
 | 
					 unsigned char *p;
 | 
				
			||||||
p = buf;
 | 
					 p = buf;
 | 
				
			||||||
p7 = d2i_PKCS7(NULL, &p, len);
 | 
					 p7 = d2i_PKCS7(NULL, &p, len);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
At this point p7 contains a valid PKCS7 structure of NULL if an error
 | 
					At this point p7 contains a valid PKCS7 structure of NULL if an error
 | 
				
			||||||
occurred. If an error occurred ERR_print_errors(bio) should give more
 | 
					occurred. If an error occurred ERR_print_errors(bio) should give more
 | 
				
			||||||
@@ -736,11 +922,11 @@ code itself (the hex digits after the second colon).
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
* Why do I get errors about unknown algorithms?
 | 
					* Why do I get errors about unknown algorithms?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
This can happen under several circumstances such as reading in an
 | 
					The cause is forgetting to load OpenSSL's table of algorithms with
 | 
				
			||||||
encrypted private key or attempting to decrypt a PKCS#12 file. The cause
 | 
					OpenSSL_add_all_algorithms(). See the manual page for more information. This
 | 
				
			||||||
is forgetting to load OpenSSL's table of algorithms with
 | 
					can cause several problems such as being unable to read in an encrypted
 | 
				
			||||||
OpenSSL_add_all_algorithms(). See the manual page for more information.
 | 
					PEM file, unable to decrypt a PKCS#12 file or signature failure when
 | 
				
			||||||
 | 
					verifying certificates.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* Why can't the OpenSSH configure script detect OpenSSL?
 | 
					* Why can't the OpenSSH configure script detect OpenSSL?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -808,5 +994,46 @@ thread-safe):
 | 
				
			|||||||
  ERR_free_strings(), EVP_cleanup() and CRYPTO_cleanup_all_ex_data().
 | 
					  ERR_free_strings(), EVP_cleanup() and CRYPTO_cleanup_all_ex_data().
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
===============================================================================
 | 
					* Why does Valgrind complain about the use of uninitialized data?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					When OpenSSL's PRNG routines are called to generate random numbers the supplied
 | 
				
			||||||
 | 
					buffer contents are mixed into the entropy pool: so it technically does not
 | 
				
			||||||
 | 
					matter whether the buffer is initialized at this point or not.  Valgrind (and
 | 
				
			||||||
 | 
					other test tools) will complain about this. When using Valgrind, make sure the
 | 
				
			||||||
 | 
					OpenSSL library has been compiled with the PURIFY macro defined (-DPURIFY)
 | 
				
			||||||
 | 
					to get rid of these warnings.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why doesn't a memory BIO work when a file does?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					This can occur in several cases for example reading an S/MIME email message.
 | 
				
			||||||
 | 
					The reason is that a memory BIO can do one of two things when all the data
 | 
				
			||||||
 | 
					has been read from it.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The default behaviour is to indicate that no more data is available and that
 | 
				
			||||||
 | 
					the call should be retried, this is to allow the application to fill up the BIO
 | 
				
			||||||
 | 
					again if necessary.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Alternatively it can indicate that no more data is available and that EOF has
 | 
				
			||||||
 | 
					been reached.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					If a memory BIO is to behave in the same way as a file this second behaviour
 | 
				
			||||||
 | 
					is needed. This must be done by calling:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   BIO_set_mem_eof_return(bio, 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					See the manual pages for more details.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Where are the declarations and implementations of d2i_X509() etc?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					These are defined and implemented by macros of the form:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 DECLARE_ASN1_FUNCTIONS(X509) and IMPLEMENT_ASN1_FUNCTIONS(X509)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The implementation passes an ASN1 "template" defining the structure into an
 | 
				
			||||||
 | 
					ASN1 interpreter using generalised functions such as ASN1_item_d2i().
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					===============================================================================
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										44
									
								
								INSTALL
									
									
									
									
									
								
							
							
						
						
									
										44
									
								
								INSTALL
									
									
									
									
									
								
							@@ -2,8 +2,10 @@
 | 
				
			|||||||
 INSTALLATION ON THE UNIX PLATFORM
 | 
					 INSTALLATION ON THE UNIX PLATFORM
 | 
				
			||||||
 ---------------------------------
 | 
					 ---------------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 [Installation on DOS (with djgpp), Windows, OpenVMS and MacOS (before MacOS X)
 | 
					 [Installation on DOS (with djgpp), Windows, OpenVMS, MacOS (before MacOS X)
 | 
				
			||||||
  is described in INSTALL.DJGPP, INSTALL.W32, INSTALL.VMS and INSTALL.MacOS.
 | 
					  and NetWare is described in INSTALL.DJGPP, INSTALL.W32, INSTALL.VMS,
 | 
				
			||||||
 | 
					  INSTALL.MacOS and INSTALL.NW.
 | 
				
			||||||
 | 
					  
 | 
				
			||||||
  This document describes installation on operating systems in the Unix
 | 
					  This document describes installation on operating systems in the Unix
 | 
				
			||||||
  family.]
 | 
					  family.]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -73,14 +75,30 @@
 | 
				
			|||||||
  no-asm        Do not use assembler code.
 | 
					  no-asm        Do not use assembler code.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  386           Use the 80386 instruction set only (the default x86 code is
 | 
					  386           Use the 80386 instruction set only (the default x86 code is
 | 
				
			||||||
                more efficient, but requires at least a 486).
 | 
					                more efficient, but requires at least a 486). Note: Use
 | 
				
			||||||
 | 
					                compiler flags for any other CPU specific configuration,
 | 
				
			||||||
 | 
					                e.g. "-m32" to build x86 code on an x64 system.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  no-sse2	Exclude SSE2 code pathes. Normally SSE2 extention is
 | 
				
			||||||
 | 
							detected at run-time, but the decision whether or not the
 | 
				
			||||||
 | 
							machine code will be executed is taken solely on CPU
 | 
				
			||||||
 | 
							capability vector. This means that if you happen to run OS
 | 
				
			||||||
 | 
							kernel which does not support SSE2 extension on Intel P4
 | 
				
			||||||
 | 
							processor, then your application might be exposed to
 | 
				
			||||||
 | 
							"illegal instruction" exception. There might be a way
 | 
				
			||||||
 | 
							to enable support in kernel, e.g. FreeBSD kernel can be
 | 
				
			||||||
 | 
							compiled with CPU_ENABLE_SSE, and there is a way to
 | 
				
			||||||
 | 
							disengage SSE2 code pathes upon application start-up,
 | 
				
			||||||
 | 
							but if you aim for wider "audience" running such kernel,
 | 
				
			||||||
 | 
							consider no-sse2. Both 386 and no-asm options above imply
 | 
				
			||||||
 | 
							no-sse2.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  no-<cipher>   Build without the specified cipher (bf, cast, des, dh, dsa,
 | 
					  no-<cipher>   Build without the specified cipher (bf, cast, des, dh, dsa,
 | 
				
			||||||
                hmac, md2, md5, mdc2, rc2, rc4, rc5, rsa, sha).
 | 
					                hmac, md2, md5, mdc2, rc2, rc4, rc5, rsa, sha).
 | 
				
			||||||
                The crypto/<cipher> directory can be removed after running
 | 
					                The crypto/<cipher> directory can be removed after running
 | 
				
			||||||
                "make depend".
 | 
					                "make depend".
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  -Dxxx, -lxxx, -Lxxx, -fxxx, -Kxxx These system specific options will
 | 
					  -Dxxx, -lxxx, -Lxxx, -fxxx, -mxxx, -Kxxx These system specific options will
 | 
				
			||||||
                be passed through to the compiler to allow you to
 | 
					                be passed through to the compiler to allow you to
 | 
				
			||||||
                define preprocessor symbols, specify additional libraries,
 | 
					                define preprocessor symbols, specify additional libraries,
 | 
				
			||||||
                library directories or other compiler options.
 | 
					                library directories or other compiler options.
 | 
				
			||||||
@@ -123,7 +141,7 @@
 | 
				
			|||||||
     generic configurations "cc" or "gcc" should usually work on 32 bit
 | 
					     generic configurations "cc" or "gcc" should usually work on 32 bit
 | 
				
			||||||
     systems.
 | 
					     systems.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
     Configure creates the file Makefile from Makefile.org and
 | 
					     Configure creates the file Makefile.ssl from Makefile.org and
 | 
				
			||||||
     defines various macros in crypto/opensslconf.h (generated from
 | 
					     defines various macros in crypto/opensslconf.h (generated from
 | 
				
			||||||
     crypto/opensslconf.h.in).
 | 
					     crypto/opensslconf.h.in).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -140,7 +158,7 @@
 | 
				
			|||||||
     standard headers).  If it is a problem with OpenSSL itself, please
 | 
					     standard headers).  If it is a problem with OpenSSL itself, please
 | 
				
			||||||
     report the problem to <openssl-bugs@openssl.org> (note that your
 | 
					     report the problem to <openssl-bugs@openssl.org> (note that your
 | 
				
			||||||
     message will be recorded in the request tracker publicly readable
 | 
					     message will be recorded in the request tracker publicly readable
 | 
				
			||||||
     via http://www.openssl.org/support/rt2.html and will be forwarded to a
 | 
					     via http://www.openssl.org/support/rt.html and will be forwarded to a
 | 
				
			||||||
     public mailing list). Include the output of "make report" in your message.
 | 
					     public mailing list). Include the output of "make report" in your message.
 | 
				
			||||||
     Please check out the request tracker. Maybe the bug was already
 | 
					     Please check out the request tracker. Maybe the bug was already
 | 
				
			||||||
     reported or has already been fixed.
 | 
					     reported or has already been fixed.
 | 
				
			||||||
@@ -159,10 +177,10 @@
 | 
				
			|||||||
     the failure that isn't a problem in OpenSSL itself (like a missing
 | 
					     the failure that isn't a problem in OpenSSL itself (like a missing
 | 
				
			||||||
     or malfunctioning bc).  If it is a problem with OpenSSL itself,
 | 
					     or malfunctioning bc).  If it is a problem with OpenSSL itself,
 | 
				
			||||||
     try removing any compiler optimization flags from the CFLAG line
 | 
					     try removing any compiler optimization flags from the CFLAG line
 | 
				
			||||||
     in Makefile and run "make clean; make". Please send a bug
 | 
					     in Makefile.ssl and run "make clean; make". Please send a bug
 | 
				
			||||||
     report to <openssl-bugs@openssl.org>, including the output of
 | 
					     report to <openssl-bugs@openssl.org>, including the output of
 | 
				
			||||||
     "make report" in order to be added to the request tracker at
 | 
					     "make report" in order to be added to the request tracker at
 | 
				
			||||||
     http://www.openssl.org/support/rt2.html.
 | 
					     http://www.openssl.org/support/rt.html.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  4. If everything tests ok, install OpenSSL with
 | 
					  4. If everything tests ok, install OpenSSL with
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -284,10 +302,10 @@
 | 
				
			|||||||
 Note on shared libraries
 | 
					 Note on shared libraries
 | 
				
			||||||
 ------------------------
 | 
					 ------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Shared library is currently an experimental feature.  The only reason to
 | 
					 Shared libraries have certain caveats.  Binary backward compatibility
 | 
				
			||||||
 have them would be to conserve memory on systems where several program
 | 
					 can't be guaranteed before OpenSSL version 1.0.  The only reason to
 | 
				
			||||||
 are using OpenSSL.  Binary backward compatibility can't be guaranteed
 | 
					 use them would be to conserve memory on systems where several programs
 | 
				
			||||||
 before OpenSSL version 1.0.
 | 
					 are using OpenSSL.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 For some systems, the OpenSSL Configure script knows what is needed to
 | 
					 For some systems, the OpenSSL Configure script knows what is needed to
 | 
				
			||||||
 build shared libraries for libcrypto and libssl.  On these systems,
 | 
					 build shared libraries for libcrypto and libssl.  On these systems,
 | 
				
			||||||
@@ -312,7 +330,7 @@
 | 
				
			|||||||
 Note on support for multiple builds
 | 
					 Note on support for multiple builds
 | 
				
			||||||
 -----------------------------------
 | 
					 -----------------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 OpenSSL is usually built in it's source tree.  Unfortunately, this doesn't
 | 
					 OpenSSL is usually built in its source tree.  Unfortunately, this doesn't
 | 
				
			||||||
 support building for multiple platforms from the same source tree very well.
 | 
					 support building for multiple platforms from the same source tree very well.
 | 
				
			||||||
 It is however possible to build in a separate tree through the use of lots
 | 
					 It is however possible to build in a separate tree through the use of lots
 | 
				
			||||||
 of symbolic links, which should be prepared like this:
 | 
					 of symbolic links, which should be prepared like this:
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										454
									
								
								INSTALL.NW
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										454
									
								
								INSTALL.NW
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,454 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 | 
					INSTALLATION ON THE NETWARE PLATFORM
 | 
				
			||||||
 | 
					------------------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Notes about building OpenSSL for NetWare.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					BUILD PLATFORM:
 | 
				
			||||||
 | 
					---------------
 | 
				
			||||||
 | 
					The build scripts (batch files, perl scripts, etc) have been developed and
 | 
				
			||||||
 | 
					tested on W2K.  The scripts should run fine on other Windows platforms
 | 
				
			||||||
 | 
					(NT, Win9x, WinXP) but they have not been tested.  They may require some
 | 
				
			||||||
 | 
					modifications.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Supported NetWare Platforms - NetWare 5.x, NetWare 6.x:
 | 
				
			||||||
 | 
					-------------------------------------------------------
 | 
				
			||||||
 | 
					OpenSSL can either use the WinSock interfaces introduced in NetWare 5,
 | 
				
			||||||
 | 
					or the BSD socket interface.  Previous versions of NetWare, 4.x and 3.x,
 | 
				
			||||||
 | 
					are only supported if OpenSSL is build for CLIB and BSD sockets;
 | 
				
			||||||
 | 
					WinSock builds only support NetWare 5 and up.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					On NetWare there are two c-runtime libraries.  There is the legacy CLIB 
 | 
				
			||||||
 | 
					interfaces and the newer LIBC interfaces.  Being ANSI-C libraries, the 
 | 
				
			||||||
 | 
					functionality in CLIB and LIBC is similar but the LIBC interfaces are built 
 | 
				
			||||||
 | 
					using Novell Kernal Services (NKS) which is designed to leverage 
 | 
				
			||||||
 | 
					multi-processor environments.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The NetWare port of OpenSSL can be configured to build using CLIB or LIBC.
 | 
				
			||||||
 | 
					The CLIB build was developed and tested using NetWare 5.0 sp6.0a.  The LIBC 
 | 
				
			||||||
 | 
					build was developed and tested using the NetWare 6.0 FCS.  
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The necessary LIBC functionality ships with NetWare 6.  However, earlier 
 | 
				
			||||||
 | 
					NetWare 5.x versions will require updates in order to run the OpenSSL LIBC
 | 
				
			||||||
 | 
					build (NetWare 5.1 SP8 is known to work).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					As of June 2005, the LIBC build can be configured to use BSD sockets instead
 | 
				
			||||||
 | 
					of WinSock sockets. Call Configure (usually through netware\build.bat) using
 | 
				
			||||||
 | 
					a target of "netware-libc-bsdsock" instead of "netware-libc".
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					As of June 2007, support for CLIB and BSD sockets is also now available
 | 
				
			||||||
 | 
					using a target of "netware-clib-bsdsock" instead of "netware-clib";
 | 
				
			||||||
 | 
					also gcc builds are now supported on both Linux and Win32 (post 0.9.8e).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					REQUIRED TOOLS:
 | 
				
			||||||
 | 
					---------------
 | 
				
			||||||
 | 
					Based upon the configuration and build options used, some or all of the
 | 
				
			||||||
 | 
					following tools may be required:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Perl for Win32 - required (http://www.activestate.com/ActivePerl)
 | 
				
			||||||
 | 
					   Used to run the various perl scripts on the build platform.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Perl 5.8.0 for NetWare v3.20 (or later) - required 
 | 
				
			||||||
 | 
					   (http://developer.novell.com) Used to run the test script on NetWare 
 | 
				
			||||||
 | 
					   after building.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Compiler / Linker - required:
 | 
				
			||||||
 | 
					   Metrowerks CodeWarrior PDK 2.1 (or later) for NetWare (commercial):
 | 
				
			||||||
 | 
					      Provides command line tools used for building.
 | 
				
			||||||
 | 
					      Tools:
 | 
				
			||||||
 | 
					      mwccnlm.exe  - C/C++ Compiler for NetWare
 | 
				
			||||||
 | 
					      mwldnlm.exe  - Linker for NetWare
 | 
				
			||||||
 | 
					      mwasmnlm.exe - x86 assembler for NetWare (if using assembly option)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   gcc / nlmconv Cross-Compiler, available from Novell Forge (free):
 | 
				
			||||||
 | 
					         http://forge.novell.com/modules/xfmod/project/?aunixnw
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Assemblers - optional:
 | 
				
			||||||
 | 
					   If you intend to build using the assembly options you will need an
 | 
				
			||||||
 | 
					   assembler.  Work has been completed to support two assemblers, Metrowerks
 | 
				
			||||||
 | 
					   and NASM.  However, during development, a bug was found in the Metrowerks
 | 
				
			||||||
 | 
					   assembler which generates incorrect code.  Until this problem is fixed,
 | 
				
			||||||
 | 
					   the Metrowerks assembler cannot be used.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   mwasmnlm.exe - Metrowerks x86 assembler - part of CodeWarrior tools.
 | 
				
			||||||
 | 
					         (version 2.2 Built Aug 23, 1999 - not useable due to code
 | 
				
			||||||
 | 
					          generation bug)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   nasmw.exe - Netwide Assembler NASM
 | 
				
			||||||
 | 
					         version 0.98 was used in development and testing
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Make Tool - required:
 | 
				
			||||||
 | 
					   In order to build you will need a make tool.  Two make tools are
 | 
				
			||||||
 | 
					   supported, GNU make (gmake.exe) or Microsoft nmake.exe.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   make.exe - GNU make for Windows (version 3.75 used for development)
 | 
				
			||||||
 | 
					         http://gnuwin32.sourceforge.net/packages/make.htm
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   nmake.exe - Microsoft make (Version 6.00.8168.0 used for development)
 | 
				
			||||||
 | 
					         http://support.microsoft.com/kb/132084/EN-US/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Novell Developer Kit (NDK) - required: (http://developer.novell.com)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   CLIB - BUILDS:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      WinSock2 Developer Components for NetWare:
 | 
				
			||||||
 | 
					         For initial development, the October 27, 2000 version was used.
 | 
				
			||||||
 | 
					         However, future versions should also work.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					         NOTE:  The WinSock2 components include headers & import files for
 | 
				
			||||||
 | 
					         NetWare, but you will also need the winsock2.h and supporting
 | 
				
			||||||
 | 
					         headers (pshpack4.h, poppack.h, qos.h) delivered in the
 | 
				
			||||||
 | 
					         Microsoft SDK.  Note: The winsock2.h support headers may change
 | 
				
			||||||
 | 
					         with various versions of winsock2.h.  Check the dependencies
 | 
				
			||||||
 | 
					         section on the NDK WinSock2 download page for the latest
 | 
				
			||||||
 | 
					         information on dependencies. These components are unsupported by
 | 
				
			||||||
 | 
					         Novell. They are provided as a courtesy, but it is strongly
 | 
				
			||||||
 | 
					         suggested that all development be done using LIBC, not CLIB.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					         As of June 2005, the WinSock2 components are available at:
 | 
				
			||||||
 | 
					         http://forgeftp.novell.com//ws2comp/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      NLM and NetWare libraries for C (including CLIB and XPlat):
 | 
				
			||||||
 | 
					         If you are going to build a CLIB version of OpenSSL, you will
 | 
				
			||||||
 | 
					         need the CLIB headers and imports.  The March, 2001 NDK release or 
 | 
				
			||||||
 | 
					         later is recommended.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					         Earlier versions should work but haven't been tested.  In recent
 | 
				
			||||||
 | 
					         versions the import files have been consolidated and function
 | 
				
			||||||
 | 
					         names moved.  This means you may run into link problems
 | 
				
			||||||
 | 
					         (undefined symbols) when using earlier versions.   The functions
 | 
				
			||||||
 | 
					         are available in earlier versions, but you will have to modifiy
 | 
				
			||||||
 | 
					         the make files to include additional import files (see
 | 
				
			||||||
 | 
					         openssl\util\pl\netware.pl).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   LIBC - BUILDS:
 | 
				
			||||||
 | 
					   
 | 
				
			||||||
 | 
					      Libraries for C (LIBC) - LIBC headers and import files
 | 
				
			||||||
 | 
					         If you are going to build a LIBC version of OpenSSL, you will
 | 
				
			||||||
 | 
					         need the LIBC headers and imports.  The March 14, 2002 NDK release or
 | 
				
			||||||
 | 
					         later is required.  
 | 
				
			||||||
 | 
					         
 | 
				
			||||||
 | 
					         NOTE: The LIBC SDK includes the necessary WinSock2 support.
 | 
				
			||||||
 | 
					         It is not necessary to download the WinSock2 NDK when building for
 | 
				
			||||||
 | 
					         LIBC. The LIBC SDK also includes the appropriate BSD socket support
 | 
				
			||||||
 | 
					         if configuring to use BSD sockets.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					BUILDING:
 | 
				
			||||||
 | 
					---------
 | 
				
			||||||
 | 
					Before building, you will need to set a few environment variables.  You can
 | 
				
			||||||
 | 
					set them manually or you can modify the "netware\set_env.bat" file.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The set_env.bat file is a template you can use to set up the path
 | 
				
			||||||
 | 
					and environment variables you will need to build.  Modify the
 | 
				
			||||||
 | 
					various lines to point to YOUR tools and run set_env.bat.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   netware\set_env.bat <target> [compiler]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      target        - "netware-clib" - CLIB NetWare build
 | 
				
			||||||
 | 
					                    - "netware-libc" - LIBC NetWare build
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      compiler      - "gnuc"         - GNU GCC Compiler
 | 
				
			||||||
 | 
					                    - "codewarrior"  - MetroWerks CodeWarrior (default)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					If you don't use set_env.bat, you will need to set up the following
 | 
				
			||||||
 | 
					environment variables:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   PATH - Set PATH to point to the tools you will use.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   INCLUDE - The location of the NDK include files.
 | 
				
			||||||
 | 
					         
 | 
				
			||||||
 | 
					            CLIB ex: set INCLUDE=c:\ndk\nwsdk\include\nlm
 | 
				
			||||||
 | 
					            LIBC ex: set INCLUDE=c:\ndk\libc\include
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   PRELUDE - The absolute path of the prelude object to link with.  For
 | 
				
			||||||
 | 
					            a CLIB build it is recommended you use the "clibpre.o" files shipped
 | 
				
			||||||
 | 
					            with the Metrowerks PDK for NetWare.  For a LIBC build you should 
 | 
				
			||||||
 | 
					            use the "libcpre.o" file delivered with the LIBC NDK components.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					            CLIB ex: set PRELUDE=c:\ndk\nwsdk\imports\clibpre.o
 | 
				
			||||||
 | 
					            LIBC ex: set PRELUDE=c:\ndk\libc\imports\libcpre.o
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   IMPORTS - The locaton of the NDK import files.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					            CLIB ex: set IMPORTS=c:\ndk\nwsdk\imports
 | 
				
			||||||
 | 
					            LIBC ex: set IMPORTS=c:\ndk\libc\imports
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					In order to build, you need to run the Perl scripts to configure the build
 | 
				
			||||||
 | 
					process and generate a make file.  There is a batch file,
 | 
				
			||||||
 | 
					"netware\build.bat", to automate the process.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Build.bat runs the build configuration scripts and generates a make file.
 | 
				
			||||||
 | 
					If an assembly option is specified, it also runs the scripts to generate 
 | 
				
			||||||
 | 
					the assembly code.  Always run build.bat from the "openssl" directory.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   netware\build [target] [debug opts] [assembly opts] [configure opts]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      target        - "netware-clib" - CLIB NetWare build (WinSock Sockets)
 | 
				
			||||||
 | 
					                    - "netware-clib-bsdsock" - CLIB NetWare build (BSD Sockets)
 | 
				
			||||||
 | 
					                    - "netware-libc" - LIBC NetWare build (WinSock Sockets)
 | 
				
			||||||
 | 
					                    - "netware-libc-bsdsock" - LIBC NetWare build (BSD Sockets)
 | 
				
			||||||
 | 
					 
 | 
				
			||||||
 | 
					      debug opts    - "debug"  - build debug
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      assembly opts - "nw-mwasm" - use Metrowerks assembler
 | 
				
			||||||
 | 
					                      "nw-nasm"  - use NASM assembler
 | 
				
			||||||
 | 
					                      "no-asm"   - don't use assembly
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      configure opts- all unrecognized arguments are passed to the
 | 
				
			||||||
 | 
					                      perl 'configure' script. See that script for
 | 
				
			||||||
 | 
					                      internal documentation regarding options that
 | 
				
			||||||
 | 
					                      are available.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   examples:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      CLIB build, debug, without assembly:
 | 
				
			||||||
 | 
					         netware\build.bat netware-clib debug no-asm
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      LIBC build, non-debug, using NASM assembly, add mdc2 support:
 | 
				
			||||||
 | 
					         netware\build.bat netware-libc nw-nasm enable-mdc2
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      LIBC build, BSD sockets, non-debug, without assembly:
 | 
				
			||||||
 | 
					         netware\build.bat netware-libc-bsdsock no-asm
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Running build.bat generates a make file to be processed by your make 
 | 
				
			||||||
 | 
					tool (gmake or nmake):
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   CLIB ex: gmake -f netware\nlm_clib_dbg.mak 
 | 
				
			||||||
 | 
					   LIBC ex: gmake -f netware\nlm_libc.mak 
 | 
				
			||||||
 | 
					   LIBC ex: gmake -f netware\nlm_libc_bsdsock.mak 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					You can also run the build scripts manually if you do not want to use the
 | 
				
			||||||
 | 
					build.bat file.  Run the following scripts in the "\openssl"
 | 
				
			||||||
 | 
					subdirectory (in the order listed below):
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   perl configure no-asm [other config opts] [netware-clib|netware-libc|netware-libc-bsdsock]
 | 
				
			||||||
 | 
					      configures no assembly build for specified netware environment
 | 
				
			||||||
 | 
					      (CLIB or LIBC).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   perl util\mkfiles.pl >MINFO
 | 
				
			||||||
 | 
					      generates a listing of source files (used by mk1mf)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   perl util\mk1mf.pl no-asm [other config opts] [netware-clib|netware-libc|netware-libc-bsdsock >netware\nlm.mak
 | 
				
			||||||
 | 
					      generates the makefile for NetWare
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   gmake -f netware\nlm.mak
 | 
				
			||||||
 | 
					      build with the make tool (nmake.exe also works)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					NOTE:  If you are building using the assembly option, you must also run the
 | 
				
			||||||
 | 
					various Perl scripts to generate the assembly files.  See build.bat
 | 
				
			||||||
 | 
					for an example of running the various assembly scripts.  You must use the
 | 
				
			||||||
 | 
					"no-asm" option to build without assembly.  The configure and mk1mf scripts
 | 
				
			||||||
 | 
					also have various other options.  See the scripts for more information.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The output from the build is placed in the following directories:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   CLIB Debug build:
 | 
				
			||||||
 | 
					      out_nw_clib.dbg     - static libs & test nlm(s)
 | 
				
			||||||
 | 
					      tmp_nw_clib.dbg     - temporary build files
 | 
				
			||||||
 | 
					      outinc_nw_clib      - necessary include files
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   CLIB Non-debug build:
 | 
				
			||||||
 | 
					      out_nw_clib         - static libs & test nlm(s)
 | 
				
			||||||
 | 
					      tmp_nw_clib         - temporary build files
 | 
				
			||||||
 | 
					      outinc_nw_clib      - necesary include files
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   LIBC Debug build:
 | 
				
			||||||
 | 
					      out_nw_libc.dbg     - static libs & test nlm(s)
 | 
				
			||||||
 | 
					      tmp_nw_libc.dbg     - temporary build files
 | 
				
			||||||
 | 
					      outinc_nw_libc      - necessary include files
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   LIBC Non-debug build:
 | 
				
			||||||
 | 
					      out_nw_libc         - static libs & test nlm(s)
 | 
				
			||||||
 | 
					      tmp_nw_libc         - temporary build files
 | 
				
			||||||
 | 
					      outinc_nw_libc      - necesary include files
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					TESTING:
 | 
				
			||||||
 | 
					--------
 | 
				
			||||||
 | 
					The build process creates the OpenSSL static libs ( crypto.lib, ssl.lib,
 | 
				
			||||||
 | 
					rsaglue.lib ) and several test programs.  You should copy the test programs
 | 
				
			||||||
 | 
					to your NetWare server and run the tests.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The batch file "netware\cpy_tests.bat" will copy all the necessary files
 | 
				
			||||||
 | 
					to your server for testing.  In order to run the batch file, you need a
 | 
				
			||||||
 | 
					drive mapped to your target server.  It will create an "OpenSSL" directory
 | 
				
			||||||
 | 
					on the drive and copy the test files to it.  CAUTION: If a directory with the
 | 
				
			||||||
 | 
					name of "OpenSSL" already exists, it will be deleted.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					To run cpy_tests.bat:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   netware\cpy_tests [output directory] [NetWare drive]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      output directory - "out_nw_clib.dbg", "out_nw_libc", etc.
 | 
				
			||||||
 | 
					      NetWare drive    - drive letter of mapped drive
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      CLIB ex: netware\cpy_tests out_nw_clib m:
 | 
				
			||||||
 | 
					      LIBC ex: netware\cpy_tests out_nw_libc m:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The Perl script, "do_tests.pl", in the "OpenSSL" directory on the server
 | 
				
			||||||
 | 
					should be used to execute the tests.  Before running the script, make sure
 | 
				
			||||||
 | 
					your SEARCH PATH includes the "OpenSSL" directory.  For example, if you
 | 
				
			||||||
 | 
					copied the files to the "sys:" volume you use the command:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   SEARCH ADD SYS:\OPENSSL
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					To run do_tests.pl type (at the console prompt):
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   perl \openssl\do_tests.pl [options]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      options:
 | 
				
			||||||
 | 
					         -p    - pause after executing each test
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The do_tests.pl script generates a log file "\openssl\test_out\tests.log"
 | 
				
			||||||
 | 
					which should be reviewed for errors.  Any errors will be denoted by the word
 | 
				
			||||||
 | 
					"ERROR" in the log.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					DEVELOPING WITH THE OPENSSL SDK:
 | 
				
			||||||
 | 
					--------------------------------
 | 
				
			||||||
 | 
					Now that everything is built and tested, you are ready to use the OpenSSL
 | 
				
			||||||
 | 
					libraries in your development.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					There is no real installation procedure, just copy the static libs and
 | 
				
			||||||
 | 
					headers to your build location.  The libs (crypto.lib & ssl.lib) are
 | 
				
			||||||
 | 
					located in the appropriate "out_nw_XXXX" directory 
 | 
				
			||||||
 | 
					(out_nw_clib, out_nw_libc, etc).  
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The headers are located in the appropriate "outinc_nw_XXX" directory 
 | 
				
			||||||
 | 
					(outinc_nw_clib, outinc_nw_libc).  
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					One suggestion is to create the following directory 
 | 
				
			||||||
 | 
					structure for the OpenSSL SDK:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   \openssl
 | 
				
			||||||
 | 
					      |- bin
 | 
				
			||||||
 | 
					      |   |- openssl.nlm
 | 
				
			||||||
 | 
					      |   |- (other tests you want)
 | 
				
			||||||
 | 
					      |
 | 
				
			||||||
 | 
					      |- lib
 | 
				
			||||||
 | 
					      |   | - crypto.lib
 | 
				
			||||||
 | 
					      |   | - ssl.lib
 | 
				
			||||||
 | 
					      |
 | 
				
			||||||
 | 
					      |- include
 | 
				
			||||||
 | 
					      |   | - openssl
 | 
				
			||||||
 | 
					      |   |    | - (all the headers in "outinc_nw\openssl")
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The program "openssl.nlm" can be very useful.  It has dozens of
 | 
				
			||||||
 | 
					options and you may want to keep it handy for debugging, testing, etc.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					When building your apps using OpenSSL, define "NETWARE".  It is needed by
 | 
				
			||||||
 | 
					some of the OpenSSL headers.  One way to do this is with a compile option,
 | 
				
			||||||
 | 
					for example "-DNETWARE".
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					NOTES:
 | 
				
			||||||
 | 
					------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Resource leaks in Tests
 | 
				
			||||||
 | 
					------------------------
 | 
				
			||||||
 | 
					Some OpenSSL tests do not clean up resources and NetWare reports
 | 
				
			||||||
 | 
					the resource leaks when the tests unload.  If this really bugs you,
 | 
				
			||||||
 | 
					you can stop the messages by setting the developer option off at the console
 | 
				
			||||||
 | 
					prompt (set developer option = off).  Or better yet, fix the tests to
 | 
				
			||||||
 | 
					clean up the resources!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Multi-threaded Development
 | 
				
			||||||
 | 
					---------------------------
 | 
				
			||||||
 | 
					The NetWare version of OpenSSL is thread-safe, however multi-threaded
 | 
				
			||||||
 | 
					applications must provide the necessary locking function callbacks.  This
 | 
				
			||||||
 | 
					is described in doc\threads.doc.  The file "openssl-x.x.x\crypto\threads\mttest.c"
 | 
				
			||||||
 | 
					is a multi-threaded test program and demonstrates the locking functions.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					What is openssl2.nlm?
 | 
				
			||||||
 | 
					---------------------
 | 
				
			||||||
 | 
					The openssl program has numerous options and can be used for many different
 | 
				
			||||||
 | 
					things.  Many of the options operate in an interactive mode requiring the
 | 
				
			||||||
 | 
					user to enter data.  Because of this, a default screen is created for the
 | 
				
			||||||
 | 
					program.  However, when running the test script it is not desirable to
 | 
				
			||||||
 | 
					have a seperate screen.  Therefore, the build also creates openssl2.nlm.
 | 
				
			||||||
 | 
					Openssl2.nlm is functionally identical but uses the console screen.
 | 
				
			||||||
 | 
					Openssl2 can be used when a non-interactive mode is desired.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					NOTE:  There are may other possibilities (command line options, etc)
 | 
				
			||||||
 | 
					which could have been used to address the screen issue.  The openssl2.nlm
 | 
				
			||||||
 | 
					option was chosen because it impacted only the build not the code.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Why only static libraries?
 | 
				
			||||||
 | 
					--------------------------
 | 
				
			||||||
 | 
					Globals, globals, and more globals.  The OpenSSL code uses many global
 | 
				
			||||||
 | 
					variables that are allocated and initialized when used for the first time.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					On NetWare, most applications (at least historically) run in the kernel.
 | 
				
			||||||
 | 
					When running in the kernel, there is one instance of global variables.
 | 
				
			||||||
 | 
					For regular application type NLM(s) this isn't a problem because they are
 | 
				
			||||||
 | 
					the only ones using the globals.  However, for a library NLM (an NLM which
 | 
				
			||||||
 | 
					exposes functions and has no threads of execution), the globals cause
 | 
				
			||||||
 | 
					problems.  Applications could inadvertently step on each other if they
 | 
				
			||||||
 | 
					change some globals.  Even worse, the first application that triggers a
 | 
				
			||||||
 | 
					global to be allocated and initialized has the allocated memory charged to
 | 
				
			||||||
 | 
					itself.  Now when that application unloads, NetWare will clean up all the
 | 
				
			||||||
 | 
					applicaton's memory.  The global pointer variables inside OpenSSL now
 | 
				
			||||||
 | 
					point to freed memory.  An abend waiting to happen!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					To work correctly in the kernel, library NLM(s) that use globals need to
 | 
				
			||||||
 | 
					provide a set of globals (instance data) for each application.  Another
 | 
				
			||||||
 | 
					option is to require the library only be loaded in a protected address
 | 
				
			||||||
 | 
					space along with the application using it.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Modifying the OpenSSL code to provide a set of globals (instance data) for
 | 
				
			||||||
 | 
					each application isn't technically difficult, but due to the large number
 | 
				
			||||||
 | 
					globals it would require substantial code changes and it wasn't done.  Hence,
 | 
				
			||||||
 | 
					the build currently only builds static libraries which are then linked
 | 
				
			||||||
 | 
					into each application.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					NOTE:  If you are building a library NLM that uses the OpenSSL static
 | 
				
			||||||
 | 
					libraries, you will still have to deal with the global variable issue.
 | 
				
			||||||
 | 
					This is because when you link in the OpenSSL code you bring in all the
 | 
				
			||||||
 | 
					globals.  One possible solution for the global pointer variables is to
 | 
				
			||||||
 | 
					register memory functions with OpenSSL which allocate memory and charge it
 | 
				
			||||||
 | 
					to your library NLM (see the function CRYPTO_set_mem_functions).  However,
 | 
				
			||||||
 | 
					be aware that now all memory allocated by OpenSSL is charged to your NLM.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					CodeWarrior Tools and W2K
 | 
				
			||||||
 | 
					---------------------------
 | 
				
			||||||
 | 
					There have been problems reported with the CodeWarrior Linker
 | 
				
			||||||
 | 
					(mwldnlm.exe) in the PDK 2.1 for NetWare when running on Windows 2000.  The
 | 
				
			||||||
 | 
					problems cause the link step to fail.  The only work around is to obtain an
 | 
				
			||||||
 | 
					updated linker from Metrowerks.  It is expected Metrowerks will release
 | 
				
			||||||
 | 
					PDK 3.0 (in beta testing at this time - May, 2001) in the near future which
 | 
				
			||||||
 | 
					will fix these problems.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Makefile "vclean"
 | 
				
			||||||
 | 
					------------------
 | 
				
			||||||
 | 
					The generated makefile has a "vclean" target which cleans up the build
 | 
				
			||||||
 | 
					directories.  If you have been building successfully and suddenly
 | 
				
			||||||
 | 
					experience problems, use "vclean" (gmake -f netware\nlm_xxxx.mak vclean) and retry.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					"Undefined Symbol" Linker errors
 | 
				
			||||||
 | 
					--------------------------------
 | 
				
			||||||
 | 
					There have been linker errors reported when doing a CLIB build.  The problems
 | 
				
			||||||
 | 
					occur because some versions of the CLIB SDK import files inadvertently 
 | 
				
			||||||
 | 
					left out some symbols.  One symbol in particular is "_lrotl".  The missing
 | 
				
			||||||
 | 
					functions are actually delivered in the binaries, but they were left out of
 | 
				
			||||||
 | 
					the import files.  The issues should be fixed in the September 2001 release 
 | 
				
			||||||
 | 
					of the NDK.  If you experience the problems you can temporarily
 | 
				
			||||||
 | 
					work around it by manually adding the missing symbols to your version of 
 | 
				
			||||||
 | 
					"clib.imp".
 | 
				
			||||||
 | 
					
 | 
				
			||||||
							
								
								
									
										56
									
								
								INSTALL.W32
									
									
									
									
									
								
							
							
						
						
									
										56
									
								
								INSTALL.W32
									
									
									
									
									
								
							@@ -3,6 +3,7 @@
 | 
				
			|||||||
 ----------------------------------
 | 
					 ----------------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 [Instructions for building for Windows CE can be found in INSTALL.WCE]
 | 
					 [Instructions for building for Windows CE can be found in INSTALL.WCE]
 | 
				
			||||||
 | 
					 [Instructions for building for Win64 can be found in INSTALL.W64]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Heres a few comments about building OpenSSL in Windows environments.  Most
 | 
					 Heres a few comments about building OpenSSL in Windows environments.  Most
 | 
				
			||||||
 of this is tested on Win32 but it may also work in Win 3.1 with some
 | 
					 of this is tested on Win32 but it may also work in Win 3.1 with some
 | 
				
			||||||
@@ -17,7 +18,7 @@
 | 
				
			|||||||
  * Borland C
 | 
					  * Borland C
 | 
				
			||||||
  * GNU C (Cygwin or MinGW)
 | 
					  * GNU C (Cygwin or MinGW)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 If you are compiling from a tarball or a CVS snapshot then the Win32 files
 | 
					 If you are compiling from a tarball or a Git snapshot then the Win32 files
 | 
				
			||||||
 may well be not up to date. This may mean that some "tweaking" is required to
 | 
					 may well be not up to date. This may mean that some "tweaking" is required to
 | 
				
			||||||
 get it all to work. See the trouble shooting section later on for if (when?)
 | 
					 get it all to work. See the trouble shooting section later on for if (when?)
 | 
				
			||||||
 it goes wrong.
 | 
					 it goes wrong.
 | 
				
			||||||
@@ -46,13 +47,14 @@
 | 
				
			|||||||
 http://www.kernel.org/pub/software/devel/nasm/binaries/win32/
 | 
					 http://www.kernel.org/pub/software/devel/nasm/binaries/win32/
 | 
				
			||||||
 The NASM binary nasmw.exe needs to be installed anywhere on your PATH.
 | 
					 The NASM binary nasmw.exe needs to be installed anywhere on your PATH.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Firstly you should run Configure (to build a FIPS-certified variant of
 | 
					 Firstly you should run Configure:
 | 
				
			||||||
 OpenSSL, add the option "fips"):
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
 > perl Configure VC-WIN32
 | 
					 > perl Configure VC-WIN32 --prefix=c:/some/openssl/dir
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Where the prefix argument specifies where OpenSSL will be installed to.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Next you need to build the Makefiles and optionally the assembly language
 | 
					 Next you need to build the Makefiles and optionally the assembly language
 | 
				
			||||||
 files (to build a FIPS-certified variant of OpenSSL, add the argument "fips"):
 | 
					 files:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 - If you are using MASM then run:
 | 
					 - If you are using MASM then run:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -77,8 +79,12 @@
 | 
				
			|||||||
 If all is well it should compile and you will have some DLLs and executables
 | 
					 If all is well it should compile and you will have some DLLs and executables
 | 
				
			||||||
 in out32dll. If you want to try the tests then do:
 | 
					 in out32dll. If you want to try the tests then do:
 | 
				
			||||||
 
 | 
					 
 | 
				
			||||||
 > cd out32dll
 | 
					 > nmake -f ms\ntdll.mak test
 | 
				
			||||||
 > ..\ms\test
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					To install OpenSSL to the specified location do:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					> nmake -f ms\ntdll.mak install
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Tweaks:
 | 
					 Tweaks:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -88,6 +94,12 @@
 | 
				
			|||||||
 compiled in. Note that mk1mf.pl expects the platform to be the last argument
 | 
					 compiled in. Note that mk1mf.pl expects the platform to be the last argument
 | 
				
			||||||
 on the command line, so 'debug' must appear before that, as all other options.
 | 
					 on the command line, so 'debug' must appear before that, as all other options.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 By default in 0.9.8 OpenSSL will compile builtin ENGINES into the libeay32.dll
 | 
				
			||||||
 | 
					 shared library. If you specify the "no-static-engine" option on the command
 | 
				
			||||||
 | 
					 line to Configure the shared library build (ms\ntdll.mak) will compile the
 | 
				
			||||||
 | 
					 engines as separate DLLs.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 The default Win32 environment is to leave out any Windows NT specific
 | 
					 The default Win32 environment is to leave out any Windows NT specific
 | 
				
			||||||
 features.
 | 
					 features.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -98,15 +110,15 @@
 | 
				
			|||||||
 You can also build a static version of the library using the Makefile
 | 
					 You can also build a static version of the library using the Makefile
 | 
				
			||||||
 ms\nt.mak
 | 
					 ms\nt.mak
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Borland C++ builder 5
 | 
					 Borland C++ builder 5
 | 
				
			||||||
 ---------------------
 | 
					 ---------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 * Configure for building with Borland Builder (to build a FIPS-certified
 | 
					 * Configure for building with Borland Builder:
 | 
				
			||||||
   variant of OpenSSL, add the option "fips"):
 | 
					 | 
				
			||||||
   > perl Configure BC-32
 | 
					   > perl Configure BC-32
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 * Create the appropriate makefile (to build a FIPS-certified variant of
 | 
					 * Create the appropriate makefile
 | 
				
			||||||
   OpenSSL, add the argument "fips")
 | 
					 | 
				
			||||||
   > ms\do_nasm
 | 
					   > ms\do_nasm
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 * Build
 | 
					 * Build
 | 
				
			||||||
@@ -197,8 +209,6 @@
 | 
				
			|||||||
   occur, try
 | 
					   occur, try
 | 
				
			||||||
   > ms\mingw32 no-asm
 | 
					   > ms\mingw32 no-asm
 | 
				
			||||||
   instead.
 | 
					   instead.
 | 
				
			||||||
   If you want to build a FIPS-certified variant of OpenSSL, add the argument
 | 
					 | 
				
			||||||
   "fips"
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
   libcrypto.a and libssl.a are the static libraries. To use the DLLs,
 | 
					   libcrypto.a and libssl.a are the static libraries. To use the DLLs,
 | 
				
			||||||
   link with libeay32.a and libssl32.a instead.
 | 
					   link with libeay32.a and libssl32.a instead.
 | 
				
			||||||
@@ -254,7 +264,7 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 then ms\do_XXX should not give a warning any more. However the numbers that
 | 
					 then ms\do_XXX should not give a warning any more. However the numbers that
 | 
				
			||||||
 get assigned by this technique may not match those that eventually get
 | 
					 get assigned by this technique may not match those that eventually get
 | 
				
			||||||
 assigned in the CVS tree: so anything linked against this version of the
 | 
					 assigned in the Git tree: so anything linked against this version of the
 | 
				
			||||||
 library may need to be recompiled.
 | 
					 library may need to be recompiled.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 If you get errors about unresolved symbols there are several possible
 | 
					 If you get errors about unresolved symbols there are several possible
 | 
				
			||||||
@@ -291,3 +301,21 @@
 | 
				
			|||||||
 (e.g. fopen()), and OpenSSL cannot change these; so in general you cannot
 | 
					 (e.g. fopen()), and OpenSSL cannot change these; so in general you cannot
 | 
				
			||||||
 rely on CRYPTO_malloc_init() solving your problem, and you should
 | 
					 rely on CRYPTO_malloc_init() solving your problem, and you should
 | 
				
			||||||
 consistently use the multithreaded library.
 | 
					 consistently use the multithreaded library.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Linking your application
 | 
				
			||||||
 | 
					 ------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 If you link with static OpenSSL libraries [those built with ms/nt.mak],
 | 
				
			||||||
 | 
					 then you're expected to additionally link your application with
 | 
				
			||||||
 | 
					 WSOCK32.LIB, ADVAPI32.LIB, GDI32.LIB and USER32.LIB. Those developing
 | 
				
			||||||
 | 
					 non-interactive service applications might feel concerned about linking
 | 
				
			||||||
 | 
					 with latter two, as they are justly associated with interactive desktop,
 | 
				
			||||||
 | 
					 which is not available to service processes. The toolkit is designed
 | 
				
			||||||
 | 
					 to detect in which context it's currently executed, GUI, console app
 | 
				
			||||||
 | 
					 or service, and act accordingly, namely whether or not to actually make
 | 
				
			||||||
 | 
					 GUI calls.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 If you link with OpenSSL .DLLs, then you're expected to include into
 | 
				
			||||||
 | 
					 your application code small "shim" snippet, which provides glue between
 | 
				
			||||||
 | 
					 OpenSSL BIO layer and your compiler run-time. Look up OPENSSL_Applink
 | 
				
			||||||
 | 
					 reference page for further details.
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										66
									
								
								INSTALL.W64
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										66
									
								
								INSTALL.W64
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,66 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 | 
					 INSTALLATION ON THE WIN64 PLATFORM
 | 
				
			||||||
 | 
					 ----------------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Caveat lector
 | 
				
			||||||
 | 
					 -------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 As of moment of this writing Win64 support is classified "initial"
 | 
				
			||||||
 | 
					 for the following reasons.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 - No assembler modules are engaged upon initial 0.9.8 release.
 | 
				
			||||||
 | 
					 - API might change within 0.9.8 life-span, *but* in a manner which
 | 
				
			||||||
 | 
					   doesn't break backward binary compatibility. Or in other words,
 | 
				
			||||||
 | 
					   application programs compiled with initial 0.9.8 headers will
 | 
				
			||||||
 | 
					   be expected to work with future minor release .DLL without need
 | 
				
			||||||
 | 
					   to re-compile, even if future minor release features modified API.
 | 
				
			||||||
 | 
					 - Above mentioned API modifications have everything to do with
 | 
				
			||||||
 | 
					   elimination of a number of limitations, which are normally
 | 
				
			||||||
 | 
					   considered inherent to 32-bit platforms. Which in turn is why they
 | 
				
			||||||
 | 
					   are treated as limitations on 64-bit platform such as Win64:-)
 | 
				
			||||||
 | 
					   The current list comprises [but not necessarily limited to]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   - null-terminated strings may not be longer than 2G-1 bytes,
 | 
				
			||||||
 | 
					     longer strings are treated as zero-length;
 | 
				
			||||||
 | 
					   - dynamically and *internally* allocated chunks can't be larger
 | 
				
			||||||
 | 
					     than 2G-1 bytes;
 | 
				
			||||||
 | 
					   - inability to encrypt/decrypt chunks of data larger than 4GB
 | 
				
			||||||
 | 
					     [it's possibly to *hash* chunks of arbitrary size through];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   Neither of these is actually big deal and hardly encountered
 | 
				
			||||||
 | 
					   in real-life applications.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Compiling procedure
 | 
				
			||||||
 | 
					 -------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 You will need Perl. You can run under Cygwin or you can download
 | 
				
			||||||
 | 
					 ActiveState Perl from http://www.activestate.com/ActivePerl.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 You will need Microsoft Platform SDK, available for download at
 | 
				
			||||||
 | 
					 http://www.microsoft.com/msdownload/platformsdk/sdkupdate/. As per
 | 
				
			||||||
 | 
					 April 2005 Platform SDK is equipped with Win64 compilers, as well
 | 
				
			||||||
 | 
					 as assemblers, but it might change in the future.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 To build for Win64/x64:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 > perl Configure VC-WIN64A
 | 
				
			||||||
 | 
					 > ms\do_win64a
 | 
				
			||||||
 | 
					 > nmake -f ms\ntdll.mak
 | 
				
			||||||
 | 
					 > cd out32dll
 | 
				
			||||||
 | 
					 > ..\ms\test
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 To build for Win64/IA64:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 > perl Configure VC-WIN64I
 | 
				
			||||||
 | 
					 > ms\do_win64i
 | 
				
			||||||
 | 
					 > nmake -f ms\ntdll.mak
 | 
				
			||||||
 | 
					 > cd out32dll
 | 
				
			||||||
 | 
					 > ..\ms\test
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Naturally test-suite itself has to be executed on the target platform.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Installation
 | 
				
			||||||
 | 
					 ------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 TBD, for now see INSTALL.W32.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -11,8 +11,11 @@
 | 
				
			|||||||
 You also need Perl for Win32.  You will need ActiveState Perl, available
 | 
					 You also need Perl for Win32.  You will need ActiveState Perl, available
 | 
				
			||||||
 from http://www.activestate.com/ActivePerl.
 | 
					 from http://www.activestate.com/ActivePerl.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Windows CE support in OpenSSL relies on wcecompat.  All Windows CE specific
 | 
					 Windows CE support in OpenSSL relies on wcecompat and therefore it's
 | 
				
			||||||
 issues should be directed to www.essemer.com.au.
 | 
					 appropriate to check http://www.essemer.com.au/windowsce/ for updates in
 | 
				
			||||||
 | 
					 case of compilation problems. As for the moment of this writing version
 | 
				
			||||||
 | 
					 1.1 is available and actually required for WCE 4.2 and newer platforms.
 | 
				
			||||||
 | 
					 All Windows CE specific issues should be directed to www.essemer.com.au.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 The C Runtime Library implementation for Windows CE that is included with
 | 
					 The C Runtime Library implementation for Windows CE that is included with
 | 
				
			||||||
 Microsoft eMbedded Visual C++ 3.0 is incomplete and in some places
 | 
					 Microsoft eMbedded Visual C++ 3.0 is incomplete and in some places
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										2
									
								
								LICENSE
									
									
									
									
									
								
							
							
						
						
									
										2
									
								
								LICENSE
									
									
									
									
									
								
							@@ -12,7 +12,7 @@
 | 
				
			|||||||
  ---------------
 | 
					  ---------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* ====================================================================
 | 
					/* ====================================================================
 | 
				
			||||||
 * Copyright (c) 1998-2005 The OpenSSL Project.  All rights reserved.
 | 
					 * Copyright (c) 1998-2011 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Redistribution and use in source and binary forms, with or without
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 * modification, are permitted provided that the following conditions
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -29,7 +29,7 @@ OSErr AppendErrorMessageToHandle(Handle inoutHandle);
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
//	A bunch of evil macros that would be uneccessary if I were always using C++ !
 | 
					//	A bunch of evil macros that would be unnecessary if I were always using C++ !
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define SetErrorMessageAndBailIfNil(theArg,theMessage)								\
 | 
					#define SetErrorMessageAndBailIfNil(theArg,theMessage)								\
 | 
				
			||||||
{																					\
 | 
					{																					\
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										910
									
								
								Makefile.org
									
									
									
									
									
								
							
							
						
						
									
										910
									
								
								Makefile.org
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										609
									
								
								Makefile.shared
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										609
									
								
								Makefile.shared
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,609 @@
 | 
				
			|||||||
 | 
					#
 | 
				
			||||||
 | 
					# Helper makefile to link shared libraries in a portable way.
 | 
				
			||||||
 | 
					# This is much simpler than libtool, and hopefully not too error-prone.
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					# The following variables need to be set on the command line to build
 | 
				
			||||||
 | 
					# properly
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# CC contains the current compiler.  This one MUST be defined
 | 
				
			||||||
 | 
					CC=cc
 | 
				
			||||||
 | 
					CFLAGS=$(CFLAG)
 | 
				
			||||||
 | 
					# LDFLAGS contains flags to be used when temporary object files (when building
 | 
				
			||||||
 | 
					# shared libraries) are created, or when an application is linked.
 | 
				
			||||||
 | 
					# SHARED_LDFLAGS contains flags to be used when the shared library is created.
 | 
				
			||||||
 | 
					LDFLAGS=
 | 
				
			||||||
 | 
					SHARED_LDFLAGS=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# LIBNAME contains just the name of the library, without prefix ("lib"
 | 
				
			||||||
 | 
					# on Unix, "cyg" for certain forms under Cygwin...) or suffix (.a, .so,
 | 
				
			||||||
 | 
					# .dll, ...).  This one MUST have a value when using this makefile to
 | 
				
			||||||
 | 
					# build shared libraries.
 | 
				
			||||||
 | 
					# For example, to build libfoo.so, you need to do the following:
 | 
				
			||||||
 | 
					#LIBNAME=foo
 | 
				
			||||||
 | 
					LIBNAME=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# APPNAME contains just the name of the application, without suffix (""
 | 
				
			||||||
 | 
					# on Unix, ".exe" on Windows, ...).  This one MUST have a value when using
 | 
				
			||||||
 | 
					# this makefile to build applications.
 | 
				
			||||||
 | 
					# For example, to build foo, you need to do the following:
 | 
				
			||||||
 | 
					#APPNAME=foo
 | 
				
			||||||
 | 
					APPNAME=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# OBJECTS contains all the object files to link together into the application.
 | 
				
			||||||
 | 
					# This must contain at least one object file.
 | 
				
			||||||
 | 
					#OBJECTS=foo.o
 | 
				
			||||||
 | 
					OBJECTS=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# LIBEXTRAS contains extra modules to link together with the library.
 | 
				
			||||||
 | 
					# For example, if a second library, say libbar.a needs to be linked into
 | 
				
			||||||
 | 
					# libfoo.so, you need to do the following:
 | 
				
			||||||
 | 
					#LIBEXTRAS=libbar.a
 | 
				
			||||||
 | 
					# Note that this MUST be used when using the link_o targets, to hold the
 | 
				
			||||||
 | 
					# names of all object files that go into the target library.
 | 
				
			||||||
 | 
					LIBEXTRAS=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# LIBVERSION contains the current version of the library.
 | 
				
			||||||
 | 
					# For example, to build libfoo.so.1.2, you need to do the following:
 | 
				
			||||||
 | 
					#LIBVERSION=1.2
 | 
				
			||||||
 | 
					LIBVERSION=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# LIBCOMPATVERSIONS contains the compatibility versions (a list) of
 | 
				
			||||||
 | 
					# the library.  They MUST be in decreasing order.
 | 
				
			||||||
 | 
					# For example, if libfoo.so.1.2.1 is backward compatible with libfoo.so.1.2
 | 
				
			||||||
 | 
					# and libfoo.so.1, you need to do the following:
 | 
				
			||||||
 | 
					#LIBCOMPATVERSIONS=1.2 1
 | 
				
			||||||
 | 
					# Note that on systems that use sonames, the last number will appear as
 | 
				
			||||||
 | 
					# part of it.
 | 
				
			||||||
 | 
					# It's also possible, for systems that support it (Tru64, for example),
 | 
				
			||||||
 | 
					# to add extra compatibility info with more precision, by adding a second
 | 
				
			||||||
 | 
					# list of versions, separated from the first with a semicolon, like this:
 | 
				
			||||||
 | 
					#LIBCOMPATVERSIONS=1.2 1;1.2.0 1.1.2 1.1.1 1.1.0 1.0.0
 | 
				
			||||||
 | 
					LIBCOMPATVERSIONS=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# LIBDEPS contains all the flags necessary to cover all necessary
 | 
				
			||||||
 | 
					# dependencies to other libraries.
 | 
				
			||||||
 | 
					LIBDEPS=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#------------------------------------------------------------------------------
 | 
				
			||||||
 | 
					# The rest is private to this makefile.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					SET_X=:
 | 
				
			||||||
 | 
					#SET_X=set -x
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					top:
 | 
				
			||||||
 | 
						echo "Trying to use this makefile interactively?  Don't."
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					CALC_VERSIONS=	\
 | 
				
			||||||
 | 
						SHLIB_COMPAT=; SHLIB_SOVER=; \
 | 
				
			||||||
 | 
						if [ -n "$(LIBVERSION)$(LIBCOMPATVERSIONS)" ]; then \
 | 
				
			||||||
 | 
							prev=""; \
 | 
				
			||||||
 | 
							for v in `echo "$(LIBVERSION) $(LIBCOMPATVERSIONS)" | cut -d';' -f1`; do \
 | 
				
			||||||
 | 
								SHLIB_SOVER_NODOT=$$v; \
 | 
				
			||||||
 | 
								SHLIB_SOVER=.$$v; \
 | 
				
			||||||
 | 
								if [ -n "$$prev" ]; then \
 | 
				
			||||||
 | 
									SHLIB_COMPAT="$$SHLIB_COMPAT .$$prev"; \
 | 
				
			||||||
 | 
								fi; \
 | 
				
			||||||
 | 
								prev=$$v; \
 | 
				
			||||||
 | 
							done; \
 | 
				
			||||||
 | 
						fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					LINK_APP=	\
 | 
				
			||||||
 | 
					  ( $(SET_X);   \
 | 
				
			||||||
 | 
					    LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
 | 
				
			||||||
 | 
					    LDCMD="$${LDCMD:-$(CC)}"; LDFLAGS="$${LDFLAGS:-$(CFLAGS)}"; \
 | 
				
			||||||
 | 
					    LIBPATH=`for x in $$LIBDEPS; do if echo $$x | grep '^ *-L' > /dev/null 2>&1; then echo $$x | sed -e 's/^ *-L//'; fi; done | uniq`; \
 | 
				
			||||||
 | 
					    LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
 | 
				
			||||||
 | 
					    LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
 | 
				
			||||||
 | 
					    $${LDCMD} $${LDFLAGS} -o $${APPNAME:=$(APPNAME)} $(OBJECTS) $${LIBDEPS} )
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					LINK_SO=	\
 | 
				
			||||||
 | 
					  ( $(SET_X);   \
 | 
				
			||||||
 | 
					    LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
 | 
				
			||||||
 | 
					    SHAREDCMD="$${SHAREDCMD:-$(CC)}"; \
 | 
				
			||||||
 | 
					    SHAREDFLAGS="$${SHAREDFLAGS:-$(CFLAGS) $(SHARED_LDFLAGS)}"; \
 | 
				
			||||||
 | 
					    LIBPATH=`for x in $$LIBDEPS; do if echo $$x | grep '^ *-L' > /dev/null 2>&1; then echo $$x | sed -e 's/^ *-L//'; fi; done | uniq`; \
 | 
				
			||||||
 | 
					    LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
 | 
				
			||||||
 | 
					    LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
 | 
				
			||||||
 | 
					    $${SHAREDCMD} $${SHAREDFLAGS} \
 | 
				
			||||||
 | 
						-o $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX \
 | 
				
			||||||
 | 
						$$ALLSYMSFLAGS $$SHOBJECTS $$NOALLSYMSFLAGS $$LIBDEPS \
 | 
				
			||||||
 | 
					  ) && $(SYMLINK_SO)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					SYMLINK_SO=	\
 | 
				
			||||||
 | 
						if [ -n "$$INHIBIT_SYMLINKS" ]; then :; else \
 | 
				
			||||||
 | 
							prev=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; \
 | 
				
			||||||
 | 
							if [ -n "$$SHLIB_COMPAT" ]; then \
 | 
				
			||||||
 | 
								for x in $$SHLIB_COMPAT; do \
 | 
				
			||||||
 | 
									( $(SET_X); rm -f $$SHLIB$$x$$SHLIB_SUFFIX; \
 | 
				
			||||||
 | 
									  ln -s $$prev $$SHLIB$$x$$SHLIB_SUFFIX ); \
 | 
				
			||||||
 | 
									prev=$$SHLIB$$x$$SHLIB_SUFFIX; \
 | 
				
			||||||
 | 
								done; \
 | 
				
			||||||
 | 
							fi; \
 | 
				
			||||||
 | 
							if [ -n "$$SHLIB_SOVER" ]; then \
 | 
				
			||||||
 | 
								( $(SET_X); rm -f $$SHLIB$$SHLIB_SUFFIX; \
 | 
				
			||||||
 | 
								  ln -s $$prev $$SHLIB$$SHLIB_SUFFIX ); \
 | 
				
			||||||
 | 
							fi; \
 | 
				
			||||||
 | 
						fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					LINK_SO_A=	SHOBJECTS="lib$(LIBNAME).a $(LIBEXTRAS)"; $(LINK_SO)
 | 
				
			||||||
 | 
					LINK_SO_O=	SHOBJECTS="$(LIBEXTRAS)"; $(LINK_SO)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					LINK_SO_A_VIA_O=	\
 | 
				
			||||||
 | 
					  SHOBJECTS=lib$(LIBNAME).o; \
 | 
				
			||||||
 | 
					  ALL=$$ALLSYMSFLAGS; ALLSYMSFLAGS=; NOALLSYMSFLAGS=; \
 | 
				
			||||||
 | 
					  ( $(SET_X); \
 | 
				
			||||||
 | 
					    ld $(LDFLAGS) -r -o lib$(LIBNAME).o $$ALL lib$(LIBNAME).a $(LIBEXTRAS) ); \
 | 
				
			||||||
 | 
					  $(LINK_SO) && rm -f $(LIBNAME).o
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					LINK_SO_A_UNPACKED=	\
 | 
				
			||||||
 | 
					  UNPACKDIR=link_tmp.$$$$; rm -rf $$UNPACKDIR; mkdir $$UNPACKDIR; \
 | 
				
			||||||
 | 
					  (cd $$UNPACKDIR; ar x ../lib$(LIBNAME).a) && \
 | 
				
			||||||
 | 
					  ([ -z "$(LIBEXTRAS)" ] || cp $(LIBEXTRAS) $$UNPACKDIR) && \
 | 
				
			||||||
 | 
					  SHOBJECTS=$$UNPACKDIR/*.o; \
 | 
				
			||||||
 | 
					  $(LINK_SO) && rm -rf $$UNPACKDIR
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					DETECT_GNU_LD=(${CC} -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					DO_GNU_SO=$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS='-Wl,--whole-archive'; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
 | 
				
			||||||
 | 
						SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					DO_GNU_APP=LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBRPATH)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#This is rather special.  It's a special target with which one can link
 | 
				
			||||||
 | 
					#applications without bothering with any features that have anything to
 | 
				
			||||||
 | 
					#do with shared libraries, for example when linking against static
 | 
				
			||||||
 | 
					#libraries.  It's mostly here to avoid a lot of conditionals everywhere
 | 
				
			||||||
 | 
					#else...
 | 
				
			||||||
 | 
					link_app.:
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					link_o.gnu:
 | 
				
			||||||
 | 
						@ $(DO_GNU_SO); $(LINK_SO_O)
 | 
				
			||||||
 | 
					link_a.gnu:
 | 
				
			||||||
 | 
						@ $(DO_GNU_SO); $(LINK_SO_A)
 | 
				
			||||||
 | 
					link_app.gnu:
 | 
				
			||||||
 | 
						@ $(DO_GNU_APP); $(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					link_o.bsd:
 | 
				
			||||||
 | 
						@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
 | 
				
			||||||
 | 
						$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
						LIBDEPS=" "; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS="-Wl,-Bforcearchive"; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS=; \
 | 
				
			||||||
 | 
						SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
 | 
				
			||||||
 | 
						fi; $(LINK_SO_O)
 | 
				
			||||||
 | 
					link_a.bsd:
 | 
				
			||||||
 | 
						@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
 | 
				
			||||||
 | 
						$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
						LIBDEPS=" "; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS="-Wl,-Bforcearchive"; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS=; \
 | 
				
			||||||
 | 
						SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
 | 
				
			||||||
 | 
						fi; $(LINK_SO_A)
 | 
				
			||||||
 | 
					link_app.bsd:
 | 
				
			||||||
 | 
						@if ${DETECT_GNU_LD}; then $(DO_GNU_APP); else \
 | 
				
			||||||
 | 
						LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBPATH)"; \
 | 
				
			||||||
 | 
						fi; $(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# For Darwin AKA Mac OS/X (dyld)
 | 
				
			||||||
 | 
					# link_o.darwin produces .so, because we let it use dso_dlfcn module,
 | 
				
			||||||
 | 
					# which has .so extension hard-coded. One can argue that one should
 | 
				
			||||||
 | 
					# develop special dso module for MacOS X. At least manual encourages
 | 
				
			||||||
 | 
					# to use native NSModule(3) API and refers to dlfcn as termporary hack.
 | 
				
			||||||
 | 
					link_o.darwin:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=`expr "$$THIS" : '.*/\([^/\.]*\)\.'`; \
 | 
				
			||||||
 | 
						SHLIB=$${SHLIB:-lib$(LIBNAME)}; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=`expr "$$THIS" : '.*\(\.[^\.]*\)$$'`; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=$${SHLIB_SUFFIX:-.so}; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS='-all_load'; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
						SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS)"; \
 | 
				
			||||||
 | 
						if [ -n "$(LIBVERSION)" ]; then \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$$SHAREDFLAGS -current_version $(LIBVERSION)"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_O)
 | 
				
			||||||
 | 
					link_a.darwin:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME); \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=.dylib; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS='-all_load'; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
						SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS)"; \
 | 
				
			||||||
 | 
						if [ -n "$(LIBVERSION)" ]; then \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$$SHAREDFLAGS -current_version $(LIBVERSION)"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						SHAREDFLAGS="$$SHAREDFLAGS -install_name ${INSTALLTOP}/lib/$$SHLIB${SHLIB_EXT}"; \
 | 
				
			||||||
 | 
						$(LINK_SO_A)
 | 
				
			||||||
 | 
					link_app.darwin:	# is there run-path on darwin?
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					link_o.cygwin:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						INHIBIT_SYMLINKS=yes; \
 | 
				
			||||||
 | 
						SHLIB=cyg$(LIBNAME); \
 | 
				
			||||||
 | 
						base=-Wl,--enable-auto-image-base; \
 | 
				
			||||||
 | 
						if expr $(PLATFORM) : 'mingw' > /dev/null; then \
 | 
				
			||||||
 | 
							SHLIB=$(LIBNAME)eay32; base=; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=.dll; \
 | 
				
			||||||
 | 
						LIBVERSION="$(LIBVERSION)"; \
 | 
				
			||||||
 | 
						SHLIB_SOVER=${LIBVERSION:+"-$(LIBVERSION)"}; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS='-Wl,--whole-archive'; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
 | 
				
			||||||
 | 
						SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a"; \
 | 
				
			||||||
 | 
						$(LINK_SO_O)
 | 
				
			||||||
 | 
					link_a.cygwin:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						INHIBIT_SYMLINKS=yes; \
 | 
				
			||||||
 | 
						SHLIB=cyg$(LIBNAME); \
 | 
				
			||||||
 | 
						base=-Wl,--enable-auto-image-base; \
 | 
				
			||||||
 | 
						if expr $(PLATFORM) : 'mingw' > /dev/null; then \
 | 
				
			||||||
 | 
							SHLIB=$(LIBNAME)eay32; \
 | 
				
			||||||
 | 
							base=;  [ $(LIBNAME) = "crypto" ] && base=-Wl,--image-base,0x63000000; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=.dll; \
 | 
				
			||||||
 | 
						SHLIB_SOVER=-$(LIBVERSION); \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS='-Wl,--whole-archive'; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
 | 
				
			||||||
 | 
						SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a"; \
 | 
				
			||||||
 | 
						[ -f apps/$$SHLIB$$SHLIB_SUFFIX ] && rm apps/$$SHLIB$$SHLIB_SUFFIX; \
 | 
				
			||||||
 | 
						[ -f test/$$SHLIB$$SHLIB_SUFFIX ] && rm test/$$SHLIB$$SHLIB_SUFFIX; \
 | 
				
			||||||
 | 
						$(LINK_SO_A) || exit 1; \
 | 
				
			||||||
 | 
						cp -p $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX apps/; \
 | 
				
			||||||
 | 
						cp -p $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX test/
 | 
				
			||||||
 | 
					link_app.cygwin:
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					link_o.alpha-osf1:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_SO); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
							SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
							SHLIB_HIST=`echo "$(LIBCOMPATVERSIONS)" | cut -d';' -f2 | sed -e 's/ */:/'`; \
 | 
				
			||||||
 | 
							if [ -n "$$SHLIB_HIST" ]; then \
 | 
				
			||||||
 | 
								SHLIB_HIST="$${SHLIB_HIST}:$(LIBVERSION)"; \
 | 
				
			||||||
 | 
							else \
 | 
				
			||||||
 | 
								SHLIB_HIST="$(LIBVERSION)"; \
 | 
				
			||||||
 | 
							fi; \
 | 
				
			||||||
 | 
							SHLIB_SOVER=; \
 | 
				
			||||||
 | 
							ALLSYMSFLAGS='-all'; \
 | 
				
			||||||
 | 
							NOALLSYMSFLAGS='-none'; \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-B,symbolic"; \
 | 
				
			||||||
 | 
							if [ -n "$$SHLIB_HIST" ]; then \
 | 
				
			||||||
 | 
								SHAREDFLAGS="$$SHAREDFLAGS -set_version $$SHLIB_HIST"; \
 | 
				
			||||||
 | 
							fi; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_O)
 | 
				
			||||||
 | 
					link_a.alpha-osf1:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_SO); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
							SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
							SHLIB_HIST=`echo "$(LIBCOMPATVERSIONS)" | cut -d';' -f2 | sed -e 's/ */:/'`; \
 | 
				
			||||||
 | 
							if [ -n "$$SHLIB_HIST" ]; then \
 | 
				
			||||||
 | 
								SHLIB_HIST="$${SHLIB_HIST}:$(LIBVERSION)"; \
 | 
				
			||||||
 | 
							else \
 | 
				
			||||||
 | 
								SHLIB_HIST="$(LIBVERSION)"; \
 | 
				
			||||||
 | 
							fi; \
 | 
				
			||||||
 | 
							SHLIB_SOVER=; \
 | 
				
			||||||
 | 
							ALLSYMSFLAGS='-all'; \
 | 
				
			||||||
 | 
							NOALLSYMSFLAGS='-none'; \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-B,symbolic"; \
 | 
				
			||||||
 | 
							if [ -n "$$SHLIB_HIST" ]; then \
 | 
				
			||||||
 | 
								SHAREDFLAGS="$$SHAREDFLAGS -set_version $$SHLIB_HIST"; \
 | 
				
			||||||
 | 
							fi; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_A)
 | 
				
			||||||
 | 
					link_app.alpha-osf1:
 | 
				
			||||||
 | 
						@if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_APP); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							LDFLAGS="$(CFLAGS) -rpath $(LIBRPATH)"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					link_o.solaris:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_SO); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
							MINUSZ='-z '; \
 | 
				
			||||||
 | 
							($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
 | 
				
			||||||
 | 
							SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
							SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
							ALLSYMSFLAGS="$${MINUSZ}allextract"; \
 | 
				
			||||||
 | 
							NOALLSYMSFLAGS="$${MINUSZ}defaultextract"; \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX -Wl,-Bsymbolic"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_O)
 | 
				
			||||||
 | 
					link_a.solaris:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_SO); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
							MINUSZ='-z '; \
 | 
				
			||||||
 | 
							(${CC} -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
 | 
				
			||||||
 | 
							SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
							SHLIB_SUFFIX=;\
 | 
				
			||||||
 | 
							ALLSYMSFLAGS="$${MINUSZ}allextract"; \
 | 
				
			||||||
 | 
							NOALLSYMSFLAGS="$${MINUSZ}defaultextract"; \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX -Wl,-Bsymbolic"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_A)
 | 
				
			||||||
 | 
					link_app.solaris:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_APP); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							LDFLAGS="$(CFLAGS) -R $(LIBRPATH)"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# OpenServer 5 native compilers used
 | 
				
			||||||
 | 
					link_o.svr3:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_SO); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
							SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
							SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
							ALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
							NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$(CFLAGS) -G -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_O)
 | 
				
			||||||
 | 
					link_a.svr3:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_SO); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
							SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
							SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
							ALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
							NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$(CFLAGS) -G -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_A_UNPACKED)
 | 
				
			||||||
 | 
					link_app.svr3:
 | 
				
			||||||
 | 
						@${DETECT_GNU_LD} && $(DO_GNU_APP); \
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# UnixWare 7 and OpenUNIX 8 native compilers used
 | 
				
			||||||
 | 
					link_o.svr5:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_SO); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
							SHARE_FLAG='-G'; \
 | 
				
			||||||
 | 
							($(CC) -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
 | 
				
			||||||
 | 
							SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
							SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
							ALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
							NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$(CFLAGS) $${SHARE_FLAG} -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_O)
 | 
				
			||||||
 | 
					link_a.svr5:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_SO); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
							SHARE_FLAG='-G'; \
 | 
				
			||||||
 | 
							(${CC} -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
 | 
				
			||||||
 | 
							SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
							SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
							ALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
							NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$(CFLAGS) $${SHARE_FLAG} -h $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_A_UNPACKED)
 | 
				
			||||||
 | 
					link_app.svr5:
 | 
				
			||||||
 | 
						@${DETECT_GNU_LD} && $(DO_GNU_APP); \
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					link_o.irix:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_SO); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
							SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
							SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
							MINUSWL=""; \
 | 
				
			||||||
 | 
							($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSWL="-Wl,"; \
 | 
				
			||||||
 | 
							ALLSYMSFLAGS="$${MINUSWL}-all"; \
 | 
				
			||||||
 | 
							NOALLSYMSFLAGS="$${MINUSWL}-none"; \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-soname,$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX,-B,symbolic"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_O)
 | 
				
			||||||
 | 
					link_a.irix:
 | 
				
			||||||
 | 
						@ if ${DETECT_GNU_LD}; then \
 | 
				
			||||||
 | 
							$(DO_GNU_SO); \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
							SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
							SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
							MINUSWL=""; \
 | 
				
			||||||
 | 
							($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSWL="-Wl,"; \
 | 
				
			||||||
 | 
							ALLSYMSFLAGS="$${MINUSWL}-all"; \
 | 
				
			||||||
 | 
							NOALLSYMSFLAGS="$${MINUSWL}-none"; \
 | 
				
			||||||
 | 
							SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-soname,$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX,-B,symbolic"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_SO_A)
 | 
				
			||||||
 | 
					link_app.irix:
 | 
				
			||||||
 | 
						@LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBRPATH)"; \
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# 32-bit PA-RISC HP-UX embeds the -L pathname of libs we link with, so
 | 
				
			||||||
 | 
					# we compensate for it with +cdp ../: and +cdp ./:. Yes, these rewrite
 | 
				
			||||||
 | 
					# rules imply that we can only link one level down in catalog structure,
 | 
				
			||||||
 | 
					# but that's what takes place for the moment of this writing. +cdp option
 | 
				
			||||||
 | 
					# was introduced in HP-UX 11.x and applies in 32-bit PA-RISC link
 | 
				
			||||||
 | 
					# editor context only [it's simply ignored in other cases, which are all
 | 
				
			||||||
 | 
					# ELFs by the way].
 | 
				
			||||||
 | 
					#
 | 
				
			||||||
 | 
					link_o.hpux:
 | 
				
			||||||
 | 
						@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
 | 
				
			||||||
 | 
						$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).sl; \
 | 
				
			||||||
 | 
						expr "$(CFLAGS)" : '.*DSO_DLFCN' > /dev/null && SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS='-Wl,-Fl'; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
						expr $(PLATFORM) : 'hpux64' > /dev/null && ALLSYMSFLAGS='-Wl,+forceload'; \
 | 
				
			||||||
 | 
						SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-B,symbolic,+vnocompatwarnings,-z,+s,+h,$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX,+cdp,../:,+cdp,./:"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
 | 
				
			||||||
 | 
						$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
 | 
				
			||||||
 | 
					link_a.hpux:
 | 
				
			||||||
 | 
						@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
 | 
				
			||||||
 | 
						$(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).sl; \
 | 
				
			||||||
 | 
						expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS='-Wl,-Fl'; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
						expr $(PLATFORM) : 'hpux64' > /dev/null && ALLSYMSFLAGS='-Wl,+forceload'; \
 | 
				
			||||||
 | 
						SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-B,symbolic,+vnocompatwarnings,-z,+s,+h,$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX,+cdp,../:,+cdp,./:"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
 | 
				
			||||||
 | 
						$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
 | 
				
			||||||
 | 
					link_app.hpux:
 | 
				
			||||||
 | 
						@if ${DETECT_GNU_LD}; then $(DO_GNU_APP); else \
 | 
				
			||||||
 | 
						LDFLAGS="$(CFLAGS) -Wl,+s,+cdp,../:,+cdp,./:,+b,$(LIBRPATH)"; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					link_o.aix:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						OBJECT_MODE=`expr "x$(SHARED_LDFLAGS)" : 'x\-[a-z]*\(64\)'` || :; \
 | 
				
			||||||
 | 
						OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
						SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-bexpall,-bnolibpath,-bM:SRE'; \
 | 
				
			||||||
 | 
						$(LINK_SO_O);
 | 
				
			||||||
 | 
					link_a.aix:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						OBJECT_MODE=`expr "x$(SHARED_LDFLAGS)" : 'x\-[a-z]*\(64\)'` || : ; \
 | 
				
			||||||
 | 
						OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS='-bnogc'; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
						SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-bexpall,-bnolibpath,-bM:SRE'; \
 | 
				
			||||||
 | 
						$(LINK_SO_A_VIA_O)
 | 
				
			||||||
 | 
					link_app.aix:
 | 
				
			||||||
 | 
						LDFLAGS="$(CFLAGS) -Wl,-brtl,-blibpath:$(LIBRPATH):$${LIBPATH:-/usr/lib:/lib}"; \
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					link_o.reliantunix:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS=; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
						SHAREDFLAGS='$(CFLAGS) -G'; \
 | 
				
			||||||
 | 
						$(LINK_SO_O)
 | 
				
			||||||
 | 
					link_a.reliantunix:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=; \
 | 
				
			||||||
 | 
						ALLSYMSFLAGS=; \
 | 
				
			||||||
 | 
						NOALLSYMSFLAGS=''; \
 | 
				
			||||||
 | 
						SHAREDFLAGS='$(CFLAGS) -G'; \
 | 
				
			||||||
 | 
						$(LINK_SO_A_UNPACKED)
 | 
				
			||||||
 | 
					link_app.reliantunix:
 | 
				
			||||||
 | 
						$(LINK_APP)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Targets to build symbolic links when needed
 | 
				
			||||||
 | 
					symlink.gnu symlink.solaris symlink.svr3 symlink.svr5 symlink.irix \
 | 
				
			||||||
 | 
					symlink.aix symlink.reliantunix:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						$(SYMLINK_SO)
 | 
				
			||||||
 | 
					symlink.darwin:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME); \
 | 
				
			||||||
 | 
						SHLIB_SUFFIX=.dylib; \
 | 
				
			||||||
 | 
						$(SYMLINK_SO)
 | 
				
			||||||
 | 
					symlink.hpux:
 | 
				
			||||||
 | 
						@ $(CALC_VERSIONS); \
 | 
				
			||||||
 | 
						SHLIB=lib$(LIBNAME).sl; \
 | 
				
			||||||
 | 
						expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
 | 
				
			||||||
 | 
						$(SYMLINK_SO)
 | 
				
			||||||
 | 
					# The following lines means those specific architectures do no symlinks
 | 
				
			||||||
 | 
					symlink.cygwin symlink.alpha-osf1 symlink.tru64 symlink.tru64-rpath:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Compatibility targets
 | 
				
			||||||
 | 
					link_o.bsd-gcc-shared link_o.linux-shared link_o.gnu-shared: link_o.gnu
 | 
				
			||||||
 | 
					link_a.bsd-gcc-shared link_a.linux-shared link_a.gnu-shared: link_a.gnu
 | 
				
			||||||
 | 
					link_app.bsd-gcc-shared link_app.linux-shared link_app.gnu-shared: link_app.gnu
 | 
				
			||||||
 | 
					symlink.bsd-gcc-shared symlink.bsd-shared symlink.linux-shared symlink.gnu-shared: symlink.gnu
 | 
				
			||||||
 | 
					link_o.bsd-shared: link_o.bsd
 | 
				
			||||||
 | 
					link_a.bsd-shared: link_a.bsd
 | 
				
			||||||
 | 
					link_app.bsd-shared: link_app.bsd
 | 
				
			||||||
 | 
					link_o.darwin-shared: link_o.darwin
 | 
				
			||||||
 | 
					link_a.darwin-shared: link_a.darwin
 | 
				
			||||||
 | 
					link_app.darwin-shared: link_app.darwin
 | 
				
			||||||
 | 
					symlink.darwin-shared: symlink.darwin
 | 
				
			||||||
 | 
					link_o.cygwin-shared: link_o.cygwin
 | 
				
			||||||
 | 
					link_a.cygwin-shared: link_a.cygwin
 | 
				
			||||||
 | 
					link_app.cygwin-shared: link_app.cygwin
 | 
				
			||||||
 | 
					symlink.cygwin-shared: symlink.cygwin
 | 
				
			||||||
 | 
					link_o.alpha-osf1-shared: link_o.alpha-osf1
 | 
				
			||||||
 | 
					link_a.alpha-osf1-shared: link_a.alpha-osf1
 | 
				
			||||||
 | 
					link_app.alpha-osf1-shared: link_app.alpha-osf1
 | 
				
			||||||
 | 
					symlink.alpha-osf1-shared: symlink.alpha-osf1
 | 
				
			||||||
 | 
					link_o.tru64-shared: link_o.tru64
 | 
				
			||||||
 | 
					link_a.tru64-shared: link_a.tru64
 | 
				
			||||||
 | 
					link_app.tru64-shared: link_app.tru64
 | 
				
			||||||
 | 
					symlink.tru64-shared: symlink.tru64
 | 
				
			||||||
 | 
					link_o.tru64-shared-rpath: link_o.tru64-rpath
 | 
				
			||||||
 | 
					link_a.tru64-shared-rpath: link_a.tru64-rpath
 | 
				
			||||||
 | 
					link_app.tru64-shared-rpath: link_app.tru64-rpath
 | 
				
			||||||
 | 
					symlink.tru64-shared-rpath: symlink.tru64-rpath
 | 
				
			||||||
 | 
					link_o.solaris-shared: link_o.solaris
 | 
				
			||||||
 | 
					link_a.solaris-shared: link_a.solaris
 | 
				
			||||||
 | 
					link_app.solaris-shared: link_app.solaris
 | 
				
			||||||
 | 
					symlink.solaris-shared: symlink.solaris
 | 
				
			||||||
 | 
					link_o.svr3-shared: link_o.svr3
 | 
				
			||||||
 | 
					link_a.svr3-shared: link_a.svr3
 | 
				
			||||||
 | 
					link_app.svr3-shared: link_app.svr3
 | 
				
			||||||
 | 
					symlink.svr3-shared: symlink.svr3
 | 
				
			||||||
 | 
					link_o.svr5-shared: link_o.svr5
 | 
				
			||||||
 | 
					link_a.svr5-shared: link_a.svr5
 | 
				
			||||||
 | 
					link_app.svr5-shared: link_app.svr5
 | 
				
			||||||
 | 
					symlink.svr5-shared: symlink.svr5
 | 
				
			||||||
 | 
					link_o.irix-shared: link_o.irix
 | 
				
			||||||
 | 
					link_a.irix-shared: link_a.irix
 | 
				
			||||||
 | 
					link_app.irix-shared: link_app.irix
 | 
				
			||||||
 | 
					symlink.irix-shared: symlink.irix
 | 
				
			||||||
 | 
					link_o.hpux-shared: link_o.hpux
 | 
				
			||||||
 | 
					link_a.hpux-shared: link_a.hpux
 | 
				
			||||||
 | 
					link_app.hpux-shared: link_app.hpux
 | 
				
			||||||
 | 
					symlink.hpux-shared: symlink.hpux
 | 
				
			||||||
 | 
					link_o.aix-shared: link_o.aix
 | 
				
			||||||
 | 
					link_a.aix-shared: link_a.aix
 | 
				
			||||||
 | 
					link_app.aix-shared: link_app.aix
 | 
				
			||||||
 | 
					symlink.aix-shared: symlink.aix
 | 
				
			||||||
 | 
					link_o.reliantunix-shared: link_o.reliantunix
 | 
				
			||||||
 | 
					link_a.reliantunix-shared: link_a.reliantunix
 | 
				
			||||||
 | 
					link_app.reliantunix-shared: link_app.reliantunix
 | 
				
			||||||
 | 
					symlink.reliantunix-shared: symlink.reliantunix
 | 
				
			||||||
							
								
								
									
										338
									
								
								NEWS
									
									
									
									
									
								
							
							
						
						
									
										338
									
								
								NEWS
									
									
									
									
									
								
							@@ -5,7 +5,293 @@
 | 
				
			|||||||
  This file gives a brief overview of the major changes between each OpenSSL
 | 
					  This file gives a brief overview of the major changes between each OpenSSL
 | 
				
			||||||
  release. For more details please read the CHANGES file.
 | 
					  release. For more details please read the CHANGES file.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g:
 | 
					  Major changes between OpenSSL 0.9.8zc and OpenSSL 0.9.8zd [8 Jan 2015]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3571
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3569
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3572
 | 
				
			||||||
 | 
					      o Fix for CVE-2015-0204
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-8275
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3570
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8zb and OpenSSL 0.9.8zc [15 Oct 2014]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3513
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3567
 | 
				
			||||||
 | 
					      o Mitigation for CVE-2014-3566 (SSL protocol vulnerability)
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3568
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8za and OpenSSL 0.9.8zb [6 Aug 2014]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3510
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3507
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3506
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3505
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3508
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Known issues in OpenSSL 0.9.8za:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Compilation failure of s3_pkt.c on some platforms due to missing
 | 
				
			||||||
 | 
					        <limits.h> include. Fixed in 0.9.8zb-dev.
 | 
				
			||||||
 | 
					      o FIPS capable link failure with missing symbol BN_consttime_swap.
 | 
				
			||||||
 | 
					        Fixed in 0.9.8zb-dev. Workaround is to compile with no-ec: the EC
 | 
				
			||||||
 | 
					        algorithms are not FIPS approved in OpenSSL 0.9.8 anyway.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8y and OpenSSL 0.9.8za [5 Jun 2014]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-0224
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-0221
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-0195
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-3470
 | 
				
			||||||
 | 
					      o Fix for CVE-2014-0076
 | 
				
			||||||
 | 
					      o Fix for CVE-2010-5298
 | 
				
			||||||
 | 
					      o Fix to TLS alert handling.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8x and OpenSSL 0.9.8y [5 Feb 2013]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
 | 
				
			||||||
 | 
					      o Fix OCSP bad key DoS attack CVE-2013-0166
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8w and OpenSSL 0.9.8x [10 May 2012]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix DTLS record length checking bug CVE-2012-2333
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8v and OpenSSL 0.9.8w [23 Apr 2012]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for CVE-2012-2131 (corrected fix for 0.9.8 and CVE-2012-2110)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8u and OpenSSL 0.9.8v [19 Apr 2012]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for ASN1 overflow bug CVE-2012-2110
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8t and OpenSSL 0.9.8u [12 Mar 2012]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for CMS/PKCS#7 MMA CVE-2012-0884
 | 
				
			||||||
 | 
					      o Corrected fix for CVE-2011-4619
 | 
				
			||||||
 | 
					      o Various DTLS fixes.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8s and OpenSSL 0.9.8t [18 Jan 2012]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for DTLS DoS issue CVE-2012-0050
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8r and OpenSSL 0.9.8s [4 Jan 2012]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for DTLS plaintext recovery attack CVE-2011-4108
 | 
				
			||||||
 | 
					      o Fix policy check double free error CVE-2011-4109
 | 
				
			||||||
 | 
					      o Clear block padding bytes of SSL 3.0 records CVE-2011-4576
 | 
				
			||||||
 | 
					      o Only allow one SGC handshake restart for SSL/TLS CVE-2011-4619
 | 
				
			||||||
 | 
					      o Check for malformed RFC3779 data CVE-2011-4577
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r [8 Feb 2011]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for security issue CVE-2011-0014
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8p and OpenSSL 0.9.8q [2 Dec 2010]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for security issue CVE-2010-4180
 | 
				
			||||||
 | 
					      o Fix for CVE-2010-4252
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8o and OpenSSL 0.9.8p [16 Nov 2010]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for security issue CVE-2010-3864.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8n and OpenSSL 0.9.8o [1 Jun 2010]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix for security issue CVE-2010-0742.
 | 
				
			||||||
 | 
					      o Various DTLS fixes.
 | 
				
			||||||
 | 
					      o Recognise SHA2 certificates if only SSL algorithms added.
 | 
				
			||||||
 | 
					      o Fix for no-rc4 compilation.
 | 
				
			||||||
 | 
					      o Chil ENGINE unload workaround.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n [24 Mar 2010]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o CFB cipher definition fixes.
 | 
				
			||||||
 | 
					      o Fix security issues CVE-2010-0740 and CVE-2010-0433.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m [25 Feb 2010]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Cipher definition fixes.
 | 
				
			||||||
 | 
					      o Workaround for slow RAND_poll() on some WIN32 versions.
 | 
				
			||||||
 | 
					      o Remove MD2 from algorithm tables.
 | 
				
			||||||
 | 
					      o SPKAC handling fixes.
 | 
				
			||||||
 | 
					      o Support for RFC5746 TLS renegotiation extension.
 | 
				
			||||||
 | 
					      o Compression memory leak fixed.
 | 
				
			||||||
 | 
					      o Compression session resumption fixed.
 | 
				
			||||||
 | 
					      o Ticket and SNI coexistence fixes.
 | 
				
			||||||
 | 
					      o Many fixes to DTLS handling. 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l [5 Nov 2009]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Temporary work around for CVE-2009-3555: disable renegotiation.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k [25 Mar 2009]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix various build issues.
 | 
				
			||||||
 | 
					      o Fix security issues (CVE-2009-0590, CVE-2009-0591, CVE-2009-0789)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j [7 Jan 2009]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix security issue (CVE-2008-5077)
 | 
				
			||||||
 | 
					      o Merge FIPS 140-2 branch code.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h [28 May 2008]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o CryptoAPI ENGINE support.
 | 
				
			||||||
 | 
					      o Various precautionary measures.
 | 
				
			||||||
 | 
					      o Fix for bugs affecting certificate request creation.
 | 
				
			||||||
 | 
					      o Support for local machine keyset attribute in PKCS#12 files.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g [19 Oct 2007]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Backport of CMS functionality to 0.9.8.
 | 
				
			||||||
 | 
					      o Fixes for bugs introduced with 0.9.8f.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f [11 Oct 2007]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Add gcc 4.2 support.
 | 
				
			||||||
 | 
					      o Add support for AES and SSE2 assembly lanugauge optimization
 | 
				
			||||||
 | 
					        for VC++ build.
 | 
				
			||||||
 | 
					      o Support for RFC4507bis and server name extensions if explicitly 
 | 
				
			||||||
 | 
					        selected at compile time.
 | 
				
			||||||
 | 
					      o DTLS improvements.
 | 
				
			||||||
 | 
					      o RFC4507bis support.
 | 
				
			||||||
 | 
					      o TLS Extensions support.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e [23 Feb 2007]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Various ciphersuite selection fixes.
 | 
				
			||||||
 | 
					      o RFC3779 support.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8c and OpenSSL 0.9.8d [28 Sep 2006]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Introduce limits to prevent malicious key DoS  (CVE-2006-2940)
 | 
				
			||||||
 | 
					      o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
 | 
				
			||||||
 | 
					      o Changes to ciphersuite selection algorithm
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8b and OpenSSL 0.9.8c [5 Sep 2006]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
 | 
				
			||||||
 | 
					      o New cipher Camellia
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8a and OpenSSL 0.9.8b [4 May 2006]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Cipher string fixes.
 | 
				
			||||||
 | 
					      o Fixes for VC++ 2005.
 | 
				
			||||||
 | 
					      o Updated ECC cipher suite support.
 | 
				
			||||||
 | 
					      o New functions EVP_CIPHER_CTX_new() and EVP_CIPHER_CTX_free().
 | 
				
			||||||
 | 
					      o Zlib compression usage fixes.
 | 
				
			||||||
 | 
					      o Built in dynamic engine compilation support on Win32.
 | 
				
			||||||
 | 
					      o Fixes auto dynamic engine loading in Win32.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.8 and OpenSSL 0.9.8a [11 Oct 2005]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix potential SSL 2.0 rollback, CVE-2005-2969
 | 
				
			||||||
 | 
					      o Extended Windows CE support
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.8 [5 Jul 2005]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Major work on the BIGNUM library for higher efficiency and to
 | 
				
			||||||
 | 
					        make operations more streamlined and less contradictory.  This
 | 
				
			||||||
 | 
					        is the result of a major audit of the BIGNUM library.
 | 
				
			||||||
 | 
					      o Addition of BIGNUM functions for fields GF(2^m) and NIST
 | 
				
			||||||
 | 
					        curves, to support the Elliptic Crypto functions.
 | 
				
			||||||
 | 
					      o Major work on Elliptic Crypto; ECDH and ECDSA added, including
 | 
				
			||||||
 | 
					        the use through EVP, X509 and ENGINE.
 | 
				
			||||||
 | 
					      o New ASN.1 mini-compiler that's usable through the OpenSSL
 | 
				
			||||||
 | 
					        configuration file.
 | 
				
			||||||
 | 
					      o Added support for ASN.1 indefinite length constructed encoding.
 | 
				
			||||||
 | 
					      o New PKCS#12 'medium level' API to manipulate PKCS#12 files.
 | 
				
			||||||
 | 
					      o Complete rework of shared library construction and linking
 | 
				
			||||||
 | 
					        programs with shared or static libraries, through a separate
 | 
				
			||||||
 | 
					        Makefile.shared.
 | 
				
			||||||
 | 
					      o Rework of the passing of parameters from one Makefile to another.
 | 
				
			||||||
 | 
					      o Changed ENGINE framework to load dynamic engine modules
 | 
				
			||||||
 | 
					        automatically from specifically given directories.
 | 
				
			||||||
 | 
					      o New structure and ASN.1 functions for CertificatePair.
 | 
				
			||||||
 | 
					      o Changed the ZLIB compression method to be stateful.
 | 
				
			||||||
 | 
					      o Changed the key-generation and primality testing "progress"
 | 
				
			||||||
 | 
					        mechanism to take a structure that contains the ticker
 | 
				
			||||||
 | 
					        function and an argument.
 | 
				
			||||||
 | 
					      o New engine module: GMP (performs private key exponentiation).
 | 
				
			||||||
 | 
					      o New engine module: VIA PadLOck ACE extension in VIA C3
 | 
				
			||||||
 | 
					        Nehemiah processors.
 | 
				
			||||||
 | 
					      o Added support for IPv6 addresses in certificate extensions.
 | 
				
			||||||
 | 
					        See RFC 1884, section 2.2.
 | 
				
			||||||
 | 
					      o Added support for certificate policy mappings, policy
 | 
				
			||||||
 | 
					        constraints and name constraints.
 | 
				
			||||||
 | 
					      o Added support for multi-valued AVAs in the OpenSSL
 | 
				
			||||||
 | 
					        configuration file.
 | 
				
			||||||
 | 
					      o Added support for multiple certificates with the same subject
 | 
				
			||||||
 | 
					        in the 'openssl ca' index file.
 | 
				
			||||||
 | 
					      o Make it possible to create self-signed certificates using
 | 
				
			||||||
 | 
					        'openssl ca -selfsign'.
 | 
				
			||||||
 | 
					      o Make it possible to generate a serial number file with
 | 
				
			||||||
 | 
					        'openssl ca -create_serial'.
 | 
				
			||||||
 | 
					      o New binary search functions with extended functionality.
 | 
				
			||||||
 | 
					      o New BUF functions.
 | 
				
			||||||
 | 
					      o New STORE structure and library to provide an interface to all
 | 
				
			||||||
 | 
					        sorts of data repositories.  Supports storage of public and
 | 
				
			||||||
 | 
					        private keys, certificates, CRLs, numbers and arbitrary blobs.
 | 
				
			||||||
 | 
						This library is unfortunately unfinished and unused withing
 | 
				
			||||||
 | 
						OpenSSL.
 | 
				
			||||||
 | 
					      o New control functions for the error stack.
 | 
				
			||||||
 | 
					      o Changed the PKCS#7 library to support one-pass S/MIME
 | 
				
			||||||
 | 
					        processing.
 | 
				
			||||||
 | 
					      o Added the possibility to compile without old deprecated
 | 
				
			||||||
 | 
					        functionality with the OPENSSL_NO_DEPRECATED macro or the
 | 
				
			||||||
 | 
					        'no-deprecated' argument to the config and Configure scripts.
 | 
				
			||||||
 | 
					      o Constification of all ASN.1 conversion functions, and other
 | 
				
			||||||
 | 
					        affected functions.
 | 
				
			||||||
 | 
					      o Improved platform support for PowerPC.
 | 
				
			||||||
 | 
					      o New FIPS 180-2 algorithms (SHA-224, -256, -384 and -512).
 | 
				
			||||||
 | 
					      o New X509_VERIFY_PARAM structure to support parametrisation
 | 
				
			||||||
 | 
					        of X.509 path validation.
 | 
				
			||||||
 | 
					      o Major overhaul of RC4 performance on Intel P4, IA-64 and
 | 
				
			||||||
 | 
					        AMD64.
 | 
				
			||||||
 | 
					      o Changed the Configure script to have some algorithms disabled
 | 
				
			||||||
 | 
					        by default.  Those can be explicitely enabled with the new
 | 
				
			||||||
 | 
					        argument form 'enable-xxx'.
 | 
				
			||||||
 | 
					      o Change the default digest in 'openssl' commands from MD5 to
 | 
				
			||||||
 | 
					        SHA-1.
 | 
				
			||||||
 | 
					      o Added support for DTLS.
 | 
				
			||||||
 | 
					      o New BIGNUM blinding.
 | 
				
			||||||
 | 
					      o Added support for the RSA-PSS encryption scheme
 | 
				
			||||||
 | 
					      o Added support for the RSA X.931 padding.
 | 
				
			||||||
 | 
					      o Added support for BSD sockets on NetWare.
 | 
				
			||||||
 | 
					      o Added support for files larger than 2GB.
 | 
				
			||||||
 | 
					      o Added initial support for Win64.
 | 
				
			||||||
 | 
					      o Added alternate pkg-config files.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m [23 Feb 2007]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o FIPS 1.1.1 module linking.
 | 
				
			||||||
 | 
					      o Various ciphersuite selection fixes.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l [28 Sep 2006]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Introduce limits to prevent malicious key DoS  (CVE-2006-2940)
 | 
				
			||||||
 | 
					      o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k [5 Sep 2006]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j [4 May 2006]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Visual C++ 2005 fixes.
 | 
				
			||||||
 | 
					      o Update Windows build system for FIPS.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i [14 Oct 2005]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Give EVP_MAX_MD_SIZE it's old value, except for a FIPS build.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h [11 Oct 2005]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Fix SSL 2.0 Rollback, CVE-2005-2969
 | 
				
			||||||
 | 
					      o Allow use of fixed-length exponent on DSA signing
 | 
				
			||||||
 | 
					      o Default fixed-window RSA, DSA, DH private-key operations
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g [11 Apr 2005]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o More compilation issues fixed.
 | 
					      o More compilation issues fixed.
 | 
				
			||||||
      o Adaptation to more modern Kerberos API.
 | 
					      o Adaptation to more modern Kerberos API.
 | 
				
			||||||
@@ -14,7 +300,7 @@
 | 
				
			|||||||
      o More constification.
 | 
					      o More constification.
 | 
				
			||||||
      o Added processing of proxy certificates (RFC 3820).
 | 
					      o Added processing of proxy certificates (RFC 3820).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f:
 | 
					  Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f [22 Mar 2005]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Several compilation issues fixed.
 | 
					      o Several compilation issues fixed.
 | 
				
			||||||
      o Many memory allocation failure checks added.
 | 
					      o Many memory allocation failure checks added.
 | 
				
			||||||
@@ -22,12 +308,12 @@
 | 
				
			|||||||
      o Mandatory basic checks on certificates.
 | 
					      o Mandatory basic checks on certificates.
 | 
				
			||||||
      o Performance improvements.
 | 
					      o Performance improvements.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e:
 | 
					  Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e [25 Oct 2004]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Fix race condition in CRL checking code.
 | 
					      o Fix race condition in CRL checking code.
 | 
				
			||||||
      o Fixes to PKCS#7 (S/MIME) code.
 | 
					      o Fixes to PKCS#7 (S/MIME) code.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d:
 | 
					  Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d [17 Mar 2004]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
 | 
					      o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
 | 
				
			||||||
      o Security: Fix null-pointer assignment in do_change_cipher_spec()
 | 
					      o Security: Fix null-pointer assignment in do_change_cipher_spec()
 | 
				
			||||||
@@ -35,14 +321,14 @@
 | 
				
			|||||||
      o Multiple X509 verification fixes
 | 
					      o Multiple X509 verification fixes
 | 
				
			||||||
      o Speed up HMAC and other operations
 | 
					      o Speed up HMAC and other operations
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c:
 | 
					  Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c [30 Sep 2003]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Security: fix various ASN1 parsing bugs.
 | 
					      o Security: fix various ASN1 parsing bugs.
 | 
				
			||||||
      o New -ignore_err option to OCSP utility.
 | 
					      o New -ignore_err option to OCSP utility.
 | 
				
			||||||
      o Various interop and bug fixes in S/MIME code.
 | 
					      o Various interop and bug fixes in S/MIME code.
 | 
				
			||||||
      o SSL/TLS protocol fix for unrequested client certificates.
 | 
					      o SSL/TLS protocol fix for unrequested client certificates.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b:
 | 
					  Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b [10 Apr 2003]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Security: counter the Klima-Pokorny-Rosa extension of
 | 
					      o Security: counter the Klima-Pokorny-Rosa extension of
 | 
				
			||||||
        Bleichbacher's attack 
 | 
					        Bleichbacher's attack 
 | 
				
			||||||
@@ -53,7 +339,7 @@
 | 
				
			|||||||
      o ASN.1: treat domainComponent correctly.
 | 
					      o ASN.1: treat domainComponent correctly.
 | 
				
			||||||
      o Documentation: fixes and additions.
 | 
					      o Documentation: fixes and additions.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a:
 | 
					  Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a [19 Feb 2003]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Security: Important security related bugfixes.
 | 
					      o Security: Important security related bugfixes.
 | 
				
			||||||
      o Enhanced compatibility with MIT Kerberos.
 | 
					      o Enhanced compatibility with MIT Kerberos.
 | 
				
			||||||
@@ -64,7 +350,7 @@
 | 
				
			|||||||
      o SSL/TLS: now handles manual certificate chain building.
 | 
					      o SSL/TLS: now handles manual certificate chain building.
 | 
				
			||||||
      o SSL/TLS: certain session ID malfunctions corrected.
 | 
					      o SSL/TLS: certain session ID malfunctions corrected.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7:
 | 
					  Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7 [30 Dec 2002]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o New library section OCSP.
 | 
					      o New library section OCSP.
 | 
				
			||||||
      o Complete rewrite of ASN1 code.
 | 
					      o Complete rewrite of ASN1 code.
 | 
				
			||||||
@@ -110,23 +396,23 @@
 | 
				
			|||||||
      o SSL/TLS: add callback to retrieve SSL/TLS messages.
 | 
					      o SSL/TLS: add callback to retrieve SSL/TLS messages.
 | 
				
			||||||
      o SSL/TLS: support AES cipher suites (RFC3268).
 | 
					      o SSL/TLS: support AES cipher suites (RFC3268).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k:
 | 
					  Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k [30 Sep 2003]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Security: fix various ASN1 parsing bugs.
 | 
					      o Security: fix various ASN1 parsing bugs.
 | 
				
			||||||
      o SSL/TLS protocol fix for unrequested client certificates.
 | 
					      o SSL/TLS protocol fix for unrequested client certificates.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j:
 | 
					  Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j [10 Apr 2003]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Security: counter the Klima-Pokorny-Rosa extension of
 | 
					      o Security: counter the Klima-Pokorny-Rosa extension of
 | 
				
			||||||
        Bleichbacher's attack 
 | 
					        Bleichbacher's attack 
 | 
				
			||||||
      o Security: make RSA blinding default.
 | 
					      o Security: make RSA blinding default.
 | 
				
			||||||
      o Build: shared library support fixes.
 | 
					      o Build: shared library support fixes.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i:
 | 
					  Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i [19 Feb 2003]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Important security related bugfixes.
 | 
					      o Important security related bugfixes.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h:
 | 
					  Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h [5 Dec 2002]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o New configuration targets for Tandem OSS and A/UX.
 | 
					      o New configuration targets for Tandem OSS and A/UX.
 | 
				
			||||||
      o New OIDs for Microsoft attributes.
 | 
					      o New OIDs for Microsoft attributes.
 | 
				
			||||||
@@ -140,25 +426,25 @@
 | 
				
			|||||||
      o Fixes for smaller building problems.
 | 
					      o Fixes for smaller building problems.
 | 
				
			||||||
      o Updates of manuals, FAQ and other instructive documents.
 | 
					      o Updates of manuals, FAQ and other instructive documents.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g:
 | 
					  Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g [9 Aug 2002]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Important building fixes on Unix.
 | 
					      o Important building fixes on Unix.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f:
 | 
					  Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f [8 Aug 2002]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Various important bugfixes.
 | 
					      o Various important bugfixes.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e:
 | 
					  Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e [30 Jul 2002]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Important security related bugfixes.
 | 
					      o Important security related bugfixes.
 | 
				
			||||||
      o Various SSL/TLS library bugfixes.
 | 
					      o Various SSL/TLS library bugfixes.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d:
 | 
					  Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d [9 May 2002]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Various SSL/TLS library bugfixes.
 | 
					      o Various SSL/TLS library bugfixes.
 | 
				
			||||||
      o Fix DH parameter generation for 'non-standard' generators.
 | 
					      o Fix DH parameter generation for 'non-standard' generators.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c:
 | 
					  Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c [21 Dec 2001]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Various SSL/TLS library bugfixes.
 | 
					      o Various SSL/TLS library bugfixes.
 | 
				
			||||||
      o BIGNUM library fixes.
 | 
					      o BIGNUM library fixes.
 | 
				
			||||||
@@ -171,7 +457,7 @@
 | 
				
			|||||||
        Broadcom and Cryptographic Appliance's keyserver
 | 
					        Broadcom and Cryptographic Appliance's keyserver
 | 
				
			||||||
        [in 0.9.6c-engine release].
 | 
					        [in 0.9.6c-engine release].
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b:
 | 
					  Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b [9 Jul 2001]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Security fix: PRNG improvements.
 | 
					      o Security fix: PRNG improvements.
 | 
				
			||||||
      o Security fix: RSA OAEP check.
 | 
					      o Security fix: RSA OAEP check.
 | 
				
			||||||
@@ -188,7 +474,7 @@
 | 
				
			|||||||
      o Increase default size for BIO buffering filter.
 | 
					      o Increase default size for BIO buffering filter.
 | 
				
			||||||
      o Compatibility fixes in some scripts.
 | 
					      o Compatibility fixes in some scripts.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a:
 | 
					  Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a [5 Apr 2001]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Security fix: change behavior of OpenSSL to avoid using
 | 
					      o Security fix: change behavior of OpenSSL to avoid using
 | 
				
			||||||
        environment variables when running as root.
 | 
					        environment variables when running as root.
 | 
				
			||||||
@@ -213,7 +499,7 @@
 | 
				
			|||||||
      o New function BN_rand_range().
 | 
					      o New function BN_rand_range().
 | 
				
			||||||
      o Add "-rand" option to openssl s_client and s_server.
 | 
					      o Add "-rand" option to openssl s_client and s_server.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6:
 | 
					  Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6 [10 Oct 2000]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Some documentation for BIO and SSL libraries.
 | 
					      o Some documentation for BIO and SSL libraries.
 | 
				
			||||||
      o Enhanced chain verification using key identifiers.
 | 
					      o Enhanced chain verification using key identifiers.
 | 
				
			||||||
@@ -228,7 +514,7 @@
 | 
				
			|||||||
    [1] The support for external crypto devices is currently a separate
 | 
					    [1] The support for external crypto devices is currently a separate
 | 
				
			||||||
        distribution.  See the file README.ENGINE.
 | 
					        distribution.  See the file README.ENGINE.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a:
 | 
					  Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a [1 Apr 2000]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8 
 | 
					      o Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8 
 | 
				
			||||||
      o Shared library support for HPUX and Solaris-gcc
 | 
					      o Shared library support for HPUX and Solaris-gcc
 | 
				
			||||||
@@ -237,7 +523,7 @@
 | 
				
			|||||||
      o New 'rand' application
 | 
					      o New 'rand' application
 | 
				
			||||||
      o New way to check for existence of algorithms from scripts
 | 
					      o New way to check for existence of algorithms from scripts
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5:
 | 
					  Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5 [25 May 2000]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o S/MIME support in new 'smime' command
 | 
					      o S/MIME support in new 'smime' command
 | 
				
			||||||
      o Documentation for the OpenSSL command line application
 | 
					      o Documentation for the OpenSSL command line application
 | 
				
			||||||
@@ -273,7 +559,7 @@
 | 
				
			|||||||
      o Enhanced support for Alpha Linux
 | 
					      o Enhanced support for Alpha Linux
 | 
				
			||||||
      o Experimental MacOS support
 | 
					      o Experimental MacOS support
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4:
 | 
					  Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4 [9 Aug 1999]:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      o Transparent support for PKCS#8 format private keys: these are used
 | 
					      o Transparent support for PKCS#8 format private keys: these are used
 | 
				
			||||||
        by several software packages and are more secure than the standard
 | 
					        by several software packages and are more secure than the standard
 | 
				
			||||||
@@ -284,7 +570,7 @@
 | 
				
			|||||||
      o New pipe-like BIO that allows using the SSL library when actual I/O
 | 
					      o New pipe-like BIO that allows using the SSL library when actual I/O
 | 
				
			||||||
        must be handled by the application (BIO pair)
 | 
					        must be handled by the application (BIO pair)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3:
 | 
					  Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3 [24 May 1999]:
 | 
				
			||||||
      o Lots of enhancements and cleanups to the Configuration mechanism
 | 
					      o Lots of enhancements and cleanups to the Configuration mechanism
 | 
				
			||||||
      o RSA OEAP related fixes
 | 
					      o RSA OEAP related fixes
 | 
				
			||||||
      o Added `openssl ca -revoke' option for revoking a certificate
 | 
					      o Added `openssl ca -revoke' option for revoking a certificate
 | 
				
			||||||
@@ -298,7 +584,7 @@
 | 
				
			|||||||
      o Sparc assembler bignum implementation, optimized hash functions
 | 
					      o Sparc assembler bignum implementation, optimized hash functions
 | 
				
			||||||
      o Option to disable selected ciphers
 | 
					      o Option to disable selected ciphers
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b:
 | 
					  Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b [22 Mar 1999]:
 | 
				
			||||||
      o Fixed a security hole related to session resumption
 | 
					      o Fixed a security hole related to session resumption
 | 
				
			||||||
      o Fixed RSA encryption routines for the p < q case
 | 
					      o Fixed RSA encryption routines for the p < q case
 | 
				
			||||||
      o "ALL" in cipher lists now means "everything except NULL ciphers"
 | 
					      o "ALL" in cipher lists now means "everything except NULL ciphers"
 | 
				
			||||||
@@ -320,7 +606,7 @@
 | 
				
			|||||||
      o Lots of memory leak fixes.
 | 
					      o Lots of memory leak fixes.
 | 
				
			||||||
      o Lots of bug fixes.
 | 
					      o Lots of bug fixes.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c:
 | 
					  Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c [23 Dec 1998]:
 | 
				
			||||||
      o Integration of the popular NO_RSA/NO_DSA patches
 | 
					      o Integration of the popular NO_RSA/NO_DSA patches
 | 
				
			||||||
      o Initial support for compression inside the SSL record layer
 | 
					      o Initial support for compression inside the SSL record layer
 | 
				
			||||||
      o Added BIO proxy and filtering functionality
 | 
					      o Added BIO proxy and filtering functionality
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										228
									
								
								Netware/build.bat
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										228
									
								
								Netware/build.bat
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,228 @@
 | 
				
			|||||||
 | 
					@echo off
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem ========================================================================
 | 
				
			||||||
 | 
					rem   Batch file to automate building OpenSSL for NetWare.
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					rem   usage:
 | 
				
			||||||
 | 
					rem      build [target] [debug opts] [assembly opts] [configure opts]
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					rem      target        - "netware-clib" - CLib NetWare build (WinSock Sockets)
 | 
				
			||||||
 | 
					rem                    - "netware-clib-bsdsock" - CLib NetWare build (BSD Sockets)
 | 
				
			||||||
 | 
					rem                    - "netware-libc" - LibC NetWare build (WinSock Sockets)
 | 
				
			||||||
 | 
					rem                    - "netware-libc-bsdsock" - LibC NetWare build (BSD Sockets)
 | 
				
			||||||
 | 
					rem 
 | 
				
			||||||
 | 
					rem      debug opts    - "debug"  - build debug
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					rem      assembly opts - "nw-mwasm" - use Metrowerks assembler
 | 
				
			||||||
 | 
					rem                    - "nw-nasm"  - use NASM assembler
 | 
				
			||||||
 | 
					rem                    - "no-asm"   - don't use assembly
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					rem      configure opts- all unrecognized arguments are passed to the
 | 
				
			||||||
 | 
					rem                       perl configure script
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					rem   If no arguments are specified the default is to build non-debug with
 | 
				
			||||||
 | 
					rem   no assembly.  NOTE: there is no default BLD_TARGET.
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   No assembly is the default - Uncomment section below to change
 | 
				
			||||||
 | 
					rem   the assembler default
 | 
				
			||||||
 | 
					set ASM_MODE=
 | 
				
			||||||
 | 
					set ASSEMBLER=
 | 
				
			||||||
 | 
					set NO_ASM=no-asm
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Uncomment to default to the Metrowerks assembler
 | 
				
			||||||
 | 
					rem set ASM_MODE=nw-mwasm
 | 
				
			||||||
 | 
					rem set ASSEMBLER=Metrowerks
 | 
				
			||||||
 | 
					rem set NO_ASM=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Uncomment to default to the NASM assembler
 | 
				
			||||||
 | 
					rem set ASM_MODE=nw-nasm
 | 
				
			||||||
 | 
					rem set ASSEMBLER=NASM
 | 
				
			||||||
 | 
					rem set NO_ASM=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   No default Bld target
 | 
				
			||||||
 | 
					set BLD_TARGET=no_target
 | 
				
			||||||
 | 
					rem set BLD_TARGET=netware-clib
 | 
				
			||||||
 | 
					rem set BLD_TARGET=netware-libc
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Default to build non-debug
 | 
				
			||||||
 | 
					set DEBUG=
 | 
				
			||||||
 | 
					                                    
 | 
				
			||||||
 | 
					rem   Uncomment to default to debug build
 | 
				
			||||||
 | 
					rem set DEBUG=debug
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					set CONFIG_OPTS=
 | 
				
			||||||
 | 
					set ARG_PROCESSED=NO
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Process command line args
 | 
				
			||||||
 | 
					:opts
 | 
				
			||||||
 | 
					if "a%1" == "a" goto endopt
 | 
				
			||||||
 | 
					if "%1" == "no-asm"   set NO_ASM=no-asm
 | 
				
			||||||
 | 
					if "%1" == "no-asm"   set ARG_PROCESSED=YES
 | 
				
			||||||
 | 
					if "%1" == "debug"    set DEBUG=debug
 | 
				
			||||||
 | 
					if "%1" == "debug"    set ARG_PROCESSED=YES
 | 
				
			||||||
 | 
					if "%1" == "nw-nasm"  set ASM_MODE=nw-nasm
 | 
				
			||||||
 | 
					if "%1" == "nw-nasm"  set ASSEMBLER=NASM
 | 
				
			||||||
 | 
					if "%1" == "nw-nasm"  set NO_ASM=
 | 
				
			||||||
 | 
					if "%1" == "nw-nasm"  set ARG_PROCESSED=YES
 | 
				
			||||||
 | 
					if "%1" == "nw-mwasm" set ASM_MODE=nw-mwasm
 | 
				
			||||||
 | 
					if "%1" == "nw-mwasm" set ASSEMBLER=Metrowerks
 | 
				
			||||||
 | 
					if "%1" == "nw-mwasm" set NO_ASM=
 | 
				
			||||||
 | 
					if "%1" == "nw-mwasm" set ARG_PROCESSED=YES
 | 
				
			||||||
 | 
					if "%1" == "netware-clib" set BLD_TARGET=netware-clib
 | 
				
			||||||
 | 
					if "%1" == "netware-clib" set ARG_PROCESSED=YES
 | 
				
			||||||
 | 
					if "%1" == "netware-clib-bsdsock" set BLD_TARGET=netware-clib-bsdsock
 | 
				
			||||||
 | 
					if "%1" == "netware-clib-bsdsock" set ARG_PROCESSED=YES
 | 
				
			||||||
 | 
					if "%1" == "netware-libc" set BLD_TARGET=netware-libc
 | 
				
			||||||
 | 
					if "%1" == "netware-libc" set ARG_PROCESSED=YES
 | 
				
			||||||
 | 
					if "%1" == "netware-libc-bsdsock" set BLD_TARGET=netware-libc-bsdsock
 | 
				
			||||||
 | 
					if "%1" == "netware-libc-bsdsock" set ARG_PROCESSED=YES
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   If we didn't recognize the argument, consider it an option for config
 | 
				
			||||||
 | 
					if "%ARG_PROCESSED%" == "NO" set CONFIG_OPTS=%CONFIG_OPTS% %1
 | 
				
			||||||
 | 
					if "%ARG_PROCESSED%" == "YES" set ARG_PROCESSED=NO
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					shift
 | 
				
			||||||
 | 
					goto opts
 | 
				
			||||||
 | 
					:endopt
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem make sure a valid BLD_TARGET was specified
 | 
				
			||||||
 | 
					if "%BLD_TARGET%" == "no_target" goto no_target
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem build the nlm make file name which includes target and debug info
 | 
				
			||||||
 | 
					set NLM_MAKE=
 | 
				
			||||||
 | 
					if "%BLD_TARGET%" == "netware-clib" set NLM_MAKE=netware\nlm_clib
 | 
				
			||||||
 | 
					if "%BLD_TARGET%" == "netware-clib-bsdsock" set NLM_MAKE=netware\nlm_clib_bsdsock
 | 
				
			||||||
 | 
					if "%BLD_TARGET%" == "netware-libc" set NLM_MAKE=netware\nlm_libc
 | 
				
			||||||
 | 
					if "%BLD_TARGET%" == "netware-libc-bsdsock" set NLM_MAKE=netware\nlm_libc_bsdsock
 | 
				
			||||||
 | 
					if "%DEBUG%" == "" set NLM_MAKE=%NLM_MAKE%.mak
 | 
				
			||||||
 | 
					if "%DEBUG%" == "debug" set NLM_MAKE=%NLM_MAKE%_dbg.mak
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if "%NO_ASM%" == "no-asm" set ASM_MODE=
 | 
				
			||||||
 | 
					if "%NO_ASM%" == "no-asm" set ASSEMBLER=
 | 
				
			||||||
 | 
					if "%NO_ASM%" == "no-asm" set CONFIG_OPTS=%CONFIG_OPTS% no-asm
 | 
				
			||||||
 | 
					if "%NO_ASM%" == "no-asm" goto do_config
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem ==================================================
 | 
				
			||||||
 | 
					echo Generating x86 for %ASSEMBLER% assembler
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo Bignum
 | 
				
			||||||
 | 
					cd crypto\bn\asm
 | 
				
			||||||
 | 
					rem perl x86.pl %ASM_MODE% > bn-nw.asm
 | 
				
			||||||
 | 
					perl bn-586.pl %ASM_MODE% > bn-nw.asm
 | 
				
			||||||
 | 
					perl co-586.pl %ASM_MODE% > co-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo AES
 | 
				
			||||||
 | 
					cd crypto\aes\asm
 | 
				
			||||||
 | 
					perl aes-586.pl %ASM_MODE% > a-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo DES
 | 
				
			||||||
 | 
					cd crypto\des\asm
 | 
				
			||||||
 | 
					perl des-586.pl %ASM_MODE% > d-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo "crypt(3)"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					cd crypto\des\asm
 | 
				
			||||||
 | 
					perl crypt586.pl %ASM_MODE% > y-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo Blowfish
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					cd crypto\bf\asm
 | 
				
			||||||
 | 
					perl bf-586.pl %ASM_MODE% > b-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo CAST5
 | 
				
			||||||
 | 
					cd crypto\cast\asm
 | 
				
			||||||
 | 
					perl cast-586.pl %ASM_MODE% > c-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo RC4
 | 
				
			||||||
 | 
					cd crypto\rc4\asm
 | 
				
			||||||
 | 
					perl rc4-586.pl %ASM_MODE% > r4-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo MD5
 | 
				
			||||||
 | 
					cd crypto\md5\asm
 | 
				
			||||||
 | 
					perl md5-586.pl %ASM_MODE% > m5-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo SHA1
 | 
				
			||||||
 | 
					cd crypto\sha\asm
 | 
				
			||||||
 | 
					perl sha1-586.pl %ASM_MODE% > s1-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo RIPEMD160
 | 
				
			||||||
 | 
					cd crypto\ripemd\asm
 | 
				
			||||||
 | 
					perl rmd-586.pl %ASM_MODE% > rm-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo RC5\32
 | 
				
			||||||
 | 
					cd crypto\rc5\asm
 | 
				
			||||||
 | 
					perl rc5-586.pl %ASM_MODE% > r5-nw.asm
 | 
				
			||||||
 | 
					cd ..\..\..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo CPUID
 | 
				
			||||||
 | 
					cd crypto
 | 
				
			||||||
 | 
					perl x86cpuid.pl %ASM_MODE% > x86cpuid-nw.asm
 | 
				
			||||||
 | 
					cd ..\
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem ===============================================================
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					:do_config
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo configure options: %CONFIG_OPTS% %BLD_TARGET%
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					perl configure %CONFIG_OPTS% %BLD_TARGET%
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					perl util\mkfiles.pl >MINFO
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo mk1mf.pl options: %DEBUG% %ASM_MODE% %CONFIG_OPTS% %BLD_TARGET%
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					perl util\mk1mf.pl %DEBUG% %ASM_MODE% %CONFIG_OPTS% %BLD_TARGET% >%NLM_MAKE%
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					make -f %NLM_MAKE% vclean
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo The makefile "%NLM_MAKE%" has been created use your maketool to
 | 
				
			||||||
 | 
					echo build (ex: make -f %NLM_MAKE%)
 | 
				
			||||||
 | 
					goto end
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem ===============================================================
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					:no_target
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo .  No build target specified!!!
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo .  usage: build [target] [debug opts] [assembly opts] [configure opts]
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo .     target        - "netware-clib" - CLib NetWare build (WinSock Sockets)
 | 
				
			||||||
 | 
					echo .                   - "netware-clib-bsdsock" - CLib NetWare build (BSD Sockets)
 | 
				
			||||||
 | 
					echo .                   - "netware-libc" - LibC NetWare build (WinSock Sockets)
 | 
				
			||||||
 | 
					echo .                   - "netware-libc-bsdsock" - LibC NetWare build (BSD Sockets)
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo .     debug opts    - "debug"  - build debug
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo .     assembly opts - "nw-mwasm" - use Metrowerks assembler
 | 
				
			||||||
 | 
					echo .                     "nw-nasm"  - use NASM assembler
 | 
				
			||||||
 | 
					echo .                     "no-asm"   - don't use assembly
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo .     configure opts- all unrecognized arguments are passed to the
 | 
				
			||||||
 | 
					echo .                      perl configure script
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo .  If no debug or assembly opts are specified the default is to build
 | 
				
			||||||
 | 
					echo .  non-debug without assembly
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					        
 | 
				
			||||||
 | 
					:end        
 | 
				
			||||||
							
								
								
									
										113
									
								
								Netware/cpy_tests.bat
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										113
									
								
								Netware/cpy_tests.bat
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,113 @@
 | 
				
			|||||||
 | 
					@echo off
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Batch file to copy OpenSSL stuff to a NetWare server for testing
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   This batch file will create an "opensssl" directory at the root of the
 | 
				
			||||||
 | 
					rem   specified NetWare drive and copy the required files to run the tests.
 | 
				
			||||||
 | 
					rem   It should be run from inside the "openssl\netware" subdirectory.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Usage:
 | 
				
			||||||
 | 
					rem      cpy_tests.bat <test subdirectory> <NetWare drive>
 | 
				
			||||||
 | 
					rem          <test subdirectory> - out_nw.dbg | out_nw
 | 
				
			||||||
 | 
					rem          <NetWare drive> - any mapped drive letter
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					rem      example ( copy from debug build to m: dirve ):
 | 
				
			||||||
 | 
					rem              cpy_tests.bat out_nw.dbg m:
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					rem      CAUTION:  If a directory named OpenSSL exists on the target drive
 | 
				
			||||||
 | 
					rem                it will be deleted first.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if "%1" == "" goto usage
 | 
				
			||||||
 | 
					if "%2" == "" goto usage
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Assume running in \openssl directory unless cpy_tests.bat exists then
 | 
				
			||||||
 | 
					rem   it must be the \openssl\netware directory
 | 
				
			||||||
 | 
					set loc=.
 | 
				
			||||||
 | 
					if exist cpy_tests.bat set loc=..
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   make sure the local build subdirectory specified is valid
 | 
				
			||||||
 | 
					if not exist %loc%\%1\NUL goto invalid_dir
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   make sure target drive is valid
 | 
				
			||||||
 | 
					if not exist %2\NUL goto invalid_drive
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   If an OpenSSL directory exists on the target drive, remove it
 | 
				
			||||||
 | 
					if exist %2\openssl\NUL goto remove_openssl
 | 
				
			||||||
 | 
					goto do_copy
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:remove_openssl
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo OpenSSL directory exists on %2 - it will be removed!
 | 
				
			||||||
 | 
					pause
 | 
				
			||||||
 | 
					rmdir %2\openssl /s /q
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:do_copy
 | 
				
			||||||
 | 
					rem   make an "openssl" directory and others at the root of the NetWare drive
 | 
				
			||||||
 | 
					mkdir %2\openssl
 | 
				
			||||||
 | 
					mkdir %2\openssl\test_out
 | 
				
			||||||
 | 
					mkdir %2\openssl\apps
 | 
				
			||||||
 | 
					mkdir %2\openssl\certs
 | 
				
			||||||
 | 
					mkdir %2\openssl\test
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   copy the test nlms
 | 
				
			||||||
 | 
					copy %loc%\%1\*.nlm %2\openssl\
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   copy the test perl script
 | 
				
			||||||
 | 
					copy %loc%\netware\do_tests.pl %2\openssl\
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   copy the certs directory stuff
 | 
				
			||||||
 | 
					xcopy %loc%\certs\*.*         %2\openssl\certs\ /s
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   copy the test directory stuff
 | 
				
			||||||
 | 
					copy %loc%\test\CAss.cnf      %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\Uss.cnf       %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\pkcs7.pem     %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\pkcs7-1.pem   %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\testcrl.pem   %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\testp7.pem    %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\testreq2.pem  %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\testrsa.pem   %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\testsid.pem   %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\testx509.pem  %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\v3-cert1.pem  %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\test\v3-cert2.pem  %2\openssl\test\
 | 
				
			||||||
 | 
					copy %loc%\crypto\evp\evptests.txt %2\openssl\test\
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   copy the apps directory stuff
 | 
				
			||||||
 | 
					copy %loc%\apps\client.pem    %2\openssl\apps\
 | 
				
			||||||
 | 
					copy %loc%\apps\server.pem    %2\openssl\apps\
 | 
				
			||||||
 | 
					copy %loc%\apps\openssl.cnf   %2\openssl\apps\
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo Tests copied
 | 
				
			||||||
 | 
					echo Run the test script at the console by typing:
 | 
				
			||||||
 | 
					echo     "Perl \openssl\do_tests.pl"
 | 
				
			||||||
 | 
					echo .
 | 
				
			||||||
 | 
					echo Make sure the Search path includes the OpenSSL subdirectory
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					goto end
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:invalid_dir
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					echo Invalid build directory specified: %1
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					goto usage
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:invalid_drive
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					echo Invalid drive: %2
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					goto usage
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:usage
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					echo usage: cpy_tests.bat [test subdirectory] [NetWare drive]
 | 
				
			||||||
 | 
					echo     [test subdirectory] - out_nw_clib.dbg, out_nw_libc.dbg, etc. 
 | 
				
			||||||
 | 
					echo     [NetWare drive]     - any mapped drive letter
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					echo example: cpy_test out_nw_clib.dbg M:
 | 
				
			||||||
 | 
					echo  (copy from clib debug build area to M: drive)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:end
 | 
				
			||||||
							
								
								
									
										624
									
								
								Netware/do_tests.pl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										624
									
								
								Netware/do_tests.pl
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,624 @@
 | 
				
			|||||||
 | 
					# perl script to run OpenSSL tests
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					my $base_path      = "\\openssl";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					my $output_path    = "$base_path\\test_out";
 | 
				
			||||||
 | 
					my $cert_path      = "$base_path\\certs";
 | 
				
			||||||
 | 
					my $test_path      = "$base_path\\test";
 | 
				
			||||||
 | 
					my $app_path       = "$base_path\\apps";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					my $tmp_cert       = "$output_path\\cert.tmp";
 | 
				
			||||||
 | 
					my $OpenSSL_config = "$app_path\\openssl.cnf";
 | 
				
			||||||
 | 
					my $log_file       = "$output_path\\tests.log";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					my $pause = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#  process the command line args to see if they wanted us to pause
 | 
				
			||||||
 | 
					#  between executing each command
 | 
				
			||||||
 | 
					foreach $i (@ARGV)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   if ($i =~ /^-p$/)
 | 
				
			||||||
 | 
					   { $pause=1; }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					main();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub main()
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   # delete all the output files in the output directory
 | 
				
			||||||
 | 
					   unlink <$output_path\\*.*>;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   # open the main log file
 | 
				
			||||||
 | 
					   open(OUT, ">$log_file") || die "unable to open $log_file\n";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( OUT "========================================================\n");
 | 
				
			||||||
 | 
					   my $outFile = "$output_path\\version.out";
 | 
				
			||||||
 | 
					   system("openssl2 version (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_output("CHECKING FOR OPENSSL VERSION:", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   algorithm_tests();
 | 
				
			||||||
 | 
					   encryption_tests();
 | 
				
			||||||
 | 
					   evp_tests();
 | 
				
			||||||
 | 
					   pem_tests();
 | 
				
			||||||
 | 
					   verify_tests();
 | 
				
			||||||
 | 
					   ca_tests();
 | 
				
			||||||
 | 
					   ssl_tests();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   close(OUT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print("\nCompleted running tests.\n\n");
 | 
				
			||||||
 | 
					   print("Check log file for errors: $log_file\n");
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub algorithm_tests
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my $i;
 | 
				
			||||||
 | 
					   my $outFile;
 | 
				
			||||||
 | 
					   my @tests = ( rsa_test, destest, ideatest, bftest, bntest, shatest, sha1test,
 | 
				
			||||||
 | 
					                 sha256t, sha512t, dsatest, md2test, md4test, md5test, mdc2test,
 | 
				
			||||||
 | 
					                 rc2test, rc4test, rc5test, randtest, rmdtest, dhtest, ecdhtest,
 | 
				
			||||||
 | 
					                 ecdsatest, ectest, exptest, casttest, hmactest );
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( "\nRUNNING CRYPTO ALGORITHM TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( OUT "\n========================================================\n");
 | 
				
			||||||
 | 
					   print( OUT "CRYPTO ALGORITHM TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   foreach $i (@tests)
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      if (-e "$base_path\\$i.nlm")
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         $outFile = "$output_path\\$i.out";
 | 
				
			||||||
 | 
					         system("$i (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					         log_desc("Test: $i\.nlm:");
 | 
				
			||||||
 | 
					         log_output("", $outFile );
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					      else
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         log_desc("Test: $i\.nlm: file not found");
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub encryption_tests
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my $i;
 | 
				
			||||||
 | 
					   my $outFile;
 | 
				
			||||||
 | 
					   my @enc_tests = ( "enc", "rc4", "des-cfb", "des-ede-cfb", "des-ede3-cfb",
 | 
				
			||||||
 | 
					                     "des-ofb", "des-ede-ofb", "des-ede3-ofb",
 | 
				
			||||||
 | 
					                     "des-ecb", "des-ede", "des-ede3", "des-cbc",
 | 
				
			||||||
 | 
					                     "des-ede-cbc", "des-ede3-cbc", "idea-ecb", "idea-cfb",
 | 
				
			||||||
 | 
					                     "idea-ofb", "idea-cbc", "rc2-ecb", "rc2-cfb",
 | 
				
			||||||
 | 
					                     "rc2-ofb", "rc2-cbc", "bf-ecb", "bf-cfb",
 | 
				
			||||||
 | 
					                     "bf-ofb", "bf-cbc" );
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   my $input = "$base_path\\do_tests.pl";
 | 
				
			||||||
 | 
					   my $cipher = "$output_path\\cipher.out";
 | 
				
			||||||
 | 
					   my $clear = "$output_path\\clear.out";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( "\nRUNNING ENCRYPTION & DECRYPTION TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( OUT "\n========================================================\n");
 | 
				
			||||||
 | 
					   print( OUT "FILE ENCRYPTION & DECRYPTION TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   foreach $i (@enc_tests)
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      log_desc("Testing: $i");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # do encryption
 | 
				
			||||||
 | 
					      $outFile = "$output_path\\enc.out";
 | 
				
			||||||
 | 
					      system("openssl2 $i -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile" );
 | 
				
			||||||
 | 
					      log_output("Encrypting: $input --> $cipher", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # do decryption
 | 
				
			||||||
 | 
					      $outFile = "$output_path\\dec.out";
 | 
				
			||||||
 | 
					      system("openssl2 $i -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					      log_output("Decrypting: $cipher --> $clear", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # compare files
 | 
				
			||||||
 | 
					      $x = compare_files( $input, $clear, 1);
 | 
				
			||||||
 | 
					      if ( $x == 0 )
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         print( "\rSUCCESS - files match: $input, $clear\n");
 | 
				
			||||||
 | 
					         print( OUT "SUCCESS - files match: $input, $clear\n");
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					      else
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         print( "\rERROR: files don't match\n");
 | 
				
			||||||
 | 
					         print( OUT "ERROR: files don't match\n");
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      do_wait();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # Now do the same encryption but use Base64
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # do encryption B64
 | 
				
			||||||
 | 
					      $outFile = "$output_path\\B64enc.out";
 | 
				
			||||||
 | 
					      system("openssl2 $i -a -e -bufsize 113 -k test -in $input -out $cipher (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					      log_output("Encrypting(B64): $cipher --> $clear", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # do decryption B64
 | 
				
			||||||
 | 
					      $outFile = "$output_path\\B64dec.out";
 | 
				
			||||||
 | 
					      system("openssl2 $i -a -d -bufsize 157 -k test -in $cipher -out $clear (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					      log_output("Decrypting(B64): $cipher --> $clear", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # compare files
 | 
				
			||||||
 | 
					      $x = compare_files( $input, $clear, 1);
 | 
				
			||||||
 | 
					      if ( $x == 0 )
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         print( "\rSUCCESS - files match: $input, $clear\n");
 | 
				
			||||||
 | 
					         print( OUT "SUCCESS - files match: $input, $clear\n");
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					      else
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         print( "\rERROR: files don't match\n");
 | 
				
			||||||
 | 
					         print( OUT "ERROR: files don't match\n");
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      do_wait();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   } # end foreach
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   # delete the temporary files
 | 
				
			||||||
 | 
					   unlink($cipher);
 | 
				
			||||||
 | 
					   unlink($clear);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub pem_tests
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my $i;
 | 
				
			||||||
 | 
					   my $tmp_out;
 | 
				
			||||||
 | 
					   my $outFile = "$output_path\\pem.out";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   my %pem_tests = (
 | 
				
			||||||
 | 
					         "crl"      => "testcrl.pem",
 | 
				
			||||||
 | 
					          "pkcs7"   => "testp7.pem",
 | 
				
			||||||
 | 
					          "req"     => "testreq2.pem",
 | 
				
			||||||
 | 
					          "rsa"     => "testrsa.pem",
 | 
				
			||||||
 | 
					          "x509"    => "testx509.pem",
 | 
				
			||||||
 | 
					          "x509"    => "v3-cert1.pem",
 | 
				
			||||||
 | 
					          "sess_id" => "testsid.pem"  );
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( "\nRUNNING PEM TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( OUT "\n========================================================\n");
 | 
				
			||||||
 | 
					   print( OUT "PEM TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   foreach $i (keys(%pem_tests))
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      log_desc( "Testing: $i");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      my $input = "$test_path\\$pem_tests{$i}";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      $tmp_out = "$output_path\\$pem_tests{$i}";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      if ($i ne "req" )
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         system("openssl2 $i -in $input -out $tmp_out (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					         log_output( "openssl2 $i -in $input -out $tmp_out", $outFile);
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					      else
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         system("openssl2 $i -in $input -out $tmp_out -config $OpenSSL_config (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					         log_output( "openssl2 $i -in $input -out $tmp_out -config $OpenSSL_config", $outFile );
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      $x = compare_files( $input, $tmp_out);
 | 
				
			||||||
 | 
					      if ( $x == 0 )
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         print( "\rSUCCESS - files match: $input, $tmp_out\n");
 | 
				
			||||||
 | 
					         print( OUT "SUCCESS - files match: $input, $tmp_out\n");
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					      else
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         print( "\rERROR: files don't match\n");
 | 
				
			||||||
 | 
					         print( OUT "ERROR: files don't match\n");
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					      do_wait();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   } # end foreach
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub verify_tests
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my $i;
 | 
				
			||||||
 | 
					   my $outFile = "$output_path\\verify.out";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   $cert_path =~ s/\\/\//g;
 | 
				
			||||||
 | 
					   my @cert_files = <$cert_path/*.pem>;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( "\nRUNNING VERIFY TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( OUT "\n========================================================\n");
 | 
				
			||||||
 | 
					   print( OUT "VERIFY TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   make_tmp_cert_file();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   foreach $i (@cert_files)
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      system("openssl2 verify -CAfile $tmp_cert $i (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					      log_desc("Verifying cert: $i");
 | 
				
			||||||
 | 
					      log_output("openssl2 verify -CAfile $tmp_cert $i", $outFile);
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub ssl_tests
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my $outFile = "$output_path\\ssl_tst.out";
 | 
				
			||||||
 | 
					   my($CAcert) = "$output_path\\certCA.ss";
 | 
				
			||||||
 | 
					   my($Ukey)   = "$output_path\\keyU.ss";
 | 
				
			||||||
 | 
					   my($Ucert)  = "$output_path\\certU.ss";
 | 
				
			||||||
 | 
					   my($ssltest)= "ssltest -key $Ukey -cert $Ucert -c_key $Ukey -c_cert $Ucert -CAfile $CAcert";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( "\nRUNNING SSL TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( OUT "\n========================================================\n");
 | 
				
			||||||
 | 
					   print( OUT "SSL TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("ssltest -ssl2 (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2:");
 | 
				
			||||||
 | 
					   log_output("ssltest -ssl2", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -ssl2 -server_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2 with server authentication:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -ssl2 -server_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -ssl2 -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2 with client authentication:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -ssl2 -client_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -ssl2 -server_auth -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2 with both client and server authentication:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -ssl2 -server_auth -client_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("ssltest -ssl3 (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv3:");
 | 
				
			||||||
 | 
					   log_output("ssltest -ssl3", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -ssl3 -server_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv3 with server authentication:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -ssl3 -server_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -ssl3 -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv3 with client authentication:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -ssl3 -client_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -ssl3 -server_auth -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv3 with both client and server authentication:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -ssl3 -server_auth -client_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("ssltest (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2/sslv3:");
 | 
				
			||||||
 | 
					   log_output("ssltest", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -server_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2/sslv3 with server authentication:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -server_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2/sslv3 with client authentication:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -client_auth ", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -server_auth -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2/sslv3 with both client and server authentication:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -server_auth -client_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("ssltest -bio_pair -ssl2 (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2 via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("ssltest -bio_pair -ssl2", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("ssltest -bio_pair -dhe1024dsa -v (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2/sslv3 with 1024 bit DHE via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("ssltest -bio_pair -dhe1024dsa -v", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -bio_pair -ssl2 -server_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2 with server authentication via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -bio_pair -ssl2 -server_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -bio_pair -ssl2 -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2 with client authentication via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -bio_pair -ssl2 -client_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -bio_pair -ssl2 -server_auth -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2 with both client and server authentication via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -bio_pair -ssl2 -server_auth -client_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("ssltest -bio_pair -ssl3 (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv3 via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("ssltest -bio_pair -ssl3", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -bio_pair -ssl3 -server_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv3 with server authentication via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -bio_pair -ssl3 -server_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -bio_pair -ssl3 -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv3 with client authentication  via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -bio_pair -ssl3 -client_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -bio_pair -ssl3 -server_auth -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv3 with both client and server authentication via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -bio_pair -ssl3 -server_auth -client_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("ssltest -bio_pair (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2/sslv3 via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("ssltest -bio_pair", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -bio_pair -server_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2/sslv3 with server authentication via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -bio_pair -server_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -bio_pair -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2/sslv3 with client authentication via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -bio_pair -client_auth", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("$ssltest -bio_pair -server_auth -client_auth (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Testing sslv2/sslv3 with both client and server authentication via BIO pair:");
 | 
				
			||||||
 | 
					   log_output("$ssltest -bio_pair -server_auth -client_auth", $outFile);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub ca_tests
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my $outFile = "$output_path\\ca_tst.out";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   my($CAkey)     = "$output_path\\keyCA.ss";
 | 
				
			||||||
 | 
					   my($CAcert)    = "$output_path\\certCA.ss";
 | 
				
			||||||
 | 
					   my($CAserial)  = "$output_path\\certCA.srl";
 | 
				
			||||||
 | 
					   my($CAreq)     = "$output_path\\reqCA.ss";
 | 
				
			||||||
 | 
					   my($CAreq2)    = "$output_path\\req2CA.ss";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   my($CAconf)    = "$test_path\\CAss.cnf";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   my($Uconf)     = "$test_path\\Uss.cnf";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   my($Ukey)      = "$output_path\\keyU.ss";
 | 
				
			||||||
 | 
					   my($Ureq)      = "$output_path\\reqU.ss";
 | 
				
			||||||
 | 
					   my($Ucert)     = "$output_path\\certU.ss";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( "\nRUNNING CA TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( OUT "\n========================================================\n");
 | 
				
			||||||
 | 
					   print( OUT "CA TESTS:\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("openssl2 req -config $CAconf -out $CAreq -keyout $CAkey -new (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Make a certificate request using req:");
 | 
				
			||||||
 | 
					   log_output("openssl2 req -config $CAconf -out $CAreq -keyout $CAkey -new", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("openssl2 x509 -CAcreateserial -in $CAreq -days 30 -req -out $CAcert -signkey $CAkey (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Convert the certificate request into a self signed certificate using x509:");
 | 
				
			||||||
 | 
					   log_output("openssl2 x509 -CAcreateserial -in $CAreq -days 30 -req -out $CAcert -signkey $CAkey", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("openssl2 x509 -in $CAcert -x509toreq -signkey $CAkey -out $CAreq2 (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Convert a certificate into a certificate request using 'x509':");
 | 
				
			||||||
 | 
					   log_output("openssl2 x509 -in $CAcert -x509toreq -signkey $CAkey -out $CAreq2", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("openssl2 req -config $OpenSSL_config -verify -in $CAreq -noout (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_output("openssl2 req -config $OpenSSL_config -verify -in $CAreq -noout", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("openssl2 req -config $OpenSSL_config -verify -in $CAreq2 -noout (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_output( "openssl2 req -config $OpenSSL_config -verify -in $CAreq2 -noout", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("openssl2 verify -CAfile $CAcert $CAcert (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_output("openssl2 verify -CAfile $CAcert $CAcert", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("openssl2 req -config $Uconf -out $Ureq -keyout $Ukey -new (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Make another certificate request using req:");
 | 
				
			||||||
 | 
					   log_output("openssl2 req -config $Uconf -out $Ureq -keyout $Ukey -new", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("openssl2 x509 -CAcreateserial -in $Ureq -days 30 -req -out $Ucert -CA $CAcert -CAkey $CAkey -CAserial $CAserial (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Sign certificate request with the just created CA via x509:");
 | 
				
			||||||
 | 
					   log_output("openssl2 x509 -CAcreateserial -in $Ureq -days 30 -req -out $Ucert -CA $CAcert -CAkey $CAkey -CAserial $CAserial", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("openssl2 verify -CAfile $CAcert $Ucert (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_output("openssl2 verify -CAfile $CAcert $Ucert", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   system("openssl2 x509 -subject -issuer -startdate -enddate -noout -in $Ucert (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					   log_desc("Certificate details");
 | 
				
			||||||
 | 
					   log_output("openssl2 x509 -subject -issuer -startdate -enddate -noout -in $Ucert", $outFile);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print(OUT "--\n");
 | 
				
			||||||
 | 
					   print(OUT "The generated CA certificate is $CAcert\n");
 | 
				
			||||||
 | 
					   print(OUT "The generated CA private key is $CAkey\n");
 | 
				
			||||||
 | 
					   print(OUT "The current CA signing serial number is in $CAserial\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print(OUT "The generated user certificate is $Ucert\n");
 | 
				
			||||||
 | 
					   print(OUT "The generated user private key is $Ukey\n");
 | 
				
			||||||
 | 
					   print(OUT "--\n");
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub evp_tests
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my $i = 'evp_test';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( "\nRUNNING EVP TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print( OUT "\n========================================================\n");
 | 
				
			||||||
 | 
					   print( OUT "EVP TESTS:\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   if (-e "$base_path\\$i.nlm")
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					       my $outFile = "$output_path\\$i.out";
 | 
				
			||||||
 | 
					       system("$i $test_path\\evptests.txt (CLIB_OPT)/>$outFile");
 | 
				
			||||||
 | 
					       log_desc("Test: $i\.nlm:");
 | 
				
			||||||
 | 
					       log_output("", $outFile );
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					   else
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					       log_desc("Test: $i\.nlm: file not found");
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub log_output( $ $ )
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my( $desc, $file ) = @_;
 | 
				
			||||||
 | 
					   my($error) = 0;
 | 
				
			||||||
 | 
					   my($key);
 | 
				
			||||||
 | 
					   my($msg);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   if ($desc)
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      print("\r$desc\n");
 | 
				
			||||||
 | 
					      print(OUT "$desc\n");
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # loop waiting for test program to complete
 | 
				
			||||||
 | 
					   while ( stat($file) == 0)
 | 
				
			||||||
 | 
					      { print(". "); sleep(1); }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # copy test output to log file
 | 
				
			||||||
 | 
					   open(IN, "<$file");
 | 
				
			||||||
 | 
					   while (<IN>)
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      print(OUT $_);
 | 
				
			||||||
 | 
					      if ( $_ =~ /ERROR/ )
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         $error = 1;
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					      # close and delete the temporary test output file
 | 
				
			||||||
 | 
					   close(IN);
 | 
				
			||||||
 | 
					   unlink($file);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   if ( $error == 0 )
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      $msg = "Test Succeeded";
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					   else
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      $msg = "Test Failed";
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print(OUT "$msg\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   if ($pause)
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      print("$msg - press ENTER to continue...");
 | 
				
			||||||
 | 
					      $key = getc;
 | 
				
			||||||
 | 
					      print("\n");
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # Several of the testing scripts run a loop loading the
 | 
				
			||||||
 | 
					      # same NLM with different options.
 | 
				
			||||||
 | 
					      # On slow NetWare machines there appears to be some delay in the
 | 
				
			||||||
 | 
					      # OS actually unloading the test nlms and the OS complains about.
 | 
				
			||||||
 | 
					      # the NLM already being loaded.  This additional pause is to
 | 
				
			||||||
 | 
					      # to help provide a little more time for unloading before trying to
 | 
				
			||||||
 | 
					      # load again.
 | 
				
			||||||
 | 
					   sleep(1);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub log_desc( $ )
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my( $desc ) = @_;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print("\n");
 | 
				
			||||||
 | 
					   print("$desc\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print(OUT "\n");
 | 
				
			||||||
 | 
					   print(OUT "$desc\n");
 | 
				
			||||||
 | 
					   print(OUT "======================================\n");
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub compare_files( $ $ $ )
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my( $file1, $file2, $binary ) = @_;
 | 
				
			||||||
 | 
					   my( $n1, $n2, $b1, $b2 );
 | 
				
			||||||
 | 
					   my($ret) = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   open(IN0, $file1) || die "\nunable to open $file1\n";
 | 
				
			||||||
 | 
					   open(IN1, $file2) || die "\nunable to open $file2\n";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  if ($binary)
 | 
				
			||||||
 | 
					  {
 | 
				
			||||||
 | 
					      binmode IN0;
 | 
				
			||||||
 | 
					      binmode IN1;
 | 
				
			||||||
 | 
					  }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   for (;;)
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      $n1 = read(IN0, $b1, 512);
 | 
				
			||||||
 | 
					      $n2 = read(IN1, $b2, 512);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      if ($n1 != $n2) {last;}
 | 
				
			||||||
 | 
					      if ($b1 != $b2) {last;}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      if ($n1 == 0)
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         $ret = 0;
 | 
				
			||||||
 | 
					         last;
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					   close(IN0);
 | 
				
			||||||
 | 
					   close(IN1);
 | 
				
			||||||
 | 
					   return($ret);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub do_wait()
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my($key);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   if ($pause)
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      print("Press ENTER to continue...");
 | 
				
			||||||
 | 
					      $key = getc;
 | 
				
			||||||
 | 
					      print("\n");
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					############################################################################
 | 
				
			||||||
 | 
					sub make_tmp_cert_file()
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					   my @cert_files = <$cert_path/*.pem>;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      # delete the file if it already exists
 | 
				
			||||||
 | 
					   unlink($tmp_cert);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   open( TMP_CERT, ">$tmp_cert") || die "\nunable to open $tmp_cert\n";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   print("building temporary cert file\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   # create a temporary cert file that contains all the certs
 | 
				
			||||||
 | 
					   foreach $i (@cert_files)
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					      open( IN_CERT, $i ) || die "\nunable to open $i\n";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      for(;;)
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					         $n = sysread(IN_CERT, $data, 1024);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					         if ($n == 0)
 | 
				
			||||||
 | 
					         {
 | 
				
			||||||
 | 
					            close(IN_CERT);
 | 
				
			||||||
 | 
					            last;
 | 
				
			||||||
 | 
					         };
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					         syswrite(TMP_CERT, $data, $n);
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
 | 
					   }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   close( TMP_CERT );
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										254
									
								
								Netware/globals.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										254
									
								
								Netware/globals.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,254 @@
 | 
				
			|||||||
 | 
					An initial review of the OpenSSL code was done to determine how many 
 | 
				
			||||||
 | 
					global variables where present.  The idea was to determine the amount of 
 | 
				
			||||||
 | 
					work required to pull the globals into an instance data structure in 
 | 
				
			||||||
 | 
					order to build a Library NLM for NetWare.  This file contains the results 
 | 
				
			||||||
 | 
					of the review.  Each file is listed along with the globals in the file.  
 | 
				
			||||||
 | 
					The initial review was done very quickly so this list is probably
 | 
				
			||||||
 | 
					not a comprehensive list.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					cryptlib.c
 | 
				
			||||||
 | 
					===========================================
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static STACK *app_locks=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static STACK_OF(CRYPTO_dynlock) *dyn_locks=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void (MS_FAR *locking_callback)(int mode,int type,
 | 
				
			||||||
 | 
					   const char *file,int line)=NULL;
 | 
				
			||||||
 | 
					static int (MS_FAR *add_lock_callback)(int *pointer,int amount,
 | 
				
			||||||
 | 
					   int type,const char *file,int line)=NULL;
 | 
				
			||||||
 | 
					static unsigned long (MS_FAR *id_callback)(void)=NULL;
 | 
				
			||||||
 | 
					static struct CRYPTO_dynlock_value *(MS_FAR *dynlock_create_callback)
 | 
				
			||||||
 | 
					   (const char *file,int line)=NULL;
 | 
				
			||||||
 | 
					static void (MS_FAR *dynlock_lock_callback)(int mode,
 | 
				
			||||||
 | 
					   struct CRYPTO_dynlock_value *l, const char *file,int line)=NULL;
 | 
				
			||||||
 | 
					static void (MS_FAR *dynlock_destroy_callback)(struct CRYPTO_dynlock_value *l,
 | 
				
			||||||
 | 
					   const char *file,int line)=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mem.c
 | 
				
			||||||
 | 
					===========================================
 | 
				
			||||||
 | 
					static int allow_customize = 1;      /* we provide flexible functions for */
 | 
				
			||||||
 | 
					static int allow_customize_debug = 1;/* exchanging memory-related functions at
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* may be changed as long as `allow_customize' is set */
 | 
				
			||||||
 | 
					static void *(*malloc_locked_func)(size_t)  = malloc;
 | 
				
			||||||
 | 
					static void (*free_locked_func)(void *)     = free;
 | 
				
			||||||
 | 
					static void *(*malloc_func)(size_t)         = malloc;
 | 
				
			||||||
 | 
					static void *(*realloc_func)(void *, size_t)= realloc;
 | 
				
			||||||
 | 
					static void (*free_func)(void *)            = free;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* use default functions from mem_dbg.c */
 | 
				
			||||||
 | 
					static void (*malloc_debug_func)(void *,int,const char *,int,int)
 | 
				
			||||||
 | 
					   = CRYPTO_dbg_malloc;
 | 
				
			||||||
 | 
					static void (*realloc_debug_func)(void *,void *,int,const char *,int,int)
 | 
				
			||||||
 | 
					   = CRYPTO_dbg_realloc;
 | 
				
			||||||
 | 
					static void (*free_debug_func)(void *,int) = CRYPTO_dbg_free;
 | 
				
			||||||
 | 
					static void (*set_debug_options_func)(long) = CRYPTO_dbg_set_options;
 | 
				
			||||||
 | 
					static long (*get_debug_options_func)(void) = CRYPTO_dbg_get_options;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					mem_dbg.c
 | 
				
			||||||
 | 
					===========================================
 | 
				
			||||||
 | 
					static int mh_mode=CRYPTO_MEM_CHECK_OFF;
 | 
				
			||||||
 | 
					static unsigned long order = 0; /* number of memory requests */
 | 
				
			||||||
 | 
					static LHASH *mh=NULL; /* hash-table of memory requests (address as key) */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static LHASH *amih=NULL; /* hash-table with those app_mem_info_st's */
 | 
				
			||||||
 | 
					static long options =             /* extra information to be recorded */
 | 
				
			||||||
 | 
					static unsigned long disabling_thread = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					err.c
 | 
				
			||||||
 | 
					===========================================
 | 
				
			||||||
 | 
					static LHASH *error_hash=NULL;
 | 
				
			||||||
 | 
					static LHASH *thread_hash=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					several files have routines with static "init" to track if error strings
 | 
				
			||||||
 | 
					   have been loaded ( may not want seperate error strings for each process )
 | 
				
			||||||
 | 
					   The "init" variable can't be left "global" because the error has is a ptr
 | 
				
			||||||
 | 
					   that is malloc'ed.  The malloc'ed error has is dependant on the "init"
 | 
				
			||||||
 | 
					   vars.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   files:
 | 
				
			||||||
 | 
					      pem_err.c
 | 
				
			||||||
 | 
					      cpt_err.c
 | 
				
			||||||
 | 
					      pk12err.c
 | 
				
			||||||
 | 
					      asn1_err.c
 | 
				
			||||||
 | 
					      bio_err.c
 | 
				
			||||||
 | 
					      bn_err.c
 | 
				
			||||||
 | 
					      buf_err.c
 | 
				
			||||||
 | 
					      comp_err.c
 | 
				
			||||||
 | 
					      conf_err.c
 | 
				
			||||||
 | 
					      cpt_err.c
 | 
				
			||||||
 | 
					      dh_err.c
 | 
				
			||||||
 | 
					      dsa_err.c
 | 
				
			||||||
 | 
					      dso_err.c
 | 
				
			||||||
 | 
					      evp_err.c
 | 
				
			||||||
 | 
					      obj_err.c
 | 
				
			||||||
 | 
					      pkcs7err.c
 | 
				
			||||||
 | 
					      rand_err.c
 | 
				
			||||||
 | 
					      rsa_err.c
 | 
				
			||||||
 | 
					      rsar_err.c
 | 
				
			||||||
 | 
					      ssl_err.c
 | 
				
			||||||
 | 
					      x509_err.c
 | 
				
			||||||
 | 
					      v3err.c
 | 
				
			||||||
 | 
							err.c
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					These file have similar "init" globals but they are for other stuff not
 | 
				
			||||||
 | 
					error strings:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							bn_lib.c
 | 
				
			||||||
 | 
							ecc_enc.c
 | 
				
			||||||
 | 
							s23_clnt.c
 | 
				
			||||||
 | 
							s23_meth.c
 | 
				
			||||||
 | 
							s23_srvr.c
 | 
				
			||||||
 | 
							s2_clnt.c
 | 
				
			||||||
 | 
							s2_lib.c
 | 
				
			||||||
 | 
							s2_meth.c
 | 
				
			||||||
 | 
							s2_srvr.c
 | 
				
			||||||
 | 
							s3_clnt.c
 | 
				
			||||||
 | 
							s3_lib.c
 | 
				
			||||||
 | 
							s3_srvr.c
 | 
				
			||||||
 | 
							t1_clnt.c
 | 
				
			||||||
 | 
							t1_meth.c
 | 
				
			||||||
 | 
							t1_srvr.c
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rand_lib.c
 | 
				
			||||||
 | 
					===========================================
 | 
				
			||||||
 | 
					static RAND_METHOD *rand_meth= &rand_ssleay_meth;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					md_rand.c
 | 
				
			||||||
 | 
					===========================================
 | 
				
			||||||
 | 
					static int state_num=0,state_index=0;
 | 
				
			||||||
 | 
					static unsigned char state[STATE_SIZE+MD_DIGEST_LENGTH];
 | 
				
			||||||
 | 
					static unsigned char md[MD_DIGEST_LENGTH];
 | 
				
			||||||
 | 
					static long md_count[2]={0,0};
 | 
				
			||||||
 | 
					static double entropy=0;
 | 
				
			||||||
 | 
					static int initialized=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* This should be set to 1 only when ssleay_rand_add() is called inside
 | 
				
			||||||
 | 
					   an already locked state, so it doesn't try to lock and thereby cause
 | 
				
			||||||
 | 
					   a hang.  And it should always be reset back to 0 before unlocking. */
 | 
				
			||||||
 | 
					static int add_do_not_lock=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					obj_dat.c
 | 
				
			||||||
 | 
					============================================
 | 
				
			||||||
 | 
					static int new_nid=NUM_NID;
 | 
				
			||||||
 | 
					static LHASH *added=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					b_sock.c
 | 
				
			||||||
 | 
					===========================================
 | 
				
			||||||
 | 
					static unsigned long BIO_ghbn_hits=0L;
 | 
				
			||||||
 | 
					static unsigned long BIO_ghbn_miss=0L;
 | 
				
			||||||
 | 
					static struct ghbn_cache_st
 | 
				
			||||||
 | 
					   {
 | 
				
			||||||
 | 
					   char name[129];
 | 
				
			||||||
 | 
					   struct hostent *ent;
 | 
				
			||||||
 | 
					   unsigned long order;
 | 
				
			||||||
 | 
					   } ghbn_cache[GHBN_NUM];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int wsa_init_done=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					bio_lib.c
 | 
				
			||||||
 | 
					===========================================
 | 
				
			||||||
 | 
					static STACK_OF(CRYPTO_EX_DATA_FUNCS) *bio_meth=NULL;
 | 
				
			||||||
 | 
					static int bio_meth_num=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					bn_lib.c
 | 
				
			||||||
 | 
					========================================
 | 
				
			||||||
 | 
					static int bn_limit_bits=0;
 | 
				
			||||||
 | 
					static int bn_limit_num=8;        /* (1<<bn_limit_bits) */
 | 
				
			||||||
 | 
					static int bn_limit_bits_low=0;
 | 
				
			||||||
 | 
					static int bn_limit_num_low=8;    /* (1<<bn_limit_bits_low) */
 | 
				
			||||||
 | 
					static int bn_limit_bits_high=0;
 | 
				
			||||||
 | 
					static int bn_limit_num_high=8;   /* (1<<bn_limit_bits_high) */
 | 
				
			||||||
 | 
					static int bn_limit_bits_mont=0;
 | 
				
			||||||
 | 
					static int bn_limit_num_mont=8;   /* (1<<bn_limit_bits_mont) */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					conf_lib.c
 | 
				
			||||||
 | 
					========================================
 | 
				
			||||||
 | 
					static CONF_METHOD *default_CONF_method=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					dh_lib.c
 | 
				
			||||||
 | 
					========================================
 | 
				
			||||||
 | 
					static DH_METHOD *default_DH_method;
 | 
				
			||||||
 | 
					static int dh_meth_num = 0;
 | 
				
			||||||
 | 
					static STACK_OF(CRYPTO_EX_DATA_FUNCS) *dh_meth = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					dsa_lib.c
 | 
				
			||||||
 | 
					========================================
 | 
				
			||||||
 | 
					static DSA_METHOD *default_DSA_method;
 | 
				
			||||||
 | 
					static int dsa_meth_num = 0;
 | 
				
			||||||
 | 
					static STACK_OF(CRYPTO_EX_DATA_FUNCS) *dsa_meth = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					dso_lib.c
 | 
				
			||||||
 | 
					========================================
 | 
				
			||||||
 | 
					static DSO_METHOD *default_DSO_meth = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rsa_lib.c
 | 
				
			||||||
 | 
					========================================
 | 
				
			||||||
 | 
					static RSA_METHOD *default_RSA_meth=NULL;
 | 
				
			||||||
 | 
					static int rsa_meth_num=0;
 | 
				
			||||||
 | 
					static STACK_OF(CRYPTO_EX_DATA_FUNCS) *rsa_meth=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					x509_trs.c
 | 
				
			||||||
 | 
					=======================================
 | 
				
			||||||
 | 
					static int (*default_trust)(int id, X509 *x, int flags) = obj_trust;
 | 
				
			||||||
 | 
					static STACK_OF(X509_TRUST) *trtable = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					x509_req.c
 | 
				
			||||||
 | 
					=======================================
 | 
				
			||||||
 | 
					static int *ext_nids = ext_nid_list;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					o_names.c
 | 
				
			||||||
 | 
					======================================
 | 
				
			||||||
 | 
					static LHASH *names_lh=NULL;
 | 
				
			||||||
 | 
					static STACK_OF(NAME_FUNCS) *name_funcs_stack;
 | 
				
			||||||
 | 
					static int free_type;
 | 
				
			||||||
 | 
					static int names_type_num=OBJ_NAME_TYPE_NUM;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					th-lock.c - NEED to add support for locking for NetWare
 | 
				
			||||||
 | 
					==============================================
 | 
				
			||||||
 | 
					static long *lock_count;
 | 
				
			||||||
 | 
					(other platform specific globals)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					x_x509.c
 | 
				
			||||||
 | 
					==============================================
 | 
				
			||||||
 | 
					static int x509_meth_num = 0;
 | 
				
			||||||
 | 
					static STACK_OF(CRYPTO_EX_DATA_FUNCS) *x509_meth = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					evp_pbe.c
 | 
				
			||||||
 | 
					============================================
 | 
				
			||||||
 | 
					static STACK *pbe_algs;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					evp_key.c
 | 
				
			||||||
 | 
					============================================
 | 
				
			||||||
 | 
					static char prompt_string[80];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					ssl_ciph.c
 | 
				
			||||||
 | 
					============================================
 | 
				
			||||||
 | 
					static STACK_OF(SSL_COMP) *ssl_comp_methods=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					ssl_lib.c
 | 
				
			||||||
 | 
					=============================================
 | 
				
			||||||
 | 
					static STACK_OF(CRYPTO_EX_DATA_FUNCS) *ssl_meth=NULL;
 | 
				
			||||||
 | 
					static STACK_OF(CRYPTO_EX_DATA_FUNCS) *ssl_ctx_meth=NULL;
 | 
				
			||||||
 | 
					static int ssl_meth_num=0;
 | 
				
			||||||
 | 
					static int ssl_ctx_meth_num=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					ssl_sess.c
 | 
				
			||||||
 | 
					=============================================
 | 
				
			||||||
 | 
					static int ssl_session_num=0;
 | 
				
			||||||
 | 
					static STACK_OF(CRYPTO_EX_DATA_FUNCS) *ssl_session_meth=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					x509_vfy.c
 | 
				
			||||||
 | 
					============================================
 | 
				
			||||||
 | 
					static STACK_OF(CRYPTO_EX_DATA_FUNCS) *x509_store_ctx_method=NULL;
 | 
				
			||||||
 | 
					static int x509_store_ctx_num=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
							
								
								
									
										19
									
								
								Netware/readme.txt
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										19
									
								
								Netware/readme.txt
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,19 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 | 
					Contents of the openssl\netware directory
 | 
				
			||||||
 | 
					==========================================
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Regular files:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					readme.txt     - this file
 | 
				
			||||||
 | 
					do_tests.pl    - perl script used to run the OpenSSL tests on NetWare
 | 
				
			||||||
 | 
					cpy_tests.bat  - batch to to copy test stuff to NetWare server
 | 
				
			||||||
 | 
					build.bat      - batch file to help with builds
 | 
				
			||||||
 | 
					set_env.bat    - batch file to help setup build environments
 | 
				
			||||||
 | 
					globals.txt    - results of initial code review to identify OpenSSL global variables
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The following files are generated by the various scripts.  They are
 | 
				
			||||||
 | 
					recreated each time and it is okay to delete them.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					*.def - command files used by Metrowerks linker
 | 
				
			||||||
 | 
					*.mak - make files generated by mk1mf.pl
 | 
				
			||||||
							
								
								
									
										112
									
								
								Netware/set_env.bat
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										112
									
								
								Netware/set_env.bat
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,112 @@
 | 
				
			|||||||
 | 
					@echo off
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem ========================================================================
 | 
				
			||||||
 | 
					rem   Batch file to assist in setting up the necessary enviroment for
 | 
				
			||||||
 | 
					rem   building OpenSSL for NetWare.
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					rem   usage:
 | 
				
			||||||
 | 
					rem      set_env [target]
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					rem      target      - "netware-clib" - Clib build
 | 
				
			||||||
 | 
					rem                  - "netware-libc" - LibC build
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					rem
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if "a%1" == "a" goto usage
 | 
				
			||||||
 | 
					               
 | 
				
			||||||
 | 
					set LIBC_BUILD=
 | 
				
			||||||
 | 
					set CLIB_BUILD=
 | 
				
			||||||
 | 
					set GNUC=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if "%1" == "netware-clib" set CLIB_BUILD=Y
 | 
				
			||||||
 | 
					if "%1" == "netware-clib" set LIBC_BUILD=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if "%1" == "netware-libc" set LIBC_BUILD=Y
 | 
				
			||||||
 | 
					if "%1" == "netware-libc" set CLIB_BUILD=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if "%2" == "gnuc" set GNUC=Y
 | 
				
			||||||
 | 
					if "%2" == "codewarrior" set GNUC=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Location of tools (compiler, linker, etc)
 | 
				
			||||||
 | 
					if "%NDKBASE%" == "" set NDKBASE=c:\Novell
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   If Perl for Win32 is not already in your path, add it here
 | 
				
			||||||
 | 
					set PERL_PATH=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Define path to the Metrowerks command line tools
 | 
				
			||||||
 | 
					rem   or GNU Crosscompiler gcc / nlmconv
 | 
				
			||||||
 | 
					rem   ( compiler, assembler, linker)
 | 
				
			||||||
 | 
					if "%GNUC%" == "Y" set COMPILER_PATH=c:\usr\i586-netware\bin;c:\usr\bin
 | 
				
			||||||
 | 
					if "%GNUC%" == "" set COMPILER_PATH=c:\prg\cwcmdl40
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   If using gnu make define path to utility
 | 
				
			||||||
 | 
					rem set GNU_MAKE_PATH=%NDKBASE%\gnu
 | 
				
			||||||
 | 
					set GNU_MAKE_PATH=c:\prg\tools
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   If using ms nmake define path to nmake
 | 
				
			||||||
 | 
					rem set MS_NMAKE_PATH=%NDKBASE%\msvc\600\bin
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   If using NASM assembler define path
 | 
				
			||||||
 | 
					rem set NASM_PATH=%NDKBASE%\nasm
 | 
				
			||||||
 | 
					set NASM_PATH=c:\prg\tools
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Update path to include tool paths
 | 
				
			||||||
 | 
					set path=%path%;%COMPILER_PATH%
 | 
				
			||||||
 | 
					if not "%GNU_MAKE_PATH%" == "" set path=%path%;%GNU_MAKE_PATH%
 | 
				
			||||||
 | 
					if not "%MS_NMAKE_PATH%" == "" set path=%path%;%MS_NMAKE_PATH%
 | 
				
			||||||
 | 
					if not "%NASM_PATH%"     == "" set path=%path%;%NASM_PATH%
 | 
				
			||||||
 | 
					if not "%PERL_PATH%"     == "" set path=%path%;%PERL_PATH%
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Set INCLUDES to location of Novell NDK includes
 | 
				
			||||||
 | 
					if "%LIBC_BUILD%" == "Y" set INCLUDE=%NDKBASE%\ndk\libc\include;%NDKBASE%\ndk\libc\include\winsock
 | 
				
			||||||
 | 
					if "%CLIB_BUILD%" == "Y" set INCLUDE=%NDKBASE%\ndk\nwsdk\include\nlm;%NDKBASE%\ws295sdk\include
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Set Imports to location of Novell NDK import files
 | 
				
			||||||
 | 
					if "%LIBC_BUILD%" == "Y" set IMPORTS=%NDKBASE%\ndk\libc\imports
 | 
				
			||||||
 | 
					if "%CLIB_BUILD%" == "Y" set IMPORTS=%NDKBASE%\ndk\nwsdk\imports
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					rem   Set PRELUDE to the absolute path of the prelude object to link with in
 | 
				
			||||||
 | 
					rem   the Metrowerks NetWare PDK - NOTE: for Clib builds "clibpre.o" is 
 | 
				
			||||||
 | 
					rem   recommended, for LibC NKS builds libcpre.o must be used
 | 
				
			||||||
 | 
					if "%GNUC%" == "Y" goto gnuc
 | 
				
			||||||
 | 
					if "%LIBC_BUILD%" == "Y" set PRELUDE=%IMPORTS%\libcpre.o
 | 
				
			||||||
 | 
					rem if "%CLIB_BUILD%" == "Y" set PRELUDE=%IMPORTS%\clibpre.o
 | 
				
			||||||
 | 
					if "%CLIB_BUILD%" == "Y" set PRELUDE=%IMPORTS%\prelude.o
 | 
				
			||||||
 | 
					echo using MetroWerks CodeWarrior 
 | 
				
			||||||
 | 
					goto info
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:gnuc
 | 
				
			||||||
 | 
					if "%LIBC_BUILD%" == "Y" set PRELUDE=%IMPORTS%\libcpre.gcc.o
 | 
				
			||||||
 | 
					rem if "%CLIB_BUILD%" == "Y" set PRELUDE=%IMPORTS%\clibpre.gcc.o
 | 
				
			||||||
 | 
					if "%CLIB_BUILD%" == "Y" set PRELUDE=%IMPORTS%\prelude.gcc.o
 | 
				
			||||||
 | 
					echo using GNU GCC Compiler 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:info
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if "%LIBC_BUILD%" == "Y" echo Enviroment configured for LibC build
 | 
				
			||||||
 | 
					if "%LIBC_BUILD%" == "Y" echo use "netware\build.bat netware-libc ..." 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if "%CLIB_BUILD%" == "Y" echo Enviroment configured for CLib build
 | 
				
			||||||
 | 
					if "%CLIB_BUILD%" == "Y" echo use "netware\build.bat netware-clib ..." 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					goto end
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:usage
 | 
				
			||||||
 | 
					rem ===============================================================
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					echo No target build specified!
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					echo usage: set_env [target] [compiler]
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					echo target      - "netware-clib" - Clib build
 | 
				
			||||||
 | 
					echo             - "netware-libc" - LibC build
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					echo compiler    - "gnuc"         - GNU GCC Compiler
 | 
				
			||||||
 | 
					echo             - "codewarrior"  - MetroWerks CodeWarrior (default)
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:end
 | 
				
			||||||
 | 
					echo.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
							
								
								
									
										37
									
								
								PROBLEMS
									
									
									
									
									
								
							
							
						
						
									
										37
									
								
								PROBLEMS
									
									
									
									
									
								
							@@ -36,7 +36,9 @@ may differ on your machine.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
As long as Apple doesn't fix the problem with ld, this problem building
 | 
					As long as Apple doesn't fix the problem with ld, this problem building
 | 
				
			||||||
OpenSSL will remain as is.
 | 
					OpenSSL will remain as is. Well, the problem was addressed in 0.9.8f by
 | 
				
			||||||
 | 
					passing -Wl,-search_paths_first, but it's unknown if the flag was
 | 
				
			||||||
 | 
					supported from the initial MacOS X release.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* Parallell make leads to errors
 | 
					* Parallell make leads to errors
 | 
				
			||||||
@@ -71,6 +73,12 @@ The solution is simple for now: don't run parallell make when testing.
 | 
				
			|||||||
  The recomendation is to upgrade your compiler. This naturally applies to
 | 
					  The recomendation is to upgrade your compiler. This naturally applies to
 | 
				
			||||||
  other similar cases.
 | 
					  other similar cases.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					- There is a subtle Solaris x86-specific gcc run-time environment bug, which
 | 
				
			||||||
 | 
					  "falls between" OpenSSL [0.9.8 and later], Solaris ld and GCC. The bug
 | 
				
			||||||
 | 
					  manifests itself as Segmentation Fault upon early application start-up.
 | 
				
			||||||
 | 
					  The problem can be worked around by patching the environment according to
 | 
				
			||||||
 | 
					  http://www.openssl.org/~appro/values.c.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
* solaris64-sparcv9-cc SHA-1 performance with WorkShop 6 compiler.
 | 
					* solaris64-sparcv9-cc SHA-1 performance with WorkShop 6 compiler.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
As subject suggests SHA-1 might perform poorly (4 times slower)
 | 
					As subject suggests SHA-1 might perform poorly (4 times slower)
 | 
				
			||||||
@@ -162,3 +170,30 @@ hire /bin/ksh to do the job /bin/sh fails to do.
 | 
				
			|||||||
   your $PATH with chosen location, e.g. PATH=/tmp:$PATH. Alter-
 | 
					   your $PATH with chosen location, e.g. PATH=/tmp:$PATH. Alter-
 | 
				
			||||||
   natively just replace system /bin/test and /bin/[ with the
 | 
					   natively just replace system /bin/test and /bin/[ with the
 | 
				
			||||||
   above script.
 | 
					   above script.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* hpux64-ia64-cc fails blowfish test.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Compiler bug, presumably at particular patch level. It should be noted
 | 
				
			||||||
 | 
					that same compiler generates correct 32-bit code, a.k.a. hpux-ia64-cc
 | 
				
			||||||
 | 
					target. Drop optimization level to +O2 when compiling 64-bit bf_skey.o.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* no-engines generates errors.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Unfortunately, the 'no-engines' configuration option currently doesn't
 | 
				
			||||||
 | 
					work properly.  Use 'no-hw' and you'll will at least get no hardware
 | 
				
			||||||
 | 
					support.  We'll see how we fix that on OpenSSL versions past 0.9.8.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* 'make test' fails in BN_sqr [commonly with "error 139" denoting SIGSEGV]
 | 
				
			||||||
 | 
					  if elder GNU binutils were deployed to link shared libcrypto.so.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					As subject suggests the failure is caused by a bug in elder binutils,
 | 
				
			||||||
 | 
					either as or ld, and was observed on FreeBSD and Linux. There are two
 | 
				
			||||||
 | 
					options. First is naturally to upgrade binutils, the second one - to
 | 
				
			||||||
 | 
					reconfigure with additional no-sse2 [or 386] option passed to ./config.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* If configured with ./config no-dso, toolkit still gets linked with -ldl,
 | 
				
			||||||
 | 
					  which most notably poses a problem when linking with dietlibc.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					We don't have framework to associate -ldl with no-dso, therefore the only
 | 
				
			||||||
 | 
					way is to edit Makefile right after ./config no-dso and remove -ldl from
 | 
				
			||||||
 | 
					EX_LIBS line.
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										44
									
								
								README
									
									
									
									
									
								
							
							
						
						
									
										44
									
								
								README
									
									
									
									
									
								
							@@ -1,7 +1,7 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 OpenSSL 0.9.7h-dev XX xxx XXXX
 | 
					 OpenSSL 0.9.8zd 8 Jan 2015
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Copyright (c) 1998-2005 The OpenSSL Project
 | 
					 Copyright (c) 1998-2011 The OpenSSL Project
 | 
				
			||||||
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 | 
					 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 | 
				
			||||||
 All rights reserved.
 | 
					 All rights reserved.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -36,12 +36,13 @@
 | 
				
			|||||||
     actually logically part of it. It includes routines for the following:
 | 
					     actually logically part of it. It includes routines for the following:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
     Ciphers
 | 
					     Ciphers
 | 
				
			||||||
        libdes - EAY's libdes DES encryption package which has been floating
 | 
					        libdes - EAY's libdes DES encryption package which was floating
 | 
				
			||||||
                 around the net for a few years.  It includes 15
 | 
					                 around the net for a few years, and was then relicensed by
 | 
				
			||||||
                 'modes/variations' of DES (1, 2 and 3 key versions of ecb,
 | 
					                 him as part of SSLeay.  It includes 15 'modes/variations'
 | 
				
			||||||
                 cbc, cfb and ofb; pcbc and a more general form of cfb and
 | 
					                 of DES (1, 2 and 3 key versions of ecb, cbc, cfb and ofb;
 | 
				
			||||||
                 ofb) including desx in cbc mode, a fast crypt(3), and
 | 
					                 pcbc and a more general form of cfb and ofb) including desx
 | 
				
			||||||
                 routines to read passwords from the keyboard.
 | 
					                 in cbc mode, a fast crypt(3), and routines to read
 | 
				
			||||||
 | 
					                 passwords from the keyboard.
 | 
				
			||||||
        RC4 encryption,
 | 
					        RC4 encryption,
 | 
				
			||||||
        RC2 encryption      - 4 different modes, ecb, cbc, cfb and ofb.
 | 
					        RC2 encryption      - 4 different modes, ecb, cbc, cfb and ofb.
 | 
				
			||||||
        Blowfish encryption - 4 different modes, ecb, cbc, cfb and ofb.
 | 
					        Blowfish encryption - 4 different modes, ecb, cbc, cfb and ofb.
 | 
				
			||||||
@@ -111,7 +112,9 @@
 | 
				
			|||||||
 should be contacted if that algorithm is to be used; their web page is
 | 
					 should be contacted if that algorithm is to be used; their web page is
 | 
				
			||||||
 http://www.ascom.ch/.
 | 
					 http://www.ascom.ch/.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 The MDC2 algorithm is patented by IBM.
 | 
					 NTT and Mitsubishi have patents and pending patents on the Camellia
 | 
				
			||||||
 | 
					 algorithm, but allow use at no charge without requiring an explicit
 | 
				
			||||||
 | 
					 licensing agreement: http://info.isl.ntt.co.jp/crypt/eng/info/chiteki.html
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 INSTALLATION
 | 
					 INSTALLATION
 | 
				
			||||||
 ------------
 | 
					 ------------
 | 
				
			||||||
@@ -134,6 +137,9 @@
 | 
				
			|||||||
 SUPPORT
 | 
					 SUPPORT
 | 
				
			||||||
 -------
 | 
					 -------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 See the OpenSSL website www.openssl.org for details of how to obtain
 | 
				
			||||||
 | 
					 commercial technical support.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 If you have any problems with OpenSSL then please take the following steps
 | 
					 If you have any problems with OpenSSL then please take the following steps
 | 
				
			||||||
 first:
 | 
					 first:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -156,10 +162,14 @@
 | 
				
			|||||||
    - Stack Traceback (if the application dumps core)
 | 
					    - Stack Traceback (if the application dumps core)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Report the bug to the OpenSSL project via the Request Tracker
 | 
					 Report the bug to the OpenSSL project via the Request Tracker
 | 
				
			||||||
 (http://www.openssl.org/support/rt2.html) by mail to:
 | 
					 (http://www.openssl.org/support/rt.html) by mail to:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    openssl-bugs@openssl.org
 | 
					    openssl-bugs@openssl.org
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Note that the request tracker should NOT be used for general assistance
 | 
				
			||||||
 | 
					 or support queries. Just because something doesn't work the way you expect
 | 
				
			||||||
 | 
					 does not mean it is necessarily a bug in OpenSSL.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Note that mail to openssl-bugs@openssl.org is recorded in the publicly
 | 
					 Note that mail to openssl-bugs@openssl.org is recorded in the publicly
 | 
				
			||||||
 readable request tracker database and is forwarded to a public
 | 
					 readable request tracker database and is forwarded to a public
 | 
				
			||||||
 mailing list. Confidential mail may be sent to openssl-security@openssl.org
 | 
					 mailing list. Confidential mail may be sent to openssl-security@openssl.org
 | 
				
			||||||
@@ -170,10 +180,22 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 Development is coordinated on the openssl-dev mailing list (see
 | 
					 Development is coordinated on the openssl-dev mailing list (see
 | 
				
			||||||
 http://www.openssl.org for information on subscribing). If you
 | 
					 http://www.openssl.org for information on subscribing). If you
 | 
				
			||||||
 would like to submit a patch, send it to openssl-dev@openssl.org with
 | 
					 would like to submit a patch, send it to openssl-bugs@openssl.org with
 | 
				
			||||||
 the string "[PATCH]" in the subject. Please be sure to include a
 | 
					 the string "[PATCH]" in the subject. Please be sure to include a
 | 
				
			||||||
 textual explanation of what your patch does.
 | 
					 textual explanation of what your patch does.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 If you are unsure as to whether a feature will be useful for the general
 | 
				
			||||||
 | 
					 OpenSSL community please discuss it on the openssl-dev mailing list first.
 | 
				
			||||||
 | 
					 Someone may be already working on the same thing or there may be a good
 | 
				
			||||||
 | 
					 reason as to why that feature isn't implemented.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Patches should be as up to date as possible, preferably relative to the
 | 
				
			||||||
 | 
					 current Git or the last snapshot. They should follow the coding style of
 | 
				
			||||||
 | 
					 OpenSSL and compile without warnings. Some of the core team developer targets
 | 
				
			||||||
 | 
					 can be used for testing purposes, (debug-steve64, debug-geoff etc). OpenSSL
 | 
				
			||||||
 | 
					 compiles on many varied platforms: try to ensure you only use portable
 | 
				
			||||||
 | 
					 features.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Note: For legal reasons, contributions from the US can be accepted only
 | 
					 Note: For legal reasons, contributions from the US can be accepted only
 | 
				
			||||||
 if a TSU notification and a copy of the patch are sent to crypt@bis.doc.gov
 | 
					 if a TSU notification and a copy of the patch are sent to crypt@bis.doc.gov
 | 
				
			||||||
 (formerly BXA) with a copy to the ENC Encryption Request Coordinator;
 | 
					 (formerly BXA) with a copy to the ENC Encryption Request Coordinator;
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										116
									
								
								STATUS
									
									
									
									
									
								
							
							
						
						
									
										116
									
								
								STATUS
									
									
									
									
									
								
							@@ -1,116 +0,0 @@
 | 
				
			|||||||
 | 
					 | 
				
			||||||
  OpenSSL STATUS                           Last modified at
 | 
					 | 
				
			||||||
  ______________                           $Date: 2005/04/11 15:10:06 $
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  DEVELOPMENT STATE
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.8:  Under development...
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.7g: Released on April     11th, 2005
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.7f: Released on March     22nd, 2005
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.7e: Released on October   25th, 2004
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.7d: Released on March     17th, 2004
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.7c: Released on September 30th, 2003
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.7b: Released on April     10th, 2003
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.7a: Released on February  19th, 2003
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.7:  Released on December  31st, 2002
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6m: Released on March     17th, 2004
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6l: Released on November   4th, 2003
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6k: Released on September 30th, 2003
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6j: Released on April     10th, 2003
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6i: Released on February  19th, 2003
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6h: Released on December   5th, 2002
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6g: Released on August     9th, 2002
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6f: Released on August     8th, 2002
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6e: Released on July      30th, 2002
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6d: Released on May        9th, 2002
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6c: Released on December  21st, 2001
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6b: Released on July       9th, 2001
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6a: Released on April      5th, 2001
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.6:  Released on September 24th, 2000
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.5a: Released on April      1st, 2000
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.5:  Released on February  28th, 2000
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.4:  Released on August    09th, 1999
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.3a: Released on May       29th, 1999
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.3:  Released on May       25th, 1999
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.2b: Released on March     22th, 1999
 | 
					 | 
				
			||||||
    o  OpenSSL 0.9.1c: Released on December  23th, 1998
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  [See also http://www.openssl.org/support/rt2.html]
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  RELEASE SHOWSTOPPERS
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o 
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  AVAILABLE PATCHES
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o 
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  IN PROGRESS
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o Steve is currently working on (in no particular order):
 | 
					 | 
				
			||||||
        ASN1 code redesign, butchery, replacement.
 | 
					 | 
				
			||||||
        OCSP
 | 
					 | 
				
			||||||
        EVP cipher enhancement.
 | 
					 | 
				
			||||||
        Enhanced certificate chain verification.
 | 
					 | 
				
			||||||
	Private key, certificate and CRL API and implementation.
 | 
					 | 
				
			||||||
	Developing and bugfixing PKCS#7 (S/MIME code).
 | 
					 | 
				
			||||||
        Various X509 issues: character sets, certificate request extensions.
 | 
					 | 
				
			||||||
    o Geoff and Richard are currently working on:
 | 
					 | 
				
			||||||
	ENGINE (the new code that gives hardware support among others).
 | 
					 | 
				
			||||||
    o Richard is currently working on:
 | 
					 | 
				
			||||||
	UI (User Interface)
 | 
					 | 
				
			||||||
	UTIL (a new set of library functions to support some higher level
 | 
					 | 
				
			||||||
	      functionality that is currently missing).
 | 
					 | 
				
			||||||
	Shared library support for VMS.
 | 
					 | 
				
			||||||
	Kerberos 5 authentication (Heimdal)
 | 
					 | 
				
			||||||
	Constification
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  NEEDS PATCH
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o  apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o  "OpenSSL STATUS" is never up-to-date.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  OPEN ISSUES
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o  The Makefile hierarchy and build mechanism is still not a round thing:
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
       1. The config vs. Configure scripts
 | 
					 | 
				
			||||||
          It's the same nasty situation as for Apache with APACI vs.
 | 
					 | 
				
			||||||
          src/Configure. It confuses.
 | 
					 | 
				
			||||||
          Suggestion: Merge Configure and config into a single configure
 | 
					 | 
				
			||||||
                      script with a Autoconf style interface ;-) and remove
 | 
					 | 
				
			||||||
                      Configure and config. Or even let us use GNU Autoconf
 | 
					 | 
				
			||||||
                      itself. Then we can avoid a lot of those platform checks
 | 
					 | 
				
			||||||
                      which are currently in Configure.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o  Support for Shared Libraries has to be added at least
 | 
					 | 
				
			||||||
       for the major Unix platforms. The details we can rip from the stuff
 | 
					 | 
				
			||||||
       Ralf has done for the Apache src/Configure script. Ben wants the
 | 
					 | 
				
			||||||
       solution to be really simple.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
       Status: Ralf will look how we can easily incorporate the
 | 
					 | 
				
			||||||
               compiler PIC and linker DSO flags from Apache
 | 
					 | 
				
			||||||
               into the OpenSSL Configure script.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
               Ulf: +1 for using GNU autoconf and libtool (but not automake,
 | 
					 | 
				
			||||||
                    which apparently is not flexible enough to generate
 | 
					 | 
				
			||||||
                    libcrypto)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  WISHES
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o  Add variants of DH_generate_parameters() and BN_generate_prime() [etc?]
 | 
					 | 
				
			||||||
       where the callback function can request that the function be aborted.
 | 
					 | 
				
			||||||
       [Gregory Stark <ghstark@pobox.com>, <rayyang2000@yahoo.com>]
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o  SRP in TLS.
 | 
					 | 
				
			||||||
       [wished by:
 | 
					 | 
				
			||||||
        Dj <derek@yo.net>, Tom Wu <tom@arcot.com>,
 | 
					 | 
				
			||||||
        Tom Holroyd <tomh@po.crl.go.jp>]
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
       See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
 | 
					 | 
				
			||||||
       as well as http://www-cs-students.stanford.edu/~tjw/srp/.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
       Tom Holroyd tells us there is a SRP patch for OpenSSH at
 | 
					 | 
				
			||||||
       http://members.tripod.com/professor_tom/archives/, that could
 | 
					 | 
				
			||||||
       be useful.
 | 
					 | 
				
			||||||
@@ -12,6 +12,14 @@ $	    WRITE SYS$OUTPUT "Should be the directory where you want things installed.
 | 
				
			|||||||
$	    EXIT
 | 
					$	    EXIT
 | 
				
			||||||
$	ENDIF
 | 
					$	ENDIF
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
 | 
					$	IF (F$GETSYI("CPU").LT.128)
 | 
				
			||||||
 | 
					$	THEN
 | 
				
			||||||
 | 
					$	    ARCH := VAX
 | 
				
			||||||
 | 
					$	ELSE
 | 
				
			||||||
 | 
					$	    ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
 | 
				
			||||||
 | 
					$	    IF (ARCH .EQS. "") THEN ARCH = "UNK"
 | 
				
			||||||
 | 
					$	ENDIF
 | 
				
			||||||
 | 
					$
 | 
				
			||||||
$	ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
 | 
					$	ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
 | 
				
			||||||
$	ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
 | 
					$	ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
 | 
				
			||||||
$	ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
 | 
					$	ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
 | 
				
			||||||
@@ -19,13 +27,7 @@ $	ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
 | 
				
			|||||||
$	ROOT = ROOT_DEV + "[" + ROOT_DIR
 | 
					$	ROOT = ROOT_DEV + "[" + ROOT_DIR
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
 | 
					$	DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLVLIB WRK_SSLROOT:[VAX_LIB]
 | 
					 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLALIB WRK_SSLROOT:[ALPHA_LIB]
 | 
					 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLINCLUDE WRK_SSLROOT:[INCLUDE]
 | 
					$	DEFINE/NOLOG WRK_SSLINCLUDE WRK_SSLROOT:[INCLUDE]
 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLVEXE WRK_SSLROOT:[VAX_EXE]
 | 
					 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLAEXE WRK_SSLROOT:[ALPHA_EXE]
 | 
					 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLCERTS WRK_SSLROOT:[CERTS]
 | 
					 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLPRIVATE WRK_SSLROOT:[PRIVATE]
 | 
					 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$	IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
 | 
					$	IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
 | 
				
			||||||
	   CREATE/DIR/LOG WRK_SSLROOT:[000000]
 | 
						   CREATE/DIR/LOG WRK_SSLROOT:[000000]
 | 
				
			||||||
@@ -39,7 +41,7 @@ $	IF F$SEARCH("WRK_SSLINCLUDE:vms_idhacks.h") .NES. "" THEN -
 | 
				
			|||||||
$
 | 
					$
 | 
				
			||||||
$	OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
 | 
					$	OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
 | 
				
			||||||
$	WRITE SYS$OUTPUT "%OPEN-I-CREATED,  ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
 | 
					$	WRITE SYS$OUTPUT "%OPEN-I-CREATED,  ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
 | 
				
			||||||
$	WRITE SF "$! Startup file for Openssl 0.9.2-RL 15-Mar-1999"
 | 
					$	WRITE SF "$! Startup file for Openssl"
 | 
				
			||||||
$	WRITE SF "$!"
 | 
					$	WRITE SF "$!"
 | 
				
			||||||
$	WRITE SF "$! Do not edit this file, as it will be regenerated during next installation."
 | 
					$	WRITE SF "$! Do not edit this file, as it will be regenerated during next installation."
 | 
				
			||||||
$	WRITE SF "$! Instead, add or change SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
 | 
					$	WRITE SF "$! Instead, add or change SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
 | 
				
			||||||
@@ -47,8 +49,13 @@ $	WRITE SF "$!"
 | 
				
			|||||||
$	WRITE SF "$! P1	a qualifier to DEFINE.  For example ""/SYSTEM"" to get the logical names"
 | 
					$	WRITE SF "$! P1	a qualifier to DEFINE.  For example ""/SYSTEM"" to get the logical names"
 | 
				
			||||||
$	WRITE SF "$!	defined in the system logical name table."
 | 
					$	WRITE SF "$!	defined in the system logical name table."
 | 
				
			||||||
$	WRITE SF "$!"
 | 
					$	WRITE SF "$!"
 | 
				
			||||||
$	WRITE SF "$	ARCH = ""VAX"""
 | 
					$	WRITE SF "$	IF (F$GETSYI(""CPU"").LT.128)"
 | 
				
			||||||
$	WRITE SF "$	IF F$GETSYI(""CPU"") .GE. 128 THEN ARCH = ""ALPHA"""
 | 
					$	WRITE SF "$	THEN"
 | 
				
			||||||
 | 
					$	WRITE SF "$	    ARCH := VAX"
 | 
				
			||||||
 | 
					$	WRITE SF "$	ELSE"
 | 
				
			||||||
 | 
					$	WRITE SF "$	    ARCH = F$EDIT( F$GETSYI( ""ARCH_NAME""), ""UPCASE"")"
 | 
				
			||||||
 | 
					$	WRITE SF "$	    IF (ARCH .EQS. """") THEN ARCH = ""UNK"""
 | 
				
			||||||
 | 
					$	WRITE SF "$	ENDIF"
 | 
				
			||||||
$	WRITE SF "$	DEFINE/NOLOG'P1	SSLROOT		",ROOT,".] /TRANS=CONC"
 | 
					$	WRITE SF "$	DEFINE/NOLOG'P1	SSLROOT		",ROOT,".] /TRANS=CONC"
 | 
				
			||||||
$	WRITE SF "$	DEFINE/NOLOG'P1	SSLLIB		SSLROOT:['ARCH'_LIB]"
 | 
					$	WRITE SF "$	DEFINE/NOLOG'P1	SSLLIB		SSLROOT:['ARCH'_LIB]"
 | 
				
			||||||
$	WRITE SF "$	DEFINE/NOLOG'P1	SSLINCLUDE	SSLROOT:[INCLUDE]"
 | 
					$	WRITE SF "$	DEFINE/NOLOG'P1	SSLINCLUDE	SSLROOT:[INCLUDE]"
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -3,10 +3,10 @@ $!
 | 
				
			|||||||
$! No command line parameters.  This should be run at the start of the source
 | 
					$! No command line parameters.  This should be run at the start of the source
 | 
				
			||||||
$! tree (the same directory where one finds INSTALL.VMS).
 | 
					$! tree (the same directory where one finds INSTALL.VMS).
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Input:	[.UTIL]LIBEAY.NUM,[.AXP.EXE.CRYPTO]LIBCRYPTO.OLB
 | 
					$! Input:	[.UTIL]LIBEAY.NUM,[.xxx.EXE.CRYPTO]LIBCRYPTO.OLB
 | 
				
			||||||
$!		[.UTIL]SSLEAY.NUM,[.AXP.EXE.SSL]LIBSSL.OLB
 | 
					$!		[.UTIL]SSLEAY.NUM,[.xxx.EXE.SSL]LIBSSL.OLB
 | 
				
			||||||
$! Output:	[.AXP.EXE.CRYPTO]LIBCRYPTO.OPT,.MAP,.EXE
 | 
					$! Output:	[.xxx.EXE.CRYPTO]LIBCRYPTO.OPT,.MAP,.EXE
 | 
				
			||||||
$!		[.AXP.EXE.SSL]LIBSSL.OPT,.MAP,.EXE
 | 
					$!		[.xxx.EXE.SSL]LIBSSL.OPT,.MAP,.EXE
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! So far, tests have only been made on VMS for Alpha.  VAX will come in time.
 | 
					$! So far, tests have only been made on VMS for Alpha.  VAX will come in time.
 | 
				
			||||||
$! ===========================================================================
 | 
					$! ===========================================================================
 | 
				
			||||||
@@ -19,31 +19,41 @@ $   write sys$error "ERROR: Couldn't find any library version info..."
 | 
				
			|||||||
$   exit
 | 
					$   exit
 | 
				
			||||||
$ endif
 | 
					$ endif
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$ if f$getsyi("CPU") .ge. 128
 | 
					$ if (f$getsyi("cpu").lt.128)
 | 
				
			||||||
$ then
 | 
					$ then
 | 
				
			||||||
 | 
					$     arch := VAX
 | 
				
			||||||
 | 
					$ else
 | 
				
			||||||
 | 
					$     arch = f$edit( f$getsyi( "ARCH_NAME"), "UPCASE")
 | 
				
			||||||
 | 
					$     if (arch .eqs. "") then arch = "UNK"
 | 
				
			||||||
 | 
					$ endif
 | 
				
			||||||
 | 
					$
 | 
				
			||||||
 | 
					$ if arch .nes. "VAX"
 | 
				
			||||||
 | 
					$ then
 | 
				
			||||||
 | 
					$   arch_vax = 0
 | 
				
			||||||
$   libid  = "Crypto"
 | 
					$   libid  = "Crypto"
 | 
				
			||||||
$   libnum = "[.UTIL]LIBEAY.NUM"
 | 
					$   libnum = "[.UTIL]LIBEAY.NUM"
 | 
				
			||||||
$   libdir = "[.AXP.EXE.CRYPTO]"
 | 
					$   libdir = "[.''ARCH'.EXE.CRYPTO]"
 | 
				
			||||||
$   libolb = "''libdir'LIBCRYPTO.OLB"
 | 
					$   libolb = "''libdir'LIBCRYPTO.OLB"
 | 
				
			||||||
$   libopt = "''libdir'LIBCRYPTO.OPT"
 | 
					$   libopt = "''libdir'LIBCRYPTO.OPT"
 | 
				
			||||||
$   libmap = "''libdir'LIBCRYPTO.MAP"
 | 
					$   libmap = "''libdir'LIBCRYPTO.MAP"
 | 
				
			||||||
$   libgoal= "''libdir'LIBCRYPTO.EXE"
 | 
					$   libgoal= "''libdir'LIBCRYPTO.EXE"
 | 
				
			||||||
$   libref = ""
 | 
					$   libref = ""
 | 
				
			||||||
$   gosub create_axp_shr
 | 
					$   gosub create_nonvax_shr
 | 
				
			||||||
$   libid  = "SSL"
 | 
					$   libid  = "SSL"
 | 
				
			||||||
$   libnum = "[.UTIL]SSLEAY.NUM"
 | 
					$   libnum = "[.UTIL]SSLEAY.NUM"
 | 
				
			||||||
$   libdir = "[.AXP.EXE.SSL]"
 | 
					$   libdir = "[.''ARCH'.EXE.SSL]"
 | 
				
			||||||
$   libolb = "''libdir'LIBSSL.OLB"
 | 
					$   libolb = "''libdir'LIBSSL.OLB"
 | 
				
			||||||
$   libopt = "''libdir'LIBSSL.OPT"
 | 
					$   libopt = "''libdir'LIBSSL.OPT"
 | 
				
			||||||
$   libmap = "''libdir'LIBSSL.MAP"
 | 
					$   libmap = "''libdir'LIBSSL.MAP"
 | 
				
			||||||
$   libgoal= "''libdir'LIBSSL.EXE"
 | 
					$   libgoal= "''libdir'LIBSSL.EXE"
 | 
				
			||||||
$   libref = "[.AXP.EXE.CRYPTO]LIBCRYPTO.EXE"
 | 
					$   libref = "[.''ARCH'.EXE.CRYPTO]LIBCRYPTO.EXE"
 | 
				
			||||||
$   gosub create_axp_shr
 | 
					$   gosub create_nonvax_shr
 | 
				
			||||||
$ else
 | 
					$ else
 | 
				
			||||||
 | 
					$   arch_vax = 1
 | 
				
			||||||
$   libtit = "CRYPTO_TRANSFER_VECTOR"
 | 
					$   libtit = "CRYPTO_TRANSFER_VECTOR"
 | 
				
			||||||
$   libid  = "Crypto"
 | 
					$   libid  = "Crypto"
 | 
				
			||||||
$   libnum = "[.UTIL]LIBEAY.NUM"
 | 
					$   libnum = "[.UTIL]LIBEAY.NUM"
 | 
				
			||||||
$   libdir = "[.VAX.EXE.CRYPTO]"
 | 
					$   libdir = "[.''ARCH'.EXE.CRYPTO]"
 | 
				
			||||||
$   libmar = "''libdir'LIBCRYPTO.MAR"
 | 
					$   libmar = "''libdir'LIBCRYPTO.MAR"
 | 
				
			||||||
$   libolb = "''libdir'LIBCRYPTO.OLB"
 | 
					$   libolb = "''libdir'LIBCRYPTO.OLB"
 | 
				
			||||||
$   libopt = "''libdir'LIBCRYPTO.OPT"
 | 
					$   libopt = "''libdir'LIBCRYPTO.OPT"
 | 
				
			||||||
@@ -56,22 +66,22 @@ $   gosub create_vax_shr
 | 
				
			|||||||
$   libtit = "SSL_TRANSFER_VECTOR"
 | 
					$   libtit = "SSL_TRANSFER_VECTOR"
 | 
				
			||||||
$   libid  = "SSL"
 | 
					$   libid  = "SSL"
 | 
				
			||||||
$   libnum = "[.UTIL]SSLEAY.NUM"
 | 
					$   libnum = "[.UTIL]SSLEAY.NUM"
 | 
				
			||||||
$   libdir = "[.VAX.EXE.SSL]"
 | 
					$   libdir = "[.''ARCH'.EXE.SSL]"
 | 
				
			||||||
$   libmar = "''libdir'LIBSSL.MAR"
 | 
					$   libmar = "''libdir'LIBSSL.MAR"
 | 
				
			||||||
$   libolb = "''libdir'LIBSSL.OLB"
 | 
					$   libolb = "''libdir'LIBSSL.OLB"
 | 
				
			||||||
$   libopt = "''libdir'LIBSSL.OPT"
 | 
					$   libopt = "''libdir'LIBSSL.OPT"
 | 
				
			||||||
$   libobj = "''libdir'LIBSSL.OBJ"
 | 
					$   libobj = "''libdir'LIBSSL.OBJ"
 | 
				
			||||||
$   libmap = "''libdir'LIBSSL.MAP"
 | 
					$   libmap = "''libdir'LIBSSL.MAP"
 | 
				
			||||||
$   libgoal= "''libdir'LIBSSL.EXE"
 | 
					$   libgoal= "''libdir'LIBSSL.EXE"
 | 
				
			||||||
$   libref = "[.VAX.EXE.CRYPTO]LIBCRYPTO.EXE"
 | 
					$   libref = "[.''ARCH'.EXE.CRYPTO]LIBCRYPTO.EXE"
 | 
				
			||||||
$   libvec = "LIBSSL"
 | 
					$   libvec = "LIBSSL"
 | 
				
			||||||
$   gosub create_vax_shr
 | 
					$   gosub create_vax_shr
 | 
				
			||||||
$ endif
 | 
					$ endif
 | 
				
			||||||
$ exit
 | 
					$ exit
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$! ----- Soubroutines to actually build the shareable libraries
 | 
					$! ----- Soubroutines to build the shareable libraries
 | 
				
			||||||
$! The way things work, there's a main shareable library creator for each
 | 
					$! For each supported architecture, there's a main shareable library
 | 
				
			||||||
$! supported architecture, which is called from the main code above.
 | 
					$! creator, which is called from the main code above.
 | 
				
			||||||
$! The creator will define a number of variables to tell the next levels of
 | 
					$! The creator will define a number of variables to tell the next levels of
 | 
				
			||||||
$! subroutines what routines to use to write to the option files, call the
 | 
					$! subroutines what routines to use to write to the option files, call the
 | 
				
			||||||
$! main processor, read_func_num, and when that is done, it will write version
 | 
					$! main processor, read_func_num, and when that is done, it will write version
 | 
				
			||||||
@@ -97,10 +107,10 @@ $! read_func_num depends on the following variables from the creator:
 | 
				
			|||||||
$! libwriter	The name of the writer routine to call for each .num file line
 | 
					$! libwriter	The name of the writer routine to call for each .num file line
 | 
				
			||||||
$! -----
 | 
					$! -----
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$! ----- Subroutines for AXP
 | 
					$! ----- Subroutines for non-VAX
 | 
				
			||||||
$! -----
 | 
					$! -----
 | 
				
			||||||
$! The creator routine
 | 
					$! The creator routine
 | 
				
			||||||
$ create_axp_shr:
 | 
					$ create_nonvax_shr:
 | 
				
			||||||
$   open/write opt 'libopt'
 | 
					$   open/write opt 'libopt'
 | 
				
			||||||
$   write opt "identification=""",libid," ",libverstr,""""
 | 
					$   write opt "identification=""",libid," ",libverstr,""""
 | 
				
			||||||
$   write opt libolb,"/lib"
 | 
					$   write opt libolb,"/lib"
 | 
				
			||||||
@@ -108,7 +118,7 @@ $   if libref .nes. "" then write opt libref,"/SHARE"
 | 
				
			|||||||
$   write opt "SYMBOL_VECTOR=(-"
 | 
					$   write opt "SYMBOL_VECTOR=(-"
 | 
				
			||||||
$   libfirstentry := true
 | 
					$   libfirstentry := true
 | 
				
			||||||
$   libwrch   := opt
 | 
					$   libwrch   := opt
 | 
				
			||||||
$   libwriter := write_axp_transfer_entry
 | 
					$   libwriter := write_nonvax_transfer_entry
 | 
				
			||||||
$   textcount = 0
 | 
					$   textcount = 0
 | 
				
			||||||
$   gosub read_func_num
 | 
					$   gosub read_func_num
 | 
				
			||||||
$   write opt ")"
 | 
					$   write opt ")"
 | 
				
			||||||
@@ -118,7 +128,7 @@ $   link/map='libmap'/full/share='libgoal' 'libopt'/option
 | 
				
			|||||||
$   return
 | 
					$   return
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$! The record writer routine
 | 
					$! The record writer routine
 | 
				
			||||||
$ write_axp_transfer_entry:
 | 
					$ write_nonvax_transfer_entry:
 | 
				
			||||||
$   if libentry .eqs. ".dummy" then return
 | 
					$   if libentry .eqs. ".dummy" then return
 | 
				
			||||||
$   if info_kind .eqs. "VARIABLE"
 | 
					$   if info_kind .eqs. "VARIABLE"
 | 
				
			||||||
$   then
 | 
					$   then
 | 
				
			||||||
@@ -144,7 +154,7 @@ $   libfirstentry := false
 | 
				
			|||||||
$   textcount = textcount + textcount_this
 | 
					$   textcount = textcount + textcount_this
 | 
				
			||||||
$   return
 | 
					$   return
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$! ----- Subroutines for AXP
 | 
					$! ----- Subroutines for VAX
 | 
				
			||||||
$! -----
 | 
					$! -----
 | 
				
			||||||
$! The creator routine
 | 
					$! The creator routine
 | 
				
			||||||
$ create_vax_shr:
 | 
					$ create_vax_shr:
 | 
				
			||||||
@@ -264,16 +274,15 @@ $             truesum = truesum + 1
 | 
				
			|||||||
$           if plat_entry .eqs. "!EXPORT_VAR_AS_FUNCTION" then -
 | 
					$           if plat_entry .eqs. "!EXPORT_VAR_AS_FUNCTION" then -
 | 
				
			||||||
$             falsesum = falsesum + 1
 | 
					$             falsesum = falsesum + 1
 | 
				
			||||||
$         endif
 | 
					$         endif
 | 
				
			||||||
$         if plat_entry .eqs. "VMS" then truesum = truesum + 1
 | 
					$!
 | 
				
			||||||
$         if plat_entry .eqs. "!VMS" then falsesum = falsesum + 1
 | 
					$         if ((plat_entry .eqs. "VMS") .or. -
 | 
				
			||||||
$         if f$trnlnm("OPENSSL_FIPS") .nes. ""
 | 
					            (arch_vax .and. (plat_entry .eqs. "VMSVAX"))) then -
 | 
				
			||||||
$         then
 | 
					            truesum = truesum + 1
 | 
				
			||||||
$           if plat_entry .eqs. "OPENSSL_FIPS" then truesum = truesum + 1
 | 
					$!
 | 
				
			||||||
$           if plat_entry .eqs. "!OPENSSL_FIPS" then falsesum = falsesum + 1
 | 
					$         if ((plat_entry .eqs. "!VMS") .or. -
 | 
				
			||||||
$         else
 | 
					            (arch_vax .and. (plat_entry .eqs. "!VMSVAX"))) then -
 | 
				
			||||||
$           if plat_entry .eqs. "OPENSSL_FIPS" then falsesum = falsesum + 1
 | 
					            falsesum = falsesum + 1
 | 
				
			||||||
$           if plat_entry .eqs. "!OPENSSL_FIPS" then truesum = truesum + 1
 | 
					$!
 | 
				
			||||||
$         endif
 | 
					 | 
				
			||||||
$	  goto loop1
 | 
					$	  goto loop1
 | 
				
			||||||
$       endif
 | 
					$       endif
 | 
				
			||||||
$     endloop1:
 | 
					$     endloop1:
 | 
				
			||||||
@@ -293,6 +302,7 @@ $       if alg_entry .eqs. "" then goto loop2
 | 
				
			|||||||
$       if alg_entry .nes. ","
 | 
					$       if alg_entry .nes. ","
 | 
				
			||||||
$       then
 | 
					$       then
 | 
				
			||||||
$         if alg_entry .eqs. "KRB5" then goto loop ! Special for now
 | 
					$         if alg_entry .eqs. "KRB5" then goto loop ! Special for now
 | 
				
			||||||
 | 
					$	  if alg_entry .eqs. "STATIC_ENGINE" then goto loop ! Special for now
 | 
				
			||||||
$         if f$trnlnm("OPENSSL_NO_"+alg_entry) .nes. "" then goto loop
 | 
					$         if f$trnlnm("OPENSSL_NO_"+alg_entry) .nes. "" then goto loop
 | 
				
			||||||
$	  goto loop2
 | 
					$	  goto loop2
 | 
				
			||||||
$       endif
 | 
					$       endif
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -8,31 +8,39 @@ $!
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$! Slightly modified by Richard Levitte <richard@levitte.org>
 | 
					$! Slightly modified by Richard Levitte <richard@levitte.org>
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$! Always define OPENSSL.  Others are optional (non-null P1).
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
$ OPENSSL  :== $SSLEXE:OPENSSL
 | 
					$ OPENSSL  :== $SSLEXE:OPENSSL
 | 
				
			||||||
$ VERIFY   :== $SSLEXE:OPENSSL VERIFY
 | 
					$
 | 
				
			||||||
$ ASN1PARSE:== $SSLEXE:OPENSSL ASN1PARS
 | 
					$ IF (P1 .NES. "")
 | 
				
			||||||
$ REQ      :== $SSLEXE:OPENSSL REQ
 | 
					$ THEN
 | 
				
			||||||
$ DGST     :== $SSLEXE:OPENSSL DGST
 | 
					$     VERIFY   :== $SSLEXE:OPENSSL VERIFY
 | 
				
			||||||
$ DH       :== $SSLEXE:OPENSSL DH
 | 
					$     ASN1PARSE:== $SSLEXE:OPENSSL ASN1PARS
 | 
				
			||||||
$ ENC      :== $SSLEXE:OPENSSL ENC
 | 
					$! REQ could conflict with REQUEST.
 | 
				
			||||||
$ GENDH    :== $SSLEXE:OPENSSL GENDH
 | 
					$     OREQ     :== $SSLEXE:OPENSSL REQ
 | 
				
			||||||
$ ERRSTR   :== $SSLEXE:OPENSSL ERRSTR
 | 
					$     DGST     :== $SSLEXE:OPENSSL DGST
 | 
				
			||||||
$ CA       :== $SSLEXE:OPENSSL CA
 | 
					$     DH       :== $SSLEXE:OPENSSL DH
 | 
				
			||||||
$ CRL      :== $SSLEXE:OPENSSL CRL
 | 
					$     ENC      :== $SSLEXE:OPENSSL ENC
 | 
				
			||||||
$ RSA      :== $SSLEXE:OPENSSL RSA
 | 
					$     GENDH    :== $SSLEXE:OPENSSL GENDH
 | 
				
			||||||
$ DSA      :== $SSLEXE:OPENSSL DSA
 | 
					$     ERRSTR   :== $SSLEXE:OPENSSL ERRSTR
 | 
				
			||||||
$ DSAPARAM :== $SSLEXE:OPENSSL DSAPARAM
 | 
					$     CA       :== $SSLEXE:OPENSSL CA
 | 
				
			||||||
$ X509     :== $SSLEXE:OPENSSL X509
 | 
					$     CRL      :== $SSLEXE:OPENSSL CRL
 | 
				
			||||||
$ GENRSA   :== $SSLEXE:OPENSSL GENRSA
 | 
					$     RSA      :== $SSLEXE:OPENSSL RSA
 | 
				
			||||||
$ GENDSA   :== $SSLEXE:OPENSSL GENDSA
 | 
					$     DSA      :== $SSLEXE:OPENSSL DSA
 | 
				
			||||||
$ S_SERVER :== $SSLEXE:OPENSSL S_SERVER
 | 
					$     DSAPARAM :== $SSLEXE:OPENSSL DSAPARAM
 | 
				
			||||||
$ S_CLIENT :== $SSLEXE:OPENSSL S_CLIENT
 | 
					$     X509     :== $SSLEXE:OPENSSL X509
 | 
				
			||||||
$ SPEED    :== $SSLEXE:OPENSSL SPEED
 | 
					$     GENRSA   :== $SSLEXE:OPENSSL GENRSA
 | 
				
			||||||
$ S_TIME   :== $SSLEXE:OPENSSL S_TIME
 | 
					$     GENDSA   :== $SSLEXE:OPENSSL GENDSA
 | 
				
			||||||
$ VERSION  :== $SSLEXE:OPENSSL VERSION
 | 
					$     S_SERVER :== $SSLEXE:OPENSSL S_SERVER
 | 
				
			||||||
$ PKCS7    :== $SSLEXE:OPENSSL PKCS7
 | 
					$     S_CLIENT :== $SSLEXE:OPENSSL S_CLIENT
 | 
				
			||||||
$ CRL2PKCS7:== $SSLEXE:OPENSSL CRL2P7
 | 
					$     SPEED    :== $SSLEXE:OPENSSL SPEED
 | 
				
			||||||
$ SESS_ID  :== $SSLEXE:OPENSSL SESS_ID
 | 
					$     S_TIME   :== $SSLEXE:OPENSSL S_TIME
 | 
				
			||||||
$ CIPHERS  :== $SSLEXE:OPENSSL CIPHERS
 | 
					$     VERSION  :== $SSLEXE:OPENSSL VERSION
 | 
				
			||||||
$ NSEQ     :== $SSLEXE:OPENSSL NSEQ
 | 
					$     PKCS7    :== $SSLEXE:OPENSSL PKCS7
 | 
				
			||||||
$ PKCS12   :== $SSLEXE:OPENSSL PKCS12
 | 
					$     CRL2PKCS7:== $SSLEXE:OPENSSL CRL2P7
 | 
				
			||||||
 | 
					$     SESS_ID  :== $SSLEXE:OPENSSL SESS_ID
 | 
				
			||||||
 | 
					$     CIPHERS  :== $SSLEXE:OPENSSL CIPHERS
 | 
				
			||||||
 | 
					$     NSEQ     :== $SSLEXE:OPENSSL NSEQ
 | 
				
			||||||
 | 
					$     PKCS12   :== $SSLEXE:OPENSSL PKCS12
 | 
				
			||||||
 | 
					$ ENDIF
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -3,6 +3,5 @@ Makefile.save
 | 
				
			|||||||
der_chop
 | 
					der_chop
 | 
				
			||||||
der_chop.bak
 | 
					der_chop.bak
 | 
				
			||||||
CA.pl
 | 
					CA.pl
 | 
				
			||||||
openssl.sha1
 | 
					 | 
				
			||||||
*.flc
 | 
					*.flc
 | 
				
			||||||
semantic.cache
 | 
					semantic.cache
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -114,8 +114,8 @@ $!
 | 
				
			|||||||
$   IF F$SEARCH(CATOP+".private"+CAKEY) .EQS. ""
 | 
					$   IF F$SEARCH(CATOP+".private"+CAKEY) .EQS. ""
 | 
				
			||||||
$   THEN
 | 
					$   THEN
 | 
				
			||||||
$     READ '__INPUT' FILE -
 | 
					$     READ '__INPUT' FILE -
 | 
				
			||||||
	   /PROMT="CA certificate filename (or enter to create)"
 | 
						   /PROMPT="CA certificate filename (or enter to create): "
 | 
				
			||||||
$     IF F$SEARCH(FILE) .NES. ""
 | 
					$     IF (FILE .NES. "") .AND. (F$SEARCH(FILE) .NES. "")
 | 
				
			||||||
$     THEN
 | 
					$     THEN
 | 
				
			||||||
$       COPY 'FILE' 'CATOP'.private'CAKEY'
 | 
					$       COPY 'FILE' 'CATOP'.private'CAKEY'
 | 
				
			||||||
$	RET=$STATUS
 | 
					$	RET=$STATUS
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -45,7 +45,8 @@ if(defined $ENV{OPENSSL}) {
 | 
				
			|||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
$SSLEAY_CONFIG=$ENV{"SSLEAY_CONFIG"};
 | 
					$SSLEAY_CONFIG=$ENV{"SSLEAY_CONFIG"};
 | 
				
			||||||
$DAYS="-days 365";
 | 
					$DAYS="-days 365";	# 1 year
 | 
				
			||||||
 | 
					$CADAYS="-days 1095";	# 3 years
 | 
				
			||||||
$REQ="$openssl req $SSLEAY_CONFIG";
 | 
					$REQ="$openssl req $SSLEAY_CONFIG";
 | 
				
			||||||
$CA="$openssl ca $SSLEAY_CONFIG";
 | 
					$CA="$openssl ca $SSLEAY_CONFIG";
 | 
				
			||||||
$VERIFY="$openssl verify";
 | 
					$VERIFY="$openssl verify";
 | 
				
			||||||
@@ -54,6 +55,7 @@ $PKCS12="$openssl pkcs12";
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
$CATOP="./demoCA";
 | 
					$CATOP="./demoCA";
 | 
				
			||||||
$CAKEY="cakey.pem";
 | 
					$CAKEY="cakey.pem";
 | 
				
			||||||
 | 
					$CAREQ="careq.pem";
 | 
				
			||||||
$CACERT="cacert.pem";
 | 
					$CACERT="cacert.pem";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
$DIRMODE = 0777;
 | 
					$DIRMODE = 0777;
 | 
				
			||||||
@@ -66,19 +68,19 @@ foreach (@ARGV) {
 | 
				
			|||||||
	    exit 0;
 | 
						    exit 0;
 | 
				
			||||||
	} elsif (/^-newcert$/) {
 | 
						} elsif (/^-newcert$/) {
 | 
				
			||||||
	    # create a certificate
 | 
						    # create a certificate
 | 
				
			||||||
	    system ("$REQ -new -x509 -keyout newreq.pem -out newreq.pem $DAYS");
 | 
						    system ("$REQ -new -x509 -keyout newkey.pem -out newcert.pem $DAYS");
 | 
				
			||||||
	    $RET=$?;
 | 
						    $RET=$?;
 | 
				
			||||||
	    print "Certificate (and private key) is in newreq.pem\n"
 | 
						    print "Certificate is in newcert.pem, private key is in newkey.pem\n"
 | 
				
			||||||
	} elsif (/^-newreq$/) {
 | 
						} elsif (/^-newreq$/) {
 | 
				
			||||||
	    # create a certificate request
 | 
						    # create a certificate request
 | 
				
			||||||
	    system ("$REQ -new -keyout newreq.pem -out newreq.pem $DAYS");
 | 
						    system ("$REQ -new -keyout newkey.pem -out newreq.pem $DAYS");
 | 
				
			||||||
	    $RET=$?;
 | 
						    $RET=$?;
 | 
				
			||||||
	    print "Request (and private key) is in newreq.pem\n";
 | 
						    print "Request is in newreq.pem, private key is in newkey.pem\n";
 | 
				
			||||||
	} elsif (/^-newreq-nodes$/) {
 | 
						} elsif (/^-newreq-nodes$/) {
 | 
				
			||||||
	    # create a certificate request
 | 
						    # create a certificate request
 | 
				
			||||||
	    system ("$REQ -new -nodes -keyout newreq.pem -out newreq.pem $DAYS");
 | 
						    system ("$REQ -new -nodes -keyout newkey.pem -out newreq.pem $DAYS");
 | 
				
			||||||
	    $RET=$?;
 | 
						    $RET=$?;
 | 
				
			||||||
	    print "Request (and private key) is in newreq.pem\n";
 | 
						    print "Request is in newreq.pem, private key is in newkey.pem\n";
 | 
				
			||||||
	} elsif (/^-newca$/) {
 | 
						} elsif (/^-newca$/) {
 | 
				
			||||||
		# if explicitly asked for or it doesn't exist then setup the
 | 
							# if explicitly asked for or it doesn't exist then setup the
 | 
				
			||||||
		# directory structure that Eric likes to manage things 
 | 
							# directory structure that Eric likes to manage things 
 | 
				
			||||||
@@ -92,6 +94,9 @@ foreach (@ARGV) {
 | 
				
			|||||||
		mkdir "${CATOP}/private", $DIRMODE;
 | 
							mkdir "${CATOP}/private", $DIRMODE;
 | 
				
			||||||
		open OUT, ">${CATOP}/index.txt";
 | 
							open OUT, ">${CATOP}/index.txt";
 | 
				
			||||||
		close OUT;
 | 
							close OUT;
 | 
				
			||||||
 | 
							open OUT, ">${CATOP}/crlnumber";
 | 
				
			||||||
 | 
							print OUT "01\n";
 | 
				
			||||||
 | 
							close OUT;
 | 
				
			||||||
	    }
 | 
						    }
 | 
				
			||||||
	    if ( ! -f "${CATOP}/private/$CAKEY" ) {
 | 
						    if ( ! -f "${CATOP}/private/$CAKEY" ) {
 | 
				
			||||||
		print "CA certificate filename (or enter to create)\n";
 | 
							print "CA certificate filename (or enter to create)\n";
 | 
				
			||||||
@@ -106,22 +111,24 @@ foreach (@ARGV) {
 | 
				
			|||||||
		    $RET=$?;
 | 
							    $RET=$?;
 | 
				
			||||||
		} else {
 | 
							} else {
 | 
				
			||||||
		    print "Making CA certificate ...\n";
 | 
							    print "Making CA certificate ...\n";
 | 
				
			||||||
		    system ("$REQ -new -x509 -keyout " .
 | 
							    system ("$REQ -new -keyout " .
 | 
				
			||||||
			"${CATOP}/private/$CAKEY -out ${CATOP}/$CACERT $DAYS");
 | 
								"${CATOP}/private/$CAKEY -out ${CATOP}/$CAREQ");
 | 
				
			||||||
 | 
							    system ("$CA -create_serial " .
 | 
				
			||||||
 | 
								"-out ${CATOP}/$CACERT $CADAYS -batch " . 
 | 
				
			||||||
 | 
								"-keyfile ${CATOP}/private/$CAKEY -selfsign " .
 | 
				
			||||||
 | 
								"-extensions v3_ca " .
 | 
				
			||||||
 | 
								"-infiles ${CATOP}/$CAREQ ");
 | 
				
			||||||
		    $RET=$?;
 | 
							    $RET=$?;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	    }
 | 
						    }
 | 
				
			||||||
	    if (! -f "${CATOP}/serial" ) {
 | 
					 | 
				
			||||||
		system ("$X509 -in ${CATOP}/$CACERT -noout "
 | 
					 | 
				
			||||||
			. "-next_serial -out ${CATOP}/serial");
 | 
					 | 
				
			||||||
	    }
 | 
					 | 
				
			||||||
	} elsif (/^-pkcs12$/) {
 | 
						} elsif (/^-pkcs12$/) {
 | 
				
			||||||
	    my $cname = $ARGV[1];
 | 
						    my $cname = $ARGV[1];
 | 
				
			||||||
	    $cname = "My Certificate" unless defined $cname;
 | 
						    $cname = "My Certificate" unless defined $cname;
 | 
				
			||||||
	    system ("$PKCS12 -in newcert.pem -inkey newreq.pem " .
 | 
						    system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
 | 
				
			||||||
			"-certfile ${CATOP}/$CACERT -out newcert.p12 " .
 | 
								"-certfile ${CATOP}/$CACERT -out newcert.p12 " .
 | 
				
			||||||
			"-export -name \"$cname\"");
 | 
								"-export -name \"$cname\"");
 | 
				
			||||||
	    $RET=$?;
 | 
						    $RET=$?;
 | 
				
			||||||
 | 
						    print "PKCS #12 file is in newcert.p12\n";
 | 
				
			||||||
	    exit $RET;
 | 
						    exit $RET;
 | 
				
			||||||
	} elsif (/^-xsign$/) {
 | 
						} elsif (/^-xsign$/) {
 | 
				
			||||||
	    system ("$CA -policy policy_anything -infiles newreq.pem");
 | 
						    system ("$CA -policy policy_anything -infiles newreq.pem");
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										110
									
								
								apps/CA.sh
									
									
									
									
									
								
							
							
						
						
									
										110
									
								
								apps/CA.sh
									
									
									
									
									
								
							@@ -16,8 +16,8 @@
 | 
				
			|||||||
# 12-Jan-96 tjh    Added more things ... including CA -signcert which
 | 
					# 12-Jan-96 tjh    Added more things ... including CA -signcert which
 | 
				
			||||||
#                  converts a certificate to a request and then signs it.
 | 
					#                  converts a certificate to a request and then signs it.
 | 
				
			||||||
# 10-Jan-96 eay    Fixed a few more bugs and added the SSLEAY_CONFIG
 | 
					# 10-Jan-96 eay    Fixed a few more bugs and added the SSLEAY_CONFIG
 | 
				
			||||||
#		   environment variable so this can be driven from
 | 
					#                  environment variable so this can be driven from
 | 
				
			||||||
#		   a script.
 | 
					#                  a script.
 | 
				
			||||||
# 25-Jul-96 eay    Cleaned up filenames some more.
 | 
					# 25-Jul-96 eay    Cleaned up filenames some more.
 | 
				
			||||||
# 11-Jun-96 eay    Fixed a few filename missmatches.
 | 
					# 11-Jun-96 eay    Fixed a few filename missmatches.
 | 
				
			||||||
# 03-May-96 eay    Modified to use 'ssleay cmd' instead of 'cmd'.
 | 
					# 03-May-96 eay    Modified to use 'ssleay cmd' instead of 'cmd'.
 | 
				
			||||||
@@ -29,35 +29,73 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
# default openssl.cnf file has setup as per the following
 | 
					# default openssl.cnf file has setup as per the following
 | 
				
			||||||
# demoCA ... where everything is stored
 | 
					# demoCA ... where everything is stored
 | 
				
			||||||
 | 
					cp_pem() {
 | 
				
			||||||
 | 
					    infile=$1
 | 
				
			||||||
 | 
					    outfile=$2
 | 
				
			||||||
 | 
					    bound=$3
 | 
				
			||||||
 | 
					    flag=0
 | 
				
			||||||
 | 
					    exec <$infile;
 | 
				
			||||||
 | 
					    while read line; do
 | 
				
			||||||
 | 
						if [ $flag -eq 1 ]; then
 | 
				
			||||||
 | 
							echo $line|grep "^-----END.*$bound"  2>/dev/null 1>/dev/null
 | 
				
			||||||
 | 
							if [ $? -eq 0 ] ; then
 | 
				
			||||||
 | 
								echo $line >>$outfile
 | 
				
			||||||
 | 
								break
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								echo $line >>$outfile
 | 
				
			||||||
 | 
							fi
 | 
				
			||||||
 | 
						fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						echo $line|grep "^-----BEGIN.*$bound"  2>/dev/null 1>/dev/null
 | 
				
			||||||
 | 
						if [ $? -eq 0 ]; then
 | 
				
			||||||
 | 
							echo $line >$outfile
 | 
				
			||||||
 | 
							flag=1
 | 
				
			||||||
 | 
						fi
 | 
				
			||||||
 | 
					    done
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					usage() {
 | 
				
			||||||
 | 
					 echo "usage: $0 -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify" >&2
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
if [ -z "$OPENSSL" ]; then OPENSSL=openssl; fi
 | 
					if [ -z "$OPENSSL" ]; then OPENSSL=openssl; fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
DAYS="-days 365"
 | 
					if [ -z "$DAYS" ] ; then DAYS="-days 365" ; fi	# 1 year
 | 
				
			||||||
 | 
					CADAYS="-days 1095"	# 3 years
 | 
				
			||||||
REQ="$OPENSSL req $SSLEAY_CONFIG"
 | 
					REQ="$OPENSSL req $SSLEAY_CONFIG"
 | 
				
			||||||
CA="$OPENSSL ca $SSLEAY_CONFIG"
 | 
					CA="$OPENSSL ca $SSLEAY_CONFIG"
 | 
				
			||||||
VERIFY="$OPENSSL verify"
 | 
					VERIFY="$OPENSSL verify"
 | 
				
			||||||
X509="$OPENSSL x509"
 | 
					X509="$OPENSSL x509"
 | 
				
			||||||
 | 
					PKCS12="openssl pkcs12"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
CATOP=./demoCA
 | 
					if [ -z "$CATOP" ] ; then CATOP=./demoCA ; fi
 | 
				
			||||||
CAKEY=./cakey.pem
 | 
					CAKEY=./cakey.pem
 | 
				
			||||||
 | 
					CAREQ=./careq.pem
 | 
				
			||||||
CACERT=./cacert.pem
 | 
					CACERT=./cacert.pem
 | 
				
			||||||
 | 
					
 | 
				
			||||||
for i
 | 
					RET=0
 | 
				
			||||||
do
 | 
					
 | 
				
			||||||
case $i in
 | 
					while [ "$1" != "" ] ; do
 | 
				
			||||||
 | 
					case $1 in
 | 
				
			||||||
-\?|-h|-help)
 | 
					-\?|-h|-help)
 | 
				
			||||||
    echo "usage: CA -newcert|-newreq|-newca|-sign|-verify" >&2
 | 
					    usage
 | 
				
			||||||
    exit 0
 | 
					    exit 0
 | 
				
			||||||
    ;;
 | 
					    ;;
 | 
				
			||||||
-newcert)
 | 
					-newcert)
 | 
				
			||||||
    # create a certificate
 | 
					    # create a certificate
 | 
				
			||||||
    $REQ -new -x509 -keyout newreq.pem -out newreq.pem $DAYS
 | 
					    $REQ -new -x509 -keyout newkey.pem -out newcert.pem $DAYS
 | 
				
			||||||
    RET=$?
 | 
					    RET=$?
 | 
				
			||||||
    echo "Certificate (and private key) is in newreq.pem"
 | 
					    echo "Certificate is in newcert.pem, private key is in newkey.pem"
 | 
				
			||||||
    ;;
 | 
					    ;;
 | 
				
			||||||
-newreq)
 | 
					-newreq)
 | 
				
			||||||
    # create a certificate request
 | 
					    # create a certificate request
 | 
				
			||||||
    $REQ -new -keyout newreq.pem -out newreq.pem $DAYS
 | 
					    $REQ -new -keyout newkey.pem -out newreq.pem $DAYS
 | 
				
			||||||
 | 
					    RET=$?
 | 
				
			||||||
 | 
					    echo "Request is in newreq.pem, private key is in newkey.pem"
 | 
				
			||||||
 | 
					    ;;
 | 
				
			||||||
 | 
					-newreq-nodes) 
 | 
				
			||||||
 | 
					    # create a certificate request
 | 
				
			||||||
 | 
					    $REQ -new -nodes -keyout newreq.pem -out newreq.pem $DAYS
 | 
				
			||||||
    RET=$?
 | 
					    RET=$?
 | 
				
			||||||
    echo "Request (and private key) is in newreq.pem"
 | 
					    echo "Request (and private key) is in newreq.pem"
 | 
				
			||||||
    ;;
 | 
					    ;;
 | 
				
			||||||
@@ -67,12 +105,11 @@ case $i in
 | 
				
			|||||||
    NEW="1"
 | 
					    NEW="1"
 | 
				
			||||||
    if [ "$NEW" -o ! -f ${CATOP}/serial ]; then
 | 
					    if [ "$NEW" -o ! -f ${CATOP}/serial ]; then
 | 
				
			||||||
	# create the directory hierarchy
 | 
						# create the directory hierarchy
 | 
				
			||||||
	mkdir ${CATOP} 
 | 
						mkdir -p ${CATOP}
 | 
				
			||||||
	mkdir ${CATOP}/certs 
 | 
						mkdir -p ${CATOP}/certs
 | 
				
			||||||
	mkdir ${CATOP}/crl 
 | 
						mkdir -p ${CATOP}/crl
 | 
				
			||||||
	mkdir ${CATOP}/newcerts
 | 
						mkdir -p ${CATOP}/newcerts
 | 
				
			||||||
	mkdir ${CATOP}/private
 | 
						mkdir -p ${CATOP}/private
 | 
				
			||||||
	echo "01" > ${CATOP}/serial
 | 
					 | 
				
			||||||
	touch ${CATOP}/index.txt
 | 
						touch ${CATOP}/index.txt
 | 
				
			||||||
    fi
 | 
					    fi
 | 
				
			||||||
    if [ ! -f ${CATOP}/private/$CAKEY ]; then
 | 
					    if [ ! -f ${CATOP}/private/$CAKEY ]; then
 | 
				
			||||||
@@ -81,12 +118,21 @@ case $i in
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	# ask user for existing CA certificate
 | 
						# ask user for existing CA certificate
 | 
				
			||||||
	if [ "$FILE" ]; then
 | 
						if [ "$FILE" ]; then
 | 
				
			||||||
	    cp $FILE ${CATOP}/private/$CAKEY
 | 
						    cp_pem $FILE ${CATOP}/private/$CAKEY PRIVATE
 | 
				
			||||||
 | 
						    cp_pem $FILE ${CATOP}/$CACERT CERTIFICATE
 | 
				
			||||||
	    RET=$?
 | 
						    RET=$?
 | 
				
			||||||
 | 
						    if [ ! -f "${CATOP}/serial" ]; then
 | 
				
			||||||
 | 
							$X509 -in ${CATOP}/$CACERT -noout -next_serial \
 | 
				
			||||||
 | 
							      -out ${CATOP}/serial
 | 
				
			||||||
 | 
						    fi
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
	    echo "Making CA certificate ..."
 | 
						    echo "Making CA certificate ..."
 | 
				
			||||||
	    $REQ -new -x509 -keyout ${CATOP}/private/$CAKEY \
 | 
						    $REQ -new -keyout ${CATOP}/private/$CAKEY \
 | 
				
			||||||
			   -out ${CATOP}/$CACERT $DAYS
 | 
								   -out ${CATOP}/$CAREQ
 | 
				
			||||||
 | 
						    $CA -create_serial -out ${CATOP}/$CACERT $CADAYS -batch \
 | 
				
			||||||
 | 
								   -keyfile ${CATOP}/private/$CAKEY -selfsign \
 | 
				
			||||||
 | 
								   -extensions v3_ca \
 | 
				
			||||||
 | 
								   -infiles ${CATOP}/$CAREQ
 | 
				
			||||||
	    RET=$?
 | 
						    RET=$?
 | 
				
			||||||
	fi
 | 
						fi
 | 
				
			||||||
    fi
 | 
					    fi
 | 
				
			||||||
@@ -95,16 +141,33 @@ case $i in
 | 
				
			|||||||
    $CA -policy policy_anything -infiles newreq.pem
 | 
					    $CA -policy policy_anything -infiles newreq.pem
 | 
				
			||||||
    RET=$?
 | 
					    RET=$?
 | 
				
			||||||
    ;;
 | 
					    ;;
 | 
				
			||||||
 | 
					-pkcs12)
 | 
				
			||||||
 | 
					    if [ -z "$2" ] ; then
 | 
				
			||||||
 | 
						CNAME="My Certificate"
 | 
				
			||||||
 | 
					    else
 | 
				
			||||||
 | 
						CNAME="$2"
 | 
				
			||||||
 | 
					    fi
 | 
				
			||||||
 | 
					    $PKCS12 -in newcert.pem -inkey newreq.pem -certfile ${CATOP}/$CACERT \
 | 
				
			||||||
 | 
						    -out newcert.p12 -export -name "$CNAME"
 | 
				
			||||||
 | 
					    RET=$?
 | 
				
			||||||
 | 
					    exit $RET
 | 
				
			||||||
 | 
					    ;;
 | 
				
			||||||
-sign|-signreq)
 | 
					-sign|-signreq)
 | 
				
			||||||
    $CA -policy policy_anything -out newcert.pem -infiles newreq.pem
 | 
					    $CA -policy policy_anything -out newcert.pem -infiles newreq.pem
 | 
				
			||||||
    RET=$?
 | 
					    RET=$?
 | 
				
			||||||
    cat newcert.pem
 | 
					    cat newcert.pem
 | 
				
			||||||
    echo "Signed certificate is in newcert.pem"
 | 
					    echo "Signed certificate is in newcert.pem"
 | 
				
			||||||
    ;;
 | 
					    ;;
 | 
				
			||||||
 | 
					-signCA)
 | 
				
			||||||
 | 
					    $CA -policy policy_anything -out newcert.pem -extensions v3_ca -infiles newreq.pem
 | 
				
			||||||
 | 
					    RET=$?
 | 
				
			||||||
 | 
					    echo "Signed CA certificate is in newcert.pem"
 | 
				
			||||||
 | 
					    ;;
 | 
				
			||||||
-signcert)
 | 
					-signcert)
 | 
				
			||||||
    echo "Cert passphrase will be requested twice - bug?"
 | 
					    echo "Cert passphrase will be requested twice - bug?"
 | 
				
			||||||
    $X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
 | 
					    $X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
 | 
				
			||||||
    $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
 | 
					    $CA -policy policy_anything -out newcert.pem -infiles tmp.pem
 | 
				
			||||||
 | 
					    RET=$?
 | 
				
			||||||
    cat newcert.pem
 | 
					    cat newcert.pem
 | 
				
			||||||
    echo "Signed certificate is in newcert.pem"
 | 
					    echo "Signed certificate is in newcert.pem"
 | 
				
			||||||
    ;;
 | 
					    ;;
 | 
				
			||||||
@@ -122,13 +185,14 @@ case $i in
 | 
				
			|||||||
	    fi
 | 
						    fi
 | 
				
			||||||
	done
 | 
						done
 | 
				
			||||||
    fi
 | 
					    fi
 | 
				
			||||||
    exit 0
 | 
					    exit $RET
 | 
				
			||||||
    ;;
 | 
					    ;;
 | 
				
			||||||
*)
 | 
					*)
 | 
				
			||||||
    echo "Unknown arg $i";
 | 
					    echo "Unknown arg $i" >&2
 | 
				
			||||||
 | 
					    usage
 | 
				
			||||||
    exit 1
 | 
					    exit 1
 | 
				
			||||||
    ;;
 | 
					    ;;
 | 
				
			||||||
esac
 | 
					esac
 | 
				
			||||||
 | 
					shift
 | 
				
			||||||
done
 | 
					done
 | 
				
			||||||
exit $RET
 | 
					exit $RET
 | 
				
			||||||
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										1528
									
								
								apps/Makefile
									
									
									
									
									
								
							
							
						
						
									
										1528
									
								
								apps/Makefile
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										629
									
								
								apps/apps.c
									
									
									
									
									
								
							
							
						
						
									
										629
									
								
								apps/apps.c
									
									
									
									
									
								
							@@ -115,6 +115,7 @@
 | 
				
			|||||||
#include <sys/types.h>
 | 
					#include <sys/types.h>
 | 
				
			||||||
#include <sys/stat.h>
 | 
					#include <sys/stat.h>
 | 
				
			||||||
#include <ctype.h>
 | 
					#include <ctype.h>
 | 
				
			||||||
 | 
					#include <assert.h>
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/x509v3.h>
 | 
					#include <openssl/x509v3.h>
 | 
				
			||||||
@@ -125,13 +126,20 @@
 | 
				
			|||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
#include <openssl/engine.h>
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
 | 
					#include <openssl/rsa.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_JPAKE
 | 
				
			||||||
 | 
					#include <openssl/jpake.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define NON_MAIN
 | 
					#define NON_MAIN
 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
#undef NON_MAIN
 | 
					#undef NON_MAIN
 | 
				
			||||||
 | 
					
 | 
				
			||||||
typedef struct {
 | 
					typedef struct {
 | 
				
			||||||
	char *name;
 | 
						const char *name;
 | 
				
			||||||
	unsigned long flag;
 | 
						unsigned long flag;
 | 
				
			||||||
	unsigned long mask;
 | 
						unsigned long mask;
 | 
				
			||||||
} NAME_EX_TBL;
 | 
					} NAME_EX_TBL;
 | 
				
			||||||
@@ -250,7 +258,7 @@ int str2fmt(char *s)
 | 
				
			|||||||
		return(FORMAT_UNDEF);
 | 
							return(FORMAT_UNDEF);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WIN16)
 | 
					#if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WIN16) || defined(OPENSSL_SYS_NETWARE)
 | 
				
			||||||
void program_name(char *in, char *out, int size)
 | 
					void program_name(char *in, char *out, int size)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int i,n;
 | 
						int i,n;
 | 
				
			||||||
@@ -269,12 +277,23 @@ void program_name(char *in, char *out, int size)
 | 
				
			|||||||
	if (p == NULL)
 | 
						if (p == NULL)
 | 
				
			||||||
		p=in;
 | 
							p=in;
 | 
				
			||||||
	n=strlen(p);
 | 
						n=strlen(p);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(OPENSSL_SYS_NETWARE)
 | 
				
			||||||
 | 
					   /* strip off trailing .nlm if present. */
 | 
				
			||||||
 | 
					   if ((n > 4) && (p[n-4] == '.') &&
 | 
				
			||||||
 | 
					      ((p[n-3] == 'n') || (p[n-3] == 'N')) &&
 | 
				
			||||||
 | 
					      ((p[n-2] == 'l') || (p[n-2] == 'L')) &&
 | 
				
			||||||
 | 
					      ((p[n-1] == 'm') || (p[n-1] == 'M')))
 | 
				
			||||||
 | 
					      n-=4;
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
	/* strip off trailing .exe if present. */
 | 
						/* strip off trailing .exe if present. */
 | 
				
			||||||
	if ((n > 4) && (p[n-4] == '.') &&
 | 
						if ((n > 4) && (p[n-4] == '.') &&
 | 
				
			||||||
		((p[n-3] == 'e') || (p[n-3] == 'E')) &&
 | 
							((p[n-3] == 'e') || (p[n-3] == 'E')) &&
 | 
				
			||||||
		((p[n-2] == 'x') || (p[n-2] == 'X')) &&
 | 
							((p[n-2] == 'x') || (p[n-2] == 'X')) &&
 | 
				
			||||||
		((p[n-1] == 'e') || (p[n-1] == 'E')))
 | 
							((p[n-1] == 'e') || (p[n-1] == 'E')))
 | 
				
			||||||
		n-=4;
 | 
							n-=4;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (n > size-1)
 | 
						if (n > size-1)
 | 
				
			||||||
		n=size-1;
 | 
							n=size-1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -332,18 +351,19 @@ void program_name(char *in, char *out, int size)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
int chopup_args(ARGS *arg, char *buf, int *argc, char **argv[])
 | 
					int chopup_args(ARGS *arg, char *buf, int *argc, char **argv[])
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int num,len,i;
 | 
						int num,i;
 | 
				
			||||||
	char *p;
 | 
						char *p;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	*argc=0;
 | 
						*argc=0;
 | 
				
			||||||
	*argv=NULL;
 | 
						*argv=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	len=strlen(buf);
 | 
					 | 
				
			||||||
	i=0;
 | 
						i=0;
 | 
				
			||||||
	if (arg->count == 0)
 | 
						if (arg->count == 0)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		arg->count=20;
 | 
							arg->count=20;
 | 
				
			||||||
		arg->data=(char **)OPENSSL_malloc(sizeof(char *)*arg->count);
 | 
							arg->data=(char **)OPENSSL_malloc(sizeof(char *)*arg->count);
 | 
				
			||||||
 | 
							if (arg->data == NULL)
 | 
				
			||||||
 | 
								return 0;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	for (i=0; i<arg->count; i++)
 | 
						for (i=0; i<arg->count; i++)
 | 
				
			||||||
		arg->data[i]=NULL;
 | 
							arg->data[i]=NULL;
 | 
				
			||||||
@@ -361,10 +381,17 @@ int chopup_args(ARGS *arg, char *buf, int *argc, char **argv[])
 | 
				
			|||||||
		/* The start of something good :-) */
 | 
							/* The start of something good :-) */
 | 
				
			||||||
		if (num >= arg->count)
 | 
							if (num >= arg->count)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			arg->count+=20;
 | 
								char **tmp_p;
 | 
				
			||||||
			arg->data=(char **)OPENSSL_realloc(arg->data,
 | 
								int tlen = arg->count + 20;
 | 
				
			||||||
				sizeof(char *)*arg->count);
 | 
								tmp_p = (char **)OPENSSL_realloc(arg->data,
 | 
				
			||||||
			if (argc == 0) return(0);
 | 
									sizeof(char *)*tlen);
 | 
				
			||||||
 | 
								if (tmp_p == NULL)
 | 
				
			||||||
 | 
									return 0;
 | 
				
			||||||
 | 
								arg->data  = tmp_p;
 | 
				
			||||||
 | 
								arg->count = tlen;
 | 
				
			||||||
 | 
								/* initialize newly allocated data */
 | 
				
			||||||
 | 
								for (i = num; i < arg->count; i++)
 | 
				
			||||||
 | 
									arg->data[i] = NULL;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		arg->data[num++]=p;
 | 
							arg->data[num++]=p;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -533,12 +560,12 @@ int password_callback(char *buf, int bufsiz, int verify,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		if (ok >= 0)
 | 
							if (ok >= 0)
 | 
				
			||||||
			ok = UI_add_input_string(ui,prompt,ui_flags,buf,
 | 
								ok = UI_add_input_string(ui,prompt,ui_flags,buf,
 | 
				
			||||||
				PW_MIN_LENGTH,BUFSIZ-1);
 | 
									PW_MIN_LENGTH,bufsiz-1);
 | 
				
			||||||
		if (ok >= 0 && verify)
 | 
							if (ok >= 0 && verify)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			buff = (char *)OPENSSL_malloc(bufsiz);
 | 
								buff = (char *)OPENSSL_malloc(bufsiz);
 | 
				
			||||||
			ok = UI_add_verify_string(ui,prompt,ui_flags,buff,
 | 
								ok = UI_add_verify_string(ui,prompt,ui_flags,buff,
 | 
				
			||||||
				PW_MIN_LENGTH,BUFSIZ-1, buf);
 | 
									PW_MIN_LENGTH,bufsiz-1, buf);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		if (ok >= 0)
 | 
							if (ok >= 0)
 | 
				
			||||||
			do
 | 
								do
 | 
				
			||||||
@@ -754,7 +781,7 @@ X509 *load_cert(BIO *err, const char *file, int format,
 | 
				
			|||||||
		x=d2i_X509_bio(cert,NULL);
 | 
							x=d2i_X509_bio(cert,NULL);
 | 
				
			||||||
	else if (format == FORMAT_NETSCAPE)
 | 
						else if (format == FORMAT_NETSCAPE)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		unsigned char *p,*op;
 | 
							const unsigned char *p,*op;
 | 
				
			||||||
		int size=0,i;
 | 
							int size=0,i;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/* We sort of have to do it this way because it is sort of nice
 | 
							/* We sort of have to do it this way because it is sort of nice
 | 
				
			||||||
@@ -840,10 +867,17 @@ EVP_PKEY *load_key(BIO *err, const char *file, int format, int maybe_stdin,
 | 
				
			|||||||
	if (format == FORMAT_ENGINE)
 | 
						if (format == FORMAT_ENGINE)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (!e)
 | 
							if (!e)
 | 
				
			||||||
			BIO_printf(bio_err,"no engine specified\n");
 | 
								BIO_printf(err,"no engine specified\n");
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			pkey = ENGINE_load_private_key(e, file,
 | 
								pkey = ENGINE_load_private_key(e, file,
 | 
				
			||||||
				ui_method, &cb_data);
 | 
									ui_method, &cb_data);
 | 
				
			||||||
 | 
								if (!pkey) 
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(err,"cannot load %s from engine\n",key_descrip);
 | 
				
			||||||
 | 
									ERR_print_errors(err);
 | 
				
			||||||
 | 
									}	
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -894,7 +928,10 @@ EVP_PKEY *load_key(BIO *err, const char *file, int format, int maybe_stdin,
 | 
				
			|||||||
 end:
 | 
					 end:
 | 
				
			||||||
	if (key != NULL) BIO_free(key);
 | 
						if (key != NULL) BIO_free(key);
 | 
				
			||||||
	if (pkey == NULL) 
 | 
						if (pkey == NULL) 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_printf(err,"unable to load %s\n", key_descrip);
 | 
							BIO_printf(err,"unable to load %s\n", key_descrip);
 | 
				
			||||||
 | 
							ERR_print_errors(err);
 | 
				
			||||||
 | 
							}	
 | 
				
			||||||
	return(pkey);
 | 
						return(pkey);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1256,7 +1293,7 @@ static int set_table_opts(unsigned long *flags, const char *arg, const NAME_EX_T
 | 
				
			|||||||
	return 0;
 | 
						return 0;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
void print_name(BIO *out, char *title, X509_NAME *nm, unsigned long lflags)
 | 
					void print_name(BIO *out, const char *title, X509_NAME *nm, unsigned long lflags)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	char *buf;
 | 
						char *buf;
 | 
				
			||||||
	char mline = 0;
 | 
						char mline = 0;
 | 
				
			||||||
@@ -1394,6 +1431,8 @@ char *make_config_name()
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	len=strlen(t)+strlen(OPENSSL_CONF)+2;
 | 
						len=strlen(t)+strlen(OPENSSL_CONF)+2;
 | 
				
			||||||
	p=OPENSSL_malloc(len);
 | 
						p=OPENSSL_malloc(len);
 | 
				
			||||||
 | 
						if (p == NULL)
 | 
				
			||||||
 | 
							return NULL;
 | 
				
			||||||
	BUF_strlcpy(p,t,len);
 | 
						BUF_strlcpy(p,t,len);
 | 
				
			||||||
#ifndef OPENSSL_SYS_VMS
 | 
					#ifndef OPENSSL_SYS_VMS
 | 
				
			||||||
	BUF_strlcat(p,"/",len);
 | 
						BUF_strlcat(p,"/",len);
 | 
				
			||||||
@@ -1724,23 +1763,10 @@ CA_DB *load_index(char *dbfile, DB_ATTR *db_attr)
 | 
				
			|||||||
		char *p = NCONF_get_string(dbattr_conf,NULL,"unique_subject");
 | 
							char *p = NCONF_get_string(dbattr_conf,NULL,"unique_subject");
 | 
				
			||||||
		if (p)
 | 
							if (p)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
 | 
					#ifdef RL_DEBUG
 | 
				
			||||||
			BIO_printf(bio_err, "DEBUG[load_index]: unique_subject = \"%s\"\n", p);
 | 
								BIO_printf(bio_err, "DEBUG[load_index]: unique_subject = \"%s\"\n", p);
 | 
				
			||||||
			switch(*p)
 | 
					#endif
 | 
				
			||||||
				{
 | 
								retdb->attributes.unique_subject = parse_yesno(p,1);
 | 
				
			||||||
			case 'f': /* false */
 | 
					 | 
				
			||||||
			case 'F': /* FALSE */
 | 
					 | 
				
			||||||
			case 'n': /* no */
 | 
					 | 
				
			||||||
			case 'N': /* NO */
 | 
					 | 
				
			||||||
				retdb->attributes.unique_subject = 0;
 | 
					 | 
				
			||||||
				break;
 | 
					 | 
				
			||||||
			case 't': /* true */
 | 
					 | 
				
			||||||
			case 'T': /* TRUE */
 | 
					 | 
				
			||||||
			case 'y': /* yes */
 | 
					 | 
				
			||||||
			case 'Y': /* YES */
 | 
					 | 
				
			||||||
			default:
 | 
					 | 
				
			||||||
				retdb->attributes.unique_subject = 1;
 | 
					 | 
				
			||||||
				break;
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1775,7 +1801,7 @@ int index_index(CA_DB *db)
 | 
				
			|||||||
	return 1;
 | 
						return 1;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int save_index(char *dbfile, char *suffix, CA_DB *db)
 | 
					int save_index(const char *dbfile, const char *suffix, CA_DB *db)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char buf[3][BSIZE];
 | 
						char buf[3][BSIZE];
 | 
				
			||||||
	BIO *out = BIO_new(BIO_s_file());
 | 
						BIO *out = BIO_new(BIO_s_file());
 | 
				
			||||||
@@ -1842,7 +1868,7 @@ int save_index(char *dbfile, char *suffix, CA_DB *db)
 | 
				
			|||||||
	return 0;
 | 
						return 0;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int rotate_index(char *dbfile, char *new_suffix, char *old_suffix)
 | 
					int rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char buf[5][BSIZE];
 | 
						char buf[5][BSIZE];
 | 
				
			||||||
	int i,j;
 | 
						int i,j;
 | 
				
			||||||
@@ -1982,9 +2008,177 @@ void free_index(CA_DB *db)
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int parse_yesno(const char *str, int def)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						int ret = def;
 | 
				
			||||||
 | 
						if (str)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							switch (*str)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
							case 'f': /* false */
 | 
				
			||||||
 | 
							case 'F': /* FALSE */
 | 
				
			||||||
 | 
							case 'n': /* no */
 | 
				
			||||||
 | 
							case 'N': /* NO */
 | 
				
			||||||
 | 
							case '0': /* 0 */
 | 
				
			||||||
 | 
								ret = 0;
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
							case 't': /* true */
 | 
				
			||||||
 | 
							case 'T': /* TRUE */
 | 
				
			||||||
 | 
							case 'y': /* yes */
 | 
				
			||||||
 | 
							case 'Y': /* YES */
 | 
				
			||||||
 | 
							case '1': /* 1 */
 | 
				
			||||||
 | 
								ret = 1;
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
							default:
 | 
				
			||||||
 | 
								ret = def;
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						return ret;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * subject is expected to be in the format /type0=value0/type1=value1/type2=...
 | 
				
			||||||
 | 
					 * where characters may be escaped by \
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					X509_NAME *parse_name(char *subject, long chtype, int multirdn)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						size_t buflen = strlen(subject)+1; /* to copy the types and values into. due to escaping, the copy can only become shorter */
 | 
				
			||||||
 | 
						char *buf = OPENSSL_malloc(buflen);
 | 
				
			||||||
 | 
						size_t max_ne = buflen / 2 + 1; /* maximum number of name elements */
 | 
				
			||||||
 | 
						char **ne_types = OPENSSL_malloc(max_ne * sizeof (char *));
 | 
				
			||||||
 | 
						char **ne_values = OPENSSL_malloc(max_ne * sizeof (char *));
 | 
				
			||||||
 | 
						int *mval = OPENSSL_malloc (max_ne * sizeof (int));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						char *sp = subject, *bp = buf;
 | 
				
			||||||
 | 
						int i, ne_num = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						X509_NAME *n = NULL;
 | 
				
			||||||
 | 
						int nid;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!buf || !ne_types || !ne_values || !mval)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "malloc error\n");
 | 
				
			||||||
 | 
							goto error;
 | 
				
			||||||
 | 
							}	
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (*subject != '/')
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Subject does not start with '/'.\n");
 | 
				
			||||||
 | 
							goto error;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						sp++; /* skip leading / */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* no multivalued RDN by default */
 | 
				
			||||||
 | 
						mval[ne_num] = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						while (*sp)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							/* collect type */
 | 
				
			||||||
 | 
							ne_types[ne_num] = bp;
 | 
				
			||||||
 | 
							while (*sp)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (*sp == '\\') /* is there anything to escape in the type...? */
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									if (*++sp)
 | 
				
			||||||
 | 
										*bp++ = *sp++;
 | 
				
			||||||
 | 
									else	
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										BIO_printf(bio_err, "escape character at end of string\n");
 | 
				
			||||||
 | 
										goto error;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									}	
 | 
				
			||||||
 | 
								else if (*sp == '=')
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									sp++;
 | 
				
			||||||
 | 
									*bp++ = '\0';
 | 
				
			||||||
 | 
									break;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									*bp++ = *sp++;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (!*sp)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "end of string encountered while processing type of subject name element #%d\n", ne_num);
 | 
				
			||||||
 | 
								goto error;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							ne_values[ne_num] = bp;
 | 
				
			||||||
 | 
							while (*sp)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (*sp == '\\')
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									if (*++sp)
 | 
				
			||||||
 | 
										*bp++ = *sp++;
 | 
				
			||||||
 | 
									else
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										BIO_printf(bio_err, "escape character at end of string\n");
 | 
				
			||||||
 | 
										goto error;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else if (*sp == '/')
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									sp++;
 | 
				
			||||||
 | 
									/* no multivalued RDN by default */
 | 
				
			||||||
 | 
									mval[ne_num+1] = 0;
 | 
				
			||||||
 | 
									break;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else if (*sp == '+' && multirdn)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									/* a not escaped + signals a mutlivalued RDN */
 | 
				
			||||||
 | 
									sp++;
 | 
				
			||||||
 | 
									mval[ne_num+1] = -1;
 | 
				
			||||||
 | 
									break;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									*bp++ = *sp++;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							*bp++ = '\0';
 | 
				
			||||||
 | 
							ne_num++;
 | 
				
			||||||
 | 
							}	
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!(n = X509_NAME_new()))
 | 
				
			||||||
 | 
							goto error;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for (i = 0; i < ne_num; i++)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if ((nid=OBJ_txt2nid(ne_types[i])) == NID_undef)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Subject Attribute %s has no known NID, skipped\n", ne_types[i]);
 | 
				
			||||||
 | 
								continue;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (!*ne_values[i])
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "No value provided for Subject Attribute %s, skipped\n", ne_types[i]);
 | 
				
			||||||
 | 
								continue;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (!X509_NAME_add_entry_by_NID(n, nid, chtype, (unsigned char*)ne_values[i], -1,-1,mval[i]))
 | 
				
			||||||
 | 
								goto error;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						OPENSSL_free(ne_values);
 | 
				
			||||||
 | 
						OPENSSL_free(ne_types);
 | 
				
			||||||
 | 
						OPENSSL_free(buf);
 | 
				
			||||||
 | 
						OPENSSL_free(mval);
 | 
				
			||||||
 | 
						return n;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					error:
 | 
				
			||||||
 | 
						X509_NAME_free(n);
 | 
				
			||||||
 | 
						if (ne_values)
 | 
				
			||||||
 | 
							OPENSSL_free(ne_values);
 | 
				
			||||||
 | 
						if (ne_types)
 | 
				
			||||||
 | 
							OPENSSL_free(ne_types);
 | 
				
			||||||
 | 
						if (mval)
 | 
				
			||||||
 | 
							OPENSSL_free(mval);
 | 
				
			||||||
 | 
						if (buf)
 | 
				
			||||||
 | 
							OPENSSL_free(buf);
 | 
				
			||||||
 | 
						return NULL;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* This code MUST COME AFTER anything that uses rename() */
 | 
					/* This code MUST COME AFTER anything that uses rename() */
 | 
				
			||||||
#ifdef OPENSSL_SYS_WIN32
 | 
					#ifdef OPENSSL_SYS_WIN32
 | 
				
			||||||
int WIN32_rename(char *from, char *to)
 | 
					int WIN32_rename(const char *from, const char *to)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_SYS_WINCE
 | 
					#ifndef OPENSSL_SYS_WINCE
 | 
				
			||||||
	/* Windows rename gives an error if 'to' exists, so delete it
 | 
						/* Windows rename gives an error if 'to' exists, so delete it
 | 
				
			||||||
@@ -2020,3 +2214,374 @@ int WIN32_rename(char *from, char *to)
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int args_verify(char ***pargs, int *pargc,
 | 
				
			||||||
 | 
								int *badarg, BIO *err, X509_VERIFY_PARAM **pm)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						ASN1_OBJECT *otmp = NULL;
 | 
				
			||||||
 | 
						unsigned long flags = 0;
 | 
				
			||||||
 | 
						int i;
 | 
				
			||||||
 | 
						int purpose = 0;
 | 
				
			||||||
 | 
						char **oldargs = *pargs;
 | 
				
			||||||
 | 
						char *arg = **pargs, *argn = (*pargs)[1];
 | 
				
			||||||
 | 
						if (!strcmp(arg, "-policy"))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!argn)
 | 
				
			||||||
 | 
								*badarg = 1;
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								otmp = OBJ_txt2obj(argn, 0);
 | 
				
			||||||
 | 
								if (!otmp)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(err, "Invalid Policy \"%s\"\n",
 | 
				
			||||||
 | 
														argn);
 | 
				
			||||||
 | 
									*badarg = 1;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							(*pargs)++;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else if (strcmp(arg,"-purpose") == 0)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							X509_PURPOSE *xptmp;
 | 
				
			||||||
 | 
							if (!argn)
 | 
				
			||||||
 | 
								*badarg = 1;
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								i = X509_PURPOSE_get_by_sname(argn);
 | 
				
			||||||
 | 
								if(i < 0)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(err, "unrecognized purpose\n");
 | 
				
			||||||
 | 
									*badarg = 1;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									xptmp = X509_PURPOSE_get0(i);
 | 
				
			||||||
 | 
									purpose = X509_PURPOSE_get_id(xptmp);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							(*pargs)++;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else if (!strcmp(arg, "-ignore_critical"))
 | 
				
			||||||
 | 
							flags |= X509_V_FLAG_IGNORE_CRITICAL;
 | 
				
			||||||
 | 
						else if (!strcmp(arg, "-issuer_checks"))
 | 
				
			||||||
 | 
							flags |= X509_V_FLAG_CB_ISSUER_CHECK;
 | 
				
			||||||
 | 
						else if (!strcmp(arg, "-crl_check"))
 | 
				
			||||||
 | 
							flags |=  X509_V_FLAG_CRL_CHECK;
 | 
				
			||||||
 | 
						else if (!strcmp(arg, "-crl_check_all"))
 | 
				
			||||||
 | 
							flags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
 | 
				
			||||||
 | 
						else if (!strcmp(arg, "-policy_check"))
 | 
				
			||||||
 | 
							flags |= X509_V_FLAG_POLICY_CHECK;
 | 
				
			||||||
 | 
						else if (!strcmp(arg, "-explicit_policy"))
 | 
				
			||||||
 | 
							flags |= X509_V_FLAG_EXPLICIT_POLICY;
 | 
				
			||||||
 | 
						else if (!strcmp(arg, "-x509_strict"))
 | 
				
			||||||
 | 
							flags |= X509_V_FLAG_X509_STRICT;
 | 
				
			||||||
 | 
						else if (!strcmp(arg, "-policy_print"))
 | 
				
			||||||
 | 
							flags |= X509_V_FLAG_NOTIFY_POLICY;
 | 
				
			||||||
 | 
						else if (!strcmp(arg, "-check_ss_sig"))
 | 
				
			||||||
 | 
							flags |= X509_V_FLAG_CHECK_SS_SIGNATURE;
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (*badarg)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (*pm)
 | 
				
			||||||
 | 
								X509_VERIFY_PARAM_free(*pm);
 | 
				
			||||||
 | 
							*pm = NULL;
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!*pm && !(*pm = X509_VERIFY_PARAM_new()))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							*badarg = 1;
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (otmp)
 | 
				
			||||||
 | 
							X509_VERIFY_PARAM_add0_policy(*pm, otmp);
 | 
				
			||||||
 | 
						if (flags)
 | 
				
			||||||
 | 
							X509_VERIFY_PARAM_set_flags(*pm, flags);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (purpose)
 | 
				
			||||||
 | 
							X509_VERIFY_PARAM_set_purpose(*pm, purpose);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						end:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						(*pargs)++;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (pargc)
 | 
				
			||||||
 | 
							*pargc -= *pargs - oldargs;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void nodes_print(BIO *out, const char *name,
 | 
				
			||||||
 | 
						STACK_OF(X509_POLICY_NODE) *nodes)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						X509_POLICY_NODE *node;
 | 
				
			||||||
 | 
						int i;
 | 
				
			||||||
 | 
						BIO_printf(out, "%s Policies:", name);
 | 
				
			||||||
 | 
						if (nodes)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_puts(out, "\n");
 | 
				
			||||||
 | 
							for (i = 0; i < sk_X509_POLICY_NODE_num(nodes); i++)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								node = sk_X509_POLICY_NODE_value(nodes, i);
 | 
				
			||||||
 | 
								X509_POLICY_NODE_print(out, node, 2);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							BIO_puts(out, " <empty>\n");
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void policies_print(BIO *out, X509_STORE_CTX *ctx)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						X509_POLICY_TREE *tree;
 | 
				
			||||||
 | 
						int explicit_policy;
 | 
				
			||||||
 | 
						int free_out = 0;
 | 
				
			||||||
 | 
						if (out == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							out = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
				
			||||||
 | 
							free_out = 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						tree = X509_STORE_CTX_get0_policy_tree(ctx);
 | 
				
			||||||
 | 
						explicit_policy = X509_STORE_CTX_get_explicit_policy(ctx);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BIO_printf(out, "Require explicit Policy: %s\n",
 | 
				
			||||||
 | 
									explicit_policy ? "True" : "False");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						nodes_print(out, "Authority", X509_policy_tree_get0_policies(tree));
 | 
				
			||||||
 | 
						nodes_print(out, "User", X509_policy_tree_get0_user_policies(tree));
 | 
				
			||||||
 | 
						if (free_out)
 | 
				
			||||||
 | 
							BIO_free(out);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_JPAKE
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static JPAKE_CTX *jpake_init(const char *us, const char *them,
 | 
				
			||||||
 | 
												 const char *secret)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIGNUM *p = NULL;
 | 
				
			||||||
 | 
						BIGNUM *g = NULL;
 | 
				
			||||||
 | 
						BIGNUM *q = NULL;
 | 
				
			||||||
 | 
						BIGNUM *bnsecret = BN_new();
 | 
				
			||||||
 | 
						JPAKE_CTX *ctx;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* Use a safe prime for p (that we found earlier) */
 | 
				
			||||||
 | 
						BN_hex2bn(&p, "F9E5B365665EA7A05A9C534502780FEE6F1AB5BD4F49947FD036DBD7E905269AF46EF28B0FC07487EE4F5D20FB3C0AF8E700F3A2FA3414970CBED44FEDFF80CE78D800F184BB82435D137AADA2C6C16523247930A63B85661D1FC817A51ACD96168E95898A1F83A79FFB529368AA7833ABD1B0C3AEDDB14D2E1A2F71D99F763F");
 | 
				
			||||||
 | 
						g = BN_new();
 | 
				
			||||||
 | 
						BN_set_word(g, 2);
 | 
				
			||||||
 | 
						q = BN_new();
 | 
				
			||||||
 | 
						BN_rshift1(q, p);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BN_bin2bn((const unsigned char *)secret, strlen(secret), bnsecret);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ctx = JPAKE_CTX_new(us, them, p, g, q, bnsecret);
 | 
				
			||||||
 | 
						BN_free(bnsecret);
 | 
				
			||||||
 | 
						BN_free(q);
 | 
				
			||||||
 | 
						BN_free(g);
 | 
				
			||||||
 | 
						BN_free(p);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return ctx;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void jpake_send_part(BIO *conn, const JPAKE_STEP_PART *p)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BN_print(conn, p->gx);
 | 
				
			||||||
 | 
						BIO_puts(conn, "\n");
 | 
				
			||||||
 | 
						BN_print(conn, p->zkpx.gr);
 | 
				
			||||||
 | 
						BIO_puts(conn, "\n");
 | 
				
			||||||
 | 
						BN_print(conn, p->zkpx.b);
 | 
				
			||||||
 | 
						BIO_puts(conn, "\n");
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void jpake_send_step1(BIO *bconn, JPAKE_CTX *ctx)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						JPAKE_STEP1 s1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						JPAKE_STEP1_init(&s1);
 | 
				
			||||||
 | 
						JPAKE_STEP1_generate(&s1, ctx);
 | 
				
			||||||
 | 
						jpake_send_part(bconn, &s1.p1);
 | 
				
			||||||
 | 
						jpake_send_part(bconn, &s1.p2);
 | 
				
			||||||
 | 
						(void)BIO_flush(bconn);
 | 
				
			||||||
 | 
						JPAKE_STEP1_release(&s1);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void jpake_send_step2(BIO *bconn, JPAKE_CTX *ctx)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						JPAKE_STEP2 s2;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						JPAKE_STEP2_init(&s2);
 | 
				
			||||||
 | 
						JPAKE_STEP2_generate(&s2, ctx);
 | 
				
			||||||
 | 
						jpake_send_part(bconn, &s2);
 | 
				
			||||||
 | 
						(void)BIO_flush(bconn);
 | 
				
			||||||
 | 
						JPAKE_STEP2_release(&s2);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void jpake_send_step3a(BIO *bconn, JPAKE_CTX *ctx)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						JPAKE_STEP3A s3a;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						JPAKE_STEP3A_init(&s3a);
 | 
				
			||||||
 | 
						JPAKE_STEP3A_generate(&s3a, ctx);
 | 
				
			||||||
 | 
						BIO_write(bconn, s3a.hhk, sizeof s3a.hhk);
 | 
				
			||||||
 | 
						(void)BIO_flush(bconn);
 | 
				
			||||||
 | 
						JPAKE_STEP3A_release(&s3a);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void jpake_send_step3b(BIO *bconn, JPAKE_CTX *ctx)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						JPAKE_STEP3B s3b;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						JPAKE_STEP3B_init(&s3b);
 | 
				
			||||||
 | 
						JPAKE_STEP3B_generate(&s3b, ctx);
 | 
				
			||||||
 | 
						BIO_write(bconn, s3b.hk, sizeof s3b.hk);
 | 
				
			||||||
 | 
						(void)BIO_flush(bconn);
 | 
				
			||||||
 | 
						JPAKE_STEP3B_release(&s3b);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void readbn(BIGNUM **bn, BIO *bconn)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						char buf[10240];
 | 
				
			||||||
 | 
						int l;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						l = BIO_gets(bconn, buf, sizeof buf);
 | 
				
			||||||
 | 
						assert(l > 0);
 | 
				
			||||||
 | 
						assert(buf[l-1] == '\n');
 | 
				
			||||||
 | 
						buf[l-1] = '\0';
 | 
				
			||||||
 | 
						BN_hex2bn(bn, buf);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void jpake_receive_part(JPAKE_STEP_PART *p, BIO *bconn)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						readbn(&p->gx, bconn);
 | 
				
			||||||
 | 
						readbn(&p->zkpx.gr, bconn);
 | 
				
			||||||
 | 
						readbn(&p->zkpx.b, bconn);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void jpake_receive_step1(JPAKE_CTX *ctx, BIO *bconn)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						JPAKE_STEP1 s1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						JPAKE_STEP1_init(&s1);
 | 
				
			||||||
 | 
						jpake_receive_part(&s1.p1, bconn);
 | 
				
			||||||
 | 
						jpake_receive_part(&s1.p2, bconn);
 | 
				
			||||||
 | 
						if(!JPAKE_STEP1_process(ctx, &s1))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							exit(1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						JPAKE_STEP1_release(&s1);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void jpake_receive_step2(JPAKE_CTX *ctx, BIO *bconn)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						JPAKE_STEP2 s2;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						JPAKE_STEP2_init(&s2);
 | 
				
			||||||
 | 
						jpake_receive_part(&s2, bconn);
 | 
				
			||||||
 | 
						if(!JPAKE_STEP2_process(ctx, &s2))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							exit(1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						JPAKE_STEP2_release(&s2);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void jpake_receive_step3a(JPAKE_CTX *ctx, BIO *bconn)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						JPAKE_STEP3A s3a;
 | 
				
			||||||
 | 
						int l;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						JPAKE_STEP3A_init(&s3a);
 | 
				
			||||||
 | 
						l = BIO_read(bconn, s3a.hhk, sizeof s3a.hhk);
 | 
				
			||||||
 | 
						assert(l == sizeof s3a.hhk);
 | 
				
			||||||
 | 
						if(!JPAKE_STEP3A_process(ctx, &s3a))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							exit(1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						JPAKE_STEP3A_release(&s3a);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void jpake_receive_step3b(JPAKE_CTX *ctx, BIO *bconn)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						JPAKE_STEP3B s3b;
 | 
				
			||||||
 | 
						int l;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						JPAKE_STEP3B_init(&s3b);
 | 
				
			||||||
 | 
						l = BIO_read(bconn, s3b.hk, sizeof s3b.hk);
 | 
				
			||||||
 | 
						assert(l == sizeof s3b.hk);
 | 
				
			||||||
 | 
						if(!JPAKE_STEP3B_process(ctx, &s3b))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							exit(1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						JPAKE_STEP3B_release(&s3b);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void jpake_client_auth(BIO *out, BIO *conn, const char *secret)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						JPAKE_CTX *ctx;
 | 
				
			||||||
 | 
						BIO *bconn;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BIO_puts(out, "Authenticating with JPAKE\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ctx = jpake_init("client", "server", secret);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						bconn = BIO_new(BIO_f_buffer());
 | 
				
			||||||
 | 
						BIO_push(bconn, conn);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						jpake_send_step1(bconn, ctx);
 | 
				
			||||||
 | 
						jpake_receive_step1(ctx, bconn);
 | 
				
			||||||
 | 
						jpake_send_step2(bconn, ctx);
 | 
				
			||||||
 | 
						jpake_receive_step2(ctx, bconn);
 | 
				
			||||||
 | 
						jpake_send_step3a(bconn, ctx);
 | 
				
			||||||
 | 
						jpake_receive_step3b(ctx, bconn);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/*
 | 
				
			||||||
 | 
						 * The problem is that you must use the derived key in the
 | 
				
			||||||
 | 
						 * session key or you are subject to man-in-the-middle
 | 
				
			||||||
 | 
						 * attacks.
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						BIO_puts(out, "JPAKE authentication succeeded (N.B. This version can"
 | 
				
			||||||
 | 
							 " be MitMed. See the version in HEAD for how to do it"
 | 
				
			||||||
 | 
							 " properly)\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BIO_pop(bconn);
 | 
				
			||||||
 | 
						BIO_free(bconn);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void jpake_server_auth(BIO *out, BIO *conn, const char *secret)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						JPAKE_CTX *ctx;
 | 
				
			||||||
 | 
						BIO *bconn;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BIO_puts(out, "Authenticating with JPAKE\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ctx = jpake_init("server", "client", secret);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						bconn = BIO_new(BIO_f_buffer());
 | 
				
			||||||
 | 
						BIO_push(bconn, conn);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						jpake_receive_step1(ctx, bconn);
 | 
				
			||||||
 | 
						jpake_send_step1(bconn, ctx);
 | 
				
			||||||
 | 
						jpake_receive_step2(ctx, bconn);
 | 
				
			||||||
 | 
						jpake_send_step2(bconn, ctx);
 | 
				
			||||||
 | 
						jpake_receive_step3a(ctx, bconn);
 | 
				
			||||||
 | 
						jpake_send_step3b(bconn, ctx);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/*
 | 
				
			||||||
 | 
						 * The problem is that you must use the derived key in the
 | 
				
			||||||
 | 
						 * session key or you are subject to man-in-the-middle
 | 
				
			||||||
 | 
						 * attacks.
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						BIO_puts(out, "JPAKE authentication succeeded (N.B. This version can"
 | 
				
			||||||
 | 
							 " be MitMed. See the version in HEAD for how to do it"
 | 
				
			||||||
 | 
							 " properly)\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BIO_pop(bconn);
 | 
				
			||||||
 | 
						BIO_free(bconn);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										39
									
								
								apps/apps.h
									
									
									
									
									
								
							
							
						
						
									
										39
									
								
								apps/apps.h
									
									
									
									
									
								
							@@ -114,9 +114,7 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
#include "e_os.h"
 | 
					#include "e_os.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#include <openssl/buffer.h>
 | 
					 | 
				
			||||||
#include <openssl/bio.h>
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
#include <openssl/crypto.h>
 | 
					 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/lhash.h>
 | 
					#include <openssl/lhash.h>
 | 
				
			||||||
#include <openssl/conf.h>
 | 
					#include <openssl/conf.h>
 | 
				
			||||||
@@ -124,6 +122,9 @@
 | 
				
			|||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
#include <openssl/engine.h>
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_OCSP
 | 
				
			||||||
 | 
					#include <openssl/ocsp.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#include <openssl/ossl_typ.h>
 | 
					#include <openssl/ossl_typ.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn);
 | 
					int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn);
 | 
				
			||||||
@@ -138,7 +139,7 @@ long app_RAND_load_files(char *file); /* `file' is a list of files to read,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
#ifdef OPENSSL_SYS_WIN32
 | 
					#ifdef OPENSSL_SYS_WIN32
 | 
				
			||||||
#define rename(from,to) WIN32_rename((from),(to))
 | 
					#define rename(from,to) WIN32_rename((from),(to))
 | 
				
			||||||
int WIN32_rename(char *oldname,char *newname);
 | 
					int WIN32_rename(const char *oldname,const char *newname);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef MONOLITH
 | 
					#ifndef MONOLITH
 | 
				
			||||||
@@ -165,7 +166,9 @@ extern int in_FIPS_mode;
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef OPENSSL_SYS_NETWARE
 | 
				
			||||||
#include <signal.h>
 | 
					#include <signal.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef SIGPIPE
 | 
					#ifdef SIGPIPE
 | 
				
			||||||
#define do_pipe_sig()	signal(SIGPIPE,SIG_IGN)
 | 
					#define do_pipe_sig()	signal(SIGPIPE,SIG_IGN)
 | 
				
			||||||
@@ -231,6 +234,12 @@ extern int in_FIPS_mode;
 | 
				
			|||||||
#  endif
 | 
					#  endif
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef OPENSSL_SYSNAME_WIN32
 | 
				
			||||||
 | 
					#  define openssl_fdset(a,b) FD_SET((unsigned int)a, b)
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
					#  define openssl_fdset(a,b) FD_SET(a, b)
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
typedef struct args_st
 | 
					typedef struct args_st
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char **data;
 | 
						char **data;
 | 
				
			||||||
@@ -257,7 +266,7 @@ void program_name(char *in,char *out,int size);
 | 
				
			|||||||
int chopup_args(ARGS *arg,char *buf, int *argc, char **argv[]);
 | 
					int chopup_args(ARGS *arg,char *buf, int *argc, char **argv[]);
 | 
				
			||||||
#ifdef HEADER_X509_H
 | 
					#ifdef HEADER_X509_H
 | 
				
			||||||
int dump_cert_text(BIO *out, X509 *x);
 | 
					int dump_cert_text(BIO *out, X509 *x);
 | 
				
			||||||
void print_name(BIO *out, char *title, X509_NAME *nm, unsigned long lflags);
 | 
					void print_name(BIO *out, const char *title, X509_NAME *nm, unsigned long lflags);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
int set_cert_ex(unsigned long *flags, const char *arg);
 | 
					int set_cert_ex(unsigned long *flags, const char *arg);
 | 
				
			||||||
int set_name_ex(unsigned long *flags, const char *arg);
 | 
					int set_name_ex(unsigned long *flags, const char *arg);
 | 
				
			||||||
@@ -278,12 +287,18 @@ X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
 | 
				
			|||||||
ENGINE *setup_engine(BIO *err, const char *engine, int debug);
 | 
					ENGINE *setup_engine(BIO *err, const char *engine, int debug);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_OCSP
 | 
				
			||||||
 | 
					OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
 | 
				
			||||||
 | 
								char *host, char *path, char *port, int use_ssl,
 | 
				
			||||||
 | 
								int req_timeout);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int load_config(BIO *err, CONF *cnf);
 | 
					int load_config(BIO *err, CONF *cnf);
 | 
				
			||||||
char *make_config_name(void);
 | 
					char *make_config_name(void);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* Functions defined in ca.c and also used in ocsp.c */
 | 
					/* Functions defined in ca.c and also used in ocsp.c */
 | 
				
			||||||
int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
 | 
					int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
 | 
				
			||||||
			ASN1_GENERALIZEDTIME **pinvtm, char *str);
 | 
								ASN1_GENERALIZEDTIME **pinvtm, const char *str);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define DB_type         0
 | 
					#define DB_type         0
 | 
				
			||||||
#define DB_exp_date     1
 | 
					#define DB_exp_date     1
 | 
				
			||||||
@@ -313,12 +328,20 @@ int rotate_serial(char *serialfile, char *new_suffix, char *old_suffix);
 | 
				
			|||||||
int rand_serial(BIGNUM *b, ASN1_INTEGER *ai);
 | 
					int rand_serial(BIGNUM *b, ASN1_INTEGER *ai);
 | 
				
			||||||
CA_DB *load_index(char *dbfile, DB_ATTR *dbattr);
 | 
					CA_DB *load_index(char *dbfile, DB_ATTR *dbattr);
 | 
				
			||||||
int index_index(CA_DB *db);
 | 
					int index_index(CA_DB *db);
 | 
				
			||||||
int save_index(char *dbfile, char *suffix, CA_DB *db);
 | 
					int save_index(const char *dbfile, const char *suffix, CA_DB *db);
 | 
				
			||||||
int rotate_index(char *dbfile, char *new_suffix, char *old_suffix);
 | 
					int rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix);
 | 
				
			||||||
void free_index(CA_DB *db);
 | 
					void free_index(CA_DB *db);
 | 
				
			||||||
int index_name_cmp(const char **a, const char **b);
 | 
					int index_name_cmp(const char **a, const char **b);
 | 
				
			||||||
 | 
					int parse_yesno(const char *str, int def);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
X509_NAME *do_subject(char *str, long chtype);
 | 
					X509_NAME *parse_name(char *str, long chtype, int multirdn);
 | 
				
			||||||
 | 
					int args_verify(char ***pargs, int *pargc,
 | 
				
			||||||
 | 
								int *badarg, BIO *err, X509_VERIFY_PARAM **pm);
 | 
				
			||||||
 | 
					void policies_print(BIO *out, X509_STORE_CTX *ctx);
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_JPAKE
 | 
				
			||||||
 | 
					void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
 | 
				
			||||||
 | 
					void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define FORMAT_UNDEF    0
 | 
					#define FORMAT_UNDEF    0
 | 
				
			||||||
#define FORMAT_ASN1     1
 | 
					#define FORMAT_ASN1     1
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										126
									
								
								apps/asn1pars.c
									
									
									
									
									
								
							
							
						
						
									
										126
									
								
								apps/asn1pars.c
									
									
									
									
									
								
							@@ -56,7 +56,7 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* A nice addition from Dr Stephen Henson <shenson@bigfoot.com> to 
 | 
					/* A nice addition from Dr Stephen Henson <steve@openssl.org> to 
 | 
				
			||||||
 * add the -strparse option which parses nested binary structures
 | 
					 * add the -strparse option which parses nested binary structures
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -82,6 +82,8 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
int MAIN(int, char **);
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int i,badops=0,offset=0,ret=1,j;
 | 
						int i,badops=0,offset=0,ret=1,j;
 | 
				
			||||||
@@ -90,7 +92,9 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	BIO *in=NULL,*out=NULL,*b64=NULL, *derout = NULL;
 | 
						BIO *in=NULL,*out=NULL,*b64=NULL, *derout = NULL;
 | 
				
			||||||
	int informat,indent=0, noout = 0, dump = 0;
 | 
						int informat,indent=0, noout = 0, dump = 0;
 | 
				
			||||||
	char *infile=NULL,*str=NULL,*prog,*oidfile=NULL, *derfile=NULL;
 | 
						char *infile=NULL,*str=NULL,*prog,*oidfile=NULL, *derfile=NULL;
 | 
				
			||||||
 | 
						char *genstr=NULL, *genconf=NULL;
 | 
				
			||||||
	unsigned char *tmpbuf;
 | 
						unsigned char *tmpbuf;
 | 
				
			||||||
 | 
						const unsigned char *ctmpbuf;
 | 
				
			||||||
	BUF_MEM *buf=NULL;
 | 
						BUF_MEM *buf=NULL;
 | 
				
			||||||
	STACK *osk=NULL;
 | 
						STACK *osk=NULL;
 | 
				
			||||||
	ASN1_TYPE *at=NULL;
 | 
						ASN1_TYPE *at=NULL;
 | 
				
			||||||
@@ -167,6 +171,16 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			sk_push(osk,*(++argv));
 | 
								sk_push(osk,*(++argv));
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-genstr") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								genstr= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-genconf") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								genconf= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
								BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
				
			||||||
@@ -182,7 +196,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
bad:
 | 
					bad:
 | 
				
			||||||
		BIO_printf(bio_err,"%s [options] <infile\n",prog);
 | 
							BIO_printf(bio_err,"%s [options] <infile\n",prog);
 | 
				
			||||||
		BIO_printf(bio_err,"where options are\n");
 | 
							BIO_printf(bio_err,"where options are\n");
 | 
				
			||||||
		BIO_printf(bio_err," -inform arg   input format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -inform arg   input format - one of DER PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -in arg       input file\n");
 | 
							BIO_printf(bio_err," -in arg       input file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -out arg      output file (output format is always DER\n");
 | 
							BIO_printf(bio_err," -out arg      output file (output format is always DER\n");
 | 
				
			||||||
		BIO_printf(bio_err," -noout arg    don't produce any output\n");
 | 
							BIO_printf(bio_err," -noout arg    don't produce any output\n");
 | 
				
			||||||
@@ -195,6 +209,8 @@ bad:
 | 
				
			|||||||
		BIO_printf(bio_err," -strparse offset\n");
 | 
							BIO_printf(bio_err," -strparse offset\n");
 | 
				
			||||||
		BIO_printf(bio_err,"               a series of these can be used to 'dig' into multiple\n");
 | 
							BIO_printf(bio_err,"               a series of these can be used to 'dig' into multiple\n");
 | 
				
			||||||
		BIO_printf(bio_err,"               ASN1 blob wrappings\n");
 | 
							BIO_printf(bio_err,"               ASN1 blob wrappings\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -genstr str   string to generate ASN1 structure from\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -genconf file file to generate ASN1 structure from\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -248,25 +264,39 @@ bad:
 | 
				
			|||||||
	if ((buf=BUF_MEM_new()) == NULL) goto end;
 | 
						if ((buf=BUF_MEM_new()) == NULL) goto end;
 | 
				
			||||||
	if (!BUF_MEM_grow(buf,BUFSIZ*8)) goto end; /* Pre-allocate :-) */
 | 
						if (!BUF_MEM_grow(buf,BUFSIZ*8)) goto end; /* Pre-allocate :-) */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (informat == FORMAT_PEM)
 | 
						if (genstr || genconf)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO *tmp;
 | 
							num = do_generate(bio_err, genstr, genconf, buf);
 | 
				
			||||||
 | 
							if (num < 0)
 | 
				
			||||||
		if ((b64=BIO_new(BIO_f_base64())) == NULL)
 | 
								{
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
		BIO_push(b64,in);
 | 
								}
 | 
				
			||||||
		tmp=in;
 | 
					 | 
				
			||||||
		in=b64;
 | 
					 | 
				
			||||||
		b64=tmp;
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	num=0;
 | 
						else
 | 
				
			||||||
	for (;;)
 | 
					 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (!BUF_MEM_grow(buf,(int)num+BUFSIZ)) goto end;
 | 
					
 | 
				
			||||||
		i=BIO_read(in,&(buf->data[num]),BUFSIZ);
 | 
							if (informat == FORMAT_PEM)
 | 
				
			||||||
		if (i <= 0) break;
 | 
								{
 | 
				
			||||||
		num+=i;
 | 
								BIO *tmp;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								if ((b64=BIO_new(BIO_f_base64())) == NULL)
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
								BIO_push(b64,in);
 | 
				
			||||||
 | 
								tmp=in;
 | 
				
			||||||
 | 
								in=b64;
 | 
				
			||||||
 | 
								b64=tmp;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							num=0;
 | 
				
			||||||
 | 
							for (;;)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (!BUF_MEM_grow(buf,(int)num+BUFSIZ)) goto end;
 | 
				
			||||||
 | 
								i=BIO_read(in,&(buf->data[num]),BUFSIZ);
 | 
				
			||||||
 | 
								if (i <= 0) break;
 | 
				
			||||||
 | 
								num+=i;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	str=buf->data;
 | 
						str=buf->data;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -278,8 +308,8 @@ bad:
 | 
				
			|||||||
		tmplen=num;
 | 
							tmplen=num;
 | 
				
			||||||
		for (i=0; i<sk_num(osk); i++)
 | 
							for (i=0; i<sk_num(osk); i++)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			int typ;
 | 
					 | 
				
			||||||
			ASN1_TYPE *atmp;
 | 
								ASN1_TYPE *atmp;
 | 
				
			||||||
 | 
								int typ;
 | 
				
			||||||
			j=atoi(sk_value(osk,i));
 | 
								j=atoi(sk_value(osk,i));
 | 
				
			||||||
			if (j == 0)
 | 
								if (j == 0)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
@@ -289,7 +319,8 @@ bad:
 | 
				
			|||||||
			tmpbuf+=j;
 | 
								tmpbuf+=j;
 | 
				
			||||||
			tmplen-=j;
 | 
								tmplen-=j;
 | 
				
			||||||
			atmp = at;
 | 
								atmp = at;
 | 
				
			||||||
			at = d2i_ASN1_TYPE(NULL,&tmpbuf,tmplen);
 | 
								ctmpbuf = tmpbuf;
 | 
				
			||||||
 | 
								at = d2i_ASN1_TYPE(NULL,&ctmpbuf,tmplen);
 | 
				
			||||||
			ASN1_TYPE_free(atmp);
 | 
								ASN1_TYPE_free(atmp);
 | 
				
			||||||
			if(!at)
 | 
								if(!at)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
@@ -353,3 +384,62 @@ end:
 | 
				
			|||||||
	OPENSSL_EXIT(ret);
 | 
						OPENSSL_EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						CONF *cnf = NULL;
 | 
				
			||||||
 | 
						int len;
 | 
				
			||||||
 | 
						long errline;
 | 
				
			||||||
 | 
						unsigned char *p;
 | 
				
			||||||
 | 
						ASN1_TYPE *atyp = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (genconf)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							cnf = NCONF_new(NULL);
 | 
				
			||||||
 | 
							if (!NCONF_load(cnf, genconf, &errline))
 | 
				
			||||||
 | 
								goto conferr;
 | 
				
			||||||
 | 
							if (!genstr)
 | 
				
			||||||
 | 
								genstr = NCONF_get_string(cnf, "default", "asn1");
 | 
				
			||||||
 | 
							if (!genstr)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio, "Can't find 'asn1' in '%s'\n", genconf);
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						atyp = ASN1_generate_nconf(genstr, cnf);
 | 
				
			||||||
 | 
						NCONF_free(cnf);
 | 
				
			||||||
 | 
						cnf = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!atyp)
 | 
				
			||||||
 | 
							return -1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						len = i2d_ASN1_TYPE(atyp, NULL);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (len <= 0)
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!BUF_MEM_grow(buf,len))
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						p=(unsigned char *)buf->data;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						i2d_ASN1_TYPE(atyp, &p);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ASN1_TYPE_free(atyp);
 | 
				
			||||||
 | 
						return len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						conferr:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (errline > 0)
 | 
				
			||||||
 | 
							BIO_printf(bio, "Error on line %ld of config file '%s'\n",
 | 
				
			||||||
 | 
												errline, genconf);
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							BIO_printf(bio, "Error loading config file '%s'\n", genconf);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						err:
 | 
				
			||||||
 | 
						NCONF_free(cnf);
 | 
				
			||||||
 | 
						ASN1_TYPE_free(atyp);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return -1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										428
									
								
								apps/ca.c
									
									
									
									
									
								
							
							
						
						
									
										428
									
								
								apps/ca.c
									
									
									
									
									
								
							@@ -83,7 +83,7 @@
 | 
				
			|||||||
#    else
 | 
					#    else
 | 
				
			||||||
#      include <unixlib.h>
 | 
					#      include <unixlib.h>
 | 
				
			||||||
#    endif
 | 
					#    endif
 | 
				
			||||||
#  elif !defined(OPENSSL_SYS_VXWORKS) && !defined(OPENSSL_SYS_WINDOWS)
 | 
					#  elif !defined(OPENSSL_SYS_VXWORKS) && !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_NETWARE) && !defined(__TANDEM)
 | 
				
			||||||
#    include <sys/file.h>
 | 
					#    include <sys/file.h>
 | 
				
			||||||
#  endif
 | 
					#  endif
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -105,6 +105,9 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
#define ENV_DEFAULT_CA		"default_ca"
 | 
					#define ENV_DEFAULT_CA		"default_ca"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define STRING_MASK	"string_mask"
 | 
				
			||||||
 | 
					#define UTF8_IN			"utf8"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define ENV_DIR			"dir"
 | 
					#define ENV_DIR			"dir"
 | 
				
			||||||
#define ENV_CERTS		"certs"
 | 
					#define ENV_CERTS		"certs"
 | 
				
			||||||
#define ENV_CRL_DIR		"crl_dir"
 | 
					#define ENV_CRL_DIR		"crl_dir"
 | 
				
			||||||
@@ -131,6 +134,7 @@
 | 
				
			|||||||
#define ENV_NAMEOPT		"name_opt"
 | 
					#define ENV_NAMEOPT		"name_opt"
 | 
				
			||||||
#define ENV_CERTOPT		"cert_opt"
 | 
					#define ENV_CERTOPT		"cert_opt"
 | 
				
			||||||
#define ENV_EXTCOPY		"copy_extensions"
 | 
					#define ENV_EXTCOPY		"copy_extensions"
 | 
				
			||||||
 | 
					#define ENV_UNIQUE_SUBJECT	"unique_subject"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define ENV_DATABASE		"database"
 | 
					#define ENV_DATABASE		"database"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -142,7 +146,7 @@
 | 
				
			|||||||
#define REV_KEY_COMPROMISE	3	/* Value is cert key compromise time */
 | 
					#define REV_KEY_COMPROMISE	3	/* Value is cert key compromise time */
 | 
				
			||||||
#define REV_CA_COMPROMISE	4	/* Value is CA key compromise time */
 | 
					#define REV_CA_COMPROMISE	4	/* Value is CA key compromise time */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static char *ca_usage[]={
 | 
					static const char *ca_usage[]={
 | 
				
			||||||
"usage: ca args\n",
 | 
					"usage: ca args\n",
 | 
				
			||||||
"\n",
 | 
					"\n",
 | 
				
			||||||
" -verbose        - Talk alot while doing things\n",
 | 
					" -verbose        - Talk alot while doing things\n",
 | 
				
			||||||
@@ -160,6 +164,7 @@ static char *ca_usage[]={
 | 
				
			|||||||
" -keyform arg    - private key file format (PEM or ENGINE)\n",
 | 
					" -keyform arg    - private key file format (PEM or ENGINE)\n",
 | 
				
			||||||
" -key arg        - key to decode the private key if it is encrypted\n",
 | 
					" -key arg        - key to decode the private key if it is encrypted\n",
 | 
				
			||||||
" -cert file      - The CA certificate\n",
 | 
					" -cert file      - The CA certificate\n",
 | 
				
			||||||
 | 
					" -selfsign       - sign a certificate with the key associated with it\n",
 | 
				
			||||||
" -in file        - The input PEM encoded certificate request(s)\n",
 | 
					" -in file        - The input PEM encoded certificate request(s)\n",
 | 
				
			||||||
" -out file       - Where to put the output file(s)\n",
 | 
					" -out file       - Where to put the output file(s)\n",
 | 
				
			||||||
" -outdir dir     - Where to put output certificates\n",
 | 
					" -outdir dir     - Where to put output certificates\n",
 | 
				
			||||||
@@ -172,6 +177,8 @@ static char *ca_usage[]={
 | 
				
			|||||||
" -msie_hack      - msie modifications to handle all those universal strings\n",
 | 
					" -msie_hack      - msie modifications to handle all those universal strings\n",
 | 
				
			||||||
" -revoke file    - Revoke a certificate (given in file)\n",
 | 
					" -revoke file    - Revoke a certificate (given in file)\n",
 | 
				
			||||||
" -subj arg       - Use arg instead of request's subject\n",
 | 
					" -subj arg       - Use arg instead of request's subject\n",
 | 
				
			||||||
 | 
					" -utf8           - input characters are UTF8 (default ASCII)\n",
 | 
				
			||||||
 | 
					" -multivalue-rdn - enable support for multivalued RDNs\n",
 | 
				
			||||||
" -extensions ..  - Extension section (override value in config file)\n",
 | 
					" -extensions ..  - Extension section (override value in config file)\n",
 | 
				
			||||||
" -extfile file   - Configuration file with X509v3 extentions to add\n",
 | 
					" -extfile file   - Configuration file with X509v3 extentions to add\n",
 | 
				
			||||||
" -crlexts ..     - CRL extension section (override value in config file)\n",
 | 
					" -crlexts ..     - CRL extension section (override value in config file)\n",
 | 
				
			||||||
@@ -189,40 +196,39 @@ extern int EF_PROTECT_BELOW;
 | 
				
			|||||||
extern int EF_ALIGNMENT;
 | 
					extern int EF_ALIGNMENT;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void lookup_fail(char *name,char *tag);
 | 
					static void lookup_fail(const char *name, const char *tag);
 | 
				
			||||||
static int certify(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
 | 
					static int certify(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
 | 
				
			||||||
		   const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,CA_DB *db,
 | 
							   const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,CA_DB *db,
 | 
				
			||||||
		   BIGNUM *serial, char *subj, int email_dn, char *startdate,
 | 
							   BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate,
 | 
				
			||||||
		   char *enddate, long days, int batch, char *ext_sect, CONF *conf,
 | 
							   char *enddate, long days, int batch, char *ext_sect, CONF *conf,
 | 
				
			||||||
		   int verbose, unsigned long certopt, unsigned long nameopt,
 | 
							   int verbose, unsigned long certopt, unsigned long nameopt,
 | 
				
			||||||
		   int default_op, int ext_copy);
 | 
							   int default_op, int ext_copy, int selfsign);
 | 
				
			||||||
static int certify_cert(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
 | 
					static int certify_cert(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
 | 
				
			||||||
			const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,
 | 
								const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,
 | 
				
			||||||
			CA_DB *db, BIGNUM *serial, char *subj, int email_dn,
 | 
								CA_DB *db, BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn,
 | 
				
			||||||
			char *startdate, char *enddate, long days, int batch,
 | 
								char *startdate, char *enddate, long days, int batch,
 | 
				
			||||||
			char *ext_sect, CONF *conf,int verbose, unsigned long certopt,
 | 
								char *ext_sect, CONF *conf,int verbose, unsigned long certopt,
 | 
				
			||||||
			unsigned long nameopt, int default_op, int ext_copy,
 | 
								unsigned long nameopt, int default_op, int ext_copy,
 | 
				
			||||||
			ENGINE *e);
 | 
								ENGINE *e);
 | 
				
			||||||
static int certify_spkac(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
 | 
					static int certify_spkac(X509 **xret, char *infile,EVP_PKEY *pkey,X509 *x509,
 | 
				
			||||||
			 const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,
 | 
								 const EVP_MD *dgst,STACK_OF(CONF_VALUE) *policy,
 | 
				
			||||||
			 CA_DB *db, BIGNUM *serial,char *subj, int email_dn,
 | 
								 CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn, int email_dn,
 | 
				
			||||||
			 char *startdate, char *enddate, long days, char *ext_sect,
 | 
								 char *startdate, char *enddate, long days, char *ext_sect,
 | 
				
			||||||
			 CONF *conf, int verbose, unsigned long certopt, 
 | 
								 CONF *conf, int verbose, unsigned long certopt, 
 | 
				
			||||||
			 unsigned long nameopt, int default_op, int ext_copy);
 | 
								 unsigned long nameopt, int default_op, int ext_copy);
 | 
				
			||||||
static int fix_data(int nid, int *type);
 | 
					 | 
				
			||||||
static void write_new_certificate(BIO *bp, X509 *x, int output_der, int notext);
 | 
					static void write_new_certificate(BIO *bp, X509 *x, int output_der, int notext);
 | 
				
			||||||
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
 | 
					static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
 | 
				
			||||||
	STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,char *subj,
 | 
						STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial,char *subj,unsigned long chtype, int multirdn,
 | 
				
			||||||
	int email_dn, char *startdate, char *enddate, long days, int batch,
 | 
						int email_dn, char *startdate, char *enddate, long days, int batch,
 | 
				
			||||||
       	int verbose, X509_REQ *req, char *ext_sect, CONF *conf,
 | 
					       	int verbose, X509_REQ *req, char *ext_sect, CONF *conf,
 | 
				
			||||||
	unsigned long certopt, unsigned long nameopt, int default_op,
 | 
						unsigned long certopt, unsigned long nameopt, int default_op,
 | 
				
			||||||
	int ext_copy);
 | 
						int ext_copy, int selfsign);
 | 
				
			||||||
static int do_revoke(X509 *x509, CA_DB *db, int ext, char *extval);
 | 
					static int do_revoke(X509 *x509, CA_DB *db, int ext, char *extval);
 | 
				
			||||||
static int get_certificate_status(const char *ser_status, CA_DB *db);
 | 
					static int get_certificate_status(const char *ser_status, CA_DB *db);
 | 
				
			||||||
static int do_updatedb(CA_DB *db);
 | 
					static int do_updatedb(CA_DB *db);
 | 
				
			||||||
static int check_time_format(char *str);
 | 
					static int check_time_format(const char *str);
 | 
				
			||||||
char *make_revocation_str(int rev_type, char *rev_arg);
 | 
					char *make_revocation_str(int rev_type, char *rev_arg);
 | 
				
			||||||
int make_revoked(X509_REVOKED *rev, char *str);
 | 
					int make_revoked(X509_REVOKED *rev, const char *str);
 | 
				
			||||||
int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str);
 | 
					int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str);
 | 
				
			||||||
static CONF *conf=NULL;
 | 
					static CONF *conf=NULL;
 | 
				
			||||||
static CONF *extconf=NULL;
 | 
					static CONF *extconf=NULL;
 | 
				
			||||||
@@ -272,6 +278,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	char *extensions=NULL;
 | 
						char *extensions=NULL;
 | 
				
			||||||
	char *extfile=NULL;
 | 
						char *extfile=NULL;
 | 
				
			||||||
	char *subj=NULL;
 | 
						char *subj=NULL;
 | 
				
			||||||
 | 
						unsigned long chtype = MBSTRING_ASC;
 | 
				
			||||||
 | 
						int multirdn = 0;
 | 
				
			||||||
	char *tmp_email_dn=NULL;
 | 
						char *tmp_email_dn=NULL;
 | 
				
			||||||
	char *crl_ext=NULL;
 | 
						char *crl_ext=NULL;
 | 
				
			||||||
	int rev_type = REV_NONE;
 | 
						int rev_type = REV_NONE;
 | 
				
			||||||
@@ -286,7 +294,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	unsigned long nameopt = 0, certopt = 0;
 | 
						unsigned long nameopt = 0, certopt = 0;
 | 
				
			||||||
	int default_op = 1;
 | 
						int default_op = 1;
 | 
				
			||||||
	int ext_copy = EXT_COPY_NONE;
 | 
						int ext_copy = EXT_COPY_NONE;
 | 
				
			||||||
	X509 *x509=NULL;
 | 
						int selfsign = 0;
 | 
				
			||||||
 | 
						X509 *x509=NULL, *x509p = NULL;
 | 
				
			||||||
	X509 *x=NULL;
 | 
						X509 *x=NULL;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL,*Sout=NULL,*Cout=NULL;
 | 
						BIO *in=NULL,*out=NULL,*Sout=NULL,*Cout=NULL;
 | 
				
			||||||
	char *dbfile=NULL;
 | 
						char *dbfile=NULL;
 | 
				
			||||||
@@ -295,7 +304,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	X509_REVOKED *r=NULL;
 | 
						X509_REVOKED *r=NULL;
 | 
				
			||||||
	ASN1_TIME *tmptm;
 | 
						ASN1_TIME *tmptm;
 | 
				
			||||||
	ASN1_INTEGER *tmpser;
 | 
						ASN1_INTEGER *tmpser;
 | 
				
			||||||
	char **pp,*p,*f;
 | 
						char *f;
 | 
				
			||||||
 | 
						const char *p, **pp;
 | 
				
			||||||
	int i,j;
 | 
						int i,j;
 | 
				
			||||||
	const EVP_MD *dgst=NULL;
 | 
						const EVP_MD *dgst=NULL;
 | 
				
			||||||
	STACK_OF(CONF_VALUE) *attribs=NULL;
 | 
						STACK_OF(CONF_VALUE) *attribs=NULL;
 | 
				
			||||||
@@ -350,6 +360,12 @@ EF_ALIGNMENT=0;
 | 
				
			|||||||
			subj= *(++argv);
 | 
								subj= *(++argv);
 | 
				
			||||||
			/* preserve=1; */
 | 
								/* preserve=1; */
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-utf8") == 0)
 | 
				
			||||||
 | 
								chtype = MBSTRING_UTF8;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-create_serial") == 0)
 | 
				
			||||||
 | 
								create_ser = 1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-multivalue-rdn") == 0)
 | 
				
			||||||
 | 
								multirdn=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-startdate") == 0)
 | 
							else if (strcmp(*argv,"-startdate") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -400,6 +416,8 @@ EF_ALIGNMENT=0;
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			certfile= *(++argv);
 | 
								certfile= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-selfsign") == 0)
 | 
				
			||||||
 | 
								selfsign=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-in") == 0)
 | 
							else if (strcmp(*argv,"-in") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -633,29 +651,31 @@ bad:
 | 
				
			|||||||
		ERR_clear_error();
 | 
							ERR_clear_error();
 | 
				
			||||||
	app_RAND_load_file(randfile, bio_err, 0);
 | 
						app_RAND_load_file(randfile, bio_err, 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						f = NCONF_get_string(conf, section, STRING_MASK);
 | 
				
			||||||
 | 
						if (!f)
 | 
				
			||||||
 | 
							ERR_clear_error();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(f && !ASN1_STRING_set_default_mask_asc(f)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Invalid global string mask setting %s\n", f);
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (chtype != MBSTRING_UTF8){
 | 
				
			||||||
 | 
							f = NCONF_get_string(conf, section, UTF8_IN);
 | 
				
			||||||
 | 
							if (!f)
 | 
				
			||||||
 | 
								ERR_clear_error();
 | 
				
			||||||
 | 
							else if (!strcmp(f, "yes"))
 | 
				
			||||||
 | 
								chtype = MBSTRING_UTF8;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	db_attr.unique_subject = 1;
 | 
						db_attr.unique_subject = 1;
 | 
				
			||||||
	p = NCONF_get_string(conf, section, "unique_subject");
 | 
						p = NCONF_get_string(conf, section, ENV_UNIQUE_SUBJECT);
 | 
				
			||||||
	if (p)
 | 
						if (p)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
#ifdef RL_DEBUG
 | 
					#ifdef RL_DEBUG
 | 
				
			||||||
		BIO_printf(bio_err, "DEBUG: unique_subject = \"%s\"\n", p);
 | 
							BIO_printf(bio_err, "DEBUG: unique_subject = \"%s\"\n", p);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		switch(*p)
 | 
							db_attr.unique_subject = parse_yesno(p,1);
 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
		case 'f': /* false */
 | 
					 | 
				
			||||||
		case 'F': /* FALSE */
 | 
					 | 
				
			||||||
		case 'n': /* no */
 | 
					 | 
				
			||||||
		case 'N': /* NO */
 | 
					 | 
				
			||||||
			db_attr.unique_subject = 0;
 | 
					 | 
				
			||||||
			break;
 | 
					 | 
				
			||||||
		case 't': /* true */
 | 
					 | 
				
			||||||
		case 'T': /* TRUE */
 | 
					 | 
				
			||||||
		case 'y': /* yes */
 | 
					 | 
				
			||||||
		case 'Y': /* YES */
 | 
					 | 
				
			||||||
		default:
 | 
					 | 
				
			||||||
			db_attr.unique_subject = 1;
 | 
					 | 
				
			||||||
			break;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		ERR_clear_error();
 | 
							ERR_clear_error();
 | 
				
			||||||
@@ -699,7 +719,7 @@ bad:
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/*****************************************************************/
 | 
						/*****************************************************************/
 | 
				
			||||||
	/* we definitely need a public key, so let's get it */
 | 
						/* we definitely need a private key, so let's get it */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((keyfile == NULL) && ((keyfile=NCONF_get_string(conf,
 | 
						if ((keyfile == NULL) && ((keyfile=NCONF_get_string(conf,
 | 
				
			||||||
		section,ENV_PRIVATE_KEY)) == NULL))
 | 
							section,ENV_PRIVATE_KEY)) == NULL))
 | 
				
			||||||
@@ -727,22 +747,27 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	/*****************************************************************/
 | 
						/*****************************************************************/
 | 
				
			||||||
	/* we need a certificate */
 | 
						/* we need a certificate */
 | 
				
			||||||
	if ((certfile == NULL) && ((certfile=NCONF_get_string(conf,
 | 
						if (!selfsign || spkac_file || ss_cert_file || gencrl)
 | 
				
			||||||
		section,ENV_CERTIFICATE)) == NULL))
 | 
					 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		lookup_fail(section,ENV_CERTIFICATE);
 | 
							if ((certfile == NULL)
 | 
				
			||||||
		goto err;
 | 
								&& ((certfile=NCONF_get_string(conf,
 | 
				
			||||||
		}
 | 
									     section,ENV_CERTIFICATE)) == NULL))
 | 
				
			||||||
	x509=load_cert(bio_err, certfile, FORMAT_PEM, NULL, e,
 | 
								{
 | 
				
			||||||
		"CA certificate");
 | 
								lookup_fail(section,ENV_CERTIFICATE);
 | 
				
			||||||
	if (x509 == NULL)
 | 
								goto err;
 | 
				
			||||||
		goto err;
 | 
								}
 | 
				
			||||||
 | 
							x509=load_cert(bio_err, certfile, FORMAT_PEM, NULL, e,
 | 
				
			||||||
 | 
								"CA certificate");
 | 
				
			||||||
 | 
							if (x509 == NULL)
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!X509_check_private_key(x509,pkey))
 | 
							if (!X509_check_private_key(x509,pkey))
 | 
				
			||||||
		{
 | 
								{
 | 
				
			||||||
		BIO_printf(bio_err,"CA certificate and CA private key do not match\n");
 | 
								BIO_printf(bio_err,"CA certificate and CA private key do not match\n");
 | 
				
			||||||
		goto err;
 | 
								goto err;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
						if (!selfsign) x509p = x509;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	f=NCONF_get_string(conf,BASE_SECTION,ENV_PRESERVE);
 | 
						f=NCONF_get_string(conf,BASE_SECTION,ENV_PRESERVE);
 | 
				
			||||||
	if (f == NULL)
 | 
						if (f == NULL)
 | 
				
			||||||
@@ -832,8 +857,8 @@ bad:
 | 
				
			|||||||
			perror(outdir);
 | 
								perror(outdir);
 | 
				
			||||||
			goto err;
 | 
								goto err;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
#ifdef S_IFDIR
 | 
					#ifdef S_ISDIR
 | 
				
			||||||
		if (!(sb.st_mode & S_IFDIR))
 | 
							if (!S_ISDIR(sb.st_mode))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"%s need to be a directory\n",outdir);
 | 
								BIO_printf(bio_err,"%s need to be a directory\n",outdir);
 | 
				
			||||||
			perror(outdir);
 | 
								perror(outdir);
 | 
				
			||||||
@@ -856,7 +881,7 @@ bad:
 | 
				
			|||||||
	/* Lets check some fields */
 | 
						/* Lets check some fields */
 | 
				
			||||||
	for (i=0; i<sk_num(db->db->data); i++)
 | 
						for (i=0; i<sk_num(db->db->data); i++)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		pp=(char **)sk_value(db->db->data,i);
 | 
							pp=(const char **)sk_value(db->db->data,i);
 | 
				
			||||||
		if ((pp[DB_type][0] != DB_TYPE_REV) &&
 | 
							if ((pp[DB_type][0] != DB_TYPE_REV) &&
 | 
				
			||||||
			(pp[DB_rev_date][0] != '\0'))
 | 
								(pp[DB_rev_date][0] != '\0'))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -943,7 +968,6 @@ bad:
 | 
				
			|||||||
			if (verbose) BIO_printf(bio_err,
 | 
								if (verbose) BIO_printf(bio_err,
 | 
				
			||||||
				"Done. %d entries marked as expired\n",i); 
 | 
									"Done. %d entries marked as expired\n",i); 
 | 
				
			||||||
	      		}
 | 
						      		}
 | 
				
			||||||
			goto err;
 | 
					 | 
				
			||||||
	  	}
 | 
						  	}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 	/*****************************************************************/
 | 
					 	/*****************************************************************/
 | 
				
			||||||
@@ -1133,7 +1157,7 @@ bad:
 | 
				
			|||||||
			{
 | 
								{
 | 
				
			||||||
			total++;
 | 
								total++;
 | 
				
			||||||
			j=certify_spkac(&x,spkac_file,pkey,x509,dgst,attribs,db,
 | 
								j=certify_spkac(&x,spkac_file,pkey,x509,dgst,attribs,db,
 | 
				
			||||||
				serial,subj,email_dn,startdate,enddate,days,extensions,
 | 
									serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,extensions,
 | 
				
			||||||
				conf,verbose,certopt,nameopt,default_op,ext_copy);
 | 
									conf,verbose,certopt,nameopt,default_op,ext_copy);
 | 
				
			||||||
			if (j < 0) goto err;
 | 
								if (j < 0) goto err;
 | 
				
			||||||
			if (j > 0)
 | 
								if (j > 0)
 | 
				
			||||||
@@ -1157,7 +1181,7 @@ bad:
 | 
				
			|||||||
			{
 | 
								{
 | 
				
			||||||
			total++;
 | 
								total++;
 | 
				
			||||||
			j=certify_cert(&x,ss_cert_file,pkey,x509,dgst,attribs,
 | 
								j=certify_cert(&x,ss_cert_file,pkey,x509,dgst,attribs,
 | 
				
			||||||
				db,serial,subj,email_dn,startdate,enddate,days,batch,
 | 
									db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
 | 
				
			||||||
				extensions,conf,verbose, certopt, nameopt,
 | 
									extensions,conf,verbose, certopt, nameopt,
 | 
				
			||||||
				default_op, ext_copy, e);
 | 
									default_op, ext_copy, e);
 | 
				
			||||||
			if (j < 0) goto err;
 | 
								if (j < 0) goto err;
 | 
				
			||||||
@@ -1176,10 +1200,10 @@ bad:
 | 
				
			|||||||
		if (infile != NULL)
 | 
							if (infile != NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			total++;
 | 
								total++;
 | 
				
			||||||
			j=certify(&x,infile,pkey,x509,dgst,attribs,db,
 | 
								j=certify(&x,infile,pkey,x509p,dgst,attribs,db,
 | 
				
			||||||
				serial,subj,email_dn,startdate,enddate,days,batch,
 | 
									serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
 | 
				
			||||||
				extensions,conf,verbose, certopt, nameopt,
 | 
									extensions,conf,verbose, certopt, nameopt,
 | 
				
			||||||
				default_op, ext_copy);
 | 
									default_op, ext_copy, selfsign);
 | 
				
			||||||
			if (j < 0) goto err;
 | 
								if (j < 0) goto err;
 | 
				
			||||||
			if (j > 0)
 | 
								if (j > 0)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
@@ -1196,10 +1220,10 @@ bad:
 | 
				
			|||||||
		for (i=0; i<argc; i++)
 | 
							for (i=0; i<argc; i++)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			total++;
 | 
								total++;
 | 
				
			||||||
			j=certify(&x,argv[i],pkey,x509,dgst,attribs,db,
 | 
								j=certify(&x,argv[i],pkey,x509p,dgst,attribs,db,
 | 
				
			||||||
				serial,subj,email_dn,startdate,enddate,days,batch,
 | 
									serial,subj,chtype,multirdn,email_dn,startdate,enddate,days,batch,
 | 
				
			||||||
				extensions,conf,verbose, certopt, nameopt,
 | 
									extensions,conf,verbose, certopt, nameopt,
 | 
				
			||||||
				default_op, ext_copy);
 | 
									default_op, ext_copy, selfsign);
 | 
				
			||||||
			if (j < 0) goto err;
 | 
								if (j < 0) goto err;
 | 
				
			||||||
			if (j > 0)
 | 
								if (j > 0)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
@@ -1224,7 +1248,12 @@ bad:
 | 
				
			|||||||
				BIO_printf(bio_err,"\n%d out of %d certificate requests certified, commit? [y/n]",total_done,total);
 | 
									BIO_printf(bio_err,"\n%d out of %d certificate requests certified, commit? [y/n]",total_done,total);
 | 
				
			||||||
				(void)BIO_flush(bio_err);
 | 
									(void)BIO_flush(bio_err);
 | 
				
			||||||
				buf[0][0]='\0';
 | 
									buf[0][0]='\0';
 | 
				
			||||||
				fgets(buf[0],10,stdin);
 | 
									if (!fgets(buf[0],10,stdin))
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										BIO_printf(bio_err,"CERTIFICATION CANCELED: I/O error\n"); 
 | 
				
			||||||
 | 
										ret=0;
 | 
				
			||||||
 | 
										goto err;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
				if ((buf[0][0] != 'y') && (buf[0][0] != 'Y'))
 | 
									if ((buf[0][0] != 'y') && (buf[0][0] != 'Y'))
 | 
				
			||||||
					{
 | 
										{
 | 
				
			||||||
					BIO_printf(bio_err,"CERTIFICATION CANCELED\n"); 
 | 
										BIO_printf(bio_err,"CERTIFICATION CANCELED\n"); 
 | 
				
			||||||
@@ -1250,7 +1279,7 @@ bad:
 | 
				
			|||||||
			x=sk_X509_value(cert_sk,i);
 | 
								x=sk_X509_value(cert_sk,i);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			j=x->cert_info->serialNumber->length;
 | 
								j=x->cert_info->serialNumber->length;
 | 
				
			||||||
			p=(char *)x->cert_info->serialNumber->data;
 | 
								p=(const char *)x->cert_info->serialNumber->data;
 | 
				
			||||||
			
 | 
								
 | 
				
			||||||
			if(strlen(outdir) >= (size_t)(j ? BSIZE-j*2-6 : BSIZE-8))
 | 
								if(strlen(outdir) >= (size_t)(j ? BSIZE-j*2-6 : BSIZE-8))
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
@@ -1371,7 +1400,7 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		for (i=0; i<sk_num(db->db->data); i++)
 | 
							for (i=0; i<sk_num(db->db->data); i++)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			pp=(char **)sk_value(db->db->data,i);
 | 
								pp=(const char **)sk_value(db->db->data,i);
 | 
				
			||||||
			if (pp[DB_type][0] == DB_TYPE_REV)
 | 
								if (pp[DB_type][0] == DB_TYPE_REV)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				if ((r=X509_REVOKED_new()) == NULL) goto err;
 | 
									if ((r=X509_REVOKED_new()) == NULL) goto err;
 | 
				
			||||||
@@ -1400,6 +1429,11 @@ bad:
 | 
				
			|||||||
#ifndef OPENSSL_NO_DSA
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
		if (pkey->type == EVP_PKEY_DSA) 
 | 
							if (pkey->type == EVP_PKEY_DSA) 
 | 
				
			||||||
			dgst=EVP_dss1();
 | 
								dgst=EVP_dss1();
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
							if (pkey->type == EVP_PKEY_EC)
 | 
				
			||||||
 | 
								dgst=EVP_ecdsa();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/* Add any extensions asked for */
 | 
							/* Add any extensions asked for */
 | 
				
			||||||
@@ -1487,25 +1521,26 @@ err:
 | 
				
			|||||||
	BN_free(serial);
 | 
						BN_free(serial);
 | 
				
			||||||
	free_index(db);
 | 
						free_index(db);
 | 
				
			||||||
	EVP_PKEY_free(pkey);
 | 
						EVP_PKEY_free(pkey);
 | 
				
			||||||
	X509_free(x509);
 | 
						if (x509) X509_free(x509);
 | 
				
			||||||
	X509_CRL_free(crl);
 | 
						X509_CRL_free(crl);
 | 
				
			||||||
	NCONF_free(conf);
 | 
						NCONF_free(conf);
 | 
				
			||||||
 | 
						NCONF_free(extconf);
 | 
				
			||||||
	OBJ_cleanup();
 | 
						OBJ_cleanup();
 | 
				
			||||||
	apps_shutdown();
 | 
						apps_shutdown();
 | 
				
			||||||
	OPENSSL_EXIT(ret);
 | 
						OPENSSL_EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void lookup_fail(char *name, char *tag)
 | 
					static void lookup_fail(const char *name, const char *tag)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	BIO_printf(bio_err,"variable lookup failed for %s::%s\n",name,tag);
 | 
						BIO_printf(bio_err,"variable lookup failed for %s::%s\n",name,tag);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
					static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
				
			||||||
	     const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
						     const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
				
			||||||
	     BIGNUM *serial, char *subj, int email_dn, char *startdate, char *enddate,
 | 
						     BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
 | 
				
			||||||
	     long days, int batch, char *ext_sect, CONF *lconf, int verbose,
 | 
						     long days, int batch, char *ext_sect, CONF *lconf, int verbose,
 | 
				
			||||||
	     unsigned long certopt, unsigned long nameopt, int default_op,
 | 
						     unsigned long certopt, unsigned long nameopt, int default_op,
 | 
				
			||||||
	     int ext_copy)
 | 
						     int ext_copy, int selfsign)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	X509_REQ *req=NULL;
 | 
						X509_REQ *req=NULL;
 | 
				
			||||||
	BIO *in=NULL;
 | 
						BIO *in=NULL;
 | 
				
			||||||
@@ -1530,6 +1565,12 @@ static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_err,"Check that the request matches the signature\n");
 | 
						BIO_printf(bio_err,"Check that the request matches the signature\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (selfsign && !X509_REQ_check_private_key(req,pkey))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"Certificate request and CA private key do not match\n");
 | 
				
			||||||
 | 
							ok=0;
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	if ((pktmp=X509_REQ_get_pubkey(req)) == NULL)
 | 
						if ((pktmp=X509_REQ_get_pubkey(req)) == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"error unpacking public key\n");
 | 
							BIO_printf(bio_err,"error unpacking public key\n");
 | 
				
			||||||
@@ -1541,20 +1582,22 @@ static int certify(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
				
			|||||||
		{
 | 
							{
 | 
				
			||||||
		ok=0;
 | 
							ok=0;
 | 
				
			||||||
		BIO_printf(bio_err,"Signature verification problems....\n");
 | 
							BIO_printf(bio_err,"Signature verification problems....\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (i == 0)
 | 
						if (i == 0)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		ok=0;
 | 
							ok=0;
 | 
				
			||||||
		BIO_printf(bio_err,"Signature did not match the certificate request\n");
 | 
							BIO_printf(bio_err,"Signature did not match the certificate request\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		BIO_printf(bio_err,"Signature ok\n");
 | 
							BIO_printf(bio_err,"Signature ok\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj, email_dn,
 | 
						ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,chtype,multirdn, email_dn,
 | 
				
			||||||
		startdate,enddate,days,batch,verbose,req,ext_sect,lconf,
 | 
							startdate,enddate,days,batch,verbose,req,ext_sect,lconf,
 | 
				
			||||||
		certopt, nameopt, default_op, ext_copy);
 | 
							certopt, nameopt, default_op, ext_copy, selfsign);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	if (req != NULL) X509_REQ_free(req);
 | 
						if (req != NULL) X509_REQ_free(req);
 | 
				
			||||||
@@ -1564,7 +1607,7 @@ err:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
					static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
				
			||||||
	     const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
						     const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
				
			||||||
	     BIGNUM *serial, char *subj, int email_dn, char *startdate, char *enddate,
 | 
						     BIGNUM *serial, char *subj, unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
 | 
				
			||||||
	     long days, int batch, char *ext_sect, CONF *lconf, int verbose,
 | 
						     long days, int batch, char *ext_sect, CONF *lconf, int verbose,
 | 
				
			||||||
	     unsigned long certopt, unsigned long nameopt, int default_op,
 | 
						     unsigned long certopt, unsigned long nameopt, int default_op,
 | 
				
			||||||
	     int ext_copy, ENGINE *e)
 | 
						     int ext_copy, ENGINE *e)
 | 
				
			||||||
@@ -1606,9 +1649,9 @@ static int certify_cert(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
				
			|||||||
	if ((rreq=X509_to_X509_REQ(req,NULL,EVP_md5())) == NULL)
 | 
						if ((rreq=X509_to_X509_REQ(req,NULL,EVP_md5())) == NULL)
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,email_dn,startdate,enddate,
 | 
						ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,
 | 
				
			||||||
		days,batch,verbose,rreq,ext_sect,lconf, certopt, nameopt, default_op,
 | 
							days,batch,verbose,rreq,ext_sect,lconf, certopt, nameopt, default_op,
 | 
				
			||||||
		ext_copy);
 | 
							ext_copy, 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	if (rreq != NULL) X509_REQ_free(rreq);
 | 
						if (rreq != NULL) X509_REQ_free(rreq);
 | 
				
			||||||
@@ -1618,10 +1661,11 @@ err:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
 | 
					static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
 | 
				
			||||||
	     STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,
 | 
						     STACK_OF(CONF_VALUE) *policy, CA_DB *db, BIGNUM *serial, char *subj,
 | 
				
			||||||
 | 
						     unsigned long chtype, int multirdn,
 | 
				
			||||||
	     int email_dn, char *startdate, char *enddate, long days, int batch,
 | 
						     int email_dn, char *startdate, char *enddate, long days, int batch,
 | 
				
			||||||
	     int verbose, X509_REQ *req, char *ext_sect, CONF *lconf,
 | 
						     int verbose, X509_REQ *req, char *ext_sect, CONF *lconf,
 | 
				
			||||||
	     unsigned long certopt, unsigned long nameopt, int default_op,
 | 
						     unsigned long certopt, unsigned long nameopt, int default_op,
 | 
				
			||||||
	     int ext_copy)
 | 
						     int ext_copy, int selfsign)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	X509_NAME *name=NULL,*CAname=NULL,*subject=NULL, *dn_subject=NULL;
 | 
						X509_NAME *name=NULL,*CAname=NULL,*subject=NULL, *dn_subject=NULL;
 | 
				
			||||||
	ASN1_UTCTIME *tm,*tmptm;
 | 
						ASN1_UTCTIME *tm,*tmptm;
 | 
				
			||||||
@@ -1633,7 +1677,7 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
 | 
				
			|||||||
	X509_NAME_ENTRY *tne,*push;
 | 
						X509_NAME_ENTRY *tne,*push;
 | 
				
			||||||
	EVP_PKEY *pktmp;
 | 
						EVP_PKEY *pktmp;
 | 
				
			||||||
	int ok= -1,i,j,last,nid;
 | 
						int ok= -1,i,j,last,nid;
 | 
				
			||||||
	char *p;
 | 
						const char *p;
 | 
				
			||||||
	CONF_VALUE *cv;
 | 
						CONF_VALUE *cv;
 | 
				
			||||||
	char *row[DB_NUMBER],**rrow=NULL,**irow=NULL;
 | 
						char *row[DB_NUMBER],**rrow=NULL,**irow=NULL;
 | 
				
			||||||
	char buf[25];
 | 
						char buf[25];
 | 
				
			||||||
@@ -1650,7 +1694,7 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (subj)
 | 
						if (subj)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		X509_NAME *n = do_subject(subj, MBSTRING_ASC);
 | 
							X509_NAME *n = parse_name(subj, chtype, multirdn);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (!n)
 | 
							if (!n)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -1725,7 +1769,10 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* take a copy of the issuer name before we mess with it. */
 | 
						/* take a copy of the issuer name before we mess with it. */
 | 
				
			||||||
	CAname=X509_NAME_dup(x509->cert_info->subject);
 | 
						if (selfsign)
 | 
				
			||||||
 | 
							CAname=X509_NAME_dup(name);
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							CAname=X509_NAME_dup(x509->cert_info->subject);
 | 
				
			||||||
	if (CAname == NULL) goto err;
 | 
						if (CAname == NULL) goto err;
 | 
				
			||||||
	str=str2=NULL;
 | 
						str=str2=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1937,8 +1984,16 @@ again2:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (BN_to_ASN1_INTEGER(serial,ci->serialNumber) == NULL)
 | 
						if (BN_to_ASN1_INTEGER(serial,ci->serialNumber) == NULL)
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
	if (!X509_set_issuer_name(ret,X509_get_subject_name(x509)))
 | 
						if (selfsign)
 | 
				
			||||||
		goto err;
 | 
							{
 | 
				
			||||||
 | 
							if (!X509_set_issuer_name(ret,subject))
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!X509_set_issuer_name(ret,X509_get_subject_name(x509)))
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (strcmp(startdate,"today") == 0)
 | 
						if (strcmp(startdate,"today") == 0)
 | 
				
			||||||
		X509_gmtime_adj(X509_get_notBefore(ret),0);
 | 
							X509_gmtime_adj(X509_get_notBefore(ret),0);
 | 
				
			||||||
@@ -1973,7 +2028,10 @@ again2:
 | 
				
			|||||||
		ci->extensions = NULL;
 | 
							ci->extensions = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/* Initialize the context structure */
 | 
							/* Initialize the context structure */
 | 
				
			||||||
		X509V3_set_ctx(&ctx, x509, ret, req, NULL, 0);
 | 
							if (selfsign)
 | 
				
			||||||
 | 
								X509V3_set_ctx(&ctx, ret, ret, req, NULL, 0);
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								X509V3_set_ctx(&ctx, x509, ret, req, NULL, 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (extconf)
 | 
							if (extconf)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -2039,8 +2097,8 @@ again2:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_err,"Certificate is to be certified until ");
 | 
						BIO_printf(bio_err,"Certificate is to be certified until ");
 | 
				
			||||||
	ASN1_UTCTIME_print(bio_err,X509_get_notAfter(ret));
 | 
						ASN1_TIME_print(bio_err,X509_get_notAfter(ret));
 | 
				
			||||||
	if (days) BIO_printf(bio_err," (%d days)",days);
 | 
						if (days) BIO_printf(bio_err," (%ld days)",days);
 | 
				
			||||||
	BIO_printf(bio_err, "\n");
 | 
						BIO_printf(bio_err, "\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!batch)
 | 
						if (!batch)
 | 
				
			||||||
@@ -2049,7 +2107,12 @@ again2:
 | 
				
			|||||||
		BIO_printf(bio_err,"Sign the certificate? [y/n]:");
 | 
							BIO_printf(bio_err,"Sign the certificate? [y/n]:");
 | 
				
			||||||
		(void)BIO_flush(bio_err);
 | 
							(void)BIO_flush(bio_err);
 | 
				
			||||||
		buf[0]='\0';
 | 
							buf[0]='\0';
 | 
				
			||||||
		fgets(buf,sizeof(buf)-1,stdin);
 | 
							if (!fgets(buf,sizeof(buf)-1,stdin))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"CERTIFICATE WILL NOT BE CERTIFIED: I/O error\n");
 | 
				
			||||||
 | 
								ok=0;
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		if (!((buf[0] == 'y') || (buf[0] == 'Y')))
 | 
							if (!((buf[0] == 'y') || (buf[0] == 'Y')))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"CERTIFICATE WILL NOT BE CERTIFIED\n");
 | 
								BIO_printf(bio_err,"CERTIFICATE WILL NOT BE CERTIFIED\n");
 | 
				
			||||||
@@ -2067,6 +2130,16 @@ again2:
 | 
				
			|||||||
		EVP_PKEY_copy_parameters(pktmp,pkey);
 | 
							EVP_PKEY_copy_parameters(pktmp,pkey);
 | 
				
			||||||
	EVP_PKEY_free(pktmp);
 | 
						EVP_PKEY_free(pktmp);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
						if (pkey->type == EVP_PKEY_EC)
 | 
				
			||||||
 | 
							dgst = EVP_ecdsa();
 | 
				
			||||||
 | 
						pktmp = X509_get_pubkey(ret);
 | 
				
			||||||
 | 
						if (EVP_PKEY_missing_parameters(pktmp) &&
 | 
				
			||||||
 | 
							!EVP_PKEY_missing_parameters(pkey))
 | 
				
			||||||
 | 
							EVP_PKEY_copy_parameters(pktmp, pkey);
 | 
				
			||||||
 | 
						EVP_PKEY_free(pktmp);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!X509_sign(ret,pkey,dgst))
 | 
						if (!X509_sign(ret,pkey,dgst))
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
@@ -2163,7 +2236,7 @@ static void write_new_certificate(BIO *bp, X509 *x, int output_der, int notext)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
					static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
				
			||||||
	     const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
						     const EVP_MD *dgst, STACK_OF(CONF_VALUE) *policy, CA_DB *db,
 | 
				
			||||||
	     BIGNUM *serial, char *subj, int email_dn, char *startdate, char *enddate,
 | 
						     BIGNUM *serial, char *subj,unsigned long chtype, int multirdn, int email_dn, char *startdate, char *enddate,
 | 
				
			||||||
	     long days, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt,
 | 
						     long days, char *ext_sect, CONF *lconf, int verbose, unsigned long certopt,
 | 
				
			||||||
	     unsigned long nameopt, int default_op, int ext_copy)
 | 
						     unsigned long nameopt, int default_op, int ext_copy)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
@@ -2255,25 +2328,9 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
				
			|||||||
			continue;
 | 
								continue;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/*
 | 
							if (!X509_NAME_add_entry_by_NID(n, nid, chtype,
 | 
				
			||||||
		if ((nid == NID_pkcs9_emailAddress) && (email_dn == 0))
 | 
									(unsigned char *)buf, -1, -1, 0))
 | 
				
			||||||
			continue;
 | 
					 | 
				
			||||||
		*/
 | 
					 | 
				
			||||||
		
 | 
					 | 
				
			||||||
		j=ASN1_PRINTABLE_type((unsigned char *)buf,-1);
 | 
					 | 
				
			||||||
		if (fix_data(nid, &j) == 0)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err,
 | 
					 | 
				
			||||||
				"invalid characters in string %s\n",buf);
 | 
					 | 
				
			||||||
			goto err;
 | 
								goto err;
 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if ((ne=X509_NAME_ENTRY_create_by_NID(&ne,nid,j,
 | 
					 | 
				
			||||||
			(unsigned char *)buf,
 | 
					 | 
				
			||||||
			strlen(buf))) == NULL)
 | 
					 | 
				
			||||||
			goto err;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if (!X509_NAME_add_entry(n,ne,-1, 0)) goto err;
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (spki == NULL)
 | 
						if (spki == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -2304,9 +2361,9 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	X509_REQ_set_pubkey(req,pktmp);
 | 
						X509_REQ_set_pubkey(req,pktmp);
 | 
				
			||||||
	EVP_PKEY_free(pktmp);
 | 
						EVP_PKEY_free(pktmp);
 | 
				
			||||||
	ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,email_dn,startdate,enddate,
 | 
						ok=do_body(xret,pkey,x509,dgst,policy,db,serial,subj,chtype,multirdn,email_dn,startdate,enddate,
 | 
				
			||||||
		   days,1,verbose,req,ext_sect,lconf, certopt, nameopt, default_op,
 | 
							   days,1,verbose,req,ext_sect,lconf, certopt, nameopt, default_op,
 | 
				
			||||||
			ext_copy);
 | 
								ext_copy, 0);
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	if (req != NULL) X509_REQ_free(req);
 | 
						if (req != NULL) X509_REQ_free(req);
 | 
				
			||||||
	if (parms != NULL) CONF_free(parms);
 | 
						if (parms != NULL) CONF_free(parms);
 | 
				
			||||||
@@ -2316,29 +2373,17 @@ err:
 | 
				
			|||||||
	return(ok);
 | 
						return(ok);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int fix_data(int nid, int *type)
 | 
					static int check_time_format(const char *str)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	if (nid == NID_pkcs9_emailAddress)
 | 
						ASN1_TIME tm;
 | 
				
			||||||
		*type=V_ASN1_IA5STRING;
 | 
					 | 
				
			||||||
	if ((nid == NID_commonName) && (*type == V_ASN1_IA5STRING))
 | 
					 | 
				
			||||||
		*type=V_ASN1_T61STRING;
 | 
					 | 
				
			||||||
	if ((nid == NID_pkcs9_challengePassword) && (*type == V_ASN1_IA5STRING))
 | 
					 | 
				
			||||||
		*type=V_ASN1_T61STRING;
 | 
					 | 
				
			||||||
	if ((nid == NID_pkcs9_unstructuredName) && (*type == V_ASN1_T61STRING))
 | 
					 | 
				
			||||||
		return(0);
 | 
					 | 
				
			||||||
	if (nid == NID_pkcs9_unstructuredName)
 | 
					 | 
				
			||||||
		*type=V_ASN1_IA5STRING;
 | 
					 | 
				
			||||||
	return(1);
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
static int check_time_format(char *str)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	ASN1_UTCTIME tm;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	tm.data=(unsigned char *)str;
 | 
						tm.data=(unsigned char *)str;
 | 
				
			||||||
	tm.length=strlen(str);
 | 
						tm.length=strlen(str);
 | 
				
			||||||
	tm.type=V_ASN1_UTCTIME;
 | 
						tm.type=V_ASN1_UTCTIME;
 | 
				
			||||||
	return(ASN1_UTCTIME_check(&tm));
 | 
						if (ASN1_TIME_check(&tm))
 | 
				
			||||||
 | 
							return 1;
 | 
				
			||||||
 | 
						tm.type=V_ASN1_GENERALIZEDTIME;
 | 
				
			||||||
 | 
						return ASN1_TIME_check(&tm);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
 | 
					static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
 | 
				
			||||||
@@ -2617,7 +2662,7 @@ err:
 | 
				
			|||||||
	return (cnt);
 | 
						return (cnt);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static char *crl_reasons[] = {
 | 
					static const char *crl_reasons[] = {
 | 
				
			||||||
	/* CRL reason strings */
 | 
						/* CRL reason strings */
 | 
				
			||||||
	"unspecified",
 | 
						"unspecified",
 | 
				
			||||||
	"keyCompromise",
 | 
						"keyCompromise",
 | 
				
			||||||
@@ -2645,7 +2690,8 @@ static char *crl_reasons[] = {
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
char *make_revocation_str(int rev_type, char *rev_arg)
 | 
					char *make_revocation_str(int rev_type, char *rev_arg)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char *reason = NULL, *other = NULL, *str;
 | 
						char *other = NULL, *str;
 | 
				
			||||||
 | 
						const char *reason = NULL;
 | 
				
			||||||
	ASN1_OBJECT *otmp;
 | 
						ASN1_OBJECT *otmp;
 | 
				
			||||||
	ASN1_UTCTIME *revtm = NULL;
 | 
						ASN1_UTCTIME *revtm = NULL;
 | 
				
			||||||
	int i;
 | 
						int i;
 | 
				
			||||||
@@ -2707,6 +2753,9 @@ char *make_revocation_str(int rev_type, char *rev_arg)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	revtm = X509_gmtime_adj(NULL, 0);
 | 
						revtm = X509_gmtime_adj(NULL, 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!revtm)
 | 
				
			||||||
 | 
							return NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	i = revtm->length + 1;
 | 
						i = revtm->length + 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (reason) i += strlen(reason) + 1;
 | 
						if (reason) i += strlen(reason) + 1;
 | 
				
			||||||
@@ -2739,7 +2788,7 @@ char *make_revocation_str(int rev_type, char *rev_arg)
 | 
				
			|||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int make_revoked(X509_REVOKED *rev, char *str)
 | 
					int make_revoked(X509_REVOKED *rev, const char *str)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char *tmp = NULL;
 | 
						char *tmp = NULL;
 | 
				
			||||||
	int reason_code = -1;
 | 
						int reason_code = -1;
 | 
				
			||||||
@@ -2793,129 +2842,6 @@ int make_revoked(X509_REVOKED *rev, char *str)
 | 
				
			|||||||
	return ret;
 | 
						return ret;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*
 | 
					 | 
				
			||||||
 * subject is expected to be in the format /type0=value0/type1=value1/type2=...
 | 
					 | 
				
			||||||
 * where characters may be escaped by \
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
X509_NAME *do_subject(char *subject, long chtype)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	size_t buflen = strlen(subject)+1; /* to copy the types and values into. due to escaping, the copy can only become shorter */
 | 
					 | 
				
			||||||
	char *buf = OPENSSL_malloc(buflen);
 | 
					 | 
				
			||||||
	size_t max_ne = buflen / 2 + 1; /* maximum number of name elements */
 | 
					 | 
				
			||||||
	char **ne_types = OPENSSL_malloc(max_ne * sizeof (char *));
 | 
					 | 
				
			||||||
	char **ne_values = OPENSSL_malloc(max_ne * sizeof (char *));
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	char *sp = subject, *bp = buf;
 | 
					 | 
				
			||||||
	int i, ne_num = 0;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	X509_NAME *n = NULL;
 | 
					 | 
				
			||||||
	int nid;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (!buf || !ne_types || !ne_values)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
		BIO_printf(bio_err, "malloc error\n");
 | 
					 | 
				
			||||||
		goto error;
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (*subject != '/')
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
		BIO_printf(bio_err, "Subject does not start with '/'.\n");
 | 
					 | 
				
			||||||
		goto error;
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	sp++; /* skip leading / */
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	while (*sp)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		/* collect type */
 | 
					 | 
				
			||||||
		ne_types[ne_num] = bp;
 | 
					 | 
				
			||||||
		while (*sp)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			if (*sp == '\\') /* is there anything to escape in the type...? */
 | 
					 | 
				
			||||||
				{
 | 
					 | 
				
			||||||
				if (*++sp)
 | 
					 | 
				
			||||||
					*bp++ = *sp++;
 | 
					 | 
				
			||||||
				else
 | 
					 | 
				
			||||||
					{
 | 
					 | 
				
			||||||
					BIO_printf(bio_err, "escape character at end of string\n");
 | 
					 | 
				
			||||||
					goto error;
 | 
					 | 
				
			||||||
					}
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			else if (*sp == '=')
 | 
					 | 
				
			||||||
				{
 | 
					 | 
				
			||||||
				sp++;
 | 
					 | 
				
			||||||
				*bp++ = '\0';
 | 
					 | 
				
			||||||
				break;
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			else
 | 
					 | 
				
			||||||
				*bp++ = *sp++;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		if (!*sp)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err, "end of string encountered while processing type of subject name element #%d\n", ne_num);
 | 
					 | 
				
			||||||
			goto error;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		ne_values[ne_num] = bp;
 | 
					 | 
				
			||||||
		while (*sp)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			if (*sp == '\\')
 | 
					 | 
				
			||||||
				{
 | 
					 | 
				
			||||||
				if (*++sp)
 | 
					 | 
				
			||||||
					*bp++ = *sp++;
 | 
					 | 
				
			||||||
				else
 | 
					 | 
				
			||||||
					{
 | 
					 | 
				
			||||||
					BIO_printf(bio_err, "escape character at end of string\n");
 | 
					 | 
				
			||||||
					goto error;
 | 
					 | 
				
			||||||
					}
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			else if (*sp == '/')
 | 
					 | 
				
			||||||
				{
 | 
					 | 
				
			||||||
				sp++;
 | 
					 | 
				
			||||||
				break;
 | 
					 | 
				
			||||||
				}
 | 
					 | 
				
			||||||
			else
 | 
					 | 
				
			||||||
				*bp++ = *sp++;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		*bp++ = '\0';
 | 
					 | 
				
			||||||
		ne_num++;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (!(n = X509_NAME_new()))
 | 
					 | 
				
			||||||
		goto error;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	for (i = 0; i < ne_num; i++)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		if ((nid=OBJ_txt2nid(ne_types[i])) == NID_undef)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err, "Subject Attribute %s has no known NID, skipped\n", ne_types[i]);
 | 
					 | 
				
			||||||
			continue;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if (!*ne_values[i])
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err, "No value provided for Subject Attribute %s, skipped\n", ne_types[i]);
 | 
					 | 
				
			||||||
			continue;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if (!X509_NAME_add_entry_by_NID(n, nid, chtype, (unsigned char*)ne_values[i], -1,-1,0))
 | 
					 | 
				
			||||||
			goto error;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	OPENSSL_free(ne_values);
 | 
					 | 
				
			||||||
	OPENSSL_free(ne_types);
 | 
					 | 
				
			||||||
	OPENSSL_free(buf);
 | 
					 | 
				
			||||||
	return n;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
error:
 | 
					 | 
				
			||||||
	X509_NAME_free(n);
 | 
					 | 
				
			||||||
	if (ne_values)
 | 
					 | 
				
			||||||
		OPENSSL_free(ne_values);
 | 
					 | 
				
			||||||
	if (ne_types)
 | 
					 | 
				
			||||||
		OPENSSL_free(ne_types);
 | 
					 | 
				
			||||||
	if (buf)
 | 
					 | 
				
			||||||
		OPENSSL_free(buf);
 | 
					 | 
				
			||||||
	return NULL;
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str)
 | 
					int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char buf[25],*pbuf, *p;
 | 
						char buf[25],*pbuf, *p;
 | 
				
			||||||
@@ -2942,25 +2868,35 @@ int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str)
 | 
				
			|||||||
	p=(char *)str->data;
 | 
						p=(char *)str->data;
 | 
				
			||||||
	for (j=str->length; j>0; j--)
 | 
						for (j=str->length; j>0; j--)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
 | 
							if ((*p >= 0x20) && (*p <= 0x7e))
 | 
				
			||||||
 | 
								BIO_printf(bp,"%c",os_toebcdic[*p]);
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
		if ((*p >= ' ') && (*p <= '~'))
 | 
							if ((*p >= ' ') && (*p <= '~'))
 | 
				
			||||||
			BIO_printf(bp,"%c",*p);
 | 
								BIO_printf(bp,"%c",*p);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
		else if (*p & 0x80)
 | 
							else if (*p & 0x80)
 | 
				
			||||||
			BIO_printf(bp,"\\0x%02X",*p);
 | 
								BIO_printf(bp,"\\0x%02X",*p);
 | 
				
			||||||
		else if ((unsigned char)*p == 0xf7)
 | 
							else if ((unsigned char)*p == 0xf7)
 | 
				
			||||||
			BIO_printf(bp,"^?");
 | 
								BIO_printf(bp,"^?");
 | 
				
			||||||
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
 | 
							else	BIO_printf(bp,"^%c",os_toebcdic[*p+0x40]);
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
		else	BIO_printf(bp,"^%c",*p+'@');
 | 
							else	BIO_printf(bp,"^%c",*p+'@');
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
		p++;
 | 
							p++;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	BIO_printf(bp,"'\n");
 | 
						BIO_printf(bp,"'\n");
 | 
				
			||||||
	return 1;
 | 
						return 1;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold, ASN1_GENERALIZEDTIME **pinvtm, char *str)
 | 
					int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold, ASN1_GENERALIZEDTIME **pinvtm, const char *str)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char *tmp = NULL;
 | 
						char *tmp = NULL;
 | 
				
			||||||
	char *rtime_str, *reason_str = NULL, *arg_str = NULL, *p;
 | 
						char *rtime_str, *reason_str = NULL, *arg_str = NULL, *p;
 | 
				
			||||||
	int reason_code = -1;
 | 
						int reason_code = -1;
 | 
				
			||||||
	int i, ret = 0;
 | 
						int ret = 0;
 | 
				
			||||||
 | 
						unsigned int i;
 | 
				
			||||||
	ASN1_OBJECT *hold = NULL;
 | 
						ASN1_OBJECT *hold = NULL;
 | 
				
			||||||
	ASN1_GENERALIZEDTIME *comp_time = NULL;
 | 
						ASN1_GENERALIZEDTIME *comp_time = NULL;
 | 
				
			||||||
	tmp = BUF_strdup(str);
 | 
						tmp = BUF_strdup(str);
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -69,7 +69,7 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	ciphers_main
 | 
					#define PROG	ciphers_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static char *ciphers_usage[]={
 | 
					static const char *ciphers_usage[]={
 | 
				
			||||||
"usage: ciphers args\n",
 | 
					"usage: ciphers args\n",
 | 
				
			||||||
" -v          - verbose mode, a textual listing of the ciphers in SSLeay\n",
 | 
					" -v          - verbose mode, a textual listing of the ciphers in SSLeay\n",
 | 
				
			||||||
" -ssl2       - SSL2 mode\n",
 | 
					" -ssl2       - SSL2 mode\n",
 | 
				
			||||||
@@ -84,7 +84,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	{
 | 
						{
 | 
				
			||||||
	int ret=1,i;
 | 
						int ret=1,i;
 | 
				
			||||||
	int verbose=0;
 | 
						int verbose=0;
 | 
				
			||||||
	char **pp;
 | 
						const char **pp;
 | 
				
			||||||
	const char *p;
 | 
						const char *p;
 | 
				
			||||||
	int badops=0;
 | 
						int badops=0;
 | 
				
			||||||
	SSL_CTX *ctx=NULL;
 | 
						SSL_CTX *ctx=NULL;
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										1351
									
								
								apps/cms.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1351
									
								
								apps/cms.c
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										27
									
								
								apps/crl.c
									
									
									
									
									
								
							
							
						
						
									
										27
									
								
								apps/crl.c
									
									
									
									
									
								
							@@ -72,7 +72,7 @@
 | 
				
			|||||||
#undef POSTFIX
 | 
					#undef POSTFIX
 | 
				
			||||||
#define	POSTFIX	".rvk"
 | 
					#define	POSTFIX	".rvk"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static char *crl_usage[]={
 | 
					static const char *crl_usage[]={
 | 
				
			||||||
"usage: crl args\n",
 | 
					"usage: crl args\n",
 | 
				
			||||||
"\n",
 | 
					"\n",
 | 
				
			||||||
" -inform arg     - input format - default PEM (DER or PEM)\n",
 | 
					" -inform arg     - input format - default PEM (DER or PEM)\n",
 | 
				
			||||||
@@ -85,6 +85,7 @@ static char *crl_usage[]={
 | 
				
			|||||||
" -issuer         - print issuer DN\n",
 | 
					" -issuer         - print issuer DN\n",
 | 
				
			||||||
" -lastupdate     - lastUpdate field\n",
 | 
					" -lastupdate     - lastUpdate field\n",
 | 
				
			||||||
" -nextupdate     - nextUpdate field\n",
 | 
					" -nextupdate     - nextUpdate field\n",
 | 
				
			||||||
 | 
					" -crlnumber      - print CRL number\n",
 | 
				
			||||||
" -noout          - no CRL output\n",
 | 
					" -noout          - no CRL output\n",
 | 
				
			||||||
" -CAfile  name   - verify CRL using certificates in file \"name\"\n",
 | 
					" -CAfile  name   - verify CRL using certificates in file \"name\"\n",
 | 
				
			||||||
" -CApath  dir    - verify CRL using certificates in \"dir\"\n",
 | 
					" -CApath  dir    - verify CRL using certificates in \"dir\"\n",
 | 
				
			||||||
@@ -107,15 +108,15 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	int informat,outformat;
 | 
						int informat,outformat;
 | 
				
			||||||
	char *infile=NULL,*outfile=NULL;
 | 
						char *infile=NULL,*outfile=NULL;
 | 
				
			||||||
	int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
 | 
						int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
 | 
				
			||||||
	int fingerprint = 0;
 | 
						int fingerprint = 0, crlnumber = 0;
 | 
				
			||||||
	char **pp;
 | 
						const char **pp;
 | 
				
			||||||
	X509_STORE *store = NULL;
 | 
						X509_STORE *store = NULL;
 | 
				
			||||||
	X509_STORE_CTX ctx;
 | 
						X509_STORE_CTX ctx;
 | 
				
			||||||
	X509_LOOKUP *lookup = NULL;
 | 
						X509_LOOKUP *lookup = NULL;
 | 
				
			||||||
	X509_OBJECT xobj;
 | 
						X509_OBJECT xobj;
 | 
				
			||||||
	EVP_PKEY *pkey;
 | 
						EVP_PKEY *pkey;
 | 
				
			||||||
	int do_ver = 0;
 | 
						int do_ver = 0;
 | 
				
			||||||
	const EVP_MD *md_alg,*digest=EVP_md5();
 | 
						const EVP_MD *md_alg,*digest=EVP_sha1();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -206,6 +207,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			noout= ++num;
 | 
								noout= ++num;
 | 
				
			||||||
		else if (strcmp(*argv,"-fingerprint") == 0)
 | 
							else if (strcmp(*argv,"-fingerprint") == 0)
 | 
				
			||||||
			fingerprint= ++num;
 | 
								fingerprint= ++num;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-crlnumber") == 0)
 | 
				
			||||||
 | 
								crlnumber= ++num;
 | 
				
			||||||
		else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
 | 
							else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			/* ok */
 | 
								/* ok */
 | 
				
			||||||
@@ -281,7 +284,21 @@ bad:
 | 
				
			|||||||
				{
 | 
									{
 | 
				
			||||||
				print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), nmflag);
 | 
									print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), nmflag);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
								if (crlnumber == i)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									ASN1_INTEGER *crlnum;
 | 
				
			||||||
 | 
									crlnum = X509_CRL_get_ext_d2i(x, NID_crl_number,
 | 
				
			||||||
 | 
												      NULL, NULL);
 | 
				
			||||||
 | 
									BIO_printf(bio_out,"crlNumber=");
 | 
				
			||||||
 | 
									if (crlnum)
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										i2a_ASN1_INTEGER(bio_out, crlnum);
 | 
				
			||||||
 | 
										ASN1_INTEGER_free(crlnum);
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									else
 | 
				
			||||||
 | 
										BIO_puts(bio_out, "<NONE>");
 | 
				
			||||||
 | 
									BIO_printf(bio_out,"\n");
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			if (hash == i)
 | 
								if (hash == i)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(bio_out,"%08lx\n",
 | 
									BIO_printf(bio_out,"%08lx\n",
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -142,7 +142,13 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			if(!certflst) certflst = sk_new_null();
 | 
								if(!certflst) certflst = sk_new_null();
 | 
				
			||||||
			sk_push(certflst,*(++argv));
 | 
								if (!certflst)
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
								if (!sk_push(certflst,*(++argv)))
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									sk_free(certflst);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										84
									
								
								apps/dgst.c
									
									
									
									
									
								
							
							
						
						
									
										84
									
								
								apps/dgst.c
									
									
									
									
									
								
							@@ -74,8 +74,6 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	dgst_main
 | 
					#define PROG	dgst_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static HMAC_CTX hmac_ctx;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
					int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
				
			||||||
	  EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
 | 
						  EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
 | 
				
			||||||
	  const char *file,BIO *bmd,const char *hmac_key, int non_fips_allow);
 | 
						  const char *file,BIO *bmd,const char *hmac_key, int non_fips_allow);
 | 
				
			||||||
@@ -86,7 +84,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	{
 | 
						{
 | 
				
			||||||
	ENGINE *e = NULL;
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	unsigned char *buf=NULL;
 | 
						unsigned char *buf=NULL;
 | 
				
			||||||
	int i,err=0;
 | 
						int i,err=1;
 | 
				
			||||||
	const EVP_MD *md=NULL,*m;
 | 
						const EVP_MD *md=NULL,*m;
 | 
				
			||||||
	BIO *in=NULL,*inp;
 | 
						BIO *in=NULL,*inp;
 | 
				
			||||||
	BIO *bmd=NULL;
 | 
						BIO *bmd=NULL;
 | 
				
			||||||
@@ -103,6 +101,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	EVP_PKEY *sigkey = NULL;
 | 
						EVP_PKEY *sigkey = NULL;
 | 
				
			||||||
	unsigned char *sigbuf = NULL;
 | 
						unsigned char *sigbuf = NULL;
 | 
				
			||||||
	int siglen = 0;
 | 
						int siglen = 0;
 | 
				
			||||||
 | 
						unsigned int sig_flags = 0;
 | 
				
			||||||
	char *passargin = NULL, *passin = NULL;
 | 
						char *passargin = NULL, *passin = NULL;
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
	char *engine=NULL;
 | 
						char *engine=NULL;
 | 
				
			||||||
@@ -111,7 +110,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	int non_fips_allow = 0;
 | 
						int non_fips_allow = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					ERR_load_crypto_strings();
 | 
				
			||||||
	if ((buf=(unsigned char *)OPENSSL_malloc(BUFSIZE)) == NULL)
 | 
						if ((buf=(unsigned char *)OPENSSL_malloc(BUFSIZE)) == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"out of memory\n");
 | 
							BIO_printf(bio_err,"out of memory\n");
 | 
				
			||||||
@@ -170,6 +169,27 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			keyfile=*(++argv);
 | 
								keyfile=*(++argv);
 | 
				
			||||||
			do_verify = 1;
 | 
								do_verify = 1;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-x931") == 0)
 | 
				
			||||||
 | 
								sig_flags = EVP_MD_CTX_FLAG_PAD_X931;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-pss_saltlen") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								int saltlen;
 | 
				
			||||||
 | 
								if (--argc < 1) break;
 | 
				
			||||||
 | 
								saltlen=atoi(*(++argv));
 | 
				
			||||||
 | 
								if (saltlen == -1)
 | 
				
			||||||
 | 
									sig_flags = EVP_MD_CTX_FLAG_PSS_MREC;
 | 
				
			||||||
 | 
								else if (saltlen == -2)
 | 
				
			||||||
 | 
									sig_flags = EVP_MD_CTX_FLAG_PSS_MDLEN;
 | 
				
			||||||
 | 
								else if (saltlen < -2 || saltlen >= 0xFFFE)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(bio_err, "Invalid PSS salt length %d\n", saltlen);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									sig_flags = saltlen;
 | 
				
			||||||
 | 
								sig_flags <<= 16;
 | 
				
			||||||
 | 
								sig_flags |= EVP_MD_CTX_FLAG_PAD_PSS;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-signature") == 0)
 | 
							else if (strcmp(*argv,"-signature") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) break;
 | 
								if (--argc < 1) break;
 | 
				
			||||||
@@ -195,6 +215,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			debug=1;
 | 
								debug=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-non-fips-allow") == 0)
 | 
							else if (strcmp(*argv,"-non-fips-allow") == 0)
 | 
				
			||||||
			non_fips_allow=1;
 | 
								non_fips_allow=1;
 | 
				
			||||||
 | 
							else if (!strcmp(*argv,"-fips-fingerprint"))
 | 
				
			||||||
 | 
								hmac_key = "etaonrishdlcupfm";
 | 
				
			||||||
		else if (!strcmp(*argv,"-hmac"))
 | 
							else if (!strcmp(*argv,"-hmac"))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1)
 | 
								if (--argc < 1)
 | 
				
			||||||
@@ -232,30 +254,45 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		BIO_printf(bio_err,"-keyform arg    key file format (PEM or ENGINE)\n");
 | 
							BIO_printf(bio_err,"-keyform arg    key file format (PEM or ENGINE)\n");
 | 
				
			||||||
		BIO_printf(bio_err,"-signature file signature to verify\n");
 | 
							BIO_printf(bio_err,"-signature file signature to verify\n");
 | 
				
			||||||
		BIO_printf(bio_err,"-binary         output in binary form\n");
 | 
							BIO_printf(bio_err,"-binary         output in binary form\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-hmac key       create hashed MAC with key\n");
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
		BIO_printf(bio_err,"-engine e       use engine e, possibly a hardware device.\n");
 | 
							BIO_printf(bio_err,"-engine e       use engine e, possibly a hardware device.\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm (default)\n",
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm (default)\n",
 | 
				
			||||||
			LN_md5,LN_md5);
 | 
								LN_md5,LN_md5);
 | 
				
			||||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
 | 
				
			||||||
			LN_md4,LN_md4);
 | 
								LN_md4,LN_md4);
 | 
				
			||||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
 | 
				
			||||||
			LN_md2,LN_md2);
 | 
								LN_md2,LN_md2);
 | 
				
			||||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
					#ifndef OPENSSL_NO_SHA
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
 | 
				
			||||||
			LN_sha1,LN_sha1);
 | 
								LN_sha1,LN_sha1);
 | 
				
			||||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
 | 
				
			||||||
			LN_sha,LN_sha);
 | 
								LN_sha,LN_sha);
 | 
				
			||||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
					#ifndef OPENSSL_NO_SHA256
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
 | 
				
			||||||
 | 
								LN_sha224,LN_sha224);
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
 | 
				
			||||||
 | 
								LN_sha256,LN_sha256);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SHA512
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
 | 
				
			||||||
 | 
								LN_sha384,LN_sha384);
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
 | 
				
			||||||
 | 
								LN_sha512,LN_sha512);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
 | 
				
			||||||
			LN_mdc2,LN_mdc2);
 | 
								LN_mdc2,LN_mdc2);
 | 
				
			||||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
							BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
 | 
				
			||||||
			LN_ripemd160,LN_ripemd160);
 | 
								LN_ripemd160,LN_ripemd160);
 | 
				
			||||||
		err=1;
 | 
							err=1;
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
	e = setup_engine(bio_err, engine, 0);
 | 
					        e = setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
@@ -264,7 +301,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_set_callback(in,BIO_debug_callback);
 | 
							BIO_set_callback(in,BIO_debug_callback);
 | 
				
			||||||
		/* needed for windows 3.1 */
 | 
							/* needed for windows 3.1 */
 | 
				
			||||||
		BIO_set_callback_arg(in,bio_err);
 | 
							BIO_set_callback_arg(in,(char *)bio_err);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
 | 
						if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
 | 
				
			||||||
@@ -352,11 +389,17 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		EVP_MD_CTX_set_flags(md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
 | 
							EVP_MD_CTX_set_flags(md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (sig_flags)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							EVP_MD_CTX *md_ctx;
 | 
				
			||||||
 | 
							BIO_get_md_ctx(bmd,&md_ctx);
 | 
				
			||||||
 | 
							EVP_MD_CTX_set_flags(md_ctx, sig_flags);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* we use md as a filter, reading from 'in' */
 | 
						/* we use md as a filter, reading from 'in' */
 | 
				
			||||||
	if (!BIO_set_md(bmd,md))
 | 
						if (!BIO_set_md(bmd,md))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err, "Error setting digest %s\n",
 | 
							BIO_printf(bio_err, "Error setting digest %s\n", pname);
 | 
				
			||||||
							EVP_MD_name(md));
 | 
					 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -367,11 +410,12 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
							BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
				
			||||||
		err=do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf,
 | 
							err=do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf,
 | 
				
			||||||
			  siglen,"","(stdin)",bmd,hmac_key, non_fips_allow);
 | 
								  siglen,"","(stdin)",bmd,hmac_key,non_fips_allow);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		name=OBJ_nid2sn(md->type);
 | 
							name=OBJ_nid2sn(md->type);
 | 
				
			||||||
 | 
							err = 0;
 | 
				
			||||||
		for (i=0; i<argc; i++)
 | 
							for (i=0; i<argc; i++)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			char *tmp,*tofree=NULL;
 | 
								char *tmp,*tofree=NULL;
 | 
				
			||||||
@@ -420,11 +464,12 @@ end:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
					int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
				
			||||||
	  EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
 | 
						  EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
 | 
				
			||||||
	  const char *file,BIO *bmd,const char *hmac_key, int non_fips_allow)
 | 
						  const char *file,BIO *bmd,const char *hmac_key,int non_fips_allow)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	unsigned int len;
 | 
						unsigned int len;
 | 
				
			||||||
	int i;
 | 
						int i;
 | 
				
			||||||
	EVP_MD_CTX *md_ctx;
 | 
						EVP_MD_CTX *md_ctx;
 | 
				
			||||||
 | 
						HMAC_CTX hmac_ctx;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (hmac_key)
 | 
						if (hmac_key)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -432,9 +477,6 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		BIO_get_md(bmd,&md);
 | 
							BIO_get_md(bmd,&md);
 | 
				
			||||||
		HMAC_CTX_init(&hmac_ctx);
 | 
							HMAC_CTX_init(&hmac_ctx);
 | 
				
			||||||
		if (non_fips_allow)
 | 
					 | 
				
			||||||
			HMAC_CTX_set_flags(&hmac_ctx,
 | 
					 | 
				
			||||||
					EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
 | 
					 | 
				
			||||||
		HMAC_Init_ex(&hmac_ctx,hmac_key,strlen(hmac_key),md, NULL);
 | 
							HMAC_Init_ex(&hmac_ctx,hmac_key,strlen(hmac_key),md, NULL);
 | 
				
			||||||
		BIO_get_md_ctx(bmd,&md_ctx);
 | 
							BIO_get_md_ctx(bmd,&md_ctx);
 | 
				
			||||||
		BIO_set_md_ctx(bmd,&hmac_ctx.md_ctx);
 | 
							BIO_set_md_ctx(bmd,&hmac_ctx.md_ctx);
 | 
				
			||||||
@@ -493,7 +535,7 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
				
			|||||||
	else 
 | 
						else 
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_write(out,title,strlen(title));
 | 
							BIO_write(out,title,strlen(title));
 | 
				
			||||||
		for (i=0; (unsigned int)i<len; i++)
 | 
							for (i=0; i<(int)len; i++)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (sep && (i != 0))
 | 
								if (sep && (i != 0))
 | 
				
			||||||
				BIO_printf(out, ":");
 | 
									BIO_printf(out, ":");
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -57,6 +57,7 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>	/* for OPENSSL_NO_DH */
 | 
				
			||||||
#ifndef OPENSSL_NO_DH
 | 
					#ifndef OPENSSL_NO_DH
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
@@ -87,9 +88,6 @@ int MAIN(int, char **);
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					 | 
				
			||||||
	ENGINE *e = NULL;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	DH *dh=NULL;
 | 
						DH *dh=NULL;
 | 
				
			||||||
	int i,badops=0,text=0;
 | 
						int i,badops=0,text=0;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL;
 | 
						BIO *in=NULL,*out=NULL;
 | 
				
			||||||
@@ -188,7 +186,7 @@ bad:
 | 
				
			|||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -109,6 +109,7 @@
 | 
				
			|||||||
 *
 | 
					 *
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>	/* for OPENSSL_NO_DH */
 | 
				
			||||||
#ifndef OPENSSL_NO_DH
 | 
					#ifndef OPENSSL_NO_DH
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
@@ -142,15 +143,12 @@
 | 
				
			|||||||
 * -C
 | 
					 * -C
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK dh_cb(int p, int n, void *arg);
 | 
					static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int, char **);
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					 | 
				
			||||||
	ENGINE *e = NULL;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	DH *dh=NULL;
 | 
						DH *dh=NULL;
 | 
				
			||||||
	int i,badops=0,text=0;
 | 
						int i,badops=0,text=0;
 | 
				
			||||||
#ifndef OPENSSL_NO_DSA
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
@@ -269,7 +267,7 @@ bad:
 | 
				
			|||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (g && !num)
 | 
						if (g && !num)
 | 
				
			||||||
@@ -294,6 +292,8 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if(num) {
 | 
						if(num) {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							BN_GENCB cb;
 | 
				
			||||||
 | 
							BN_GENCB_set(&cb, dh_cb, bio_err);
 | 
				
			||||||
		if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
 | 
							if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
								BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
				
			||||||
@@ -305,12 +305,13 @@ bad:
 | 
				
			|||||||
#ifndef OPENSSL_NO_DSA
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
		if (dsaparam)
 | 
							if (dsaparam)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			DSA *dsa;
 | 
								DSA *dsa = DSA_new();
 | 
				
			||||||
			
 | 
								
 | 
				
			||||||
			BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
 | 
								BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
 | 
				
			||||||
			dsa = DSA_generate_parameters(num, NULL, 0, NULL, NULL, dh_cb, bio_err);
 | 
								if(!dsa || !DSA_generate_parameters_ex(dsa, num,
 | 
				
			||||||
			if (dsa == NULL)
 | 
											NULL, 0, NULL, NULL, &cb))
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
 | 
									if(dsa) DSA_free(dsa);
 | 
				
			||||||
				ERR_print_errors(bio_err);
 | 
									ERR_print_errors(bio_err);
 | 
				
			||||||
				goto end;
 | 
									goto end;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
@@ -326,11 +327,10 @@ bad:
 | 
				
			|||||||
		else
 | 
							else
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
 | 
								dh = DH_new();
 | 
				
			||||||
			BIO_printf(bio_err,"Generating DH parameters, %d bit long safe prime, generator %d\n",num,g);
 | 
								BIO_printf(bio_err,"Generating DH parameters, %d bit long safe prime, generator %d\n",num,g);
 | 
				
			||||||
			BIO_printf(bio_err,"This is going to take a long time\n");
 | 
								BIO_printf(bio_err,"This is going to take a long time\n");
 | 
				
			||||||
			dh=DH_generate_parameters(num,g,dh_cb,bio_err);
 | 
								if(!dh || !DH_generate_parameters_ex(dh, num, g, &cb))
 | 
				
			||||||
			
 | 
					 | 
				
			||||||
			if (dh == NULL)
 | 
					 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				ERR_print_errors(bio_err);
 | 
									ERR_print_errors(bio_err);
 | 
				
			||||||
				goto end;
 | 
									goto end;
 | 
				
			||||||
@@ -534,7 +534,7 @@ end:
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* dh_cb is identical to dsa_cb in apps/dsaparam.c */
 | 
					/* dh_cb is identical to dsa_cb in apps/dsaparam.c */
 | 
				
			||||||
static void MS_CALLBACK dh_cb(int p, int n, void *arg)
 | 
					static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char c='*';
 | 
						char c='*';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -542,11 +542,12 @@ static void MS_CALLBACK dh_cb(int p, int n, void *arg)
 | 
				
			|||||||
	if (p == 1) c='+';
 | 
						if (p == 1) c='+';
 | 
				
			||||||
	if (p == 2) c='*';
 | 
						if (p == 2) c='*';
 | 
				
			||||||
	if (p == 3) c='\n';
 | 
						if (p == 3) c='\n';
 | 
				
			||||||
	BIO_write((BIO *)arg,&c,1);
 | 
						BIO_write(cb->arg,&c,1);
 | 
				
			||||||
	(void)BIO_flush((BIO *)arg);
 | 
						(void)BIO_flush(cb->arg);
 | 
				
			||||||
#ifdef LINT
 | 
					#ifdef LINT
 | 
				
			||||||
	p=n;
 | 
						p=n;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										55
									
								
								apps/dsa.c
									
									
									
									
									
								
							
							
						
						
									
										55
									
								
								apps/dsa.c
									
									
									
									
									
								
							@@ -56,6 +56,7 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>	/* for OPENSSL_NO_DSA */
 | 
				
			||||||
#ifndef OPENSSL_NO_DSA
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
@@ -64,10 +65,11 @@
 | 
				
			|||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
#include <openssl/bio.h>
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/dsa.h>
 | 
					 | 
				
			||||||
#include <openssl/evp.h>
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
 | 
					#include <openssl/dsa.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	dsa_main
 | 
					#define PROG	dsa_main
 | 
				
			||||||
@@ -82,6 +84,10 @@
 | 
				
			|||||||
 * -aes128	- encrypt output if PEM format
 | 
					 * -aes128	- encrypt output if PEM format
 | 
				
			||||||
 * -aes192	- encrypt output if PEM format
 | 
					 * -aes192	- encrypt output if PEM format
 | 
				
			||||||
 * -aes256	- encrypt output if PEM format
 | 
					 * -aes256	- encrypt output if PEM format
 | 
				
			||||||
 | 
					 * -camellia128 - encrypt output if PEM format
 | 
				
			||||||
 | 
					 * -camellia192 - encrypt output if PEM format
 | 
				
			||||||
 | 
					 * -camellia256 - encrypt output if PEM format
 | 
				
			||||||
 | 
					 * -seed        - encrypt output if PEM format
 | 
				
			||||||
 * -text	- print a text version
 | 
					 * -text	- print a text version
 | 
				
			||||||
 * -modulus	- print the DSA public key
 | 
					 * -modulus	- print the DSA public key
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
@@ -90,9 +96,7 @@ int MAIN(int, char **);
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					 | 
				
			||||||
	ENGINE *e = NULL;
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	int ret=1;
 | 
						int ret=1;
 | 
				
			||||||
	DSA *dsa=NULL;
 | 
						DSA *dsa=NULL;
 | 
				
			||||||
	int i,badops=0;
 | 
						int i,badops=0;
 | 
				
			||||||
@@ -209,6 +213,13 @@ bad:
 | 
				
			|||||||
#ifndef OPENSSL_NO_AES
 | 
					#ifndef OPENSSL_NO_AES
 | 
				
			||||||
		BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
							BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
				
			||||||
		BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
							BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -camellia128, -camellia192, -camellia256\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                 encrypt PEM output with cbc camellia\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -seed           encrypt PEM output with cbc seed\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		BIO_printf(bio_err," -text           print the key in text\n");
 | 
							BIO_printf(bio_err," -text           print the key in text\n");
 | 
				
			||||||
		BIO_printf(bio_err," -noout          don't print key out\n");
 | 
							BIO_printf(bio_err," -noout          don't print key out\n");
 | 
				
			||||||
@@ -227,37 +238,27 @@ bad:
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
					 | 
				
			||||||
	out=BIO_new(BIO_s_file());
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
	if ((in == NULL) || (out == NULL))
 | 
						if (out == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (infile == NULL)
 | 
					 | 
				
			||||||
		BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		if (BIO_read_filename(in,infile) <= 0)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			perror(infile);
 | 
					 | 
				
			||||||
			goto end;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	BIO_printf(bio_err,"read DSA key\n");
 | 
						BIO_printf(bio_err,"read DSA key\n");
 | 
				
			||||||
	if	(informat == FORMAT_ASN1) {
 | 
						{
 | 
				
			||||||
		if(pubin) dsa=d2i_DSA_PUBKEY_bio(in,NULL);
 | 
							EVP_PKEY	*pkey;
 | 
				
			||||||
		else dsa=d2i_DSAPrivateKey_bio(in,NULL);
 | 
							if (pubin)
 | 
				
			||||||
	} else if (informat == FORMAT_PEM) {
 | 
								pkey = load_pubkey(bio_err, infile, informat, 1,
 | 
				
			||||||
		if(pubin) dsa=PEM_read_bio_DSA_PUBKEY(in,NULL, NULL, NULL);
 | 
									passin, e, "Public Key");
 | 
				
			||||||
		else dsa=PEM_read_bio_DSAPrivateKey(in,NULL,NULL,passin);
 | 
							else
 | 
				
			||||||
	} else
 | 
								pkey = load_key(bio_err, infile, informat, 1,
 | 
				
			||||||
		{
 | 
									passin, e, "Private Key");
 | 
				
			||||||
		BIO_printf(bio_err,"bad input format specified for key\n");
 | 
					
 | 
				
			||||||
		goto end;
 | 
							if (pkey != NULL)
 | 
				
			||||||
		}
 | 
							dsa = pkey == NULL ? NULL : EVP_PKEY_get1_DSA(pkey);
 | 
				
			||||||
 | 
							EVP_PKEY_free(pkey);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
	if (dsa == NULL)
 | 
						if (dsa == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"unable to load Key\n");
 | 
							BIO_printf(bio_err,"unable to load Key\n");
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										103
									
								
								apps/dsaparam.c
									
									
									
									
									
								
							
							
						
						
									
										103
									
								
								apps/dsaparam.c
									
									
									
									
									
								
							@@ -56,6 +56,13 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>	/* for OPENSSL_NO_DSA */
 | 
				
			||||||
 | 
					/* Until the key-gen callbacks are modified to use newer prototypes, we allow
 | 
				
			||||||
 | 
					 * deprecated functions for openssl-internal code */
 | 
				
			||||||
 | 
					#ifdef OPENSSL_NO_DEPRECATED
 | 
				
			||||||
 | 
					#undef OPENSSL_NO_DEPRECATED
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_DSA
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
#include <assert.h>
 | 
					#include <assert.h>
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
@@ -82,17 +89,28 @@
 | 
				
			|||||||
 * -C
 | 
					 * -C
 | 
				
			||||||
 * -noout
 | 
					 * -noout
 | 
				
			||||||
 * -genkey
 | 
					 * -genkey
 | 
				
			||||||
 | 
					 *  #ifdef GENCB_TEST
 | 
				
			||||||
 | 
					 * -timebomb n  - interrupt keygen after <n> seconds
 | 
				
			||||||
 | 
					 *  #endif
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK dsa_cb(int p, int n, void *arg);
 | 
					#ifdef GENCB_TEST
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int stop_keygen_flag = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void timebomb_sigalarm(int foo)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						stop_keygen_flag = 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int, char **);
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					 | 
				
			||||||
	ENGINE *e = NULL;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	DSA *dsa=NULL;
 | 
						DSA *dsa=NULL;
 | 
				
			||||||
	int i,badops=0,text=0;
 | 
						int i,badops=0,text=0;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL;
 | 
						BIO *in=NULL,*out=NULL;
 | 
				
			||||||
@@ -103,6 +121,9 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
	char *engine=NULL;
 | 
						char *engine=NULL;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifdef GENCB_TEST
 | 
				
			||||||
 | 
						int timebomb=0;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -149,6 +170,13 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			engine = *(++argv);
 | 
								engine = *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifdef GENCB_TEST
 | 
				
			||||||
 | 
							else if(strcmp(*argv, "-timebomb") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								timebomb = atoi(*(++argv));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		else if (strcmp(*argv,"-text") == 0)
 | 
							else if (strcmp(*argv,"-text") == 0)
 | 
				
			||||||
			text=1;
 | 
								text=1;
 | 
				
			||||||
@@ -199,6 +227,9 @@ bad:
 | 
				
			|||||||
		BIO_printf(bio_err," -rand         files to use for random number input\n");
 | 
							BIO_printf(bio_err," -rand         files to use for random number input\n");
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
		BIO_printf(bio_err," -engine e     use engine e, possibly a hardware device.\n");
 | 
							BIO_printf(bio_err," -engine e     use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifdef GENCB_TEST
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -timebomb n   interrupt keygen after <n> seconds\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		BIO_printf(bio_err," number        number of bits to use for generating private key\n");
 | 
							BIO_printf(bio_err," number        number of bits to use for generating private key\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
@@ -244,7 +275,7 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (need_rand)
 | 
						if (need_rand)
 | 
				
			||||||
@@ -257,10 +288,47 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (numbits > 0)
 | 
						if (numbits > 0)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
 | 
							BN_GENCB cb;
 | 
				
			||||||
 | 
							BN_GENCB_set(&cb, dsa_cb, bio_err);
 | 
				
			||||||
		assert(need_rand);
 | 
							assert(need_rand);
 | 
				
			||||||
 | 
							dsa = DSA_new();
 | 
				
			||||||
 | 
							if(!dsa)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"Error allocating DSA object\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
 | 
							BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
 | 
				
			||||||
	        BIO_printf(bio_err,"This could take some time\n");
 | 
						        BIO_printf(bio_err,"This could take some time\n");
 | 
				
			||||||
	        dsa=DSA_generate_parameters(num,NULL,0,NULL,NULL, dsa_cb,bio_err);
 | 
					#ifdef GENCB_TEST
 | 
				
			||||||
 | 
							if(timebomb > 0)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							struct sigaction act;
 | 
				
			||||||
 | 
							act.sa_handler = timebomb_sigalarm;
 | 
				
			||||||
 | 
							act.sa_flags = 0;
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"(though I'll stop it if not done within %d secs)\n",
 | 
				
			||||||
 | 
									timebomb);
 | 
				
			||||||
 | 
							if(sigaction(SIGALRM, &act, NULL) != 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"Error, couldn't set SIGALRM handler\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							alarm(timebomb);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						        if(!DSA_generate_parameters_ex(dsa,num,NULL,0,NULL,NULL, &cb))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
					#ifdef GENCB_TEST
 | 
				
			||||||
 | 
								if(stop_keygen_flag)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(bio_err,"DSA key generation time-stopped\n");
 | 
				
			||||||
 | 
									/* This is an asked-for behaviour! */
 | 
				
			||||||
 | 
									ret = 0;
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"Error, DSA key generation failed\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else if	(informat == FORMAT_ASN1)
 | 
						else if	(informat == FORMAT_ASN1)
 | 
				
			||||||
		dsa=d2i_DSAparams_bio(in,NULL);
 | 
							dsa=d2i_DSAparams_bio(in,NULL);
 | 
				
			||||||
@@ -286,12 +354,10 @@ bad:
 | 
				
			|||||||
	if (C)
 | 
						if (C)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		unsigned char *data;
 | 
							unsigned char *data;
 | 
				
			||||||
		int l,len,bits_p,bits_q,bits_g;
 | 
							int l,len,bits_p;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		len=BN_num_bytes(dsa->p);
 | 
							len=BN_num_bytes(dsa->p);
 | 
				
			||||||
		bits_p=BN_num_bits(dsa->p);
 | 
							bits_p=BN_num_bits(dsa->p);
 | 
				
			||||||
		bits_q=BN_num_bits(dsa->q);
 | 
					 | 
				
			||||||
		bits_g=BN_num_bits(dsa->g);
 | 
					 | 
				
			||||||
		data=(unsigned char *)OPENSSL_malloc(len+20);
 | 
							data=(unsigned char *)OPENSSL_malloc(len+20);
 | 
				
			||||||
		if (data == NULL)
 | 
							if (data == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -385,7 +451,7 @@ end:
 | 
				
			|||||||
	OPENSSL_EXIT(ret);
 | 
						OPENSSL_EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK dsa_cb(int p, int n, void *arg)
 | 
					static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char c='*';
 | 
						char c='*';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -393,10 +459,21 @@ static void MS_CALLBACK dsa_cb(int p, int n, void *arg)
 | 
				
			|||||||
	if (p == 1) c='+';
 | 
						if (p == 1) c='+';
 | 
				
			||||||
	if (p == 2) c='*';
 | 
						if (p == 2) c='*';
 | 
				
			||||||
	if (p == 3) c='\n';
 | 
						if (p == 3) c='\n';
 | 
				
			||||||
	BIO_write(arg,&c,1);
 | 
						BIO_write(cb->arg,&c,1);
 | 
				
			||||||
	(void)BIO_flush(arg);
 | 
						(void)BIO_flush(cb->arg);
 | 
				
			||||||
#ifdef LINT
 | 
					#ifdef LINT
 | 
				
			||||||
	p=n;
 | 
						p=n;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	}
 | 
					#ifdef GENCB_TEST
 | 
				
			||||||
 | 
						if(stop_keygen_flag)
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#else /* !OPENSSL_NO_DSA */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# if PEDANTIC
 | 
				
			||||||
 | 
					static void *dummy=&dummy;
 | 
				
			||||||
 | 
					# endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										400
									
								
								apps/ec.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										400
									
								
								apps/ec.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,400 @@
 | 
				
			|||||||
 | 
					/* apps/ec.c */
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Written by Nils Larsch for the OpenSSL project.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright (c) 1998-2005 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer. 
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in
 | 
				
			||||||
 | 
					 *    the documentation and/or other materials provided with the
 | 
				
			||||||
 | 
					 *    distribution.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this
 | 
				
			||||||
 | 
					 *    software must display the following acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
				
			||||||
 | 
					 *    endorse or promote products derived from this software without
 | 
				
			||||||
 | 
					 *    prior written permission. For written permission, please contact
 | 
				
			||||||
 | 
					 *    openssl-core@openssl.org.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 5. Products derived from this software may not be called "OpenSSL"
 | 
				
			||||||
 | 
					 *    nor may "OpenSSL" appear in their names without prior written
 | 
				
			||||||
 | 
					 *    permission of the OpenSSL Project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 6. Redistributions of any form whatsoever must retain the following
 | 
				
			||||||
 | 
					 *    acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
				
			||||||
 | 
					 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
				
			||||||
 | 
					 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
				
			||||||
 | 
					 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
				
			||||||
 | 
					 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
				
			||||||
 | 
					 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
				
			||||||
 | 
					 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
				
			||||||
 | 
					 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
				
			||||||
 | 
					 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
				
			||||||
 | 
					 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * ====================================================================
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This product includes cryptographic software written by Eric Young
 | 
				
			||||||
 | 
					 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
				
			||||||
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_EC
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <stdlib.h>
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#undef PROG
 | 
				
			||||||
 | 
					#define PROG	ec_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* -inform arg    - input format - default PEM (one of DER, NET or PEM)
 | 
				
			||||||
 | 
					 * -outform arg   - output format - default PEM
 | 
				
			||||||
 | 
					 * -in arg        - input file - default stdin
 | 
				
			||||||
 | 
					 * -out arg       - output file - default stdout
 | 
				
			||||||
 | 
					 * -des           - encrypt output if PEM format with DES in cbc mode
 | 
				
			||||||
 | 
					 * -text          - print a text version
 | 
				
			||||||
 | 
					 * -param_out     - print the elliptic curve parameters
 | 
				
			||||||
 | 
					 * -conv_form arg - specifies the point encoding form
 | 
				
			||||||
 | 
					 * -param_enc arg - specifies the parameter encoding
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						int 	ret = 1;
 | 
				
			||||||
 | 
						EC_KEY 	*eckey = NULL;
 | 
				
			||||||
 | 
						const EC_GROUP *group;
 | 
				
			||||||
 | 
						int 	i, badops = 0;
 | 
				
			||||||
 | 
						const EVP_CIPHER *enc = NULL;
 | 
				
			||||||
 | 
						BIO 	*in = NULL, *out = NULL;
 | 
				
			||||||
 | 
						int 	informat, outformat, text=0, noout=0;
 | 
				
			||||||
 | 
						int  	pubin = 0, pubout = 0, param_out = 0;
 | 
				
			||||||
 | 
						char 	*infile, *outfile, *prog, *engine;
 | 
				
			||||||
 | 
						char 	*passargin = NULL, *passargout = NULL;
 | 
				
			||||||
 | 
						char 	*passin = NULL, *passout = NULL;
 | 
				
			||||||
 | 
						point_conversion_form_t form = POINT_CONVERSION_UNCOMPRESSED;
 | 
				
			||||||
 | 
						int	new_form = 0;
 | 
				
			||||||
 | 
						int	asn1_flag = OPENSSL_EC_NAMED_CURVE;
 | 
				
			||||||
 | 
						int 	new_asn1_flag = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (bio_err == NULL)
 | 
				
			||||||
 | 
							if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
 | 
								BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!load_config(bio_err, NULL))
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						engine = NULL;
 | 
				
			||||||
 | 
						infile = NULL;
 | 
				
			||||||
 | 
						outfile = NULL;
 | 
				
			||||||
 | 
						informat = FORMAT_PEM;
 | 
				
			||||||
 | 
						outformat = FORMAT_PEM;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						prog = argv[0];
 | 
				
			||||||
 | 
						argc--;
 | 
				
			||||||
 | 
						argv++;
 | 
				
			||||||
 | 
						while (argc >= 1)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (strcmp(*argv,"-inform") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								informat=str2fmt(*(++argv));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-outform") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								outformat=str2fmt(*(++argv));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-in") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								infile= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-out") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								outfile= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passin") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargin= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passout") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargout= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-noout") == 0)
 | 
				
			||||||
 | 
								noout = 1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-text") == 0)
 | 
				
			||||||
 | 
								text = 1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-conv_form") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1)
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
								++argv;
 | 
				
			||||||
 | 
								new_form = 1;
 | 
				
			||||||
 | 
								if (strcmp(*argv, "compressed") == 0)
 | 
				
			||||||
 | 
									form = POINT_CONVERSION_COMPRESSED;
 | 
				
			||||||
 | 
								else if (strcmp(*argv, "uncompressed") == 0)
 | 
				
			||||||
 | 
									form = POINT_CONVERSION_UNCOMPRESSED;
 | 
				
			||||||
 | 
								else if (strcmp(*argv, "hybrid") == 0)
 | 
				
			||||||
 | 
									form = POINT_CONVERSION_HYBRID;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-param_enc") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1)
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
								++argv;
 | 
				
			||||||
 | 
								new_asn1_flag = 1;
 | 
				
			||||||
 | 
								if (strcmp(*argv, "named_curve") == 0)
 | 
				
			||||||
 | 
									asn1_flag = OPENSSL_EC_NAMED_CURVE;
 | 
				
			||||||
 | 
								else if (strcmp(*argv, "explicit") == 0)
 | 
				
			||||||
 | 
									asn1_flag = 0;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-param_out") == 0)
 | 
				
			||||||
 | 
								param_out = 1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-pubin") == 0)
 | 
				
			||||||
 | 
								pubin=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-pubout") == 0)
 | 
				
			||||||
 | 
								pubout=1;
 | 
				
			||||||
 | 
							else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "unknown option %s\n", *argv);
 | 
				
			||||||
 | 
								badops=1;
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							argc--;
 | 
				
			||||||
 | 
							argv++;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (badops)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
					bad:
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "where options are\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -inform arg     input format - "
 | 
				
			||||||
 | 
									"DER or PEM\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -outform arg    output format - "
 | 
				
			||||||
 | 
									"DER or PEM\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -in arg         input file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -passin arg     input file pass "
 | 
				
			||||||
 | 
									"phrase source\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -out arg        output file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -passout arg    output file pass "
 | 
				
			||||||
 | 
									"phrase source\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -engine e       use engine e, "
 | 
				
			||||||
 | 
									"possibly a hardware device.\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -des            encrypt PEM output, "
 | 
				
			||||||
 | 
									"instead of 'des' every other \n"
 | 
				
			||||||
 | 
									"                 cipher "
 | 
				
			||||||
 | 
									"supported by OpenSSL can be used\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -text           print the key\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -noout          don't print key out\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -param_out      print the elliptic "
 | 
				
			||||||
 | 
									"curve parameters\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -conv_form arg  specifies the "
 | 
				
			||||||
 | 
									"point conversion form \n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                 possible values:"
 | 
				
			||||||
 | 
									" compressed\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                                 "
 | 
				
			||||||
 | 
									" uncompressed (default)\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                                  "
 | 
				
			||||||
 | 
									" hybrid\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -param_enc arg  specifies the way"
 | 
				
			||||||
 | 
									" the ec parameters are encoded\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                 in the asn1 der "
 | 
				
			||||||
 | 
									"encoding\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                 possible values:"
 | 
				
			||||||
 | 
									" named_curve (default)\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                                  "
 | 
				
			||||||
 | 
									"explicit\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
 | 
					        setup_engine(bio_err, engine, 0);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting passwords\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						in = BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
						out = BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
						if ((in == NULL) || (out == NULL))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (infile == NULL)
 | 
				
			||||||
 | 
							BIO_set_fp(in, stdin, BIO_NOCLOSE);
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (BIO_read_filename(in, infile) <= 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror(infile);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "read EC key\n");
 | 
				
			||||||
 | 
						if (informat == FORMAT_ASN1) 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (pubin) 
 | 
				
			||||||
 | 
								eckey = d2i_EC_PUBKEY_bio(in, NULL);
 | 
				
			||||||
 | 
							else 
 | 
				
			||||||
 | 
								eckey = d2i_ECPrivateKey_bio(in, NULL);
 | 
				
			||||||
 | 
							} 
 | 
				
			||||||
 | 
						else if (informat == FORMAT_PEM) 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (pubin) 
 | 
				
			||||||
 | 
								eckey = PEM_read_bio_EC_PUBKEY(in, NULL, NULL, 
 | 
				
			||||||
 | 
									NULL);
 | 
				
			||||||
 | 
							else 
 | 
				
			||||||
 | 
								eckey = PEM_read_bio_ECPrivateKey(in, NULL, NULL,
 | 
				
			||||||
 | 
									passin);
 | 
				
			||||||
 | 
							} 
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "bad input format specified for key\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (eckey == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"unable to load Key\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_set_fp(out, stdout, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef OPENSSL_SYS_VMS
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
								out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (BIO_write_filename(out, outfile) <= 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror(outfile);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						group = EC_KEY_get0_group(eckey);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (new_form)
 | 
				
			||||||
 | 
							EC_KEY_set_conv_form(eckey, form);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (new_asn1_flag)
 | 
				
			||||||
 | 
							EC_KEY_set_asn1_flag(eckey, asn1_flag);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (text) 
 | 
				
			||||||
 | 
							if (!EC_KEY_print(out, eckey, 0))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror(outfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (noout) 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ret = 0;
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "writing EC key\n");
 | 
				
			||||||
 | 
						if (outformat == FORMAT_ASN1) 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (param_out)
 | 
				
			||||||
 | 
								i = i2d_ECPKParameters_bio(out, group);
 | 
				
			||||||
 | 
							else if (pubin || pubout) 
 | 
				
			||||||
 | 
								i = i2d_EC_PUBKEY_bio(out, eckey);
 | 
				
			||||||
 | 
							else 
 | 
				
			||||||
 | 
								i = i2d_ECPrivateKey_bio(out, eckey);
 | 
				
			||||||
 | 
							} 
 | 
				
			||||||
 | 
						else if (outformat == FORMAT_PEM) 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (param_out)
 | 
				
			||||||
 | 
								i = PEM_write_bio_ECPKParameters(out, group);
 | 
				
			||||||
 | 
							else if (pubin || pubout)
 | 
				
			||||||
 | 
								i = PEM_write_bio_EC_PUBKEY(out, eckey);
 | 
				
			||||||
 | 
							else 
 | 
				
			||||||
 | 
								i = PEM_write_bio_ECPrivateKey(out, eckey, enc,
 | 
				
			||||||
 | 
											NULL, 0, NULL, passout);
 | 
				
			||||||
 | 
							} 
 | 
				
			||||||
 | 
						else 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "bad output format specified for "
 | 
				
			||||||
 | 
								"outfile\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!i)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "unable to write private key\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							ret=0;
 | 
				
			||||||
 | 
					end:
 | 
				
			||||||
 | 
						if (in)
 | 
				
			||||||
 | 
							BIO_free(in);
 | 
				
			||||||
 | 
						if (out)
 | 
				
			||||||
 | 
							BIO_free_all(out);
 | 
				
			||||||
 | 
						if (eckey)
 | 
				
			||||||
 | 
							EC_KEY_free(eckey);
 | 
				
			||||||
 | 
						if (passin)
 | 
				
			||||||
 | 
							OPENSSL_free(passin);
 | 
				
			||||||
 | 
						if (passout)
 | 
				
			||||||
 | 
							OPENSSL_free(passout);
 | 
				
			||||||
 | 
						apps_shutdown();
 | 
				
			||||||
 | 
						OPENSSL_EXIT(ret);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
							
								
								
									
										725
									
								
								apps/ecparam.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										725
									
								
								apps/ecparam.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,725 @@
 | 
				
			|||||||
 | 
					/* apps/ecparam.c */
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * Written by Nils Larsch for the OpenSSL project.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright (c) 1998-2005 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer. 
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in
 | 
				
			||||||
 | 
					 *    the documentation and/or other materials provided with the
 | 
				
			||||||
 | 
					 *    distribution.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this
 | 
				
			||||||
 | 
					 *    software must display the following acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
				
			||||||
 | 
					 *    endorse or promote products derived from this software without
 | 
				
			||||||
 | 
					 *    prior written permission. For written permission, please contact
 | 
				
			||||||
 | 
					 *    openssl-core@openssl.org.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 5. Products derived from this software may not be called "OpenSSL"
 | 
				
			||||||
 | 
					 *    nor may "OpenSSL" appear in their names without prior written
 | 
				
			||||||
 | 
					 *    permission of the OpenSSL Project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 6. Redistributions of any form whatsoever must retain the following
 | 
				
			||||||
 | 
					 *    acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
				
			||||||
 | 
					 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
				
			||||||
 | 
					 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
				
			||||||
 | 
					 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
				
			||||||
 | 
					 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
				
			||||||
 | 
					 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
				
			||||||
 | 
					 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
				
			||||||
 | 
					 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
				
			||||||
 | 
					 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
				
			||||||
 | 
					 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * ====================================================================
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This product includes cryptographic software written by Eric Young
 | 
				
			||||||
 | 
					 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
				
			||||||
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Portions of the attached software ("Contribution") are developed by 
 | 
				
			||||||
 | 
					 * SUN MICROSYSTEMS, INC., and are contributed to the OpenSSL project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * The Contribution is licensed pursuant to the OpenSSL open source
 | 
				
			||||||
 | 
					 * license provided above.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * The elliptic curve binary polynomial software is originally written by 
 | 
				
			||||||
 | 
					 * Sheueling Chang Shantz and Douglas Stebila of Sun Microsystems Laboratories.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_EC
 | 
				
			||||||
 | 
					#include <assert.h>
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <stdlib.h>
 | 
				
			||||||
 | 
					#include <time.h>
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
 | 
					#include <openssl/ec.h>
 | 
				
			||||||
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#undef PROG
 | 
				
			||||||
 | 
					#define PROG	ecparam_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* -inform arg      - input format - default PEM (DER or PEM)
 | 
				
			||||||
 | 
					 * -outform arg     - output format - default PEM
 | 
				
			||||||
 | 
					 * -in  arg         - input file  - default stdin
 | 
				
			||||||
 | 
					 * -out arg         - output file - default stdout
 | 
				
			||||||
 | 
					 * -noout           - do not print the ec parameter
 | 
				
			||||||
 | 
					 * -text            - print the ec parameters in text form
 | 
				
			||||||
 | 
					 * -check           - validate the ec parameters
 | 
				
			||||||
 | 
					 * -C               - print a 'C' function creating the parameters
 | 
				
			||||||
 | 
					 * -name arg        - use the ec parameters with 'short name' name
 | 
				
			||||||
 | 
					 * -list_curves     - prints a list of all currently available curve 'short names'
 | 
				
			||||||
 | 
					 * -conv_form arg   - specifies the point conversion form 
 | 
				
			||||||
 | 
					 *                  - possible values: compressed
 | 
				
			||||||
 | 
					 *                                     uncompressed (default)
 | 
				
			||||||
 | 
					 *                                     hybrid
 | 
				
			||||||
 | 
					 * -param_enc arg   - specifies the way the ec parameters are encoded
 | 
				
			||||||
 | 
					 *                    in the asn1 der encoding
 | 
				
			||||||
 | 
					 *                    possible values: named_curve (default)
 | 
				
			||||||
 | 
					 *                                     explicit
 | 
				
			||||||
 | 
					 * -no_seed         - if 'explicit' parameters are choosen do not use the seed
 | 
				
			||||||
 | 
					 * -genkey          - generate ec key
 | 
				
			||||||
 | 
					 * -rand file       - files to use for random number input
 | 
				
			||||||
 | 
					 * -engine e        - use engine e, possibly a hardware device
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int ecparam_print_var(BIO *,BIGNUM *,const char *,int,unsigned char *);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						EC_GROUP *group = NULL;
 | 
				
			||||||
 | 
						point_conversion_form_t form = POINT_CONVERSION_UNCOMPRESSED; 
 | 
				
			||||||
 | 
						int 	new_form = 0;
 | 
				
			||||||
 | 
						int 	asn1_flag = OPENSSL_EC_NAMED_CURVE;
 | 
				
			||||||
 | 
						int 	new_asn1_flag = 0;
 | 
				
			||||||
 | 
						char 	*curve_name = NULL, *inrand = NULL;
 | 
				
			||||||
 | 
						int	list_curves = 0, no_seed = 0, check = 0,
 | 
				
			||||||
 | 
							badops = 0, text = 0, i, need_rand = 0, genkey = 0;
 | 
				
			||||||
 | 
						char	*infile = NULL, *outfile = NULL, *prog;
 | 
				
			||||||
 | 
						BIO 	*in = NULL, *out = NULL;
 | 
				
			||||||
 | 
						int 	informat, outformat, noout = 0, C = 0, ret = 1;
 | 
				
			||||||
 | 
						char	*engine = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BIGNUM	*ec_p = NULL, *ec_a = NULL, *ec_b = NULL,
 | 
				
			||||||
 | 
							*ec_gen = NULL, *ec_order = NULL, *ec_cofactor = NULL;
 | 
				
			||||||
 | 
						unsigned char *buffer = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (bio_err == NULL)
 | 
				
			||||||
 | 
							if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!load_config(bio_err, NULL))
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						informat=FORMAT_PEM;
 | 
				
			||||||
 | 
						outformat=FORMAT_PEM;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						prog=argv[0];
 | 
				
			||||||
 | 
						argc--;
 | 
				
			||||||
 | 
						argv++;
 | 
				
			||||||
 | 
						while (argc >= 1)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if 	(strcmp(*argv,"-inform") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								informat=str2fmt(*(++argv));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-outform") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								outformat=str2fmt(*(++argv));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-in") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								infile= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-out") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								outfile= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-text") == 0)
 | 
				
			||||||
 | 
								text = 1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-C") == 0)
 | 
				
			||||||
 | 
								C = 1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-check") == 0)
 | 
				
			||||||
 | 
								check = 1;
 | 
				
			||||||
 | 
							else if (strcmp (*argv, "-name") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1)
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
								curve_name = *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-list_curves") == 0)
 | 
				
			||||||
 | 
								list_curves = 1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-conv_form") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1)
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
								++argv;
 | 
				
			||||||
 | 
								new_form = 1;
 | 
				
			||||||
 | 
								if (strcmp(*argv, "compressed") == 0)
 | 
				
			||||||
 | 
									form = POINT_CONVERSION_COMPRESSED;
 | 
				
			||||||
 | 
								else if (strcmp(*argv, "uncompressed") == 0)
 | 
				
			||||||
 | 
									form = POINT_CONVERSION_UNCOMPRESSED;
 | 
				
			||||||
 | 
								else if (strcmp(*argv, "hybrid") == 0)
 | 
				
			||||||
 | 
									form = POINT_CONVERSION_HYBRID;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-param_enc") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1)
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
								++argv;
 | 
				
			||||||
 | 
								new_asn1_flag = 1;
 | 
				
			||||||
 | 
								if (strcmp(*argv, "named_curve") == 0)
 | 
				
			||||||
 | 
									asn1_flag = OPENSSL_EC_NAMED_CURVE;
 | 
				
			||||||
 | 
								else if (strcmp(*argv, "explicit") == 0)
 | 
				
			||||||
 | 
									asn1_flag = 0;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-no_seed") == 0)
 | 
				
			||||||
 | 
								no_seed = 1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-noout") == 0)
 | 
				
			||||||
 | 
								noout=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-genkey") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								genkey=1;
 | 
				
			||||||
 | 
								need_rand=1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv, "-rand") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								inrand= *(++argv);
 | 
				
			||||||
 | 
								need_rand=1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if(strcmp(*argv, "-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine = *(++argv);
 | 
				
			||||||
 | 
								}	
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
				
			||||||
 | 
								badops=1;
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							argc--;
 | 
				
			||||||
 | 
							argv++;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (badops)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
					bad:
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "%s [options] <infile >outfile\n",prog);
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "where options are\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -inform arg       input format - "
 | 
				
			||||||
 | 
									"default PEM (DER or PEM)\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -outform arg      output format - "
 | 
				
			||||||
 | 
									"default PEM\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -in  arg          input file  - "
 | 
				
			||||||
 | 
									"default stdin\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -out arg          output file - "
 | 
				
			||||||
 | 
									"default stdout\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -noout            do not print the "
 | 
				
			||||||
 | 
									"ec parameter\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -text             print the ec "
 | 
				
			||||||
 | 
									"parameters in text form\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -check            validate the ec "
 | 
				
			||||||
 | 
									"parameters\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -C                print a 'C' "
 | 
				
			||||||
 | 
									"function creating the parameters\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -name arg         use the "
 | 
				
			||||||
 | 
									"ec parameters with 'short name' name\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -list_curves      prints a list of "
 | 
				
			||||||
 | 
									"all currently available curve 'short names'\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -conv_form arg    specifies the "
 | 
				
			||||||
 | 
									"point conversion form \n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                   possible values:"
 | 
				
			||||||
 | 
									" compressed\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                                   "
 | 
				
			||||||
 | 
									" uncompressed (default)\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                                   "
 | 
				
			||||||
 | 
									" hybrid\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -param_enc arg    specifies the way"
 | 
				
			||||||
 | 
									" the ec parameters are encoded\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                   in the asn1 der "
 | 
				
			||||||
 | 
									"encoding\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                   possible values:"
 | 
				
			||||||
 | 
									" named_curve (default)\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "                                   "
 | 
				
			||||||
 | 
									" explicit\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -no_seed          if 'explicit'"
 | 
				
			||||||
 | 
									" parameters are choosen do not"
 | 
				
			||||||
 | 
									" use the seed\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -genkey           generate ec"
 | 
				
			||||||
 | 
									" key\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -rand file        files to use for"
 | 
				
			||||||
 | 
									" random number input\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, " -engine e         use engine e, "
 | 
				
			||||||
 | 
									"possibly a hardware device\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
						if ((in == NULL) || (out == NULL))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (infile == NULL)
 | 
				
			||||||
 | 
							BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (BIO_read_filename(in,infile) <= 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror(infile);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef OPENSSL_SYS_VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror(outfile);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
 | 
						setup_engine(bio_err, engine, 0);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (list_curves)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							EC_builtin_curve *curves = NULL;
 | 
				
			||||||
 | 
							size_t crv_len = 0;
 | 
				
			||||||
 | 
							size_t n = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							crv_len = EC_get_builtin_curves(NULL, 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							curves = OPENSSL_malloc((int)(sizeof(EC_builtin_curve) * crv_len));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (curves == NULL)
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (!EC_get_builtin_curves(curves, crv_len))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								OPENSSL_free(curves);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							for (n = 0; n < crv_len; n++)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								const char *comment;
 | 
				
			||||||
 | 
								const char *sname;
 | 
				
			||||||
 | 
								comment = curves[n].comment;
 | 
				
			||||||
 | 
								sname   = OBJ_nid2sn(curves[n].nid);
 | 
				
			||||||
 | 
								if (comment == NULL)
 | 
				
			||||||
 | 
									comment = "CURVE DESCRIPTION NOT AVAILABLE";
 | 
				
			||||||
 | 
								if (sname == NULL)
 | 
				
			||||||
 | 
									sname = "";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								BIO_printf(out, "  %-10s: ", sname);
 | 
				
			||||||
 | 
								BIO_printf(out, "%s\n", comment);
 | 
				
			||||||
 | 
								} 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							OPENSSL_free(curves);
 | 
				
			||||||
 | 
							ret = 0;
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (curve_name != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							int nid;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							/* workaround for the SECG curve names secp192r1
 | 
				
			||||||
 | 
							 * and secp256r1 (which are the same as the curves
 | 
				
			||||||
 | 
							 * prime192v1 and prime256v1 defined in X9.62)
 | 
				
			||||||
 | 
							 */
 | 
				
			||||||
 | 
							if (!strcmp(curve_name, "secp192r1"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "using curve name prime192v1 "
 | 
				
			||||||
 | 
									"instead of secp192r1\n");
 | 
				
			||||||
 | 
								nid = NID_X9_62_prime192v1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp(curve_name, "secp256r1"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "using curve name prime256v1 "
 | 
				
			||||||
 | 
									"instead of secp256r1\n");
 | 
				
			||||||
 | 
								nid = NID_X9_62_prime256v1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								nid = OBJ_sn2nid(curve_name);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
							if (nid == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "unknown curve name (%s)\n", 
 | 
				
			||||||
 | 
									curve_name);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							group = EC_GROUP_new_by_curve_name(nid);
 | 
				
			||||||
 | 
							if (group == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "unable to create curve (%s)\n", 
 | 
				
			||||||
 | 
									curve_name);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							EC_GROUP_set_asn1_flag(group, asn1_flag);
 | 
				
			||||||
 | 
							EC_GROUP_set_point_conversion_form(group, form);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else if (informat == FORMAT_ASN1)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							group = d2i_ECPKParameters_bio(in, NULL);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else if (informat == FORMAT_PEM)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							group = PEM_read_bio_ECPKParameters(in,NULL,NULL,NULL);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "bad input format specified\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (group == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, 
 | 
				
			||||||
 | 
								"unable to load elliptic curve parameters\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (new_form)
 | 
				
			||||||
 | 
							EC_GROUP_set_point_conversion_form(group, form);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (new_asn1_flag)
 | 
				
			||||||
 | 
							EC_GROUP_set_asn1_flag(group, asn1_flag);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (no_seed)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							EC_GROUP_set_seed(group, NULL, 0);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (text)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!ECPKParameters_print(out, group, 0))
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (check)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (group == NULL)
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "no elliptic curve parameters\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "checking elliptic curve parameters: ");
 | 
				
			||||||
 | 
							if (!EC_GROUP_check(group, NULL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "failed\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "ok\n");
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (C)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							size_t	buf_len = 0, tmp_len = 0;
 | 
				
			||||||
 | 
							const EC_POINT *point;
 | 
				
			||||||
 | 
							int	is_prime, len = 0;
 | 
				
			||||||
 | 
							const EC_METHOD *meth = EC_GROUP_method_of(group);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if ((ec_p = BN_new()) == NULL || (ec_a = BN_new()) == NULL ||
 | 
				
			||||||
 | 
							    (ec_b = BN_new()) == NULL || (ec_gen = BN_new()) == NULL ||
 | 
				
			||||||
 | 
							    (ec_order = BN_new()) == NULL || 
 | 
				
			||||||
 | 
							    (ec_cofactor = BN_new()) == NULL )
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror("OPENSSL_malloc");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							is_prime = (EC_METHOD_get_field_type(meth) == 
 | 
				
			||||||
 | 
								NID_X9_62_prime_field);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (is_prime)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (!EC_GROUP_get_curve_GFp(group, ec_p, ec_a,
 | 
				
			||||||
 | 
									ec_b, NULL))
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								/* TODO */
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if ((point = EC_GROUP_get0_generator(group)) == NULL)
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							if (!EC_POINT_point2bn(group, point, 
 | 
				
			||||||
 | 
								EC_GROUP_get_point_conversion_form(group), ec_gen, 
 | 
				
			||||||
 | 
								NULL))
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							if (!EC_GROUP_get_order(group, ec_order, NULL))
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							if (!EC_GROUP_get_cofactor(group, ec_cofactor, NULL))
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (!ec_p || !ec_a || !ec_b || !ec_gen || 
 | 
				
			||||||
 | 
								!ec_order || !ec_cofactor)
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							len = BN_num_bits(ec_order);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if ((tmp_len = (size_t)BN_num_bytes(ec_p)) > buf_len)
 | 
				
			||||||
 | 
								buf_len = tmp_len;
 | 
				
			||||||
 | 
							if ((tmp_len = (size_t)BN_num_bytes(ec_a)) > buf_len)
 | 
				
			||||||
 | 
								buf_len = tmp_len;
 | 
				
			||||||
 | 
							if ((tmp_len = (size_t)BN_num_bytes(ec_b)) > buf_len)
 | 
				
			||||||
 | 
								buf_len = tmp_len;
 | 
				
			||||||
 | 
							if ((tmp_len = (size_t)BN_num_bytes(ec_gen)) > buf_len)
 | 
				
			||||||
 | 
								buf_len = tmp_len;
 | 
				
			||||||
 | 
							if ((tmp_len = (size_t)BN_num_bytes(ec_order)) > buf_len)
 | 
				
			||||||
 | 
								buf_len = tmp_len;
 | 
				
			||||||
 | 
							if ((tmp_len = (size_t)BN_num_bytes(ec_cofactor)) > buf_len)
 | 
				
			||||||
 | 
								buf_len = tmp_len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							buffer = (unsigned char *)OPENSSL_malloc(buf_len);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (buffer == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror("OPENSSL_malloc");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							ecparam_print_var(out, ec_p, "ec_p", len, buffer);
 | 
				
			||||||
 | 
							ecparam_print_var(out, ec_a, "ec_a", len, buffer);
 | 
				
			||||||
 | 
							ecparam_print_var(out, ec_b, "ec_b", len, buffer);
 | 
				
			||||||
 | 
							ecparam_print_var(out, ec_gen, "ec_gen", len, buffer);
 | 
				
			||||||
 | 
							ecparam_print_var(out, ec_order, "ec_order", len, buffer);
 | 
				
			||||||
 | 
							ecparam_print_var(out, ec_cofactor, "ec_cofactor", len, 
 | 
				
			||||||
 | 
								buffer);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							BIO_printf(out, "\n\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							BIO_printf(out, "EC_GROUP *get_ec_group_%d(void)\n\t{\n", len);
 | 
				
			||||||
 | 
							BIO_printf(out, "\tint ok=0;\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tEC_GROUP *group = NULL;\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tEC_POINT *point = NULL;\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tBIGNUM   *tmp_1 = NULL, *tmp_2 = NULL, "
 | 
				
			||||||
 | 
									"*tmp_3 = NULL;\n\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif ((tmp_1 = BN_bin2bn(ec_p_%d, "
 | 
				
			||||||
 | 
									"sizeof(ec_p_%d), NULL)) == NULL)\n\t\t"
 | 
				
			||||||
 | 
									"goto err;\n", len, len);
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif ((tmp_2 = BN_bin2bn(ec_a_%d, "
 | 
				
			||||||
 | 
									"sizeof(ec_a_%d), NULL)) == NULL)\n\t\t"
 | 
				
			||||||
 | 
									"goto err;\n", len, len);
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif ((tmp_3 = BN_bin2bn(ec_b_%d, "
 | 
				
			||||||
 | 
									"sizeof(ec_b_%d), NULL)) == NULL)\n\t\t"
 | 
				
			||||||
 | 
									"goto err;\n", len, len);
 | 
				
			||||||
 | 
							if (is_prime)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(out, "\tif ((group = EC_GROUP_new_curve_"
 | 
				
			||||||
 | 
									"GFp(tmp_1, tmp_2, tmp_3, NULL)) == NULL)"
 | 
				
			||||||
 | 
									"\n\t\tgoto err;\n\n");
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								/* TODO */
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(out, "\t/* build generator */\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif ((tmp_1 = BN_bin2bn(ec_gen_%d, "
 | 
				
			||||||
 | 
									"sizeof(ec_gen_%d), tmp_1)) == NULL)"
 | 
				
			||||||
 | 
									"\n\t\tgoto err;\n", len, len);
 | 
				
			||||||
 | 
							BIO_printf(out, "\tpoint = EC_POINT_bn2point(group, tmp_1, "
 | 
				
			||||||
 | 
									"NULL, NULL);\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif (point == NULL)\n\t\tgoto err;\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif ((tmp_2 = BN_bin2bn(ec_order_%d, "
 | 
				
			||||||
 | 
									"sizeof(ec_order_%d), tmp_2)) == NULL)"
 | 
				
			||||||
 | 
									"\n\t\tgoto err;\n", len, len);
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif ((tmp_3 = BN_bin2bn(ec_cofactor_%d, "
 | 
				
			||||||
 | 
									"sizeof(ec_cofactor_%d), tmp_3)) == NULL)"
 | 
				
			||||||
 | 
									"\n\t\tgoto err;\n", len, len);
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif (!EC_GROUP_set_generator(group, point,"
 | 
				
			||||||
 | 
									" tmp_2, tmp_3))\n\t\tgoto err;\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\n\tok=1;\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "err:\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif (tmp_1)\n\t\tBN_free(tmp_1);\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif (tmp_2)\n\t\tBN_free(tmp_2);\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif (tmp_3)\n\t\tBN_free(tmp_3);\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif (point)\n\t\tEC_POINT_free(point);\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\tif (!ok)\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\t\t{\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\t\tEC_GROUP_free(group);\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\t\tgroup = NULL;\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\t\t}\n");
 | 
				
			||||||
 | 
							BIO_printf(out, "\treturn(group);\n\t}\n");
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!noout)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (outformat == FORMAT_ASN1)
 | 
				
			||||||
 | 
								i = i2d_ECPKParameters_bio(out, group);
 | 
				
			||||||
 | 
							else if (outformat == FORMAT_PEM)
 | 
				
			||||||
 | 
								i = PEM_write_bio_ECPKParameters(out, group);
 | 
				
			||||||
 | 
							else	
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"bad output format specified for"
 | 
				
			||||||
 | 
									" outfile\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (!i)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "unable to write elliptic "
 | 
				
			||||||
 | 
									"curve parameters\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (need_rand)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
				
			||||||
 | 
							if (inrand != NULL)
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
 | 
									app_RAND_load_files(inrand));
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (genkey)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							EC_KEY *eckey = EC_KEY_new();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (eckey == NULL)
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							assert(need_rand);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (EC_KEY_set_group(eckey, group) == 0)
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							if (!EC_KEY_generate_key(eckey))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								EC_KEY_free(eckey);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (outformat == FORMAT_ASN1)
 | 
				
			||||||
 | 
								i = i2d_ECPrivateKey_bio(out, eckey);
 | 
				
			||||||
 | 
							else if (outformat == FORMAT_PEM)
 | 
				
			||||||
 | 
								i = PEM_write_bio_ECPrivateKey(out, eckey, NULL,
 | 
				
			||||||
 | 
									NULL, 0, NULL, NULL);
 | 
				
			||||||
 | 
							else	
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "bad output format specified "
 | 
				
			||||||
 | 
									"for outfile\n");
 | 
				
			||||||
 | 
								EC_KEY_free(eckey);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							EC_KEY_free(eckey);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (need_rand)
 | 
				
			||||||
 | 
							app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ret=0;
 | 
				
			||||||
 | 
					end:
 | 
				
			||||||
 | 
						if (ec_p)
 | 
				
			||||||
 | 
							BN_free(ec_p);
 | 
				
			||||||
 | 
						if (ec_a)
 | 
				
			||||||
 | 
							BN_free(ec_a);
 | 
				
			||||||
 | 
						if (ec_b)
 | 
				
			||||||
 | 
							BN_free(ec_b);
 | 
				
			||||||
 | 
						if (ec_gen)
 | 
				
			||||||
 | 
							BN_free(ec_gen);
 | 
				
			||||||
 | 
						if (ec_order)
 | 
				
			||||||
 | 
							BN_free(ec_order);
 | 
				
			||||||
 | 
						if (ec_cofactor)
 | 
				
			||||||
 | 
							BN_free(ec_cofactor);
 | 
				
			||||||
 | 
						if (buffer)
 | 
				
			||||||
 | 
							OPENSSL_free(buffer);
 | 
				
			||||||
 | 
						if (in != NULL)
 | 
				
			||||||
 | 
							BIO_free(in);
 | 
				
			||||||
 | 
						if (out != NULL)
 | 
				
			||||||
 | 
							BIO_free_all(out);
 | 
				
			||||||
 | 
						if (group != NULL)
 | 
				
			||||||
 | 
							EC_GROUP_free(group);
 | 
				
			||||||
 | 
						apps_shutdown();
 | 
				
			||||||
 | 
						OPENSSL_EXIT(ret);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int ecparam_print_var(BIO *out, BIGNUM *in, const char *var,
 | 
				
			||||||
 | 
						int len, unsigned char *buffer)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIO_printf(out, "static unsigned char %s_%d[] = {", var, len);
 | 
				
			||||||
 | 
						if (BN_is_zero(in))
 | 
				
			||||||
 | 
							BIO_printf(out, "\n\t0x00");
 | 
				
			||||||
 | 
						else 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							int i, l;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							l = BN_bn2bin(in, buffer);
 | 
				
			||||||
 | 
							for (i=0; i<l-1; i++)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if ((i%12) == 0) 
 | 
				
			||||||
 | 
									BIO_printf(out, "\n\t");
 | 
				
			||||||
 | 
								BIO_printf(out, "0x%02X,", buffer[i]);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if ((i%12) == 0) 
 | 
				
			||||||
 | 
								BIO_printf(out, "\n\t");
 | 
				
			||||||
 | 
							BIO_printf(out, "0x%02X", buffer[i]);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						BIO_printf(out, "\n\t};\n\n");
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
							
								
								
									
										46
									
								
								apps/enc.c
									
									
									
									
									
								
							
							
						
						
									
										46
									
								
								apps/enc.c
									
									
									
									
									
								
							@@ -100,9 +100,6 @@ int MAIN(int, char **);
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					 | 
				
			||||||
	ENGINE *e = NULL;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	static const char magic[]="Salted__";
 | 
						static const char magic[]="Salted__";
 | 
				
			||||||
	char mbuf[sizeof magic-1];
 | 
						char mbuf[sizeof magic-1];
 | 
				
			||||||
	char *strbuf=NULL;
 | 
						char *strbuf=NULL;
 | 
				
			||||||
@@ -226,7 +223,12 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
				goto bad;
 | 
									goto bad;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			buf[0]='\0';
 | 
								buf[0]='\0';
 | 
				
			||||||
			fgets(buf,sizeof buf,infile);
 | 
								if (!fgets(buf,sizeof buf,infile))
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(bio_err,"unable to read key from '%s'\n",
 | 
				
			||||||
 | 
										file);
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			fclose(infile);
 | 
								fclose(infile);
 | 
				
			||||||
			i=strlen(buf);
 | 
								i=strlen(buf);
 | 
				
			||||||
			if ((i > 0) &&
 | 
								if ((i > 0) &&
 | 
				
			||||||
@@ -306,7 +308,7 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (md && (dgst=EVP_get_digestbyname(md)) == NULL)
 | 
						if (md && (dgst=EVP_get_digestbyname(md)) == NULL)
 | 
				
			||||||
@@ -346,7 +348,7 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/* It must be large enough for a base64 encoded line */
 | 
							/* It must be large enough for a base64 encoded line */
 | 
				
			||||||
		if (n < 80) n=80;
 | 
							if (base64 && n < 80) n=80;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		bsize=(int)n;
 | 
							bsize=(int)n;
 | 
				
			||||||
		if (verbose) BIO_printf(bio_err,"bufsize=%d\n",bsize);
 | 
							if (verbose) BIO_printf(bio_err,"bufsize=%d\n",bsize);
 | 
				
			||||||
@@ -371,12 +373,16 @@ bad:
 | 
				
			|||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_set_callback(in,BIO_debug_callback);
 | 
							BIO_set_callback(in,BIO_debug_callback);
 | 
				
			||||||
		BIO_set_callback(out,BIO_debug_callback);
 | 
							BIO_set_callback(out,BIO_debug_callback);
 | 
				
			||||||
		BIO_set_callback_arg(in,bio_err);
 | 
							BIO_set_callback_arg(in,(char *)bio_err);
 | 
				
			||||||
		BIO_set_callback_arg(out,bio_err);
 | 
							BIO_set_callback_arg(out,(char *)bio_err);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (inf == NULL)
 | 
						if (inf == NULL)
 | 
				
			||||||
 | 
						        {
 | 
				
			||||||
 | 
							if (bufsize != NULL)
 | 
				
			||||||
 | 
								setvbuf(stdin, (char *)NULL, _IONBF, 0);
 | 
				
			||||||
		BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
							BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
				
			||||||
 | 
						        }
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_read_filename(in,inf) <= 0)
 | 
							if (BIO_read_filename(in,inf) <= 0)
 | 
				
			||||||
@@ -427,6 +433,8 @@ bad:
 | 
				
			|||||||
	if (outf == NULL)
 | 
						if (outf == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
							if (bufsize != NULL)
 | 
				
			||||||
 | 
								setvbuf(stdout, (char *)NULL, _IONBF, 0);
 | 
				
			||||||
#ifdef OPENSSL_SYS_VMS
 | 
					#ifdef OPENSSL_SYS_VMS
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
@@ -453,7 +461,7 @@ bad:
 | 
				
			|||||||
		if (debug)
 | 
							if (debug)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_set_callback(b64,BIO_debug_callback);
 | 
								BIO_set_callback(b64,BIO_debug_callback);
 | 
				
			||||||
			BIO_set_callback_arg(b64,bio_err);
 | 
								BIO_set_callback_arg(b64,(char *)bio_err);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		if (olb64)
 | 
							if (olb64)
 | 
				
			||||||
			BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL);
 | 
								BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL);
 | 
				
			||||||
@@ -527,7 +535,8 @@ bad:
 | 
				
			|||||||
			BIO_printf(bio_err,"invalid hex iv value\n");
 | 
								BIO_printf(bio_err,"invalid hex iv value\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		if ((hiv == NULL) && (str == NULL))
 | 
							if ((hiv == NULL) && (str == NULL)
 | 
				
			||||||
 | 
							    && EVP_CIPHER_iv_length(cipher) != 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			/* No IV was explicitly set and no IV was generated
 | 
								/* No IV was explicitly set and no IV was generated
 | 
				
			||||||
			 * during EVP_BytesToKey. Hence the IV is undefined,
 | 
								 * during EVP_BytesToKey. Hence the IV is undefined,
 | 
				
			||||||
@@ -549,22 +558,15 @@ bad:
 | 
				
			|||||||
		 */
 | 
							 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		BIO_get_cipher_ctx(benc, &ctx);
 | 
							BIO_get_cipher_ctx(benc, &ctx);
 | 
				
			||||||
		if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, enc))
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err, "Error setting cipher %s\n",
 | 
					 | 
				
			||||||
					EVP_CIPHER_name(cipher));
 | 
					 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
					 | 
				
			||||||
			goto end;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (non_fips_allow)
 | 
							if (non_fips_allow)
 | 
				
			||||||
			EVP_CIPHER_CTX_set_flags(ctx,
 | 
								EVP_CIPHER_CTX_set_flags(ctx,
 | 
				
			||||||
				EVP_CIPH_FLAG_NON_FIPS_ALLOW);
 | 
									EVP_CIPH_FLAG_NON_FIPS_ALLOW);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (!EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, enc))
 | 
							if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, enc))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "Error setting cipher %s\n",
 | 
								BIO_printf(bio_err, "Error setting cipher %s\n",
 | 
				
			||||||
					EVP_CIPHER_name(cipher));
 | 
									EVP_CIPHER_name(cipher));
 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -575,7 +577,7 @@ bad:
 | 
				
			|||||||
		if (!EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, enc))
 | 
							if (!EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, enc))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "Error setting cipher %s\n",
 | 
								BIO_printf(bio_err, "Error setting cipher %s\n",
 | 
				
			||||||
					EVP_CIPHER_name(cipher));
 | 
									EVP_CIPHER_name(cipher));
 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -583,7 +585,7 @@ bad:
 | 
				
			|||||||
		if (debug)
 | 
							if (debug)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_set_callback(benc,BIO_debug_callback);
 | 
								BIO_set_callback(benc,BIO_debug_callback);
 | 
				
			||||||
			BIO_set_callback_arg(benc,bio_err);
 | 
								BIO_set_callback_arg(benc,(char *)bio_err);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (printkey)
 | 
							if (printkey)
 | 
				
			||||||
@@ -591,7 +593,7 @@ bad:
 | 
				
			|||||||
			if (!nosalt)
 | 
								if (!nosalt)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				printf("salt=");
 | 
									printf("salt=");
 | 
				
			||||||
				for (i=0; i<sizeof salt; i++)
 | 
									for (i=0; i<(int)sizeof(salt); i++)
 | 
				
			||||||
					printf("%02X",salt[i]);
 | 
										printf("%02X",salt[i]);
 | 
				
			||||||
				printf("\n");
 | 
									printf("\n");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -56,7 +56,6 @@
 | 
				
			|||||||
 *
 | 
					 *
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
@@ -66,20 +65,22 @@
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
#include <openssl/engine.h>
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
#include <openssl/ssl.h>
 | 
					#include <openssl/ssl.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	engine_main
 | 
					#define PROG	engine_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static char *engine_usage[]={
 | 
					static const char *engine_usage[]={
 | 
				
			||||||
"usage: engine opts [engine ...]\n",
 | 
					"usage: engine opts [engine ...]\n",
 | 
				
			||||||
" -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands'\n",
 | 
					" -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands'\n",
 | 
				
			||||||
"               -vv will additionally display each command's description\n",
 | 
					"               -vv will additionally display each command's description\n",
 | 
				
			||||||
"               -vvv will also add the input flags for each command\n",
 | 
					"               -vvv will also add the input flags for each command\n",
 | 
				
			||||||
"               -vvvv will also show internal input flags\n",
 | 
					"               -vvvv will also show internal input flags\n",
 | 
				
			||||||
" -c          - for each engine, also list the capabilities\n",
 | 
					" -c          - for each engine, also list the capabilities\n",
 | 
				
			||||||
" -t          - for each engine, check that they are really available\n",
 | 
					" -t[t]       - for each engine, check that they are really available\n",
 | 
				
			||||||
 | 
					"               -tt will display error trace for unavailable engines\n",
 | 
				
			||||||
" -pre <cmd>  - runs command 'cmd' against the ENGINE before any attempts\n",
 | 
					" -pre <cmd>  - runs command 'cmd' against the ENGINE before any attempts\n",
 | 
				
			||||||
"               to load it (if -t is used)\n",
 | 
					"               to load it (if -t is used)\n",
 | 
				
			||||||
" -post <cmd> - runs command 'cmd' against the ENGINE after loading it\n",
 | 
					" -post <cmd> - runs command 'cmd' against the ENGINE after loading it\n",
 | 
				
			||||||
@@ -251,7 +252,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
 | 
				
			|||||||
                        /* Now decide on the output */
 | 
					                        /* Now decide on the output */
 | 
				
			||||||
                        if(xpos == 0)
 | 
					                        if(xpos == 0)
 | 
				
			||||||
                                /* Do an indent */
 | 
					                                /* Do an indent */
 | 
				
			||||||
                                xpos = BIO_printf(bio_out, indent);
 | 
					                                xpos = BIO_puts(bio_out, indent);
 | 
				
			||||||
                        else
 | 
					                        else
 | 
				
			||||||
                                /* Otherwise prepend a ", " */
 | 
					                                /* Otherwise prepend a ", " */
 | 
				
			||||||
                                xpos += BIO_printf(bio_out, ", ");
 | 
					                                xpos += BIO_printf(bio_out, ", ");
 | 
				
			||||||
@@ -262,7 +263,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
 | 
				
			|||||||
					(xpos + (int)strlen(name) > line_wrap))
 | 
										(xpos + (int)strlen(name) > line_wrap))
 | 
				
			||||||
                                        {
 | 
					                                        {
 | 
				
			||||||
                                        BIO_printf(bio_out, "\n");
 | 
					                                        BIO_printf(bio_out, "\n");
 | 
				
			||||||
                                        xpos = BIO_printf(bio_out, indent);
 | 
					                                        xpos = BIO_puts(bio_out, indent);
 | 
				
			||||||
                                        }
 | 
					                                        }
 | 
				
			||||||
                                xpos += BIO_printf(bio_out, "%s", name);
 | 
					                                xpos += BIO_printf(bio_out, "%s", name);
 | 
				
			||||||
                                }
 | 
					                                }
 | 
				
			||||||
@@ -343,8 +344,8 @@ int MAIN(int, char **);
 | 
				
			|||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int ret=1,i;
 | 
						int ret=1,i;
 | 
				
			||||||
	char **pp;
 | 
						const char **pp;
 | 
				
			||||||
	int verbose=0, list_cap=0, test_avail=0;
 | 
						int verbose=0, list_cap=0, test_avail=0, test_avail_noise = 0;
 | 
				
			||||||
	ENGINE *e;
 | 
						ENGINE *e;
 | 
				
			||||||
	STACK *engines = sk_new_null();
 | 
						STACK *engines = sk_new_null();
 | 
				
			||||||
	STACK *pre_cmds = sk_new_null();
 | 
						STACK *pre_cmds = sk_new_null();
 | 
				
			||||||
@@ -382,8 +383,14 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-c") == 0)
 | 
							else if (strcmp(*argv,"-c") == 0)
 | 
				
			||||||
			list_cap=1;
 | 
								list_cap=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-t") == 0)
 | 
							else if (strncmp(*argv,"-t",2) == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			test_avail=1;
 | 
								test_avail=1;
 | 
				
			||||||
 | 
								if(strspn(*argv + 1, "t") < strlen(*argv + 1))
 | 
				
			||||||
 | 
									goto skip_arg_loop;
 | 
				
			||||||
 | 
								if((test_avail_noise = strlen(*argv + 1) - 1) > 1)
 | 
				
			||||||
 | 
									goto skip_arg_loop;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-pre") == 0)
 | 
							else if (strcmp(*argv,"-pre") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			argc--; argv++;
 | 
								argc--; argv++;
 | 
				
			||||||
@@ -502,7 +509,8 @@ skip_digests:
 | 
				
			|||||||
				else
 | 
									else
 | 
				
			||||||
					{
 | 
										{
 | 
				
			||||||
					BIO_printf(bio_out, "[ unavailable ]\n");
 | 
										BIO_printf(bio_out, "[ unavailable ]\n");
 | 
				
			||||||
					ERR_print_errors_fp(stdout);
 | 
										if(test_avail_noise)
 | 
				
			||||||
 | 
											ERR_print_errors_fp(stdout);
 | 
				
			||||||
					ERR_clear_error();
 | 
										ERR_clear_error();
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
@@ -516,6 +524,7 @@ skip_digests:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ERR_print_errors(bio_err);
 | 
						ERR_print_errors(bio_err);
 | 
				
			||||||
	sk_pop_free(engines, identity);
 | 
						sk_pop_free(engines, identity);
 | 
				
			||||||
	sk_pop_free(pre_cmds, identity);
 | 
						sk_pop_free(pre_cmds, identity);
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										27
									
								
								apps/gendh.c
									
									
									
									
									
								
							
							
						
						
									
										27
									
								
								apps/gendh.c
									
									
									
									
									
								
							@@ -57,6 +57,13 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>
 | 
				
			||||||
 | 
					/* Until the key-gen callbacks are modified to use newer prototypes, we allow
 | 
				
			||||||
 | 
					 * deprecated functions for openssl-internal code */
 | 
				
			||||||
 | 
					#ifdef OPENSSL_NO_DEPRECATED
 | 
				
			||||||
 | 
					#undef OPENSSL_NO_DEPRECATED
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_DH
 | 
					#ifndef OPENSSL_NO_DH
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
@@ -75,15 +82,13 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG gendh_main
 | 
					#define PROG gendh_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK dh_cb(int p, int n, void *arg);
 | 
					static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int, char **);
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
						BN_GENCB cb;
 | 
				
			||||||
	ENGINE *e = NULL;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	DH *dh=NULL;
 | 
						DH *dh=NULL;
 | 
				
			||||||
	int ret=1,num=DEFBITS;
 | 
						int ret=1,num=DEFBITS;
 | 
				
			||||||
	int g=2;
 | 
						int g=2;
 | 
				
			||||||
@@ -96,6 +101,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BN_GENCB_set(&cb, dh_cb, bio_err);
 | 
				
			||||||
	if (bio_err == NULL)
 | 
						if (bio_err == NULL)
 | 
				
			||||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
							if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
@@ -154,7 +160,7 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
		
 | 
							
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	out=BIO_new(BIO_s_file());
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
@@ -193,9 +199,9 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_err,"Generating DH parameters, %d bit long safe prime, generator %d\n",num,g);
 | 
						BIO_printf(bio_err,"Generating DH parameters, %d bit long safe prime, generator %d\n",num,g);
 | 
				
			||||||
	BIO_printf(bio_err,"This is going to take a long time\n");
 | 
						BIO_printf(bio_err,"This is going to take a long time\n");
 | 
				
			||||||
	dh=DH_generate_parameters(num,g,dh_cb,bio_err);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (dh == NULL) goto end;
 | 
						if(((dh = DH_new()) == NULL) || !DH_generate_parameters_ex(dh, num, g, &cb))
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
		
 | 
							
 | 
				
			||||||
	app_RAND_write_file(NULL, bio_err);
 | 
						app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -211,7 +217,7 @@ end:
 | 
				
			|||||||
	OPENSSL_EXIT(ret);
 | 
						OPENSSL_EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK dh_cb(int p, int n, void *arg)
 | 
					static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char c='*';
 | 
						char c='*';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -219,10 +225,11 @@ static void MS_CALLBACK dh_cb(int p, int n, void *arg)
 | 
				
			|||||||
	if (p == 1) c='+';
 | 
						if (p == 1) c='+';
 | 
				
			||||||
	if (p == 2) c='*';
 | 
						if (p == 2) c='*';
 | 
				
			||||||
	if (p == 3) c='\n';
 | 
						if (p == 3) c='\n';
 | 
				
			||||||
	BIO_write((BIO *)arg,&c,1);
 | 
						BIO_write(cb->arg,&c,1);
 | 
				
			||||||
	(void)BIO_flush((BIO *)arg);
 | 
						(void)BIO_flush(cb->arg);
 | 
				
			||||||
#ifdef LINT
 | 
					#ifdef LINT
 | 
				
			||||||
	p=n;
 | 
						p=n;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -56,6 +56,7 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>	/* for OPENSSL_NO_DSA */
 | 
				
			||||||
#ifndef OPENSSL_NO_DSA
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
@@ -77,9 +78,6 @@ int MAIN(int, char **);
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					 | 
				
			||||||
	ENGINE *e = NULL;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	DSA *dsa=NULL;
 | 
						DSA *dsa=NULL;
 | 
				
			||||||
	int ret=1;
 | 
						int ret=1;
 | 
				
			||||||
	char *outfile=NULL;
 | 
						char *outfile=NULL;
 | 
				
			||||||
@@ -139,6 +137,10 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		else if (strcmp(*argv,"-idea") == 0)
 | 
							else if (strcmp(*argv,"-idea") == 0)
 | 
				
			||||||
			enc=EVP_idea_cbc();
 | 
								enc=EVP_idea_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-seed") == 0)
 | 
				
			||||||
 | 
								enc=EVP_seed_cbc();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_AES
 | 
					#ifndef OPENSSL_NO_AES
 | 
				
			||||||
		else if (strcmp(*argv,"-aes128") == 0)
 | 
							else if (strcmp(*argv,"-aes128") == 0)
 | 
				
			||||||
			enc=EVP_aes_128_cbc();
 | 
								enc=EVP_aes_128_cbc();
 | 
				
			||||||
@@ -146,6 +148,14 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			enc=EVP_aes_192_cbc();
 | 
								enc=EVP_aes_192_cbc();
 | 
				
			||||||
		else if (strcmp(*argv,"-aes256") == 0)
 | 
							else if (strcmp(*argv,"-aes256") == 0)
 | 
				
			||||||
			enc=EVP_aes_256_cbc();
 | 
								enc=EVP_aes_256_cbc();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-camellia128") == 0)
 | 
				
			||||||
 | 
								enc=EVP_camellia_128_cbc();
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-camellia192") == 0)
 | 
				
			||||||
 | 
								enc=EVP_camellia_192_cbc();
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-camellia256") == 0)
 | 
				
			||||||
 | 
								enc=EVP_camellia_256_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		else if (**argv != '-' && dsaparams == NULL)
 | 
							else if (**argv != '-' && dsaparams == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -169,10 +179,18 @@ bad:
 | 
				
			|||||||
#ifndef OPENSSL_NO_IDEA
 | 
					#ifndef OPENSSL_NO_IDEA
 | 
				
			||||||
		BIO_printf(bio_err," -idea     - encrypt the generated key with IDEA in cbc mode\n");
 | 
							BIO_printf(bio_err," -idea     - encrypt the generated key with IDEA in cbc mode\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -seed\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                 encrypt PEM output with cbc seed\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_AES
 | 
					#ifndef OPENSSL_NO_AES
 | 
				
			||||||
		BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
							BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
				
			||||||
		BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
							BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -camellia128, -camellia192, -camellia256\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                 encrypt PEM output with cbc camellia\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
		BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
 | 
							BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -185,7 +203,7 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
 | 
						if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
 | 
				
			||||||
@@ -258,4 +276,10 @@ end:
 | 
				
			|||||||
	apps_shutdown();
 | 
						apps_shutdown();
 | 
				
			||||||
	OPENSSL_EXIT(ret);
 | 
						OPENSSL_EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					#else /* !OPENSSL_NO_DSA */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# if PEDANTIC
 | 
				
			||||||
 | 
					static void *dummy=&dummy;
 | 
				
			||||||
 | 
					# endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -56,6 +56,13 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>
 | 
				
			||||||
 | 
					/* Until the key-gen callbacks are modified to use newer prototypes, we allow
 | 
				
			||||||
 | 
					 * deprecated functions for openssl-internal code */
 | 
				
			||||||
 | 
					#ifdef OPENSSL_NO_DEPRECATED
 | 
				
			||||||
 | 
					#undef OPENSSL_NO_DEPRECATED
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_RSA
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
@@ -75,22 +82,17 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG genrsa_main
 | 
					#define PROG genrsa_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK genrsa_cb(int p, int n, void *arg);
 | 
					static int MS_CALLBACK genrsa_cb(int p, int n, BN_GENCB *cb);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int, char **);
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
						BN_GENCB cb;
 | 
				
			||||||
	ENGINE *e = NULL;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	int ret=1;
 | 
						int ret=1;
 | 
				
			||||||
	RSA *rsa=NULL;
 | 
					 | 
				
			||||||
	int i,num=DEFBITS;
 | 
						int i,num=DEFBITS;
 | 
				
			||||||
	long l;
 | 
						long l;
 | 
				
			||||||
#ifdef OPENSSL_FIPS
 | 
					 | 
				
			||||||
	int use_x931 = 0;
 | 
						int use_x931 = 0;
 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	const EVP_CIPHER *enc=NULL;
 | 
						const EVP_CIPHER *enc=NULL;
 | 
				
			||||||
	unsigned long f4=RSA_F4;
 | 
						unsigned long f4=RSA_F4;
 | 
				
			||||||
	char *outfile=NULL;
 | 
						char *outfile=NULL;
 | 
				
			||||||
@@ -100,8 +102,13 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
	char *inrand=NULL;
 | 
						char *inrand=NULL;
 | 
				
			||||||
	BIO *out=NULL;
 | 
						BIO *out=NULL;
 | 
				
			||||||
 | 
						BIGNUM *bn = BN_new();
 | 
				
			||||||
 | 
						RSA *rsa = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!bn) goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
						BN_GENCB_set(&cb, genrsa_cb, bio_err);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bio_err == NULL)
 | 
						if (bio_err == NULL)
 | 
				
			||||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
							if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
@@ -129,10 +136,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			f4=3;
 | 
								f4=3;
 | 
				
			||||||
		else if (strcmp(*argv,"-F4") == 0 || strcmp(*argv,"-f4") == 0)
 | 
							else if (strcmp(*argv,"-F4") == 0 || strcmp(*argv,"-f4") == 0)
 | 
				
			||||||
			f4=RSA_F4;
 | 
								f4=RSA_F4;
 | 
				
			||||||
#ifdef OPENSSL_FIPS
 | 
					 | 
				
			||||||
		else if (strcmp(*argv,"-x931") == 0)
 | 
							else if (strcmp(*argv,"-x931") == 0)
 | 
				
			||||||
			use_x931 = 1;
 | 
								use_x931 = 1;
 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -155,6 +160,10 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		else if (strcmp(*argv,"-idea") == 0)
 | 
							else if (strcmp(*argv,"-idea") == 0)
 | 
				
			||||||
			enc=EVP_idea_cbc();
 | 
								enc=EVP_idea_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-seed") == 0)
 | 
				
			||||||
 | 
								enc=EVP_seed_cbc();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_AES
 | 
					#ifndef OPENSSL_NO_AES
 | 
				
			||||||
		else if (strcmp(*argv,"-aes128") == 0)
 | 
							else if (strcmp(*argv,"-aes128") == 0)
 | 
				
			||||||
			enc=EVP_aes_128_cbc();
 | 
								enc=EVP_aes_128_cbc();
 | 
				
			||||||
@@ -162,6 +171,14 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			enc=EVP_aes_192_cbc();
 | 
								enc=EVP_aes_192_cbc();
 | 
				
			||||||
		else if (strcmp(*argv,"-aes256") == 0)
 | 
							else if (strcmp(*argv,"-aes256") == 0)
 | 
				
			||||||
			enc=EVP_aes_256_cbc();
 | 
								enc=EVP_aes_256_cbc();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-camellia128") == 0)
 | 
				
			||||||
 | 
								enc=EVP_camellia_128_cbc();
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-camellia192") == 0)
 | 
				
			||||||
 | 
								enc=EVP_camellia_192_cbc();
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-camellia256") == 0)
 | 
				
			||||||
 | 
								enc=EVP_camellia_256_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		else if (strcmp(*argv,"-passout") == 0)
 | 
							else if (strcmp(*argv,"-passout") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -182,9 +199,17 @@ bad:
 | 
				
			|||||||
#ifndef OPENSSL_NO_IDEA
 | 
					#ifndef OPENSSL_NO_IDEA
 | 
				
			||||||
		BIO_printf(bio_err," -idea           encrypt the generated key with IDEA in cbc mode\n");
 | 
							BIO_printf(bio_err," -idea           encrypt the generated key with IDEA in cbc mode\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -seed\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                 encrypt PEM output with cbc seed\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_AES
 | 
					#ifndef OPENSSL_NO_AES
 | 
				
			||||||
		BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
							BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
				
			||||||
		BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
							BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -camellia128, -camellia192, -camellia256\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                 encrypt PEM output with cbc camellia\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		BIO_printf(bio_err," -out file       output the key to 'file\n");
 | 
							BIO_printf(bio_err," -out file       output the key to 'file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -passout arg    output file pass phrase source\n");
 | 
							BIO_printf(bio_err," -passout arg    output file pass phrase source\n");
 | 
				
			||||||
@@ -207,7 +232,7 @@ bad:
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
@@ -240,28 +265,26 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
 | 
						BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
 | 
				
			||||||
		num);
 | 
							num);
 | 
				
			||||||
#ifdef OPENSSL_FIPS
 | 
					
 | 
				
			||||||
 | 
						rsa = RSA_new();
 | 
				
			||||||
 | 
						if (!rsa)
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (use_x931)
 | 
						if (use_x931)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIGNUM *pubexp;
 | 
							BIGNUM *pubexp;
 | 
				
			||||||
		pubexp = BN_new();
 | 
							pubexp = BN_new();
 | 
				
			||||||
		BN_set_word(pubexp, f4);
 | 
							if (!BN_set_word(pubexp, f4))
 | 
				
			||||||
		rsa = RSA_X931_generate_key(num, pubexp, genrsa_cb, bio_err);
 | 
								goto err;
 | 
				
			||||||
 | 
							if (!RSA_X931_generate_key_ex(rsa, num, pubexp, &cb))
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
		BN_free(pubexp);
 | 
							BN_free(pubexp);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else
 | 
						else if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb))
 | 
				
			||||||
#endif
 | 
							goto err;
 | 
				
			||||||
		rsa=RSA_generate_key(num,f4,genrsa_cb,bio_err);
 | 
					 | 
				
			||||||
		
 | 
							
 | 
				
			||||||
	app_RAND_write_file(NULL, bio_err);
 | 
						app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (rsa == NULL)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		BIO_printf(bio_err, "Key Generation error\n");
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		goto err;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	
 | 
					 | 
				
			||||||
	/* We need to do the following for when the base number size is <
 | 
						/* We need to do the following for when the base number size is <
 | 
				
			||||||
	 * long, esp windows 3.1 :-(. */
 | 
						 * long, esp windows 3.1 :-(. */
 | 
				
			||||||
	l=0L;
 | 
						l=0L;
 | 
				
			||||||
@@ -285,8 +308,9 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	if (rsa != NULL) RSA_free(rsa);
 | 
						if (bn) BN_free(bn);
 | 
				
			||||||
	if (out != NULL) BIO_free_all(out);
 | 
						if (rsa) RSA_free(rsa);
 | 
				
			||||||
 | 
						if (out) BIO_free_all(out);
 | 
				
			||||||
	if(passout) OPENSSL_free(passout);
 | 
						if(passout) OPENSSL_free(passout);
 | 
				
			||||||
	if (ret != 0)
 | 
						if (ret != 0)
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
@@ -294,7 +318,7 @@ err:
 | 
				
			|||||||
	OPENSSL_EXIT(ret);
 | 
						OPENSSL_EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK genrsa_cb(int p, int n, void *arg)
 | 
					static int MS_CALLBACK genrsa_cb(int p, int n, BN_GENCB *cb)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char c='*';
 | 
						char c='*';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -302,11 +326,12 @@ static void MS_CALLBACK genrsa_cb(int p, int n, void *arg)
 | 
				
			|||||||
	if (p == 1) c='+';
 | 
						if (p == 1) c='+';
 | 
				
			||||||
	if (p == 2) c='*';
 | 
						if (p == 2) c='*';
 | 
				
			||||||
	if (p == 3) c='\n';
 | 
						if (p == 3) c='\n';
 | 
				
			||||||
	BIO_write((BIO *)arg,&c,1);
 | 
						BIO_write(cb->arg,&c,1);
 | 
				
			||||||
	(void)BIO_flush((BIO *)arg);
 | 
						(void)BIO_flush(cb->arg);
 | 
				
			||||||
#ifdef LINT
 | 
					#ifdef LINT
 | 
				
			||||||
	p=n;
 | 
						p=n;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
#else /* !OPENSSL_NO_RSA */
 | 
					#else /* !OPENSSL_NO_RSA */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -5,13 +5,23 @@ $! Time of creation: 22-MAY-1998 10:13
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$! P1	root of the directory tree
 | 
					$! P1	root of the directory tree
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
 | 
					$
 | 
				
			||||||
$	IF P1 .EQS. ""
 | 
					$	IF P1 .EQS. ""
 | 
				
			||||||
$	THEN
 | 
					$	THEN
 | 
				
			||||||
$	    WRITE SYS$OUTPUT "First argument missing."
 | 
					$	    WRITE SYS$OUTPUT "First argument missing."
 | 
				
			||||||
$	    WRITE SYS$OUTPUT "Should be the directory where you want things installed."
 | 
					$	    WRITE SYS$OUTPUT -
 | 
				
			||||||
 | 
							  "Should be the directory where you want things installed."
 | 
				
			||||||
$	    EXIT
 | 
					$	    EXIT
 | 
				
			||||||
$	ENDIF
 | 
					$	ENDIF
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
 | 
					$	IF (F$GETSYI("CPU").LT.128)
 | 
				
			||||||
 | 
					$	THEN
 | 
				
			||||||
 | 
					$	    ARCH := VAX
 | 
				
			||||||
 | 
					$	ELSE
 | 
				
			||||||
 | 
					$	    ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
 | 
				
			||||||
 | 
					$	    IF (ARCH .EQS. "") THEN ARCH = "UNK"
 | 
				
			||||||
 | 
					$	ENDIF
 | 
				
			||||||
 | 
					$
 | 
				
			||||||
$	ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
 | 
					$	ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
 | 
				
			||||||
$	ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
 | 
					$	ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
 | 
				
			||||||
$	ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
 | 
					$	ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
 | 
				
			||||||
@@ -19,23 +29,16 @@ $	ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
 | 
				
			|||||||
$	ROOT = ROOT_DEV + "[" + ROOT_DIR
 | 
					$	ROOT = ROOT_DEV + "[" + ROOT_DIR
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
 | 
					$	DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLVEXE WRK_SSLROOT:[VAX_EXE]
 | 
					$	DEFINE/NOLOG WRK_SSLEXE WRK_SSLROOT:['ARCH'_EXE]
 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLAEXE WRK_SSLROOT:[ALPHA_EXE]
 | 
					 | 
				
			||||||
$	DEFINE/NOLOG WRK_SSLLIB WRK_SSLROOT:[LIB]
 | 
					 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$	IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
 | 
					$	IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
 | 
				
			||||||
	   CREATE/DIR/LOG WRK_SSLROOT:[000000]
 | 
						   CREATE/DIR/LOG WRK_SSLROOT:[000000]
 | 
				
			||||||
$	IF F$PARSE("WRK_SSLVEXE:") .EQS. "" THEN -
 | 
					$	IF F$PARSE("WRK_SSLEXE:") .EQS. "" THEN -
 | 
				
			||||||
	   CREATE/DIR/LOG WRK_SSLVEXE:
 | 
						   CREATE/DIR/LOG WRK_SSLEXE:
 | 
				
			||||||
$	IF F$PARSE("WRK_SSLAEXE:") .EQS. "" THEN -
 | 
					 | 
				
			||||||
	   CREATE/DIR/LOG WRK_SSLAEXE:
 | 
					 | 
				
			||||||
$	IF F$PARSE("WRK_SSLLIB:") .EQS. "" THEN -
 | 
					 | 
				
			||||||
	   CREATE/DIR/LOG WRK_SSLLIB:
 | 
					 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$	EXE := openssl
 | 
					$	EXE := openssl
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$	VEXE_DIR := [-.VAX.EXE.APPS]
 | 
					$	EXE_DIR := [-.'ARCH'.EXE.APPS]
 | 
				
			||||||
$	AEXE_DIR := [-.AXP.EXE.APPS]
 | 
					 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$	I = 0
 | 
					$	I = 0
 | 
				
			||||||
$ LOOP_EXE: 
 | 
					$ LOOP_EXE: 
 | 
				
			||||||
@@ -43,25 +46,18 @@ $	E = F$EDIT(F$ELEMENT(I, ",", EXE),"TRIM")
 | 
				
			|||||||
$	I = I + 1
 | 
					$	I = I + 1
 | 
				
			||||||
$	IF E .EQS. "," THEN GOTO LOOP_EXE_END
 | 
					$	IF E .EQS. "," THEN GOTO LOOP_EXE_END
 | 
				
			||||||
$	SET NOON
 | 
					$	SET NOON
 | 
				
			||||||
$	IF F$SEARCH(VEXE_DIR+E+".EXE") .NES. ""
 | 
					$	IF F$SEARCH(EXE_DIR+E+".EXE") .NES. ""
 | 
				
			||||||
$	THEN
 | 
					$	THEN
 | 
				
			||||||
$	  COPY 'VEXE_DIR''E'.EXE WRK_SSLVEXE:'E'.EXE/log
 | 
					$	  COPY 'EXE_DIR''E'.EXE WRK_SSLEXE:'E'.EXE/log
 | 
				
			||||||
$	  SET FILE/PROT=W:RE WRK_SSLVEXE:'E'.EXE
 | 
					$	  SET FILE/PROT=W:RE WRK_SSLEXE:'E'.EXE
 | 
				
			||||||
$	ENDIF
 | 
					 | 
				
			||||||
$	IF F$SEARCH(AEXE_DIR+E+".EXE") .NES. ""
 | 
					 | 
				
			||||||
$	THEN
 | 
					 | 
				
			||||||
$	  COPY 'AEXE_DIR''E'.EXE WRK_SSLAEXE:'E'.EXE/log
 | 
					 | 
				
			||||||
$	  SET FILE/PROT=W:RE WRK_SSLAEXE:'E'.EXE
 | 
					 | 
				
			||||||
$	ENDIF
 | 
					$	ENDIF
 | 
				
			||||||
$	SET ON
 | 
					$	SET ON
 | 
				
			||||||
$	GOTO LOOP_EXE
 | 
					$	GOTO LOOP_EXE
 | 
				
			||||||
$ LOOP_EXE_END:
 | 
					$ LOOP_EXE_END:
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$	SET NOON
 | 
					$	SET NOON
 | 
				
			||||||
$	COPY CA.COM WRK_SSLAEXE:CA.COM/LOG
 | 
					$	COPY CA.COM WRK_SSLEXE:CA.COM/LOG
 | 
				
			||||||
$	SET FILE/PROT=W:RE WRK_SSLAEXE:CA.COM
 | 
					$	SET FILE/PROT=W:RE WRK_SSLEXE:CA.COM
 | 
				
			||||||
$	COPY CA.COM WRK_SSLVEXE:CA.COM/LOG
 | 
					 | 
				
			||||||
$	SET FILE/PROT=W:RE WRK_SSLVEXE:CA.COM
 | 
					 | 
				
			||||||
$	COPY OPENSSL-VMS.CNF WRK_SSLROOT:[000000]OPENSSL.CNF/LOG
 | 
					$	COPY OPENSSL-VMS.CNF WRK_SSLROOT:[000000]OPENSSL.CNF/LOG
 | 
				
			||||||
$	SET FILE/PROT=W:R WRK_SSLROOT:[000000]OPENSSL.CNF
 | 
					$	SET FILE/PROT=W:R WRK_SSLROOT:[000000]OPENSSL.CNF
 | 
				
			||||||
$	SET ON
 | 
					$	SET ON
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -6,11 +6,12 @@ $!               A-Com Computing, Inc.
 | 
				
			|||||||
$!               byer@mail.all-net.net
 | 
					$!               byer@mail.all-net.net
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  Changes by Richard Levitte <richard@levitte.org>
 | 
					$!  Changes by Richard Levitte <richard@levitte.org>
 | 
				
			||||||
 | 
					$!             Zoltan Arpadffy <zoli@polarhome.com>   
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  This command files compiles and creates all the various different
 | 
					$!  This command files compiles and creates all the various different
 | 
				
			||||||
$!  "application" programs for the different types of encryption for OpenSSL.
 | 
					$!  "application" programs for the different types of encryption for OpenSSL.
 | 
				
			||||||
$!  The EXE's are placed in the directory [.xxx.EXE.APPS] where "xxx" denotes
 | 
					$!  The EXE's are placed in the directory [.xxx.EXE.APPS] where "xxx" denotes
 | 
				
			||||||
$!  either AXP or VAX depending on your machine architecture.
 | 
					$!  ALPHA, IA64 or VAX, depending on your machine architecture.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  It was written so it would try to determine what "C" compiler to
 | 
					$!  It was written so it would try to determine what "C" compiler to
 | 
				
			||||||
$!  use or you can specify which "C" compiler to use.
 | 
					$!  use or you can specify which "C" compiler to use.
 | 
				
			||||||
@@ -46,20 +47,21 @@ $ TCPIP_LIB = ""
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$! Check What Architecture We Are Using.
 | 
					$! Check What Architecture We Are Using.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ IF (F$GETSYI("CPU").GE.128)
 | 
					$ IF (F$GETSYI("CPU").LT.128)
 | 
				
			||||||
$ THEN
 | 
					$ THEN
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  The Architecture Is AXP.
 | 
					$!  The Architecture Is VAX.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$   ARCH := AXP
 | 
					$   ARCH := VAX
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Else...
 | 
					$! Else...
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ ELSE
 | 
					$ ELSE
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  The Architecture Is VAX.
 | 
					$!  The Architecture Is Alpha, IA64 or whatever comes in the future.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$   ARCH := VAX
 | 
					$   ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
 | 
				
			||||||
 | 
					$   IF (ARCH .EQS. "") THEN ARCH = "UNK"
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! End The Architecture Check.
 | 
					$! End The Architecture Check.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
@@ -68,22 +70,6 @@ $!
 | 
				
			|||||||
$! Define what programs should be compiled
 | 
					$! Define what programs should be compiled
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ PROGRAMS := OPENSSL
 | 
					$ PROGRAMS := OPENSSL
 | 
				
			||||||
$!$ PROGRAMS := VERIFY,ASN1PARS,REQ,DGST,DH,ENC,PASSWD,GENDH,ERRSTR,CA,CRL,-
 | 
					 | 
				
			||||||
$!	      RSA,DSA,DSAPARAM,-
 | 
					 | 
				
			||||||
$!	      X509,GENRSA,GENDSA,S_SERVER,S_CLIENT,SPEED,-
 | 
					 | 
				
			||||||
$!	      S_TIME,VERSION,PKCS7,CRL2P7,SESS_ID,CIPHERS,NSEQ,
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$! Check To Make Sure We Have Valid Command Line Parameters.
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$ GOSUB CHECK_OPTIONS
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$! Initialise logical names and such
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$ GOSUB INITIALISE
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$! Tell The User What Kind of Machine We Run On.
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$ WRITE SYS$OUTPUT "Compiling On A ",ARCH," Machine."
 | 
					 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Define The CRYPTO Library.
 | 
					$! Define The CRYPTO Library.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
@@ -97,6 +83,22 @@ $! Define The OBJ Directory.
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$ OBJ_DIR := SYS$DISK:[-.'ARCH'.OBJ.APPS]
 | 
					$ OBJ_DIR := SYS$DISK:[-.'ARCH'.OBJ.APPS]
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
 | 
					$! Define The EXE Directory.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$ EXE_DIR := SYS$DISK:[-.'ARCH'.EXE.APPS]
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$! Check To Make Sure We Have Valid Command Line Parameters.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$ GOSUB CHECK_OPTIONS
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$! Initialise logical names and such
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$ GOSUB INITIALISE
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$! Tell The User What Kind of Machine We Run On.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$ WRITE SYS$OUTPUT "Compiling On A ",ARCH," Machine."
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
$! Check To See If The OBJ Directory Exists.
 | 
					$! Check To See If The OBJ Directory Exists.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ IF (F$PARSE(OBJ_DIR).EQS."")
 | 
					$ IF (F$PARSE(OBJ_DIR).EQS."")
 | 
				
			||||||
@@ -110,10 +112,6 @@ $! End The OBJ Directory Check.
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$ ENDIF
 | 
					$ ENDIF
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Define The EXE Directory.
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$ EXE_DIR := SYS$DISK:[-.'ARCH'.EXE.APPS]
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$! Check To See If The EXE Directory Exists.
 | 
					$! Check To See If The EXE Directory Exists.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ IF (F$PARSE(EXE_DIR).EQS."")
 | 
					$ IF (F$PARSE(EXE_DIR).EQS."")
 | 
				
			||||||
@@ -136,157 +134,172 @@ $!
 | 
				
			|||||||
$ GOSUB CHECK_OPT_FILE
 | 
					$ GOSUB CHECK_OPT_FILE
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Define The Application Files.
 | 
					$! Define The Application Files.
 | 
				
			||||||
 | 
					$! NOTE: Some might think this list ugly.  However, it's made this way to
 | 
				
			||||||
 | 
					$! reflect the E_OBJ variable in Makefile as closely as possible, thereby
 | 
				
			||||||
 | 
					$! making it fairly easy to verify that the lists are the same.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ LIB_FILES = "VERIFY;ASN1PARS;REQ;DGST;DH;DHPARAM;ENC;PASSWD;GENDH;ERRSTR;"+-
 | 
					$ LIB_OPENSSL = "VERIFY,ASN1PARS,REQ,DGST,DH,DHPARAM,ENC,PASSWD,GENDH,ERRSTR,"+-
 | 
				
			||||||
	      "CA;PKCS7;CRL2P7;CRL;"+-
 | 
							"CA,PKCS7,CRL2P7,CRL,"+-
 | 
				
			||||||
	      "RSA;RSAUTL;DSA;DSAPARAM;"+-
 | 
							"RSA,RSAUTL,DSA,DSAPARAM,EC,ECPARAM,"+-
 | 
				
			||||||
	      "X509;GENRSA;GENDSA;S_SERVER;S_CLIENT;SPEED;"+-
 | 
							"X509,GENRSA,GENDSA,S_SERVER,S_CLIENT,SPEED,"+-
 | 
				
			||||||
	      "S_TIME;APPS;S_CB;S_SOCKET;APP_RAND;VERSION;SESS_ID;"+-
 | 
							"S_TIME,APPS,S_CB,S_SOCKET,APP_RAND,VERSION,SESS_ID,"+-
 | 
				
			||||||
	      "CIPHERS;NSEQ;PKCS12;PKCS8;SPKAC;SMIME;RAND;ENGINE;OCSP;PRIME"
 | 
							"CIPHERS,NSEQ,PKCS12,PKCS8,SPKAC,SMIME,RAND,ENGINE,"+-
 | 
				
			||||||
$ APP_FILES := OPENSSL,'OBJ_DIR'VERIFY.OBJ,ASN1PARS.OBJ,REQ.OBJ,DGST.OBJ,DH.OBJ,DHPARAM.OBJ,ENC.OBJ,PASSWD.OBJ,GENDH.OBJ,ERRSTR.OBJ,-
 | 
							"OCSP,PRIME,CMS"
 | 
				
			||||||
	       CA.OBJ,PKCS7.OBJ,CRL2P7.OBJ,CRL.OBJ,-
 | 
					 | 
				
			||||||
	       RSA.OBJ,RSAUTL.OBJ,DSA.OBJ,DSAPARAM.OBJ,-
 | 
					 | 
				
			||||||
	       X509.OBJ,GENRSA.OBJ,GENDSA.OBJ,S_SERVER.OBJ,S_CLIENT.OBJ,SPEED.OBJ,-
 | 
					 | 
				
			||||||
	       S_TIME.OBJ,APPS.OBJ,S_CB.OBJ,S_SOCKET.OBJ,APP_RAND.OBJ,VERSION.OBJ,SESS_ID.OBJ,-
 | 
					 | 
				
			||||||
	       CIPHERS.OBJ,NSEQ.OBJ,PKCS12.OBJ,PKCS8.OBJ,SPKAC.OBJ,SMIME.OBJ,RAND.OBJ,ENGINE.OBJ,OCSP.OBJ,PRIME.OBJ
 | 
					 | 
				
			||||||
$ TCPIP_PROGRAMS = ",,"
 | 
					$ TCPIP_PROGRAMS = ",,"
 | 
				
			||||||
$ IF COMPILER .EQS. "VAXC" THEN -
 | 
					$ IF COMPILER .EQS. "VAXC" THEN -
 | 
				
			||||||
     TCPIP_PROGRAMS = ",OPENSSL,"
 | 
					     TCPIP_PROGRAMS = ",OPENSSL,"
 | 
				
			||||||
$!$ APP_FILES := VERIFY;ASN1PARS;REQ;DGST;DH;ENC;GENDH;ERRSTR;CA;-
 | 
					 | 
				
			||||||
$!	       PKCS7;CRL2P7;CRL;-
 | 
					 | 
				
			||||||
$!	       RSA;DSA;DSAPARAM;-
 | 
					 | 
				
			||||||
$!	       X509;GENRSA;GENDSA;-
 | 
					 | 
				
			||||||
$!	       S_SERVER,'OBJ_DIR'S_SOCKET.OBJ,'OBJ_DIR'S_CB.OBJ;-
 | 
					 | 
				
			||||||
$!	       S_CLIENT,'OBJ_DIR'S_SOCKET.OBJ,'OBJ_DIR'S_CB.OBJ;-
 | 
					 | 
				
			||||||
$!	       SPEED;-
 | 
					 | 
				
			||||||
$!	       S_TIME,'OBJ_DIR'S_CB.OBJ;VERSION;SESS_ID;CIPHERS;NSEQ
 | 
					 | 
				
			||||||
$!$ TCPIP_PROGRAMS = ",,"
 | 
					 | 
				
			||||||
$!$ IF COMPILER .EQS. "VAXC" THEN -
 | 
					 | 
				
			||||||
$!     TCPIP_PROGRAMS = ",S_SERVER,S_CLIENT,SESS_ID,CIPHERS,S_TIME,"
 | 
					 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Setup exceptional compilations
 | 
					$! Setup exceptional compilations
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ COMPILEWITH_CC2 = ",S_SERVER,S_CLIENT,"
 | 
					$ COMPILEWITH_CC2 = ",S_SOCKET,S_SERVER,S_CLIENT,"
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ PHASE := LIB
 | 
					$ PHASE := LIB
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ RESTART: 
 | 
					$ RESTART: 
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  Define A File Counter And Set It To "0".
 | 
					$!  Define An App Counter And Set It To "0".
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ FILE_COUNTER = 0
 | 
					$ APP_COUNTER = 0
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Top Of The File Loop.
 | 
					$!  Top Of The App Loop.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ NEXT_FILE:
 | 
					$ NEXT_APP:
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! O.K, Extract The File Name From The File List.
 | 
					$!  Make The Application File Name
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ FILE_NAME0 = F$EDIT(F$ELEMENT(FILE_COUNTER,";",'PHASE'_FILES),"TRIM")
 | 
					$ CURRENT_APP = F$EDIT(F$ELEMENT(APP_COUNTER,",",PROGRAMS),"TRIM")
 | 
				
			||||||
$ FILE_NAME = F$EDIT(F$ELEMENT(0,",",FILE_NAME0),"TRIM")
 | 
					 | 
				
			||||||
$ EXTRA_OBJ = FILE_NAME0 - FILE_NAME
 | 
					 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Check To See If We Are At The End Of The File List.
 | 
					$!  Create The Executable File Name.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ IF (FILE_NAME0.EQS.";")
 | 
					$   EXE_FILE = EXE_DIR + CURRENT_APP + ".EXE"
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!  Check To See If We Are At The End Of The File List.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$ IF (CURRENT_APP.EQS.",")
 | 
				
			||||||
$ THEN
 | 
					$ THEN
 | 
				
			||||||
$   IF (PHASE.EQS."LIB")
 | 
					$   IF (PHASE.EQS."LIB")
 | 
				
			||||||
$   THEN
 | 
					$   THEN
 | 
				
			||||||
$     PHASE := APP
 | 
					$     PHASE := APP
 | 
				
			||||||
$     GOTO RESTART
 | 
					$     GOTO RESTART
 | 
				
			||||||
$   ELSE
 | 
					$   ELSE
 | 
				
			||||||
$     GOTO FILE_DONE
 | 
					$     GOTO APP_DONE
 | 
				
			||||||
$   ENDIF
 | 
					$   ENDIF
 | 
				
			||||||
$ ENDIF
 | 
					$ ENDIF
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Increment The Counter.
 | 
					$!  Increment The Counter.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ FILE_COUNTER = FILE_COUNTER + 1
 | 
					$ APP_COUNTER = APP_COUNTER + 1
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Check to see if this program should actually be compiled
 | 
					$!  Decide if we're building the object files or not.
 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$ IF PHASE .EQS. "APP" .AND. -
 | 
					 | 
				
			||||||
     ","+PROGRAMS+"," - (","+F$EDIT(FILE_NAME,"UPCASE")+",") .EQS. ","+PROGRAMS+","
 | 
					 | 
				
			||||||
$ THEN
 | 
					 | 
				
			||||||
$   GOTO NEXT_FILE
 | 
					 | 
				
			||||||
$ ENDIF
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$! Create The Source File Name.
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$ SOURCE_FILE = "SYS$DISK:[]" + FILE_NAME + ".C"
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$! Create The Object File Name.
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$ OBJECT_FILE = OBJ_DIR + FILE_NAME + ".OBJ"
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$! Create The Executable File Name.
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$ EXE_FILE = EXE_DIR + FILE_NAME + ".EXE"
 | 
					 | 
				
			||||||
$ ON WARNING THEN GOTO NEXT_FILE
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$! Check To See If The File We Want To Compile Actually Exists.
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$ IF (F$SEARCH(SOURCE_FILE).EQS."")
 | 
					 | 
				
			||||||
$ THEN
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$!  Tell The User That The File Dosen't Exist.
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$   WRITE SYS$OUTPUT ""
 | 
					 | 
				
			||||||
$   WRITE SYS$OUTPUT "The File ",SOURCE_FILE," Dosen't Exist."
 | 
					 | 
				
			||||||
$   WRITE SYS$OUTPUT ""
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$!  Exit The Build.
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$   GOTO EXIT
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$! End The File Exist Check.
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$ ENDIF
 | 
					 | 
				
			||||||
$!
 | 
					 | 
				
			||||||
$! Tell The User What We Are Building.
 | 
					 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ IF (PHASE.EQS."LIB")
 | 
					$ IF (PHASE.EQS."LIB")
 | 
				
			||||||
$ THEN
 | 
					$ THEN
 | 
				
			||||||
$   WRITE SYS$OUTPUT "Compiling The ",FILE_NAME,".C File."
 | 
					 | 
				
			||||||
$ ELSE
 | 
					 | 
				
			||||||
$   WRITE SYS$OUTPUT "Building The ",FILE_NAME," Application Program."
 | 
					 | 
				
			||||||
$ ENDIF
 | 
					 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Compile The File.
 | 
					$!  Define A Library File Counter And Set It To "-1".
 | 
				
			||||||
 | 
					$!  -1 Means The Application File Name Is To Be Used.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ ON ERROR THEN GOTO NEXT_FILE
 | 
					$   LIB_COUNTER = -1
 | 
				
			||||||
$ IF COMPILEWITH_CC2 - FILE_NAME .NES. COMPILEWITH_CC2
 | 
					 | 
				
			||||||
$ THEN
 | 
					 | 
				
			||||||
$   CC2/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
 | 
					 | 
				
			||||||
$ ELSE
 | 
					 | 
				
			||||||
$   CC/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
 | 
					 | 
				
			||||||
$ ENDIF
 | 
					 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ ON WARNING THEN GOTO NEXT_FILE
 | 
					$!  Create a .OPT file for the object files
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ IF (PHASE.EQS."LIB") 
 | 
					$   OPEN/WRITE OBJECTS 'EXE_DIR''CURRENT_APP'.OPT
 | 
				
			||||||
$ THEN 
 | 
					$!
 | 
				
			||||||
$   GOTO NEXT_FILE
 | 
					$!  Top Of The File Loop.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$  NEXT_LIB:
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!  O.K, Extract The File Name From The File List.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$   IF LIB_COUNTER .GE. 0
 | 
				
			||||||
 | 
					$   THEN
 | 
				
			||||||
 | 
					$     FILE_NAME = F$EDIT(F$ELEMENT(LIB_COUNTER,",",LIB_'CURRENT_APP'),"TRIM")
 | 
				
			||||||
 | 
					$   ELSE
 | 
				
			||||||
 | 
					$     FILE_NAME = CURRENT_APP
 | 
				
			||||||
 | 
					$   ENDIF
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!  Check To See If We Are At The End Of The File List.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$   IF (FILE_NAME.EQS.",")
 | 
				
			||||||
 | 
					$   THEN
 | 
				
			||||||
 | 
					$     CLOSE OBJECTS
 | 
				
			||||||
 | 
					$     GOTO NEXT_APP
 | 
				
			||||||
 | 
					$   ENDIF
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!  Increment The Counter.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$   LIB_COUNTER = LIB_COUNTER + 1
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!  Create The Source File Name.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$   SOURCE_FILE = "SYS$DISK:[]" + FILE_NAME + ".C"
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!  Create The Object File Name.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$   OBJECT_FILE = OBJ_DIR + FILE_NAME + ".OBJ"
 | 
				
			||||||
 | 
					$   ON WARNING THEN GOTO NEXT_LIB
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!  Check To See If The File We Want To Compile Actually Exists.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$   IF (F$SEARCH(SOURCE_FILE).EQS."")
 | 
				
			||||||
 | 
					$   THEN
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!    Tell The User That The File Dosen't Exist.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$     WRITE SYS$OUTPUT ""
 | 
				
			||||||
 | 
					$     WRITE SYS$OUTPUT "The File ",SOURCE_FILE," Dosen't Exist."
 | 
				
			||||||
 | 
					$     WRITE SYS$OUTPUT ""
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!    Exit The Build.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$     GOTO EXIT
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!  End The File Exist Check.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$   ENDIF
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!  Tell The User What We Are Building.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$   IF (PHASE.EQS."LIB")
 | 
				
			||||||
 | 
					$   THEN
 | 
				
			||||||
 | 
					$     WRITE SYS$OUTPUT "Compiling The ",FILE_NAME,".C File."
 | 
				
			||||||
 | 
					$   ELSE
 | 
				
			||||||
 | 
					$     WRITE SYS$OUTPUT "Building The ",FILE_NAME," Application Program."
 | 
				
			||||||
 | 
					$   ENDIF
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$!  Compile The File.
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$   ON ERROR THEN GOTO NEXT_LIB
 | 
				
			||||||
 | 
					$   IF COMPILEWITH_CC2 - FILE_NAME .NES. COMPILEWITH_CC2
 | 
				
			||||||
 | 
					$   THEN
 | 
				
			||||||
 | 
					$     CC2/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
 | 
				
			||||||
 | 
					$   ELSE
 | 
				
			||||||
 | 
					$     CC/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
 | 
				
			||||||
 | 
					$   ENDIF
 | 
				
			||||||
 | 
					$   WRITE OBJECTS OBJECT_FILE
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
 | 
					$   GOTO NEXT_LIB
 | 
				
			||||||
$ ENDIF
 | 
					$ ENDIF
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  Check if this program works well without a TCPIP library
 | 
					$!  Check if this program works well without a TCPIP library
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ IF TCPIP_LIB .EQS. "" .AND. TCPIP_PROGRAMS - FILE_NAME .NES. TCPIP_PROGRAMS
 | 
					$ IF TCPIP_LIB .EQS. "" .AND. TCPIP_PROGRAMS - CURRENT_APP .NES. TCPIP_PROGRAMS
 | 
				
			||||||
$ THEN
 | 
					$ THEN
 | 
				
			||||||
$   WRITE SYS$OUTPUT FILE_NAME," needs a TCP/IP library.  Can't link.  Skipping..."
 | 
					$   WRITE SYS$OUTPUT CURRENT_APP," needs a TCP/IP library.  Can't link.  Skipping..."
 | 
				
			||||||
$   GOTO NEXT_FILE
 | 
					$   GOTO NEXT_APP
 | 
				
			||||||
$ ENDIF
 | 
					$ ENDIF
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Link The Program.
 | 
					$! Link The Program.
 | 
				
			||||||
$! Check To See If We Are To Link With A Specific TCP/IP Library.
 | 
					$! Check To See If We Are To Link With A Specific TCP/IP Library.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
 | 
					$ ON WARNING THEN GOTO NEXT_APP
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
$ IF (TCPIP_LIB.NES."")
 | 
					$ IF (TCPIP_LIB.NES."")
 | 
				
			||||||
$ THEN
 | 
					$ THEN
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! Don't Link With The RSAREF Routines And TCP/IP Library.
 | 
					$! Don't Link With The RSAREF Routines And TCP/IP Library.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$   LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
 | 
					$   LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
 | 
				
			||||||
	'OBJECT_FILE''EXTRA_OBJ', -
 | 
						'EXE_DIR''CURRENT_APP'.OPT/OPTION, -
 | 
				
			||||||
        'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
 | 
					        'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
 | 
				
			||||||
        'TCPIP_LIB','OPT_FILE'/OPTION
 | 
					        'TCPIP_LIB','OPT_FILE'/OPTION
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
@@ -297,7 +310,7 @@ $!
 | 
				
			|||||||
$! Don't Link With The RSAREF Routines And Link With A TCP/IP Library.
 | 
					$! Don't Link With The RSAREF Routines And Link With A TCP/IP Library.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$   LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
 | 
					$   LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
 | 
				
			||||||
	'OBJECT_FILE''EXTRA_OBJ', -
 | 
						'EXE_DIR''CURRENT_APP'.OPT/OPTION, -
 | 
				
			||||||
        'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
 | 
					        'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
 | 
				
			||||||
        'OPT_FILE'/OPTION
 | 
					        'OPT_FILE'/OPTION
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
@@ -307,11 +320,11 @@ $ ENDIF
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$! Go Back And Do It Again.
 | 
					$! Go Back And Do It Again.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ GOTO NEXT_FILE
 | 
					$ GOTO NEXT_APP
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! All Done With This File.
 | 
					$! All Done With This File.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ FILE_DONE:
 | 
					$ APP_DONE:
 | 
				
			||||||
$ EXIT:
 | 
					$ EXIT:
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$! All Done, Time To Clean Up And Exit.
 | 
					$! All Done, Time To Clean Up And Exit.
 | 
				
			||||||
@@ -412,19 +425,19 @@ $!    Else...
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$     ELSE
 | 
					$     ELSE
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!      Create The AXP Linker Option File.
 | 
					$!      Create The non-VAX Linker Option File.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$       CREATE 'OPT_FILE'
 | 
					$       CREATE 'OPT_FILE'
 | 
				
			||||||
$DECK
 | 
					$DECK
 | 
				
			||||||
!
 | 
					!
 | 
				
			||||||
! Default System Options File For AXP To Link Agianst 
 | 
					! Default System Options File For non-VAX To Link Agianst 
 | 
				
			||||||
! The Sharable C Runtime Library.
 | 
					! The Sharable C Runtime Library.
 | 
				
			||||||
!
 | 
					!
 | 
				
			||||||
SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
 | 
					SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
 | 
				
			||||||
SYS$SHARE:CMA$OPEN_RTL/SHARE
 | 
					SYS$SHARE:CMA$OPEN_RTL/SHARE
 | 
				
			||||||
$EOD
 | 
					$EOD
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!    End The VAX/AXP DEC C Option File Check.
 | 
					$!    End The DEC C Option File Check.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$     ENDIF
 | 
					$     ENDIF
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
@@ -573,7 +586,7 @@ $   ELSE
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$!  Check To See If We Have VAXC Or DECC.
 | 
					$!  Check To See If We Have VAXC Or DECC.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$     IF (ARCH.EQS."AXP").OR.(F$TRNLNM("DECC$CC_DEFAULT").NES."")
 | 
					$     IF (ARCH.NES."VAX").OR.(F$TRNLNM("DECC$CC_DEFAULT").NES."")
 | 
				
			||||||
$     THEN 
 | 
					$     THEN 
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!      Looks Like DECC, Set To Use DECC.
 | 
					$!      Looks Like DECC, Set To Use DECC.
 | 
				
			||||||
@@ -683,7 +696,7 @@ $     CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/STANDARD=ANSI89" + -
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$!    Define The Linker Options File Name.
 | 
					$!    Define The Linker Options File Name.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$     OPT_FILE = "SYS$DISK:[]VAX_DECC_OPTIONS.OPT"
 | 
					$     OPT_FILE = "''EXE_DIR'VAX_DECC_OPTIONS.OPT"
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  End DECC Check.
 | 
					$!  End DECC Check.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
@@ -704,9 +717,9 @@ $!
 | 
				
			|||||||
$!    Compile Using VAXC.
 | 
					$!    Compile Using VAXC.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$     CC = "CC"
 | 
					$     CC = "CC"
 | 
				
			||||||
$     IF ARCH.EQS."AXP"
 | 
					$     IF ARCH.NES."VAX"
 | 
				
			||||||
$     THEN
 | 
					$     THEN
 | 
				
			||||||
$	WRITE SYS$OUTPUT "There is no VAX C on Alpha!"
 | 
					$	WRITE SYS$OUTPUT "There is no VAX C on ''ARCH'!"
 | 
				
			||||||
$	EXIT
 | 
					$	EXIT
 | 
				
			||||||
$     ENDIF
 | 
					$     ENDIF
 | 
				
			||||||
$     IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
 | 
					$     IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
 | 
				
			||||||
@@ -720,7 +733,7 @@ $     DEFINE/NOLOG SYS SYS$COMMON:[SYSLIB]
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$!    Define The Linker Options File Name.
 | 
					$!    Define The Linker Options File Name.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$     OPT_FILE = "SYS$DISK:[]VAX_VAXC_OPTIONS.OPT"
 | 
					$     OPT_FILE = "''EXE_DIR'VAX_VAXC_OPTIONS.OPT"
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  End VAXC Check
 | 
					$!  End VAXC Check
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
@@ -747,7 +760,7 @@ $     CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$!    Define The Linker Options File Name.
 | 
					$!    Define The Linker Options File Name.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$     OPT_FILE = "SYS$DISK:[]VAX_GNUC_OPTIONS.OPT"
 | 
					$     OPT_FILE = "''EXE_DIR'VAX_GNUC_OPTIONS.OPT"
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  End The GNU C Check.
 | 
					$!  End The GNU C Check.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,5 @@
 | 
				
			|||||||
/* nseq.c */
 | 
					/* nseq.c */
 | 
				
			||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
					/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
 | 
				
			||||||
 * project 1999.
 | 
					 * project 1999.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
/* ====================================================================
 | 
					/* ====================================================================
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										237
									
								
								apps/ocsp.c
									
									
									
									
									
								
							
							
						
						
									
										237
									
								
								apps/ocsp.c
									
									
									
									
									
								
							@@ -1,5 +1,5 @@
 | 
				
			|||||||
/* ocsp.c */
 | 
					/* ocsp.c */
 | 
				
			||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
					/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
 | 
				
			||||||
 * project 2000.
 | 
					 * project 2000.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
/* ====================================================================
 | 
					/* ====================================================================
 | 
				
			||||||
@@ -56,14 +56,14 @@
 | 
				
			|||||||
 *
 | 
					 *
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
#ifndef OPENSSL_NO_OCSP
 | 
					#ifndef OPENSSL_NO_OCSP
 | 
				
			||||||
 | 
					#define USE_SOCKETS
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <stdlib.h>
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h" /* needs to be included before the openssl headers! */
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/e_os2.h>
 | 
				
			||||||
#include <openssl/ocsp.h>
 | 
					 | 
				
			||||||
#include <openssl/err.h>
 | 
					 | 
				
			||||||
#include <openssl/ssl.h>
 | 
					#include <openssl/ssl.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* Maximum leeway in validity period: default 5 minutes */
 | 
					/* Maximum leeway in validity period: default 5 minutes */
 | 
				
			||||||
#define MAX_VALIDITY_PERIOD	(5 * 60)
 | 
					#define MAX_VALIDITY_PERIOD	(5 * 60)
 | 
				
			||||||
@@ -85,6 +85,8 @@ static char **lookup_serial(CA_DB *db, ASN1_INTEGER *ser);
 | 
				
			|||||||
static BIO *init_responder(char *port);
 | 
					static BIO *init_responder(char *port);
 | 
				
			||||||
static int do_responder(OCSP_REQUEST **preq, BIO **pcbio, BIO *acbio, char *port);
 | 
					static int do_responder(OCSP_REQUEST **preq, BIO **pcbio, BIO *acbio, char *port);
 | 
				
			||||||
static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp);
 | 
					static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp);
 | 
				
			||||||
 | 
					static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
 | 
				
			||||||
 | 
									OCSP_REQUEST *req, int req_timeout);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG ocsp_main
 | 
					#define PROG ocsp_main
 | 
				
			||||||
@@ -96,6 +98,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	ENGINE *e = NULL;
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	char **args;
 | 
						char **args;
 | 
				
			||||||
	char *host = NULL, *port = NULL, *path = "/";
 | 
						char *host = NULL, *port = NULL, *path = "/";
 | 
				
			||||||
 | 
						char *thost = NULL, *tport = NULL, *tpath = NULL;
 | 
				
			||||||
	char *reqin = NULL, *respin = NULL;
 | 
						char *reqin = NULL, *respin = NULL;
 | 
				
			||||||
	char *reqout = NULL, *respout = NULL;
 | 
						char *reqout = NULL, *respout = NULL;
 | 
				
			||||||
	char *signfile = NULL, *keyfile = NULL;
 | 
						char *signfile = NULL, *keyfile = NULL;
 | 
				
			||||||
@@ -111,11 +114,11 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	BIO *acbio = NULL, *cbio = NULL;
 | 
						BIO *acbio = NULL, *cbio = NULL;
 | 
				
			||||||
	BIO *derbio = NULL;
 | 
						BIO *derbio = NULL;
 | 
				
			||||||
	BIO *out = NULL;
 | 
						BIO *out = NULL;
 | 
				
			||||||
 | 
						int req_timeout = -1;
 | 
				
			||||||
	int req_text = 0, resp_text = 0;
 | 
						int req_text = 0, resp_text = 0;
 | 
				
			||||||
	long nsec = MAX_VALIDITY_PERIOD, maxage = -1;
 | 
						long nsec = MAX_VALIDITY_PERIOD, maxage = -1;
 | 
				
			||||||
	char *CAfile = NULL, *CApath = NULL;
 | 
						char *CAfile = NULL, *CApath = NULL;
 | 
				
			||||||
	X509_STORE *store = NULL;
 | 
						X509_STORE *store = NULL;
 | 
				
			||||||
	SSL_CTX *ctx = NULL;
 | 
					 | 
				
			||||||
	STACK_OF(X509) *sign_other = NULL, *verify_other = NULL, *rother = NULL;
 | 
						STACK_OF(X509) *sign_other = NULL, *verify_other = NULL, *rother = NULL;
 | 
				
			||||||
	char *sign_certfile = NULL, *verify_certfile = NULL, *rcertfile = NULL;
 | 
						char *sign_certfile = NULL, *verify_certfile = NULL, *rcertfile = NULL;
 | 
				
			||||||
	unsigned long sign_flags = 0, verify_flags = 0, rflags = 0;
 | 
						unsigned long sign_flags = 0, verify_flags = 0, rflags = 0;
 | 
				
			||||||
@@ -138,6 +141,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	if (!load_config(bio_err, NULL))
 | 
						if (!load_config(bio_err, NULL))
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
	SSL_load_error_strings();
 | 
						SSL_load_error_strings();
 | 
				
			||||||
 | 
						OpenSSL_add_ssl_algorithms();
 | 
				
			||||||
	args = argv + 1;
 | 
						args = argv + 1;
 | 
				
			||||||
	reqnames = sk_new_null();
 | 
						reqnames = sk_new_null();
 | 
				
			||||||
	ids = sk_OCSP_CERTID_new_null();
 | 
						ids = sk_OCSP_CERTID_new_null();
 | 
				
			||||||
@@ -152,8 +156,30 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
				}
 | 
									}
 | 
				
			||||||
			else badarg = 1;
 | 
								else badarg = 1;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp(*args, "-timeout"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									req_timeout = atol(*args);
 | 
				
			||||||
 | 
									if (req_timeout < 0)
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										BIO_printf(bio_err,
 | 
				
			||||||
 | 
											"Illegal timeout value %s\n",
 | 
				
			||||||
 | 
											*args);
 | 
				
			||||||
 | 
										badarg = 1;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (!strcmp(*args, "-url"))
 | 
							else if (!strcmp(*args, "-url"))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
 | 
								if (thost)
 | 
				
			||||||
 | 
									OPENSSL_free(thost);
 | 
				
			||||||
 | 
								if (tport)
 | 
				
			||||||
 | 
									OPENSSL_free(tport);
 | 
				
			||||||
 | 
								if (tpath)
 | 
				
			||||||
 | 
									OPENSSL_free(tpath);
 | 
				
			||||||
			if (args[1])
 | 
								if (args[1])
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
@@ -162,6 +188,9 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
					BIO_printf(bio_err, "Error parsing URL\n");
 | 
										BIO_printf(bio_err, "Error parsing URL\n");
 | 
				
			||||||
					badarg = 1;
 | 
										badarg = 1;
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
 | 
									thost = host;
 | 
				
			||||||
 | 
									tport = port;
 | 
				
			||||||
 | 
									tpath = path;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			else badarg = 1;
 | 
								else badarg = 1;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -701,47 +730,14 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	else if (host)
 | 
						else if (host)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
#ifndef OPENSSL_NO_SOCK
 | 
					#ifndef OPENSSL_NO_SOCK
 | 
				
			||||||
		cbio = BIO_new_connect(host);
 | 
							resp = process_responder(bio_err, req, host, path,
 | 
				
			||||||
 | 
											port, use_ssl, req_timeout);
 | 
				
			||||||
 | 
							if (!resp)
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
		BIO_printf(bio_err, "Error creating connect BIO - sockets not supported.\n");
 | 
							BIO_printf(bio_err, "Error creating connect BIO - sockets not supported.\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		if (!cbio)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err, "Error creating connect BIO\n");
 | 
					 | 
				
			||||||
			goto end;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		if (port) BIO_set_conn_port(cbio, port);
 | 
					 | 
				
			||||||
		if (use_ssl == 1)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO *sbio;
 | 
					 | 
				
			||||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
					 | 
				
			||||||
			ctx = SSL_CTX_new(SSLv23_client_method());
 | 
					 | 
				
			||||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
					 | 
				
			||||||
			ctx = SSL_CTX_new(SSLv3_client_method());
 | 
					 | 
				
			||||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
					 | 
				
			||||||
			ctx = SSL_CTX_new(SSLv2_client_method());
 | 
					 | 
				
			||||||
#else
 | 
					 | 
				
			||||||
			BIO_printf(bio_err, "SSL is disabled\n");
 | 
					 | 
				
			||||||
			goto end;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
			SSL_CTX_set_mode(ctx, SSL_MODE_AUTO_RETRY);
 | 
					 | 
				
			||||||
			sbio = BIO_new_ssl(ctx, 1);
 | 
					 | 
				
			||||||
			cbio = BIO_push(sbio, cbio);
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		if (BIO_do_connect(cbio) <= 0)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err, "Error connecting BIO\n");
 | 
					 | 
				
			||||||
			goto end;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		resp = OCSP_sendreq_bio(cbio, path, req);
 | 
					 | 
				
			||||||
		BIO_free_all(cbio);
 | 
					 | 
				
			||||||
		cbio = NULL;
 | 
					 | 
				
			||||||
		if (!resp)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err, "Error querying OCSP responsder\n");
 | 
					 | 
				
			||||||
			goto end;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else if (respin)
 | 
						else if (respin)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -784,7 +780,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (i != OCSP_RESPONSE_STATUS_SUCCESSFUL)
 | 
						if (i != OCSP_RESPONSE_STATUS_SUCCESSFUL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(out, "Responder Error: %s (%ld)\n",
 | 
							BIO_printf(out, "Responder Error: %s (%d)\n",
 | 
				
			||||||
				OCSP_response_status_str(i), i);
 | 
									OCSP_response_status_str(i), i);
 | 
				
			||||||
		if (ignore_err)
 | 
							if (ignore_err)
 | 
				
			||||||
			goto redo_accept;
 | 
								goto redo_accept;
 | 
				
			||||||
@@ -850,7 +846,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		if(i <= 0)
 | 
							if(i <= 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "Response Verify Failure\n", i);
 | 
								BIO_printf(bio_err, "Response Verify Failure\n");
 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
@@ -885,13 +881,12 @@ end:
 | 
				
			|||||||
	sk_X509_pop_free(sign_other, X509_free);
 | 
						sk_X509_pop_free(sign_other, X509_free);
 | 
				
			||||||
	sk_X509_pop_free(verify_other, X509_free);
 | 
						sk_X509_pop_free(verify_other, X509_free);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (use_ssl != -1)
 | 
						if (thost)
 | 
				
			||||||
		{
 | 
							OPENSSL_free(thost);
 | 
				
			||||||
		OPENSSL_free(host);
 | 
						if (tport)
 | 
				
			||||||
		OPENSSL_free(port);
 | 
							OPENSSL_free(tport);
 | 
				
			||||||
		OPENSSL_free(path);
 | 
						if (tpath)
 | 
				
			||||||
		SSL_CTX_free(ctx);
 | 
							OPENSSL_free(tpath);
 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	OPENSSL_EXIT(ret);
 | 
						OPENSSL_EXIT(ret);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
@@ -1114,6 +1109,7 @@ static char **lookup_serial(CA_DB *db, ASN1_INTEGER *ser)
 | 
				
			|||||||
	char *itmp, *row[DB_NUMBER],**rrow;
 | 
						char *itmp, *row[DB_NUMBER],**rrow;
 | 
				
			||||||
	for (i = 0; i < DB_NUMBER; i++) row[i] = NULL;
 | 
						for (i = 0; i < DB_NUMBER; i++) row[i] = NULL;
 | 
				
			||||||
	bn = ASN1_INTEGER_to_BN(ser,NULL);
 | 
						bn = ASN1_INTEGER_to_BN(ser,NULL);
 | 
				
			||||||
 | 
						OPENSSL_assert(bn); /* FIXME: should report an error at this point and abort */
 | 
				
			||||||
	if (BN_is_zero(bn))
 | 
						if (BN_is_zero(bn))
 | 
				
			||||||
		itmp = BUF_strdup("00");
 | 
							itmp = BUF_strdup("00");
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
@@ -1220,8 +1216,141 @@ static int send_ocsp_response(BIO *cbio, OCSP_RESPONSE *resp)
 | 
				
			|||||||
		return 0;
 | 
							return 0;
 | 
				
			||||||
	BIO_printf(cbio, http_resp, i2d_OCSP_RESPONSE(resp, NULL));
 | 
						BIO_printf(cbio, http_resp, i2d_OCSP_RESPONSE(resp, NULL));
 | 
				
			||||||
	i2d_OCSP_RESPONSE_bio(cbio, resp);
 | 
						i2d_OCSP_RESPONSE_bio(cbio, resp);
 | 
				
			||||||
	BIO_flush(cbio);
 | 
						(void)BIO_flush(cbio);
 | 
				
			||||||
	return 1;
 | 
						return 1;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static OCSP_RESPONSE *query_responder(BIO *err, BIO *cbio, char *path,
 | 
				
			||||||
 | 
									OCSP_REQUEST *req, int req_timeout)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						int fd;
 | 
				
			||||||
 | 
						int rv;
 | 
				
			||||||
 | 
						OCSP_REQ_CTX *ctx = NULL;
 | 
				
			||||||
 | 
						OCSP_RESPONSE *rsp = NULL;
 | 
				
			||||||
 | 
						fd_set confds;
 | 
				
			||||||
 | 
						struct timeval tv;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (req_timeout != -1)
 | 
				
			||||||
 | 
							BIO_set_nbio(cbio, 1);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						rv = BIO_do_connect(cbio);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if ((rv <= 0) && ((req_timeout == -1) || !BIO_should_retry(cbio)))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_puts(err, "Error connecting BIO\n");
 | 
				
			||||||
 | 
							return NULL;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (req_timeout == -1)
 | 
				
			||||||
 | 
							return OCSP_sendreq_bio(cbio, path, req);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (BIO_get_fd(cbio, &fd) <= 0)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_puts(err, "Can't get connection fd\n");
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (rv <= 0)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							FD_ZERO(&confds);
 | 
				
			||||||
 | 
							openssl_fdset(fd, &confds);
 | 
				
			||||||
 | 
							tv.tv_usec = 0;
 | 
				
			||||||
 | 
							tv.tv_sec = req_timeout;
 | 
				
			||||||
 | 
							rv = select(fd + 1, NULL, (void *)&confds, NULL, &tv);
 | 
				
			||||||
 | 
							if (rv == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_puts(err, "Timeout on connect\n");
 | 
				
			||||||
 | 
								return NULL;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ctx = OCSP_sendreq_new(cbio, path, req, -1);
 | 
				
			||||||
 | 
						if (!ctx)
 | 
				
			||||||
 | 
							return NULL;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						for (;;)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							rv = OCSP_sendreq_nbio(&rsp, ctx);
 | 
				
			||||||
 | 
							if (rv != -1)
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
							FD_ZERO(&confds);
 | 
				
			||||||
 | 
							openssl_fdset(fd, &confds);
 | 
				
			||||||
 | 
							tv.tv_usec = 0;
 | 
				
			||||||
 | 
							tv.tv_sec = req_timeout;
 | 
				
			||||||
 | 
							if (BIO_should_read(cbio))
 | 
				
			||||||
 | 
								rv = select(fd + 1, (void *)&confds, NULL, NULL, &tv);
 | 
				
			||||||
 | 
							else if (BIO_should_write(cbio))
 | 
				
			||||||
 | 
								rv = select(fd + 1, NULL, (void *)&confds, NULL, &tv);
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_puts(err, "Unexpected retry condition\n");
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (rv == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_puts(err, "Timeout on request\n");
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (rv == -1)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_puts(err, "Select error\n");
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						err:
 | 
				
			||||||
 | 
						if (ctx)
 | 
				
			||||||
 | 
							OCSP_REQ_CTX_free(ctx);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return rsp;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
 | 
				
			||||||
 | 
								char *host, char *path, char *port, int use_ssl,
 | 
				
			||||||
 | 
								int req_timeout)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIO *cbio = NULL;
 | 
				
			||||||
 | 
						SSL_CTX *ctx = NULL;
 | 
				
			||||||
 | 
						OCSP_RESPONSE *resp = NULL;
 | 
				
			||||||
 | 
						cbio = BIO_new_connect(host);
 | 
				
			||||||
 | 
						if (!cbio)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(err, "Error creating connect BIO\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (port) BIO_set_conn_port(cbio, port);
 | 
				
			||||||
 | 
						if (use_ssl == 1)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *sbio;
 | 
				
			||||||
 | 
					#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
				
			||||||
 | 
							ctx = SSL_CTX_new(SSLv23_client_method());
 | 
				
			||||||
 | 
					#elif !defined(OPENSSL_NO_SSL3)
 | 
				
			||||||
 | 
							ctx = SSL_CTX_new(SSLv3_client_method());
 | 
				
			||||||
 | 
					#elif !defined(OPENSSL_NO_SSL2)
 | 
				
			||||||
 | 
							ctx = SSL_CTX_new(SSLv2_client_method());
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
							BIO_printf(err, "SSL is disabled\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							if (ctx == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(err, "Error creating SSL context.\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							SSL_CTX_set_mode(ctx, SSL_MODE_AUTO_RETRY);
 | 
				
			||||||
 | 
							sbio = BIO_new_ssl(ctx, 1);
 | 
				
			||||||
 | 
							cbio = BIO_push(sbio, cbio);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						resp = query_responder(err, cbio, path, req, req_timeout);
 | 
				
			||||||
 | 
						if (!resp)
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error querying OCSP responder\n");
 | 
				
			||||||
 | 
						end:
 | 
				
			||||||
 | 
						if (ctx)
 | 
				
			||||||
 | 
							SSL_CTX_free(ctx);
 | 
				
			||||||
 | 
						if (cbio)
 | 
				
			||||||
 | 
							BIO_free_all(cbio);
 | 
				
			||||||
 | 
						return resp;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -44,8 +44,8 @@ new_certs_dir	= $dir.newcerts]		# default place for new certs.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
certificate	= $dir]cacert.pem 	# The CA certificate
 | 
					certificate	= $dir]cacert.pem 	# The CA certificate
 | 
				
			||||||
serial		= $dir]serial. 		# The current serial number
 | 
					serial		= $dir]serial. 		# The current serial number
 | 
				
			||||||
#crlnumber	= $dir]crlnumber.	# the current crl number must be
 | 
					crlnumber	= $dir]crlnumber.	# the current crl number
 | 
				
			||||||
					# commented out to leave a V1 CRL
 | 
										# must be commented out to leave a V1 CRL
 | 
				
			||||||
crl		= $dir]crl.pem 		# The current CRL
 | 
					crl		= $dir]crl.pem 		# The current CRL
 | 
				
			||||||
private_key	= $dir.private]cakey.pem# The private key
 | 
					private_key	= $dir.private]cakey.pem# The private key
 | 
				
			||||||
RANDFILE	= $dir.private].rand	# private random number file
 | 
					RANDFILE	= $dir.private].rand	# private random number file
 | 
				
			||||||
@@ -67,7 +67,7 @@ cert_opt 	= ca_default		# Certificate field options
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
default_days	= 365			# how long to certify for
 | 
					default_days	= 365			# how long to certify for
 | 
				
			||||||
default_crl_days= 30			# how long before next CRL
 | 
					default_crl_days= 30			# how long before next CRL
 | 
				
			||||||
default_md	= md5			# which md to use.
 | 
					default_md	= sha1			# which md to use.
 | 
				
			||||||
preserve	= no			# keep passed DN ordering
 | 
					preserve	= no			# keep passed DN ordering
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# A few difference way of specifying how similar the request should look
 | 
					# A few difference way of specifying how similar the request should look
 | 
				
			||||||
@@ -141,7 +141,7 @@ localityName			= Locality Name (eg, city)
 | 
				
			|||||||
organizationalUnitName		= Organizational Unit Name (eg, section)
 | 
					organizationalUnitName		= Organizational Unit Name (eg, section)
 | 
				
			||||||
#organizationalUnitName_default	=
 | 
					#organizationalUnitName_default	=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
commonName			= Common Name (eg, YOUR name)
 | 
					commonName			= Common Name (e.g. server FQDN or YOUR name)
 | 
				
			||||||
commonName_max			= 64
 | 
					commonName_max			= 64
 | 
				
			||||||
 | 
					
 | 
				
			||||||
emailAddress			= Email Address
 | 
					emailAddress			= Email Address
 | 
				
			||||||
@@ -188,7 +188,7 @@ nsComment			= "OpenSSL Generated Certificate"
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
# PKIX recommendations harmless if included in all certificates.
 | 
					# PKIX recommendations harmless if included in all certificates.
 | 
				
			||||||
subjectKeyIdentifier=hash
 | 
					subjectKeyIdentifier=hash
 | 
				
			||||||
authorityKeyIdentifier=keyid,issuer:always
 | 
					authorityKeyIdentifier=keyid,issuer
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# This stuff is for subjectAltName and issuerAltname.
 | 
					# This stuff is for subjectAltName and issuerAltname.
 | 
				
			||||||
# Import the email address.
 | 
					# Import the email address.
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -56,7 +56,7 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
/* ====================================================================
 | 
					/* ====================================================================
 | 
				
			||||||
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
 | 
					 * Copyright (c) 1998-2006 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Redistribution and use in source and binary forms, with or without
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 * modification, are permitted provided that the following conditions
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
@@ -129,7 +129,6 @@
 | 
				
			|||||||
#include "progs.h"
 | 
					#include "progs.h"
 | 
				
			||||||
#include "s_apps.h"
 | 
					#include "s_apps.h"
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/fips.h>
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* The LHASH callbacks ("hash" & "cmp") have been replaced by functions with the
 | 
					/* The LHASH callbacks ("hash" & "cmp") have been replaced by functions with the
 | 
				
			||||||
 * base prototypes (we cast each variable inside the function to the required
 | 
					 * base prototypes (we cast each variable inside the function to the required
 | 
				
			||||||
@@ -222,7 +221,8 @@ int main(int Argc, char *Argv[])
 | 
				
			|||||||
#define PROG_NAME_SIZE	39
 | 
					#define PROG_NAME_SIZE	39
 | 
				
			||||||
	char pname[PROG_NAME_SIZE+1];
 | 
						char pname[PROG_NAME_SIZE+1];
 | 
				
			||||||
	FUNCTION f,*fp;
 | 
						FUNCTION f,*fp;
 | 
				
			||||||
	MS_STATIC char *prompt,buf[1024];
 | 
						MS_STATIC const char *prompt;
 | 
				
			||||||
 | 
						MS_STATIC char buf[1024];
 | 
				
			||||||
	char *to_free=NULL;
 | 
						char *to_free=NULL;
 | 
				
			||||||
	int n,i,ret=0;
 | 
						int n,i,ret=0;
 | 
				
			||||||
	int argc;
 | 
						int argc;
 | 
				
			||||||
@@ -235,23 +235,20 @@ int main(int Argc, char *Argv[])
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	in_FIPS_mode = 0;
 | 
						in_FIPS_mode = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef OPENSSL_FIPS
 | 
					 | 
				
			||||||
	if(getenv("OPENSSL_FIPS")) {
 | 
						if(getenv("OPENSSL_FIPS")) {
 | 
				
			||||||
#if defined(_WIN32)
 | 
					#ifdef OPENSSL_FIPS
 | 
				
			||||||
		char filename[MAX_PATH] = "";
 | 
							if (!FIPS_mode_set(1)) {
 | 
				
			||||||
		GetModuleFileNameA( NULL, filename, MAX_PATH) ;
 | 
					 | 
				
			||||||
		p = filename;
 | 
					 | 
				
			||||||
#else
 | 
					 | 
				
			||||||
		p = Argv[0];
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
		if (!FIPS_mode_set(1,p)) {
 | 
					 | 
				
			||||||
			ERR_load_crypto_strings();
 | 
								ERR_load_crypto_strings();
 | 
				
			||||||
			ERR_print_errors(BIO_new_fp(stderr,BIO_NOCLOSE));
 | 
								ERR_print_errors(BIO_new_fp(stderr,BIO_NOCLOSE));
 | 
				
			||||||
			EXIT(1);
 | 
								EXIT(1);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		in_FIPS_mode = 1;
 | 
							in_FIPS_mode = 1;
 | 
				
			||||||
		}
 | 
					#else
 | 
				
			||||||
 | 
							fprintf(stderr, "FIPS mode not supported.\n");
 | 
				
			||||||
 | 
							EXIT(1);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bio_err == NULL)
 | 
						if (bio_err == NULL)
 | 
				
			||||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
							if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
@@ -339,7 +336,8 @@ int main(int Argc, char *Argv[])
 | 
				
			|||||||
			else	prompt="OpenSSL> ";
 | 
								else	prompt="OpenSSL> ";
 | 
				
			||||||
			fputs(prompt,stdout);
 | 
								fputs(prompt,stdout);
 | 
				
			||||||
			fflush(stdout);
 | 
								fflush(stdout);
 | 
				
			||||||
			fgets(p,n,stdin);
 | 
								if (!fgets(p,n,stdin))
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
			if (p[0] == '\0') goto end;
 | 
								if (p[0] == '\0') goto end;
 | 
				
			||||||
			i=strlen(p);
 | 
								i=strlen(p);
 | 
				
			||||||
			if (i <= 1) break;
 | 
								if (i <= 1) break;
 | 
				
			||||||
@@ -465,7 +463,11 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
 | 
				
			|||||||
		for (fp=functions; fp->name != NULL; fp++)
 | 
							for (fp=functions; fp->name != NULL; fp++)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			nl=0;
 | 
								nl=0;
 | 
				
			||||||
 | 
					#ifdef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
			if (((i++) % 5) == 0)
 | 
								if (((i++) % 5) == 0)
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
								if (((i++) % 4) == 0)
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(bio_err,"\n");
 | 
									BIO_printf(bio_err,"\n");
 | 
				
			||||||
				nl=1;
 | 
									nl=1;
 | 
				
			||||||
@@ -486,7 +488,11 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
 | 
				
			|||||||
					BIO_printf(bio_err,"\nCipher commands (see the `enc' command for more details)\n");
 | 
										BIO_printf(bio_err,"\nCipher commands (see the `enc' command for more details)\n");
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					#ifdef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
			BIO_printf(bio_err,"%-15s",fp->name);
 | 
								BIO_printf(bio_err,"%-15s",fp->name);
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"%-18s",fp->name);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		BIO_printf(bio_err,"\n\n");
 | 
							BIO_printf(bio_err,"\n\n");
 | 
				
			||||||
		ret=0;
 | 
							ret=0;
 | 
				
			||||||
@@ -509,7 +515,7 @@ static LHASH *prog_init(void)
 | 
				
			|||||||
	{
 | 
						{
 | 
				
			||||||
	LHASH *ret;
 | 
						LHASH *ret;
 | 
				
			||||||
	FUNCTION *f;
 | 
						FUNCTION *f;
 | 
				
			||||||
	int i;
 | 
						size_t i;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* Purely so it looks nice when the user hits ? */
 | 
						/* Purely so it looks nice when the user hits ? */
 | 
				
			||||||
	for(i=0,f=functions ; f->name != NULL ; ++f,++i)
 | 
						for(i=0,f=functions ; f->name != NULL ; ++f,++i)
 | 
				
			||||||
@@ -527,12 +533,12 @@ static LHASH *prog_init(void)
 | 
				
			|||||||
/* static int MS_CALLBACK cmp(FUNCTION *a, FUNCTION *b) */
 | 
					/* static int MS_CALLBACK cmp(FUNCTION *a, FUNCTION *b) */
 | 
				
			||||||
static int MS_CALLBACK cmp(const void *a_void, const void *b_void)
 | 
					static int MS_CALLBACK cmp(const void *a_void, const void *b_void)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	return(strncmp(((FUNCTION *)a_void)->name,
 | 
						return(strncmp(((const FUNCTION *)a_void)->name,
 | 
				
			||||||
			((FUNCTION *)b_void)->name,8));
 | 
								((const FUNCTION *)b_void)->name,8));
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a) */
 | 
					/* static unsigned long MS_CALLBACK hash(FUNCTION *a) */
 | 
				
			||||||
static unsigned long MS_CALLBACK hash(const void *a_void)
 | 
					static unsigned long MS_CALLBACK hash(const void *a_void)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	return(lh_strhash(((FUNCTION *)a_void)->name));
 | 
						return(lh_strhash(((const FUNCTION *)a_void)->name));
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -44,8 +44,8 @@ new_certs_dir	= $dir/newcerts		# default place for new certs.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
certificate	= $dir/cacert.pem 	# The CA certificate
 | 
					certificate	= $dir/cacert.pem 	# The CA certificate
 | 
				
			||||||
serial		= $dir/serial 		# The current serial number
 | 
					serial		= $dir/serial 		# The current serial number
 | 
				
			||||||
#crlnumber	= $dir/crlnumber	# the current crl number must be
 | 
					crlnumber	= $dir/crlnumber	# the current crl number
 | 
				
			||||||
					# commented out to leave a V1 CRL
 | 
										# must be commented out to leave a V1 CRL
 | 
				
			||||||
crl		= $dir/crl.pem 		# The current CRL
 | 
					crl		= $dir/crl.pem 		# The current CRL
 | 
				
			||||||
private_key	= $dir/private/cakey.pem# The private key
 | 
					private_key	= $dir/private/cakey.pem# The private key
 | 
				
			||||||
RANDFILE	= $dir/private/.rand	# private random number file
 | 
					RANDFILE	= $dir/private/.rand	# private random number file
 | 
				
			||||||
@@ -67,7 +67,7 @@ cert_opt 	= ca_default		# Certificate field options
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
default_days	= 365			# how long to certify for
 | 
					default_days	= 365			# how long to certify for
 | 
				
			||||||
default_crl_days= 30			# how long before next CRL
 | 
					default_crl_days= 30			# how long before next CRL
 | 
				
			||||||
default_md	= md5			# which md to use.
 | 
					default_md	= sha1			# which md to use.
 | 
				
			||||||
preserve	= no			# keep passed DN ordering
 | 
					preserve	= no			# keep passed DN ordering
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# A few difference way of specifying how similar the request should look
 | 
					# A few difference way of specifying how similar the request should look
 | 
				
			||||||
@@ -141,7 +141,7 @@ localityName			= Locality Name (eg, city)
 | 
				
			|||||||
organizationalUnitName		= Organizational Unit Name (eg, section)
 | 
					organizationalUnitName		= Organizational Unit Name (eg, section)
 | 
				
			||||||
#organizationalUnitName_default	=
 | 
					#organizationalUnitName_default	=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
commonName			= Common Name (eg, YOUR name)
 | 
					commonName			= Common Name (e.g. server FQDN or YOUR name)
 | 
				
			||||||
commonName_max			= 64
 | 
					commonName_max			= 64
 | 
				
			||||||
 | 
					
 | 
				
			||||||
emailAddress			= Email Address
 | 
					emailAddress			= Email Address
 | 
				
			||||||
@@ -188,7 +188,7 @@ nsComment			= "OpenSSL Generated Certificate"
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
# PKIX recommendations harmless if included in all certificates.
 | 
					# PKIX recommendations harmless if included in all certificates.
 | 
				
			||||||
subjectKeyIdentifier=hash
 | 
					subjectKeyIdentifier=hash
 | 
				
			||||||
authorityKeyIdentifier=keyid,issuer:always
 | 
					authorityKeyIdentifier=keyid,issuer
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# This stuff is for subjectAltName and issuerAltname.
 | 
					# This stuff is for subjectAltName and issuerAltname.
 | 
				
			||||||
# Import the email address.
 | 
					# Import the email address.
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -312,7 +312,8 @@ static char *md5crypt(const char *passwd, const char *magic, const char *salt)
 | 
				
			|||||||
	static char out_buf[6 + 9 + 24 + 2]; /* "$apr1$..salt..$.......md5hash..........\0" */
 | 
						static char out_buf[6 + 9 + 24 + 2]; /* "$apr1$..salt..$.......md5hash..........\0" */
 | 
				
			||||||
	unsigned char buf[MD5_DIGEST_LENGTH];
 | 
						unsigned char buf[MD5_DIGEST_LENGTH];
 | 
				
			||||||
	char *salt_out;
 | 
						char *salt_out;
 | 
				
			||||||
	int n, i;
 | 
						int n;
 | 
				
			||||||
 | 
						unsigned int i;
 | 
				
			||||||
	EVP_MD_CTX md,md2;
 | 
						EVP_MD_CTX md,md2;
 | 
				
			||||||
	size_t passwd_len, salt_len;
 | 
						size_t passwd_len, salt_len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -358,13 +359,13 @@ static char *md5crypt(const char *passwd, const char *magic, const char *salt)
 | 
				
			|||||||
	for (i = 0; i < 1000; i++)
 | 
						for (i = 0; i < 1000; i++)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		EVP_DigestInit_ex(&md2,EVP_md5(), NULL);
 | 
							EVP_DigestInit_ex(&md2,EVP_md5(), NULL);
 | 
				
			||||||
		EVP_DigestUpdate(&md2, (i & 1) ? (unsigned char *) passwd : buf,
 | 
							EVP_DigestUpdate(&md2, (i & 1) ? (unsigned const char *) passwd : buf,
 | 
				
			||||||
		                       (i & 1) ? passwd_len : sizeof buf);
 | 
							                       (i & 1) ? passwd_len : sizeof buf);
 | 
				
			||||||
		if (i % 3)
 | 
							if (i % 3)
 | 
				
			||||||
			EVP_DigestUpdate(&md2, salt_out, salt_len);
 | 
								EVP_DigestUpdate(&md2, salt_out, salt_len);
 | 
				
			||||||
		if (i % 7)
 | 
							if (i % 7)
 | 
				
			||||||
			EVP_DigestUpdate(&md2, passwd, passwd_len);
 | 
								EVP_DigestUpdate(&md2, passwd, passwd_len);
 | 
				
			||||||
		EVP_DigestUpdate(&md2, (i & 1) ? buf : (unsigned char *) passwd,
 | 
							EVP_DigestUpdate(&md2, (i & 1) ? buf : (unsigned const char *) passwd,
 | 
				
			||||||
		                       (i & 1) ? sizeof buf : passwd_len);
 | 
							                       (i & 1) ? sizeof buf : passwd_len);
 | 
				
			||||||
		EVP_DigestFinal_ex(&md2, buf, NULL);
 | 
							EVP_DigestFinal_ex(&md2, buf, NULL);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -473,7 +474,8 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
 | 
				
			|||||||
	if ((strlen(passwd) > pw_maxlen))
 | 
						if ((strlen(passwd) > pw_maxlen))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (!quiet)
 | 
							if (!quiet)
 | 
				
			||||||
			BIO_printf(bio_err, "Warning: truncating password to %u characters\n", pw_maxlen);
 | 
								/* XXX: really we should know how to print a size_t, not cast it */
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Warning: truncating password to %u characters\n", (unsigned)pw_maxlen);
 | 
				
			||||||
		passwd[pw_maxlen] = 0;
 | 
							passwd[pw_maxlen] = 0;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	assert(strlen(passwd) <= pw_maxlen);
 | 
						assert(strlen(passwd) <= pw_maxlen);
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										331
									
								
								apps/pkcs12.c
									
									
									
									
									
								
							
							
						
						
									
										331
									
								
								apps/pkcs12.c
									
									
									
									
									
								
							@@ -1,11 +1,9 @@
 | 
				
			|||||||
/* pkcs12.c */
 | 
					/* pkcs12.c */
 | 
				
			||||||
#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)
 | 
					/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
 | 
				
			||||||
 | 
					 * project.
 | 
				
			||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
					 | 
				
			||||||
 * project 1999.
 | 
					 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
/* ====================================================================
 | 
					/* ====================================================================
 | 
				
			||||||
 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
 | 
					 * Copyright (c) 1999-2006 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Redistribution and use in source and binary forms, with or without
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 * modification, are permitted provided that the following conditions
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
@@ -58,6 +56,9 @@
 | 
				
			|||||||
 *
 | 
					 *
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>
 | 
				
			||||||
 | 
					#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
@@ -67,6 +68,12 @@
 | 
				
			|||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
#include <openssl/pkcs12.h>
 | 
					#include <openssl/pkcs12.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef OPENSSL_SYS_NETWARE
 | 
				
			||||||
 | 
					/* Rename these functions to avoid name clashes on NetWare OS */
 | 
				
			||||||
 | 
					#define uni2asc OPENSSL_uni2asc
 | 
				
			||||||
 | 
					#define asc2uni OPENSSL_asc2uni
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define PROG pkcs12_main
 | 
					#define PROG pkcs12_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
const EVP_CIPHER *enc;
 | 
					const EVP_CIPHER *enc;
 | 
				
			||||||
@@ -83,7 +90,7 @@ int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int opti
 | 
				
			|||||||
int dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass,
 | 
					int dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass,
 | 
				
			||||||
			  int passlen, int options, char *pempass);
 | 
								  int passlen, int options, char *pempass);
 | 
				
			||||||
int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass, int passlen, int options, char *pempass);
 | 
					int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass, int passlen, int options, char *pempass);
 | 
				
			||||||
int print_attribs(BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst, char *name);
 | 
					int print_attribs(BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst,const char *name);
 | 
				
			||||||
void hex_prin(BIO *out, unsigned char *buf, int len);
 | 
					void hex_prin(BIO *out, unsigned char *buf, int len);
 | 
				
			||||||
int alg_print(BIO *x, X509_ALGOR *alg);
 | 
					int alg_print(BIO *x, X509_ALGOR *alg);
 | 
				
			||||||
int cert_load(BIO *in, STACK_OF(X509) *sk);
 | 
					int cert_load(BIO *in, STACK_OF(X509) *sk);
 | 
				
			||||||
@@ -99,6 +106,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
    char **args;
 | 
					    char **args;
 | 
				
			||||||
    char *name = NULL;
 | 
					    char *name = NULL;
 | 
				
			||||||
    char *csp_name = NULL;
 | 
					    char *csp_name = NULL;
 | 
				
			||||||
 | 
					    int add_lmk = 0;
 | 
				
			||||||
    PKCS12 *p12 = NULL;
 | 
					    PKCS12 *p12 = NULL;
 | 
				
			||||||
    char pass[50], macpass[50];
 | 
					    char pass[50], macpass[50];
 | 
				
			||||||
    int export_cert = 0;
 | 
					    int export_cert = 0;
 | 
				
			||||||
@@ -159,25 +167,38 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
    			cert_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
					    			cert_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
				
			||||||
		else if (!strcmp (*args, "-export")) export_cert = 1;
 | 
							else if (!strcmp (*args, "-export")) export_cert = 1;
 | 
				
			||||||
		else if (!strcmp (*args, "-des")) enc=EVP_des_cbc();
 | 
							else if (!strcmp (*args, "-des")) enc=EVP_des_cbc();
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-des3")) enc = EVP_des_ede3_cbc();
 | 
				
			||||||
#ifndef OPENSSL_NO_IDEA
 | 
					#ifndef OPENSSL_NO_IDEA
 | 
				
			||||||
		else if (!strcmp (*args, "-idea")) enc=EVP_idea_cbc();
 | 
							else if (!strcmp (*args, "-idea")) enc=EVP_idea_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		else if (!strcmp (*args, "-des3")) enc = EVP_des_ede3_cbc();
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
							else if (!strcmp(*args, "-seed")) enc=EVP_seed_cbc();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_AES
 | 
					#ifndef OPENSSL_NO_AES
 | 
				
			||||||
		else if (!strcmp(*args,"-aes128")) enc=EVP_aes_128_cbc();
 | 
							else if (!strcmp(*args,"-aes128")) enc=EVP_aes_128_cbc();
 | 
				
			||||||
		else if (!strcmp(*args,"-aes192")) enc=EVP_aes_192_cbc();
 | 
							else if (!strcmp(*args,"-aes192")) enc=EVP_aes_192_cbc();
 | 
				
			||||||
		else if (!strcmp(*args,"-aes256")) enc=EVP_aes_256_cbc();
 | 
							else if (!strcmp(*args,"-aes256")) enc=EVP_aes_256_cbc();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
							else if (!strcmp(*args,"-camellia128")) enc=EVP_camellia_128_cbc();
 | 
				
			||||||
 | 
							else if (!strcmp(*args,"-camellia192")) enc=EVP_camellia_192_cbc();
 | 
				
			||||||
 | 
							else if (!strcmp(*args,"-camellia256")) enc=EVP_camellia_256_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		else if (!strcmp (*args, "-noiter")) iter = 1;
 | 
							else if (!strcmp (*args, "-noiter")) iter = 1;
 | 
				
			||||||
		else if (!strcmp (*args, "-maciter"))
 | 
							else if (!strcmp (*args, "-maciter"))
 | 
				
			||||||
					 maciter = PKCS12_DEFAULT_ITER;
 | 
										 maciter = PKCS12_DEFAULT_ITER;
 | 
				
			||||||
		else if (!strcmp (*args, "-nomaciter"))
 | 
							else if (!strcmp (*args, "-nomaciter"))
 | 
				
			||||||
					 maciter = 1;
 | 
										 maciter = 1;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nomac"))
 | 
				
			||||||
 | 
										 maciter = -1;
 | 
				
			||||||
		else if (!strcmp (*args, "-nodes")) enc=NULL;
 | 
							else if (!strcmp (*args, "-nodes")) enc=NULL;
 | 
				
			||||||
		else if (!strcmp (*args, "-certpbe")) {
 | 
							else if (!strcmp (*args, "-certpbe")) {
 | 
				
			||||||
			if (args[1]) {
 | 
								if (args[1]) {
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				cert_pbe=OBJ_txt2nid(*args);
 | 
									if (!strcmp(*args, "NONE"))
 | 
				
			||||||
 | 
										cert_pbe = -1;
 | 
				
			||||||
 | 
									else
 | 
				
			||||||
 | 
										cert_pbe=OBJ_txt2nid(*args);
 | 
				
			||||||
				if(cert_pbe == NID_undef) {
 | 
									if(cert_pbe == NID_undef) {
 | 
				
			||||||
					BIO_printf(bio_err,
 | 
										BIO_printf(bio_err,
 | 
				
			||||||
						 "Unknown PBE algorithm %s\n", *args);
 | 
											 "Unknown PBE algorithm %s\n", *args);
 | 
				
			||||||
@@ -187,7 +208,10 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		} else if (!strcmp (*args, "-keypbe")) {
 | 
							} else if (!strcmp (*args, "-keypbe")) {
 | 
				
			||||||
			if (args[1]) {
 | 
								if (args[1]) {
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				key_pbe=OBJ_txt2nid(*args);
 | 
									if (!strcmp(*args, "NONE"))
 | 
				
			||||||
 | 
										key_pbe = -1;
 | 
				
			||||||
 | 
									else
 | 
				
			||||||
 | 
										key_pbe=OBJ_txt2nid(*args);
 | 
				
			||||||
				if(key_pbe == NID_undef) {
 | 
									if(key_pbe == NID_undef) {
 | 
				
			||||||
					BIO_printf(bio_err,
 | 
										BIO_printf(bio_err,
 | 
				
			||||||
						 "Unknown PBE algorithm %s\n", *args);
 | 
											 "Unknown PBE algorithm %s\n", *args);
 | 
				
			||||||
@@ -214,7 +238,9 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			args++;	
 | 
								args++;	
 | 
				
			||||||
			name = *args;
 | 
								name = *args;
 | 
				
			||||||
		    } else badarg = 1;
 | 
							    } else badarg = 1;
 | 
				
			||||||
		} else if (!strcmp (*args, "-CSP")) {
 | 
							} else if (!strcmp (*args, "-LMK"))
 | 
				
			||||||
 | 
								add_lmk = 1;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-CSP")) {
 | 
				
			||||||
		    if (args[1]) {
 | 
							    if (args[1]) {
 | 
				
			||||||
			args++;	
 | 
								args++;	
 | 
				
			||||||
			csp_name = *args;
 | 
								csp_name = *args;
 | 
				
			||||||
@@ -299,9 +325,16 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
#ifndef OPENSSL_NO_IDEA
 | 
					#ifndef OPENSSL_NO_IDEA
 | 
				
			||||||
	BIO_printf (bio_err, "-idea         encrypt private keys with idea\n");
 | 
						BIO_printf (bio_err, "-idea         encrypt private keys with idea\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "-seed         encrypt private keys with seed\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_AES
 | 
					#ifndef OPENSSL_NO_AES
 | 
				
			||||||
	BIO_printf (bio_err, "-aes128, -aes192, -aes256\n");
 | 
						BIO_printf (bio_err, "-aes128, -aes192, -aes256\n");
 | 
				
			||||||
	BIO_printf (bio_err, "              encrypt PEM output with cbc aes\n");
 | 
						BIO_printf (bio_err, "              encrypt PEM output with cbc aes\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "-camellia128, -camellia192, -camellia256\n");
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "              encrypt PEM output with cbc camellia\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	BIO_printf (bio_err, "-nodes        don't encrypt private keys\n");
 | 
						BIO_printf (bio_err, "-nodes        don't encrypt private keys\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-noiter       don't use encryption iteration\n");
 | 
						BIO_printf (bio_err, "-noiter       don't use encryption iteration\n");
 | 
				
			||||||
@@ -321,6 +354,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	BIO_printf(bio_err,  "-rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
						BIO_printf(bio_err,  "-rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
	BIO_printf(bio_err,  "              load the file (or the files in the directory) into\n");
 | 
						BIO_printf(bio_err,  "              load the file (or the files in the directory) into\n");
 | 
				
			||||||
	BIO_printf(bio_err,  "              the random number generator\n");
 | 
						BIO_printf(bio_err,  "              the random number generator\n");
 | 
				
			||||||
 | 
					  	BIO_printf(bio_err,  "-CSP name     Microsoft CSP name\n");
 | 
				
			||||||
 | 
					 	BIO_printf(bio_err,  "-LMK          Add local machine keyset attribute to private key\n");
 | 
				
			||||||
    	goto end;
 | 
					    	goto end;
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -372,24 +407,6 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	    goto end;
 | 
						    goto end;
 | 
				
			||||||
   }
 | 
					   }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if 0
 | 
					 | 
				
			||||||
   if (certfile) {
 | 
					 | 
				
			||||||
    	if(!(certsin = BIO_new_file(certfile, "r"))) {
 | 
					 | 
				
			||||||
	    BIO_printf(bio_err, "Can't open certificate file %s\n", certfile);
 | 
					 | 
				
			||||||
	    perror (certfile);
 | 
					 | 
				
			||||||
	    goto end;
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    if (keyname) {
 | 
					 | 
				
			||||||
    	if(!(inkey = BIO_new_file(keyname, "r"))) {
 | 
					 | 
				
			||||||
	    BIO_printf(bio_err, "Can't key certificate file %s\n", keyname);
 | 
					 | 
				
			||||||
	    perror (keyname);
 | 
					 | 
				
			||||||
	    goto end;
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
     }
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
    CRYPTO_pop_info();
 | 
					    CRYPTO_pop_info();
 | 
				
			||||||
    CRYPTO_push_info("write files");
 | 
					    CRYPTO_push_info("write files");
 | 
				
			||||||
@@ -426,27 +443,31 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
    if (export_cert) {
 | 
					    if (export_cert) {
 | 
				
			||||||
	EVP_PKEY *key = NULL;
 | 
						EVP_PKEY *key = NULL;
 | 
				
			||||||
	STACK_OF(PKCS12_SAFEBAG) *bags = NULL;
 | 
						X509 *ucert = NULL, *x = NULL;
 | 
				
			||||||
	STACK_OF(PKCS7) *safes = NULL;
 | 
					 | 
				
			||||||
	PKCS12_SAFEBAG *bag = NULL;
 | 
					 | 
				
			||||||
	PKCS8_PRIV_KEY_INFO *p8 = NULL;
 | 
					 | 
				
			||||||
	PKCS7 *authsafe = NULL;
 | 
					 | 
				
			||||||
	X509 *ucert = NULL;
 | 
					 | 
				
			||||||
	STACK_OF(X509) *certs=NULL;
 | 
						STACK_OF(X509) *certs=NULL;
 | 
				
			||||||
	char *catmp = NULL;
 | 
						unsigned char *catmp = NULL;
 | 
				
			||||||
	int i;
 | 
						int i;
 | 
				
			||||||
	unsigned char keyid[EVP_MAX_MD_SIZE];
 | 
					
 | 
				
			||||||
	unsigned int keyidlen = 0;
 | 
						if ((options & (NOCERTS|NOKEYS)) == (NOCERTS|NOKEYS))
 | 
				
			||||||
 | 
							{	
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Nothing to do!\n");
 | 
				
			||||||
 | 
							goto export_end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (options & NOCERTS)
 | 
				
			||||||
 | 
							chain = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
	CRYPTO_push_info("process -export_cert");
 | 
						CRYPTO_push_info("process -export_cert");
 | 
				
			||||||
	CRYPTO_push_info("reading private key");
 | 
						CRYPTO_push_info("reading private key");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	key = load_key(bio_err, keyname ? keyname : infile, FORMAT_PEM, 1,
 | 
						if (!(options & NOKEYS))
 | 
				
			||||||
		passin, e, "private key");
 | 
							{
 | 
				
			||||||
	if (!key) {
 | 
							key = load_key(bio_err, keyname ? keyname : infile,
 | 
				
			||||||
		goto export_end;
 | 
									FORMAT_PEM, 1, passin, e, "private key");
 | 
				
			||||||
	}
 | 
							if (!key)
 | 
				
			||||||
 | 
								goto export_end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
	CRYPTO_pop_info();
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
@@ -454,50 +475,62 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* Load in all certs in input file */
 | 
						/* Load in all certs in input file */
 | 
				
			||||||
	if(!(certs = load_certs(bio_err, infile, FORMAT_PEM, NULL, e,
 | 
						if(!(options & NOCERTS))
 | 
				
			||||||
		"certificates"))) {
 | 
							{
 | 
				
			||||||
		goto export_end;
 | 
							certs = load_certs(bio_err, infile, FORMAT_PEM, NULL, e,
 | 
				
			||||||
	}
 | 
												"certificates");
 | 
				
			||||||
 | 
							if (!certs)
 | 
				
			||||||
 | 
								goto export_end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (key)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								/* Look for matching private key */
 | 
				
			||||||
 | 
								for(i = 0; i < sk_X509_num(certs); i++)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									x = sk_X509_value(certs, i);
 | 
				
			||||||
 | 
									if(X509_check_private_key(x, key))
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										ucert = x;
 | 
				
			||||||
 | 
										/* Zero keyid and alias */
 | 
				
			||||||
 | 
										X509_keyid_set1(ucert, NULL, 0);
 | 
				
			||||||
 | 
										X509_alias_set1(ucert, NULL, 0);
 | 
				
			||||||
 | 
										/* Remove from list */
 | 
				
			||||||
 | 
										(void)sk_X509_delete(certs, i);
 | 
				
			||||||
 | 
										break;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								if (!ucert)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(bio_err, "No certificate matches private key\n");
 | 
				
			||||||
 | 
									goto export_end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
	CRYPTO_pop_info();
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
	CRYPTO_push_info("reading certs from input 2");
 | 
						CRYPTO_push_info("reading certs from input 2");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	for(i = 0; i < sk_X509_num(certs); i++) {
 | 
						/* Add any more certificates asked for */
 | 
				
			||||||
		ucert = sk_X509_value(certs, i);
 | 
						if(certfile)
 | 
				
			||||||
		if(X509_check_private_key(ucert, key)) {
 | 
							{
 | 
				
			||||||
			X509_digest(ucert, EVP_sha1(), keyid, &keyidlen);
 | 
							STACK_OF(X509) *morecerts=NULL;
 | 
				
			||||||
			break;
 | 
							if(!(morecerts = load_certs(bio_err, certfile, FORMAT_PEM,
 | 
				
			||||||
		}
 | 
										    NULL, e,
 | 
				
			||||||
	}
 | 
										    "certificates from certfile")))
 | 
				
			||||||
	if(!keyidlen) {
 | 
								goto export_end;
 | 
				
			||||||
		ucert = NULL;
 | 
							while(sk_X509_num(morecerts) > 0)
 | 
				
			||||||
		BIO_printf(bio_err, "No certificate matches private key\n");
 | 
								sk_X509_push(certs, sk_X509_shift(morecerts));
 | 
				
			||||||
		goto export_end;
 | 
							sk_X509_free(morecerts);
 | 
				
			||||||
	}
 | 
					 		}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
	CRYPTO_pop_info();
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
	CRYPTO_push_info("reading certs from certfile");
 | 
						CRYPTO_push_info("reading certs from certfile");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	bags = sk_PKCS12_SAFEBAG_new_null ();
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/* Add any more certificates asked for */
 | 
					 | 
				
			||||||
	if (certfile) {
 | 
					 | 
				
			||||||
		STACK_OF(X509) *morecerts=NULL;
 | 
					 | 
				
			||||||
		if(!(morecerts = load_certs(bio_err, certfile, FORMAT_PEM,
 | 
					 | 
				
			||||||
					    NULL, e,
 | 
					 | 
				
			||||||
					    "certificates from certfile"))) {
 | 
					 | 
				
			||||||
			goto export_end;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		while(sk_X509_num(morecerts) > 0) {
 | 
					 | 
				
			||||||
			sk_X509_push(certs, sk_X509_shift(morecerts));
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
		sk_X509_free(morecerts);
 | 
					 | 
				
			||||||
 	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
	CRYPTO_pop_info();
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
	CRYPTO_push_info("building chain");
 | 
						CRYPTO_push_info("building chain");
 | 
				
			||||||
@@ -527,106 +560,66 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		    X509_free(sk_X509_value(chain2, 0));
 | 
							    X509_free(sk_X509_value(chain2, 0));
 | 
				
			||||||
		    sk_X509_free(chain2);
 | 
							    sk_X509_free(chain2);
 | 
				
			||||||
		} else {
 | 
							} else {
 | 
				
			||||||
			BIO_printf (bio_err, "Error %s getting chain.\n",
 | 
								if (vret >= 0)
 | 
				
			||||||
 | 
									BIO_printf (bio_err, "Error %s getting chain.\n",
 | 
				
			||||||
					X509_verify_cert_error_string(vret));
 | 
										X509_verify_cert_error_string(vret));
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									ERR_print_errors(bio_err);
 | 
				
			||||||
			goto export_end;
 | 
								goto export_end;
 | 
				
			||||||
		}			
 | 
							}			
 | 
				
			||||||
    	}
 | 
					    	}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
						/* Add any CA names */
 | 
				
			||||||
	CRYPTO_pop_info();
 | 
					 | 
				
			||||||
	CRYPTO_push_info("building bags");
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* We now have loads of certificates: include them all */
 | 
						for (i = 0; i < sk_num(canames); i++)
 | 
				
			||||||
	for(i = 0; i < sk_X509_num(certs); i++) {
 | 
							{
 | 
				
			||||||
		X509 *cert = NULL;
 | 
							catmp = (unsigned char *)sk_value(canames, i);
 | 
				
			||||||
		cert = sk_X509_value(certs, i);
 | 
							X509_alias_set1(sk_X509_value(certs, i), catmp, -1);
 | 
				
			||||||
		bag = PKCS12_x5092certbag(cert);
 | 
							}
 | 
				
			||||||
		/* If it matches private key set id */
 | 
					
 | 
				
			||||||
		if(cert == ucert) {
 | 
						if (csp_name && key)
 | 
				
			||||||
			if(name) PKCS12_add_friendlyname(bag, name, -1);
 | 
							EVP_PKEY_add1_attr_by_NID(key, NID_ms_csp_name,
 | 
				
			||||||
			PKCS12_add_localkeyid(bag, keyid, keyidlen);
 | 
									MBSTRING_ASC, (unsigned char *)csp_name, -1);
 | 
				
			||||||
		} else if((catmp = sk_shift(canames))) 
 | 
					
 | 
				
			||||||
				PKCS12_add_friendlyname(bag, catmp, -1);
 | 
						if (add_lmk && key)
 | 
				
			||||||
		sk_PKCS12_SAFEBAG_push(bags, bag);
 | 
							EVP_PKEY_add1_attr_by_NID(key, NID_LocalKeySet, 0, NULL, -1);
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	sk_X509_pop_free(certs, X509_free);
 | 
					 | 
				
			||||||
	certs = NULL;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
	CRYPTO_pop_info();
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
	CRYPTO_push_info("encrypting bags");
 | 
						CRYPTO_push_info("reading password");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(!noprompt &&
 | 
						if(!noprompt &&
 | 
				
			||||||
		EVP_read_pw_string(pass, sizeof pass, "Enter Export Password:", 1)) {
 | 
							EVP_read_pw_string(pass, sizeof pass, "Enter Export Password:", 1))
 | 
				
			||||||
	    BIO_printf (bio_err, "Can't read Password\n");
 | 
							{
 | 
				
			||||||
	    goto export_end;
 | 
						    	BIO_printf (bio_err, "Can't read Password\n");
 | 
				
			||||||
        }
 | 
						    	goto export_end;
 | 
				
			||||||
 | 
					        	}
 | 
				
			||||||
	if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass);
 | 
						if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass);
 | 
				
			||||||
	/* Turn certbags into encrypted authsafe */
 | 
					 | 
				
			||||||
	authsafe = PKCS12_pack_p7encdata(cert_pbe, cpass, -1, NULL, 0,
 | 
					 | 
				
			||||||
								 iter, bags);
 | 
					 | 
				
			||||||
	sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
 | 
					 | 
				
			||||||
	bags = NULL;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!authsafe) {
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
		ERR_print_errors (bio_err);
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("creating PKCS#12 structure");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						p12 = PKCS12_create(cpass, name, key, ucert, certs,
 | 
				
			||||||
 | 
									key_pbe, cert_pbe, iter, -1, keytype);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!p12)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
						    	ERR_print_errors (bio_err);
 | 
				
			||||||
		goto export_end;
 | 
							goto export_end;
 | 
				
			||||||
	}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	safes = sk_PKCS7_new_null ();
 | 
						if (maciter != -1)
 | 
				
			||||||
	sk_PKCS7_push (safes, authsafe);
 | 
							PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, NULL);
 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					 | 
				
			||||||
	CRYPTO_pop_info();
 | 
					 | 
				
			||||||
	CRYPTO_push_info("building shrouded key bag");
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/* Make a shrouded key bag */
 | 
					 | 
				
			||||||
	p8 = EVP_PKEY2PKCS8 (key);
 | 
					 | 
				
			||||||
	if(keytype) PKCS8_add_keyusage(p8, keytype);
 | 
					 | 
				
			||||||
	bag = PKCS12_MAKE_SHKEYBAG(key_pbe, cpass, -1, NULL, 0, iter, p8);
 | 
					 | 
				
			||||||
	PKCS8_PRIV_KEY_INFO_free(p8);
 | 
					 | 
				
			||||||
	p8 = NULL;
 | 
					 | 
				
			||||||
        if (name) PKCS12_add_friendlyname (bag, name, -1);
 | 
					 | 
				
			||||||
	if(csp_name) PKCS12_add_CSPName_asc(bag, csp_name, -1);
 | 
					 | 
				
			||||||
	PKCS12_add_localkeyid (bag, keyid, keyidlen);
 | 
					 | 
				
			||||||
	bags = sk_PKCS12_SAFEBAG_new_null();
 | 
					 | 
				
			||||||
	sk_PKCS12_SAFEBAG_push (bags, bag);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					 | 
				
			||||||
	CRYPTO_pop_info();
 | 
					 | 
				
			||||||
	CRYPTO_push_info("encrypting shrouded key bag");
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/* Turn it into unencrypted safe bag */
 | 
					 | 
				
			||||||
	authsafe = PKCS12_pack_p7data (bags);
 | 
					 | 
				
			||||||
	sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
 | 
					 | 
				
			||||||
	bags = NULL;
 | 
					 | 
				
			||||||
	sk_PKCS7_push (safes, authsafe);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					 | 
				
			||||||
	CRYPTO_pop_info();
 | 
					 | 
				
			||||||
	CRYPTO_push_info("building pkcs12");
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	p12 = PKCS12_init(NID_pkcs7_data);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	PKCS12_pack_authsafes(p12, safes);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	sk_PKCS7_pop_free(safes, PKCS7_free);
 | 
					 | 
				
			||||||
	safes = NULL;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	PKCS12_set_mac (p12, mpass, -1, NULL, 0, maciter, NULL);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
	CRYPTO_pop_info();
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
	CRYPTO_push_info("writing pkcs12");
 | 
						CRYPTO_push_info("writing pkcs12");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	i2d_PKCS12_bio (out, p12);
 | 
						i2d_PKCS12_bio(out, p12);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ret = 0;
 | 
						ret = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -639,8 +632,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (key) EVP_PKEY_free(key);
 | 
						if (key) EVP_PKEY_free(key);
 | 
				
			||||||
	if (certs) sk_X509_pop_free(certs, X509_free);
 | 
						if (certs) sk_X509_pop_free(certs, X509_free);
 | 
				
			||||||
	if (safes) sk_PKCS7_pop_free(safes, PKCS7_free);
 | 
						if (ucert) X509_free(ucert);
 | 
				
			||||||
	if (bags) sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
	CRYPTO_pop_info();
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
@@ -667,7 +659,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
    if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass);
 | 
					    if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    if (options & INFO) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN1_INTEGER_get (p12->mac->iter) : 1);
 | 
					    if ((options & INFO) && p12->mac) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN1_INTEGER_get (p12->mac->iter) : 1);
 | 
				
			||||||
    if(macver) {
 | 
					    if(macver) {
 | 
				
			||||||
#ifdef CRYPTO_MDEBUG
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
    CRYPTO_push_info("verify MAC");
 | 
					    CRYPTO_push_info("verify MAC");
 | 
				
			||||||
@@ -848,7 +840,7 @@ int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain)
 | 
				
			|||||||
{
 | 
					{
 | 
				
			||||||
	X509_STORE_CTX store_ctx;
 | 
						X509_STORE_CTX store_ctx;
 | 
				
			||||||
	STACK_OF(X509) *chn;
 | 
						STACK_OF(X509) *chn;
 | 
				
			||||||
	int i;
 | 
						int i = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* FIXME: Should really check the return status of X509_STORE_CTX_init
 | 
						/* FIXME: Should really check the return status of X509_STORE_CTX_init
 | 
				
			||||||
	 * for an error, but how that fits into the return value of this
 | 
						 * for an error, but how that fits into the return value of this
 | 
				
			||||||
@@ -856,13 +848,17 @@ int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain)
 | 
				
			|||||||
	X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
 | 
						X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
 | 
				
			||||||
	if (X509_verify_cert(&store_ctx) <= 0) {
 | 
						if (X509_verify_cert(&store_ctx) <= 0) {
 | 
				
			||||||
		i = X509_STORE_CTX_get_error (&store_ctx);
 | 
							i = X509_STORE_CTX_get_error (&store_ctx);
 | 
				
			||||||
 | 
							if (i == 0)
 | 
				
			||||||
 | 
								/* avoid returning 0 if X509_verify_cert() did not
 | 
				
			||||||
 | 
								 * set an appropriate error value in the context */
 | 
				
			||||||
 | 
								i = -1;
 | 
				
			||||||
 | 
							chn = NULL;
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
	}
 | 
						} else
 | 
				
			||||||
	chn =  X509_STORE_CTX_get1_chain(&store_ctx);
 | 
							chn = X509_STORE_CTX_get1_chain(&store_ctx);
 | 
				
			||||||
	i = 0;
 | 
					 | 
				
			||||||
	*chain = chn;
 | 
					 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	X509_STORE_CTX_cleanup(&store_ctx);
 | 
						X509_STORE_CTX_cleanup(&store_ctx);
 | 
				
			||||||
 | 
						*chain = chn;
 | 
				
			||||||
	
 | 
						
 | 
				
			||||||
	return i;
 | 
						return i;
 | 
				
			||||||
}	
 | 
					}	
 | 
				
			||||||
@@ -870,13 +866,16 @@ err:
 | 
				
			|||||||
int alg_print (BIO *x, X509_ALGOR *alg)
 | 
					int alg_print (BIO *x, X509_ALGOR *alg)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	PBEPARAM *pbe;
 | 
						PBEPARAM *pbe;
 | 
				
			||||||
	unsigned char *p;
 | 
						const unsigned char *p;
 | 
				
			||||||
	p = alg->parameter->value.sequence->data;
 | 
						p = alg->parameter->value.sequence->data;
 | 
				
			||||||
	pbe = d2i_PBEPARAM (NULL, &p, alg->parameter->value.sequence->length);
 | 
						pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
 | 
				
			||||||
	BIO_printf (bio_err, "%s, Iteration %d\n", 
 | 
						if (!pbe)
 | 
				
			||||||
	OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)), ASN1_INTEGER_get(pbe->iter));
 | 
							return 1;
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "%s, Iteration %ld\n", 
 | 
				
			||||||
 | 
							OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
 | 
				
			||||||
 | 
							ASN1_INTEGER_get(pbe->iter));
 | 
				
			||||||
	PBEPARAM_free (pbe);
 | 
						PBEPARAM_free (pbe);
 | 
				
			||||||
	return 0;
 | 
						return 1;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* Load all certificates from a given file */
 | 
					/* Load all certificates from a given file */
 | 
				
			||||||
@@ -908,7 +907,7 @@ int cert_load(BIO *in, STACK_OF(X509) *sk)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
/* Generalised attribute print: handle PKCS#8 and bag attributes */
 | 
					/* Generalised attribute print: handle PKCS#8 and bag attributes */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int print_attribs (BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst, char *name)
 | 
					int print_attribs (BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst,const char *name)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	X509_ATTRIBUTE *attr;
 | 
						X509_ATTRIBUTE *attr;
 | 
				
			||||||
	ASN1_TYPE *av;
 | 
						ASN1_TYPE *av;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -82,9 +82,6 @@ int MAIN(int, char **);
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					 | 
				
			||||||
	ENGINE *e = NULL;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	PKCS7 *p7=NULL;
 | 
						PKCS7 *p7=NULL;
 | 
				
			||||||
	int i,badops=0;
 | 
						int i,badops=0;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL;
 | 
						BIO *in=NULL,*out=NULL;
 | 
				
			||||||
@@ -180,7 +177,7 @@ bad:
 | 
				
			|||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,5 @@
 | 
				
			|||||||
/* pkcs8.c */
 | 
					/* pkcs8.c */
 | 
				
			||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
					/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
 | 
				
			||||||
 * project 1999-2004.
 | 
					 * project 1999-2004.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
/* ====================================================================
 | 
					/* ====================================================================
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -56,6 +56,8 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG prime_main
 | 
					#define PROG prime_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
    {
 | 
					    {
 | 
				
			||||||
    int hex=0;
 | 
					    int hex=0;
 | 
				
			||||||
@@ -113,7 +115,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
    BN_print(bio_out,bn);
 | 
					    BN_print(bio_out,bn);
 | 
				
			||||||
    BIO_printf(bio_out," is %sprime\n",
 | 
					    BIO_printf(bio_out," is %sprime\n",
 | 
				
			||||||
	       BN_is_prime(bn,checks,NULL,NULL,NULL) ? "" : "not ");
 | 
						       BN_is_prime_ex(bn,checks,NULL,NULL) ? "" : "not ");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    BN_free(bn);
 | 
					    BN_free(bn);
 | 
				
			||||||
    BIO_free_all(bio_out);
 | 
					    BIO_free_all(bio_out);
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										55
									
								
								apps/progs.h
									
									
									
									
									
								
							
							
						
						
									
										55
									
								
								apps/progs.h
									
									
									
									
									
								
							@@ -17,6 +17,8 @@ extern int rsa_main(int argc,char *argv[]);
 | 
				
			|||||||
extern int rsautl_main(int argc,char *argv[]);
 | 
					extern int rsautl_main(int argc,char *argv[]);
 | 
				
			||||||
extern int dsa_main(int argc,char *argv[]);
 | 
					extern int dsa_main(int argc,char *argv[]);
 | 
				
			||||||
extern int dsaparam_main(int argc,char *argv[]);
 | 
					extern int dsaparam_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					extern int ec_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					extern int ecparam_main(int argc,char *argv[]);
 | 
				
			||||||
extern int x509_main(int argc,char *argv[]);
 | 
					extern int x509_main(int argc,char *argv[]);
 | 
				
			||||||
extern int genrsa_main(int argc,char *argv[]);
 | 
					extern int genrsa_main(int argc,char *argv[]);
 | 
				
			||||||
extern int gendsa_main(int argc,char *argv[]);
 | 
					extern int gendsa_main(int argc,char *argv[]);
 | 
				
			||||||
@@ -26,6 +28,7 @@ extern int speed_main(int argc,char *argv[]);
 | 
				
			|||||||
extern int s_time_main(int argc,char *argv[]);
 | 
					extern int s_time_main(int argc,char *argv[]);
 | 
				
			||||||
extern int version_main(int argc,char *argv[]);
 | 
					extern int version_main(int argc,char *argv[]);
 | 
				
			||||||
extern int pkcs7_main(int argc,char *argv[]);
 | 
					extern int pkcs7_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					extern int cms_main(int argc,char *argv[]);
 | 
				
			||||||
extern int crl2pkcs7_main(int argc,char *argv[]);
 | 
					extern int crl2pkcs7_main(int argc,char *argv[]);
 | 
				
			||||||
extern int sess_id_main(int argc,char *argv[]);
 | 
					extern int sess_id_main(int argc,char *argv[]);
 | 
				
			||||||
extern int ciphers_main(int argc,char *argv[]);
 | 
					extern int ciphers_main(int argc,char *argv[]);
 | 
				
			||||||
@@ -35,11 +38,9 @@ extern int pkcs8_main(int argc,char *argv[]);
 | 
				
			|||||||
extern int spkac_main(int argc,char *argv[]);
 | 
					extern int spkac_main(int argc,char *argv[]);
 | 
				
			||||||
extern int smime_main(int argc,char *argv[]);
 | 
					extern int smime_main(int argc,char *argv[]);
 | 
				
			||||||
extern int rand_main(int argc,char *argv[]);
 | 
					extern int rand_main(int argc,char *argv[]);
 | 
				
			||||||
extern int prime_main(int argc,char *argv[]);
 | 
					 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					 | 
				
			||||||
extern int engine_main(int argc,char *argv[]);
 | 
					extern int engine_main(int argc,char *argv[]);
 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
extern int ocsp_main(int argc,char *argv[]);
 | 
					extern int ocsp_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					extern int prime_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define FUNC_TYPE_GENERAL	1
 | 
					#define FUNC_TYPE_GENERAL	1
 | 
				
			||||||
#define FUNC_TYPE_MD		2
 | 
					#define FUNC_TYPE_MD		2
 | 
				
			||||||
@@ -47,8 +48,8 @@ extern int ocsp_main(int argc,char *argv[]);
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
typedef struct {
 | 
					typedef struct {
 | 
				
			||||||
	int type;
 | 
						int type;
 | 
				
			||||||
	char *name;
 | 
						const char *name;
 | 
				
			||||||
	int (*func)();
 | 
						int (*func)(int argc,char *argv[]);
 | 
				
			||||||
	} FUNCTION;
 | 
						} FUNCTION;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
FUNCTION functions[] = {
 | 
					FUNCTION functions[] = {
 | 
				
			||||||
@@ -81,6 +82,12 @@ FUNCTION functions[] = {
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_DSA
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"dsaparam",dsaparam_main},
 | 
						{FUNC_TYPE_GENERAL,"dsaparam",dsaparam_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_EC
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"ec",ec_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_EC
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"ecparam",ecparam_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"x509",x509_main},
 | 
						{FUNC_TYPE_GENERAL,"x509",x509_main},
 | 
				
			||||||
#ifndef OPENSSL_NO_RSA
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
@@ -103,6 +110,9 @@ FUNCTION functions[] = {
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"version",version_main},
 | 
						{FUNC_TYPE_GENERAL,"version",version_main},
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"pkcs7",pkcs7_main},
 | 
						{FUNC_TYPE_GENERAL,"pkcs7",pkcs7_main},
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CMS
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"cms",cms_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"crl2pkcs7",crl2pkcs7_main},
 | 
						{FUNC_TYPE_GENERAL,"crl2pkcs7",crl2pkcs7_main},
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"sess_id",sess_id_main},
 | 
						{FUNC_TYPE_GENERAL,"sess_id",sess_id_main},
 | 
				
			||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
					#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
				
			||||||
@@ -116,11 +126,11 @@ FUNCTION functions[] = {
 | 
				
			|||||||
	{FUNC_TYPE_GENERAL,"spkac",spkac_main},
 | 
						{FUNC_TYPE_GENERAL,"spkac",spkac_main},
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"smime",smime_main},
 | 
						{FUNC_TYPE_GENERAL,"smime",smime_main},
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"rand",rand_main},
 | 
						{FUNC_TYPE_GENERAL,"rand",rand_main},
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"prime",prime_main},
 | 
					 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"engine",engine_main},
 | 
						{FUNC_TYPE_GENERAL,"engine",engine_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"ocsp",ocsp_main},
 | 
						{FUNC_TYPE_GENERAL,"ocsp",ocsp_main},
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"prime",prime_main},
 | 
				
			||||||
#ifndef OPENSSL_NO_MD2
 | 
					#ifndef OPENSSL_NO_MD2
 | 
				
			||||||
	{FUNC_TYPE_MD,"md2",dgst_main},
 | 
						{FUNC_TYPE_MD,"md2",dgst_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -159,6 +169,24 @@ FUNCTION functions[] = {
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_AES
 | 
					#ifndef OPENSSL_NO_AES
 | 
				
			||||||
	{FUNC_TYPE_CIPHER,"aes-256-ecb",enc_main},
 | 
						{FUNC_TYPE_CIPHER,"aes-256-ecb",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"camellia-128-cbc",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"camellia-128-ecb",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"camellia-192-cbc",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"camellia-192-ecb",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"camellia-256-cbc",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"camellia-256-ecb",enc_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	{FUNC_TYPE_CIPHER,"base64",enc_main},
 | 
						{FUNC_TYPE_CIPHER,"base64",enc_main},
 | 
				
			||||||
#ifndef OPENSSL_NO_DES
 | 
					#ifndef OPENSSL_NO_DES
 | 
				
			||||||
@@ -173,6 +201,9 @@ FUNCTION functions[] = {
 | 
				
			|||||||
#ifndef OPENSSL_NO_IDEA
 | 
					#ifndef OPENSSL_NO_IDEA
 | 
				
			||||||
	{FUNC_TYPE_CIPHER,"idea",enc_main},
 | 
						{FUNC_TYPE_CIPHER,"idea",enc_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"seed",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_RC4
 | 
					#ifndef OPENSSL_NO_RC4
 | 
				
			||||||
	{FUNC_TYPE_CIPHER,"rc4",enc_main},
 | 
						{FUNC_TYPE_CIPHER,"rc4",enc_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -239,6 +270,18 @@ FUNCTION functions[] = {
 | 
				
			|||||||
#ifndef OPENSSL_NO_IDEA
 | 
					#ifndef OPENSSL_NO_IDEA
 | 
				
			||||||
	{FUNC_TYPE_CIPHER,"idea-ofb",enc_main},
 | 
						{FUNC_TYPE_CIPHER,"idea-ofb",enc_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"seed-cbc",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"seed-ecb",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"seed-cfb",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"seed-ofb",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_RC2
 | 
					#ifndef OPENSSL_NO_RC2
 | 
				
			||||||
	{FUNC_TYPE_CIPHER,"rc2-cbc",enc_main},
 | 
						{FUNC_TYPE_CIPHER,"rc2-cbc",enc_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -16,8 +16,8 @@ print <<'EOF';
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
typedef struct {
 | 
					typedef struct {
 | 
				
			||||||
	int type;
 | 
						int type;
 | 
				
			||||||
	char *name;
 | 
						const char *name;
 | 
				
			||||||
	int (*func)();
 | 
						int (*func)(int argc,char *argv[]);
 | 
				
			||||||
	} FUNCTION;
 | 
						} FUNCTION;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
FUNCTION functions[] = {
 | 
					FUNCTION functions[] = {
 | 
				
			||||||
@@ -29,14 +29,22 @@ foreach (@ARGV)
 | 
				
			|||||||
	$str="\t{FUNC_TYPE_GENERAL,\"$_\",${_}_main},\n";
 | 
						$str="\t{FUNC_TYPE_GENERAL,\"$_\",${_}_main},\n";
 | 
				
			||||||
	if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
 | 
						if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
 | 
				
			||||||
		{ print "#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))\n${str}#endif\n"; } 
 | 
							{ print "#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))\n${str}#endif\n"; } 
 | 
				
			||||||
 | 
						elsif ( ($_ =~ /^speed$/))
 | 
				
			||||||
 | 
							{ print "#ifndef OPENSSL_NO_SPEED\n${str}#endif\n"; }
 | 
				
			||||||
 | 
						elsif ( ($_ =~ /^engine$/))
 | 
				
			||||||
 | 
							{ print "#ifndef OPENSSL_NO_ENGINE\n${str}#endif\n"; }
 | 
				
			||||||
	elsif ( ($_ =~ /^rsa$/) || ($_ =~ /^genrsa$/) || ($_ =~ /^rsautl$/)) 
 | 
						elsif ( ($_ =~ /^rsa$/) || ($_ =~ /^genrsa$/) || ($_ =~ /^rsautl$/)) 
 | 
				
			||||||
		{ print "#ifndef OPENSSL_NO_RSA\n${str}#endif\n";  }
 | 
							{ print "#ifndef OPENSSL_NO_RSA\n${str}#endif\n";  }
 | 
				
			||||||
	elsif ( ($_ =~ /^dsa$/) || ($_ =~ /^gendsa$/) || ($_ =~ /^dsaparam$/))
 | 
						elsif ( ($_ =~ /^dsa$/) || ($_ =~ /^gendsa$/) || ($_ =~ /^dsaparam$/))
 | 
				
			||||||
		{ print "#ifndef OPENSSL_NO_DSA\n${str}#endif\n"; }
 | 
							{ print "#ifndef OPENSSL_NO_DSA\n${str}#endif\n"; }
 | 
				
			||||||
 | 
						elsif ( ($_ =~ /^ec$/) || ($_ =~ /^ecparam$/))
 | 
				
			||||||
 | 
							{ print "#ifndef OPENSSL_NO_EC\n${str}#endif\n";}
 | 
				
			||||||
	elsif ( ($_ =~ /^dh$/) || ($_ =~ /^gendh$/) || ($_ =~ /^dhparam$/))
 | 
						elsif ( ($_ =~ /^dh$/) || ($_ =~ /^gendh$/) || ($_ =~ /^dhparam$/))
 | 
				
			||||||
		{ print "#ifndef OPENSSL_NO_DH\n${str}#endif\n"; }
 | 
							{ print "#ifndef OPENSSL_NO_DH\n${str}#endif\n"; }
 | 
				
			||||||
	elsif ( ($_ =~ /^pkcs12$/))
 | 
						elsif ( ($_ =~ /^pkcs12$/))
 | 
				
			||||||
		{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
 | 
							{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
 | 
				
			||||||
 | 
						elsif ( ($_ =~ /^cms$/))
 | 
				
			||||||
 | 
							{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{ print $str; }
 | 
							{ print $str; }
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -51,14 +59,18 @@ foreach (
 | 
				
			|||||||
	"aes-128-cbc", "aes-128-ecb",
 | 
						"aes-128-cbc", "aes-128-ecb",
 | 
				
			||||||
	"aes-192-cbc", "aes-192-ecb",
 | 
						"aes-192-cbc", "aes-192-ecb",
 | 
				
			||||||
	"aes-256-cbc", "aes-256-ecb",
 | 
						"aes-256-cbc", "aes-256-ecb",
 | 
				
			||||||
 | 
						"camellia-128-cbc", "camellia-128-ecb",
 | 
				
			||||||
 | 
						"camellia-192-cbc", "camellia-192-ecb",
 | 
				
			||||||
 | 
						"camellia-256-cbc", "camellia-256-ecb",
 | 
				
			||||||
	"base64",
 | 
						"base64",
 | 
				
			||||||
	"des", "des3", "desx", "idea", "rc4", "rc4-40",
 | 
						"des", "des3", "desx", "idea", "seed", "rc4", "rc4-40",
 | 
				
			||||||
	"rc2", "bf", "cast", "rc5",
 | 
						"rc2", "bf", "cast", "rc5",
 | 
				
			||||||
	"des-ecb", "des-ede",    "des-ede3",
 | 
						"des-ecb", "des-ede",    "des-ede3",
 | 
				
			||||||
	"des-cbc", "des-ede-cbc","des-ede3-cbc",
 | 
						"des-cbc", "des-ede-cbc","des-ede3-cbc",
 | 
				
			||||||
	"des-cfb", "des-ede-cfb","des-ede3-cfb",
 | 
						"des-cfb", "des-ede-cfb","des-ede3-cfb",
 | 
				
			||||||
	"des-ofb", "des-ede-ofb","des-ede3-ofb",
 | 
						"des-ofb", "des-ede-ofb","des-ede3-ofb",
 | 
				
			||||||
	"idea-cbc","idea-ecb",   "idea-cfb", "idea-ofb",
 | 
						"idea-cbc","idea-ecb",    "idea-cfb", "idea-ofb",
 | 
				
			||||||
 | 
						"seed-cbc","seed-ecb",    "seed-cfb", "seed-ofb",
 | 
				
			||||||
	"rc2-cbc", "rc2-ecb", "rc2-cfb","rc2-ofb", "rc2-64-cbc", "rc2-40-cbc",
 | 
						"rc2-cbc", "rc2-ecb", "rc2-cfb","rc2-ofb", "rc2-64-cbc", "rc2-40-cbc",
 | 
				
			||||||
	"bf-cbc",  "bf-ecb",     "bf-cfb",   "bf-ofb",
 | 
						"bf-cbc",  "bf-ecb",     "bf-cfb",   "bf-ofb",
 | 
				
			||||||
	"cast5-cbc","cast5-ecb", "cast5-cfb","cast5-ofb",
 | 
						"cast5-cbc","cast5-ecb", "cast5-cfb","cast5-ofb",
 | 
				
			||||||
@@ -69,7 +81,9 @@ foreach (
 | 
				
			|||||||
	$t=sprintf("\t{FUNC_TYPE_CIPHER,\"%s\",enc_main},\n",$_);
 | 
						$t=sprintf("\t{FUNC_TYPE_CIPHER,\"%s\",enc_main},\n",$_);
 | 
				
			||||||
	if    ($_ =~ /des/)  { $t="#ifndef OPENSSL_NO_DES\n${t}#endif\n"; }
 | 
						if    ($_ =~ /des/)  { $t="#ifndef OPENSSL_NO_DES\n${t}#endif\n"; }
 | 
				
			||||||
	elsif ($_ =~ /aes/)  { $t="#ifndef OPENSSL_NO_AES\n${t}#endif\n"; }
 | 
						elsif ($_ =~ /aes/)  { $t="#ifndef OPENSSL_NO_AES\n${t}#endif\n"; }
 | 
				
			||||||
 | 
						elsif ($_ =~ /camellia/)  { $t="#ifndef OPENSSL_NO_CAMELLIA\n${t}#endif\n"; }
 | 
				
			||||||
	elsif ($_ =~ /idea/) { $t="#ifndef OPENSSL_NO_IDEA\n${t}#endif\n"; }
 | 
						elsif ($_ =~ /idea/) { $t="#ifndef OPENSSL_NO_IDEA\n${t}#endif\n"; }
 | 
				
			||||||
 | 
						elsif ($_ =~ /seed/) { $t="#ifndef OPENSSL_NO_SEED\n${t}#endif\n"; }
 | 
				
			||||||
	elsif ($_ =~ /rc4/)  { $t="#ifndef OPENSSL_NO_RC4\n${t}#endif\n"; }
 | 
						elsif ($_ =~ /rc4/)  { $t="#ifndef OPENSSL_NO_RC4\n${t}#endif\n"; }
 | 
				
			||||||
	elsif ($_ =~ /rc2/)  { $t="#ifndef OPENSSL_NO_RC2\n${t}#endif\n"; }
 | 
						elsif ($_ =~ /rc2/)  { $t="#ifndef OPENSSL_NO_RC2\n${t}#endif\n"; }
 | 
				
			||||||
	elsif ($_ =~ /bf/)   { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
 | 
						elsif ($_ =~ /bf/)   { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										36
									
								
								apps/rand.c
									
									
									
									
									
								
							
							
						
						
									
										36
									
								
								apps/rand.c
									
									
									
									
									
								
							@@ -68,7 +68,8 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
/* -out file         - write to file
 | 
					/* -out file         - write to file
 | 
				
			||||||
 * -rand file:file   - PRNG seed files
 | 
					 * -rand file:file   - PRNG seed files
 | 
				
			||||||
 * -base64           - encode output
 | 
					 * -base64           - base64 encode output
 | 
				
			||||||
 | 
					 * -hex              - hex encode output
 | 
				
			||||||
 * num               - write 'num' bytes
 | 
					 * num               - write 'num' bytes
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -76,14 +77,12 @@ int MAIN(int, char **);
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					 | 
				
			||||||
	ENGINE *e = NULL;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	int i, r, ret = 1;
 | 
						int i, r, ret = 1;
 | 
				
			||||||
	int badopt;
 | 
						int badopt;
 | 
				
			||||||
	char *outfile = NULL;
 | 
						char *outfile = NULL;
 | 
				
			||||||
	char *inrand = NULL;
 | 
						char *inrand = NULL;
 | 
				
			||||||
	int base64 = 0;
 | 
						int base64 = 0;
 | 
				
			||||||
 | 
						int hex = 0;
 | 
				
			||||||
	BIO *out = NULL;
 | 
						BIO *out = NULL;
 | 
				
			||||||
	int num = -1;
 | 
						int num = -1;
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
@@ -133,6 +132,13 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			else
 | 
								else
 | 
				
			||||||
				badopt = 1;
 | 
									badopt = 1;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-hex") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (!hex)
 | 
				
			||||||
 | 
									hex = 1;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									badopt = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (isdigit((unsigned char)argv[i][0]))
 | 
							else if (isdigit((unsigned char)argv[i][0]))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (num < 0)
 | 
								if (num < 0)
 | 
				
			||||||
@@ -148,6 +154,9 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			badopt = 1;
 | 
								badopt = 1;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (hex && base64)
 | 
				
			||||||
 | 
							badopt = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (num < 0)
 | 
						if (num < 0)
 | 
				
			||||||
		badopt = 1;
 | 
							badopt = 1;
 | 
				
			||||||
	
 | 
						
 | 
				
			||||||
@@ -160,12 +169,13 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		BIO_printf(bio_err, "-engine e             - use engine e, possibly a hardware device.\n");
 | 
							BIO_printf(bio_err, "-engine e             - use engine e, possibly a hardware device.\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
							BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
		BIO_printf(bio_err, "-base64               - encode output\n");
 | 
							BIO_printf(bio_err, "-base64               - base64 encode output\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-hex                  - hex encode output\n");
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
						app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
				
			||||||
@@ -205,15 +215,23 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		int chunk;
 | 
							int chunk;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		chunk = num;
 | 
							chunk = num;
 | 
				
			||||||
		if (chunk > sizeof buf)
 | 
							if (chunk > (int)sizeof(buf))
 | 
				
			||||||
			chunk = sizeof buf;
 | 
								chunk = sizeof buf;
 | 
				
			||||||
		r = RAND_bytes(buf, chunk);
 | 
							r = RAND_bytes(buf, chunk);
 | 
				
			||||||
		if (r <= 0)
 | 
							if (r <= 0)
 | 
				
			||||||
			goto err;
 | 
								goto err;
 | 
				
			||||||
		BIO_write(out, buf, chunk);
 | 
							if (!hex) 
 | 
				
			||||||
 | 
								BIO_write(out, buf, chunk);
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								for (i = 0; i < chunk; i++)
 | 
				
			||||||
 | 
									BIO_printf(out, "%02x", buf[i]);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		num -= chunk;
 | 
							num -= chunk;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	BIO_flush(out);
 | 
						if (hex)
 | 
				
			||||||
 | 
							BIO_puts(out, "\n");
 | 
				
			||||||
 | 
						(void)BIO_flush(out);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	app_RAND_write_file(NULL, bio_err);
 | 
						app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
	ret = 0;
 | 
						ret = 0;
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										250
									
								
								apps/req.c
									
									
									
									
									
								
							
							
						
						
									
										250
									
								
								apps/req.c
									
									
									
									
									
								
							@@ -56,6 +56,12 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Until the key-gen callbacks are modified to use newer prototypes, we allow
 | 
				
			||||||
 | 
					 * deprecated functions for openssl-internal code */
 | 
				
			||||||
 | 
					#ifdef OPENSSL_NO_DEPRECATED
 | 
				
			||||||
 | 
					#undef OPENSSL_NO_DEPRECATED
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
#include <time.h>
 | 
					#include <time.h>
 | 
				
			||||||
@@ -73,7 +79,13 @@
 | 
				
			|||||||
#include <openssl/x509v3.h>
 | 
					#include <openssl/x509v3.h>
 | 
				
			||||||
#include <openssl/objects.h>
 | 
					#include <openssl/objects.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
#include "../crypto/cryptlib.h"
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
 | 
					#include <openssl/rsa.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
 | 
					#include <openssl/dsa.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define SECTION		"req"
 | 
					#define SECTION		"req"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -113,9 +125,10 @@
 | 
				
			|||||||
 *		  require.  This format is wrong
 | 
					 *		  require.  This format is wrong
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int make_REQ(X509_REQ *req,EVP_PKEY *pkey,char *dn,int attribs,
 | 
					static int make_REQ(X509_REQ *req,EVP_PKEY *pkey,char *dn,int mutlirdn,
 | 
				
			||||||
		unsigned long chtype);
 | 
							int attribs,unsigned long chtype);
 | 
				
			||||||
static int build_subject(X509_REQ *req, char *subj, unsigned long chtype);
 | 
					static int build_subject(X509_REQ *req, char *subj, unsigned long chtype,
 | 
				
			||||||
 | 
							int multirdn);
 | 
				
			||||||
static int prompt_info(X509_REQ *req,
 | 
					static int prompt_info(X509_REQ *req,
 | 
				
			||||||
		STACK_OF(CONF_VALUE) *dn_sk, char *dn_sect,
 | 
							STACK_OF(CONF_VALUE) *dn_sk, char *dn_sect,
 | 
				
			||||||
		STACK_OF(CONF_VALUE) *attr_sk, char *attr_sect, int attribs,
 | 
							STACK_OF(CONF_VALUE) *attr_sk, char *attr_sect, int attribs,
 | 
				
			||||||
@@ -123,16 +136,16 @@ static int prompt_info(X509_REQ *req,
 | 
				
			|||||||
static int auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *sk,
 | 
					static int auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *sk,
 | 
				
			||||||
				STACK_OF(CONF_VALUE) *attr, int attribs,
 | 
									STACK_OF(CONF_VALUE) *attr, int attribs,
 | 
				
			||||||
				unsigned long chtype);
 | 
									unsigned long chtype);
 | 
				
			||||||
static int add_attribute_object(X509_REQ *req, char *text,
 | 
					static int add_attribute_object(X509_REQ *req, char *text, const char *def,
 | 
				
			||||||
				char *def, char *value, int nid, int n_min,
 | 
									char *value, int nid, int n_min,
 | 
				
			||||||
				int n_max, unsigned long chtype);
 | 
									int n_max, unsigned long chtype);
 | 
				
			||||||
static int add_DN_object(X509_NAME *n, char *text, char *def, char *value,
 | 
					static int add_DN_object(X509_NAME *n, char *text, const char *def, char *value,
 | 
				
			||||||
	int nid,int n_min,int n_max, unsigned long chtype);
 | 
						int nid,int n_min,int n_max, unsigned long chtype, int mval);
 | 
				
			||||||
#ifndef OPENSSL_NO_RSA
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
static void MS_CALLBACK req_cb(int p,int n,void *arg);
 | 
					static int MS_CALLBACK req_cb(int p, int n, BN_GENCB *cb);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
static int req_check_len(int len,int n_min,int n_max);
 | 
					static int req_check_len(int len,int n_min,int n_max);
 | 
				
			||||||
static int check_end(char *str, char *end);
 | 
					static int check_end(const char *str, const char *end);
 | 
				
			||||||
#ifndef MONOLITH
 | 
					#ifndef MONOLITH
 | 
				
			||||||
static char *default_config_file=NULL;
 | 
					static char *default_config_file=NULL;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -142,6 +155,7 @@ static int batch=0;
 | 
				
			|||||||
#define TYPE_RSA	1
 | 
					#define TYPE_RSA	1
 | 
				
			||||||
#define TYPE_DSA	2
 | 
					#define TYPE_DSA	2
 | 
				
			||||||
#define TYPE_DH		3
 | 
					#define TYPE_DH		3
 | 
				
			||||||
 | 
					#define TYPE_EC		4
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int, char **);
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -150,6 +164,9 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	ENGINE *e = NULL;
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
#ifndef OPENSSL_NO_DSA
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
	DSA *dsa_params=NULL;
 | 
						DSA *dsa_params=NULL;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
						EC_KEY *ec_params = NULL;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	unsigned long nmflag = 0, reqflag = 0;
 | 
						unsigned long nmflag = 0, reqflag = 0;
 | 
				
			||||||
	int ex=1,x509=0,days=30;
 | 
						int ex=1,x509=0,days=30;
 | 
				
			||||||
@@ -175,7 +192,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	char *passin = NULL, *passout = NULL;
 | 
						char *passin = NULL, *passout = NULL;
 | 
				
			||||||
	char *p;
 | 
						char *p;
 | 
				
			||||||
	char *subj = NULL;
 | 
						char *subj = NULL;
 | 
				
			||||||
	const EVP_MD *md_alg=NULL,*digest;
 | 
						int multirdn = 0;
 | 
				
			||||||
 | 
						const EVP_MD *md_alg=NULL,*digest=EVP_sha1();
 | 
				
			||||||
	unsigned long chtype = MBSTRING_ASC;
 | 
						unsigned long chtype = MBSTRING_ASC;
 | 
				
			||||||
#ifndef MONOLITH
 | 
					#ifndef MONOLITH
 | 
				
			||||||
	char *to_free;
 | 
						char *to_free;
 | 
				
			||||||
@@ -197,13 +215,6 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	informat=FORMAT_PEM;
 | 
						informat=FORMAT_PEM;
 | 
				
			||||||
	outformat=FORMAT_PEM;
 | 
						outformat=FORMAT_PEM;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef  OPENSSL_FIPS
 | 
					 | 
				
			||||||
	if (FIPS_mode())
 | 
					 | 
				
			||||||
		digest = EVP_sha1();
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
		digest = EVP_md5();
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	prog=argv[0];
 | 
						prog=argv[0];
 | 
				
			||||||
	argc--;
 | 
						argc--;
 | 
				
			||||||
	argv++;
 | 
						argv++;
 | 
				
			||||||
@@ -329,8 +340,61 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
						}
 | 
											}
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				BIO_free(in);
 | 
									BIO_free(in);
 | 
				
			||||||
				newkey=BN_num_bits(dsa_params->p);
 | 
					 | 
				
			||||||
				in=NULL;
 | 
									in=NULL;
 | 
				
			||||||
 | 
									newkey=BN_num_bits(dsa_params->p);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else 
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
									if (strncmp("ec:",p,3) == 0)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									X509 *xtmp=NULL;
 | 
				
			||||||
 | 
									EVP_PKEY *dtmp;
 | 
				
			||||||
 | 
									EC_GROUP *group;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									pkey_type=TYPE_EC;
 | 
				
			||||||
 | 
									p+=3;
 | 
				
			||||||
 | 
									if ((in=BIO_new_file(p,"r")) == NULL)
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										perror(p);
 | 
				
			||||||
 | 
										goto end;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									if ((ec_params = EC_KEY_new()) == NULL)
 | 
				
			||||||
 | 
										goto end;
 | 
				
			||||||
 | 
									group = PEM_read_bio_ECPKParameters(in, NULL, NULL, NULL);
 | 
				
			||||||
 | 
									if (group == NULL)
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										EC_KEY_free(ec_params);
 | 
				
			||||||
 | 
										ERR_clear_error();
 | 
				
			||||||
 | 
										(void)BIO_reset(in);
 | 
				
			||||||
 | 
										if ((xtmp=PEM_read_bio_X509(in,NULL,NULL,NULL)) == NULL)
 | 
				
			||||||
 | 
											{	
 | 
				
			||||||
 | 
											BIO_printf(bio_err,"unable to load EC parameters from file\n");
 | 
				
			||||||
 | 
											goto end;
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
										if ((dtmp=X509_get_pubkey(xtmp))==NULL)
 | 
				
			||||||
 | 
											goto end;
 | 
				
			||||||
 | 
										if (dtmp->type == EVP_PKEY_EC)
 | 
				
			||||||
 | 
											ec_params = EC_KEY_dup(dtmp->pkey.ec);
 | 
				
			||||||
 | 
										EVP_PKEY_free(dtmp);
 | 
				
			||||||
 | 
										X509_free(xtmp);
 | 
				
			||||||
 | 
										if (ec_params == NULL)
 | 
				
			||||||
 | 
											{
 | 
				
			||||||
 | 
											BIO_printf(bio_err,"Certificate does not contain EC parameters\n");
 | 
				
			||||||
 | 
											goto end;
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									else
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										if (EC_KEY_set_group(ec_params, group) == 0)
 | 
				
			||||||
 | 
											goto end;
 | 
				
			||||||
 | 
										EC_GROUP_free(group);
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									BIO_free(in);
 | 
				
			||||||
 | 
									in=NULL;
 | 
				
			||||||
 | 
									newkey = EC_GROUP_get_degree(EC_KEY_get0_group(ec_params));
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			else
 | 
								else
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -342,7 +406,9 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
				}
 | 
									}
 | 
				
			||||||
			else
 | 
								else
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
				pkey_type=TYPE_RSA;
 | 
									{
 | 
				
			||||||
 | 
									goto bad;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			newreq=1;
 | 
								newreq=1;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -387,6 +453,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			subj= *(++argv);
 | 
								subj= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-multivalue-rdn") == 0)
 | 
				
			||||||
 | 
								multirdn=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-days") == 0)
 | 
							else if (strcmp(*argv,"-days") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -452,9 +520,13 @@ bad:
 | 
				
			|||||||
		BIO_printf(bio_err,"                the random number generator\n");
 | 
							BIO_printf(bio_err,"                the random number generator\n");
 | 
				
			||||||
		BIO_printf(bio_err," -newkey rsa:bits generate a new RSA key of 'bits' in size\n");
 | 
							BIO_printf(bio_err," -newkey rsa:bits generate a new RSA key of 'bits' in size\n");
 | 
				
			||||||
		BIO_printf(bio_err," -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n");
 | 
							BIO_printf(bio_err," -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n");
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -newkey ec:file generate a new EC key, parameters taken from CA in 'file'\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
		BIO_printf(bio_err," -[digest]      Digest to sign with (md5, sha1, md2, mdc2, md4)\n");
 | 
							BIO_printf(bio_err," -[digest]      Digest to sign with (md5, sha1, md2, mdc2, md4)\n");
 | 
				
			||||||
		BIO_printf(bio_err," -config file   request template file.\n");
 | 
							BIO_printf(bio_err," -config file   request template file.\n");
 | 
				
			||||||
		BIO_printf(bio_err," -subj arg      set or modify request subject\n");
 | 
							BIO_printf(bio_err," -subj arg      set or modify request subject\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -multivalue-rdn enable support for multivalued RDNs\n");
 | 
				
			||||||
		BIO_printf(bio_err," -new           new request.\n");
 | 
							BIO_printf(bio_err," -new           new request.\n");
 | 
				
			||||||
		BIO_printf(bio_err," -batch         do not ask anything during request generation\n");
 | 
							BIO_printf(bio_err," -batch         do not ask anything during request generation\n");
 | 
				
			||||||
		BIO_printf(bio_err," -x509          output a x509 structure instead of a cert. req.\n");
 | 
							BIO_printf(bio_err," -x509          output a x509 structure instead of a cert. req.\n");
 | 
				
			||||||
@@ -647,7 +719,7 @@ bad:
 | 
				
			|||||||
			   message */
 | 
								   message */
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		if (EVP_PKEY_type(pkey->type) == EVP_PKEY_DSA)
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			char *randfile = NCONF_get_string(req_conf,SECTION,"RANDFILE");
 | 
								char *randfile = NCONF_get_string(req_conf,SECTION,"RANDFILE");
 | 
				
			||||||
			if (randfile == NULL)
 | 
								if (randfile == NULL)
 | 
				
			||||||
@@ -658,6 +730,9 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (newreq && (pkey == NULL))
 | 
						if (newreq && (pkey == NULL))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
 | 
							BN_GENCB cb;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
		char *randfile = NCONF_get_string(req_conf,SECTION,"RANDFILE");
 | 
							char *randfile = NCONF_get_string(req_conf,SECTION,"RANDFILE");
 | 
				
			||||||
		if (randfile == NULL)
 | 
							if (randfile == NULL)
 | 
				
			||||||
			ERR_clear_error();
 | 
								ERR_clear_error();
 | 
				
			||||||
@@ -671,24 +746,33 @@ bad:
 | 
				
			|||||||
				newkey=DEFAULT_KEY_LENGTH;
 | 
									newkey=DEFAULT_KEY_LENGTH;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (newkey < MIN_KEY_LENGTH)
 | 
							if (newkey < MIN_KEY_LENGTH && (pkey_type == TYPE_RSA || pkey_type == TYPE_DSA))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"private key length is too short,\n");
 | 
								BIO_printf(bio_err,"private key length is too short,\n");
 | 
				
			||||||
			BIO_printf(bio_err,"it needs to be at least %d bits, not %d\n",MIN_KEY_LENGTH,newkey);
 | 
								BIO_printf(bio_err,"it needs to be at least %d bits, not %ld\n",MIN_KEY_LENGTH,newkey);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		BIO_printf(bio_err,"Generating a %d bit %s private key\n",
 | 
							BIO_printf(bio_err,"Generating a %ld bit %s private key\n",
 | 
				
			||||||
			newkey,(pkey_type == TYPE_RSA)?"RSA":"DSA");
 | 
								newkey,(pkey_type == TYPE_RSA)?"RSA":
 | 
				
			||||||
 | 
								(pkey_type == TYPE_DSA)?"DSA":"EC");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if ((pkey=EVP_PKEY_new()) == NULL) goto end;
 | 
							if ((pkey=EVP_PKEY_new()) == NULL) goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_RSA
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
 | 
							BN_GENCB_set(&cb, req_cb, bio_err);
 | 
				
			||||||
		if (pkey_type == TYPE_RSA)
 | 
							if (pkey_type == TYPE_RSA)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (!EVP_PKEY_assign_RSA(pkey,
 | 
								RSA *rsa = RSA_new();
 | 
				
			||||||
				RSA_generate_key(newkey,0x10001,
 | 
								BIGNUM *bn = BN_new();
 | 
				
			||||||
					req_cb,bio_err)))
 | 
								if(!bn || !rsa || !BN_set_word(bn, 0x10001) ||
 | 
				
			||||||
 | 
										!RSA_generate_key_ex(rsa, newkey, bn, &cb) ||
 | 
				
			||||||
 | 
										!EVP_PKEY_assign_RSA(pkey, rsa))
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									if(bn) BN_free(bn);
 | 
				
			||||||
 | 
									if(rsa) RSA_free(rsa);
 | 
				
			||||||
				goto end;
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								BN_free(bn);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -700,6 +784,15 @@ bad:
 | 
				
			|||||||
			dsa_params=NULL;
 | 
								dsa_params=NULL;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
								if (pkey_type == TYPE_EC)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (!EC_KEY_generate_key(ec_params)) goto end;
 | 
				
			||||||
 | 
								if (!EVP_PKEY_assign_EC_KEY(pkey, ec_params)) 
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
								ec_params = NULL;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		app_RAND_write_file(randfile, bio_err);
 | 
							app_RAND_write_file(randfile, bio_err);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -805,6 +898,10 @@ loop:
 | 
				
			|||||||
#ifndef OPENSSL_NO_DSA
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
		if (pkey->type == EVP_PKEY_DSA)
 | 
							if (pkey->type == EVP_PKEY_DSA)
 | 
				
			||||||
			digest=EVP_dss1();
 | 
								digest=EVP_dss1();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
							if (pkey->type == EVP_PKEY_EC)
 | 
				
			||||||
 | 
								digest=EVP_ecdsa();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		if (req == NULL)
 | 
							if (req == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -814,7 +911,7 @@ loop:
 | 
				
			|||||||
				goto end;
 | 
									goto end;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			i=make_REQ(req,pkey,subj,!x509, chtype);
 | 
								i=make_REQ(req,pkey,subj,multirdn,!x509, chtype);
 | 
				
			||||||
			subj=NULL; /* done processing '-subj' option */
 | 
								subj=NULL; /* done processing '-subj' option */
 | 
				
			||||||
			if ((kludge > 0) && !sk_X509_ATTRIBUTE_num(req->req_info->attributes))
 | 
								if ((kludge > 0) && !sk_X509_ATTRIBUTE_num(req->req_info->attributes))
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
@@ -909,7 +1006,7 @@ loop:
 | 
				
			|||||||
			print_name(bio_err, "old subject=", X509_REQ_get_subject_name(req), nmflag);
 | 
								print_name(bio_err, "old subject=", X509_REQ_get_subject_name(req), nmflag);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (build_subject(req, subj, chtype) == 0)
 | 
							if (build_subject(req, subj, chtype, multirdn) == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "ERROR: cannot modify subject\n");
 | 
								BIO_printf(bio_err, "ERROR: cannot modify subject\n");
 | 
				
			||||||
			ex=1;
 | 
								ex=1;
 | 
				
			||||||
@@ -1092,13 +1189,16 @@ end:
 | 
				
			|||||||
	OBJ_cleanup();
 | 
						OBJ_cleanup();
 | 
				
			||||||
#ifndef OPENSSL_NO_DSA
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
	if (dsa_params != NULL) DSA_free(dsa_params);
 | 
						if (dsa_params != NULL) DSA_free(dsa_params);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
						if (ec_params != NULL) EC_KEY_free(ec_params);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	apps_shutdown();
 | 
						apps_shutdown();
 | 
				
			||||||
	OPENSSL_EXIT(ex);
 | 
						OPENSSL_EXIT(ex);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, char *subj, int attribs,
 | 
					static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, char *subj, int multirdn,
 | 
				
			||||||
			unsigned long chtype)
 | 
								int attribs, unsigned long chtype)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int ret=0,i;
 | 
						int ret=0,i;
 | 
				
			||||||
	char no_prompt = 0;
 | 
						char no_prompt = 0;
 | 
				
			||||||
@@ -1148,7 +1248,7 @@ static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, char *subj, int attribs,
 | 
				
			|||||||
	else 
 | 
						else 
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (subj)
 | 
							if (subj)
 | 
				
			||||||
			i = build_subject(req, subj, chtype);
 | 
								i = build_subject(req, subj, chtype, multirdn);
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			i = prompt_info(req, dn_sk, dn_sect, attr_sk, attr_sect, attribs, chtype);
 | 
								i = prompt_info(req, dn_sk, dn_sect, attr_sk, attr_sect, attribs, chtype);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -1165,11 +1265,11 @@ err:
 | 
				
			|||||||
 * subject is expected to be in the format /type0=value0/type1=value1/type2=...
 | 
					 * subject is expected to be in the format /type0=value0/type1=value1/type2=...
 | 
				
			||||||
 * where characters may be escaped by \
 | 
					 * where characters may be escaped by \
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
static int build_subject(X509_REQ *req, char *subject, unsigned long chtype)
 | 
					static int build_subject(X509_REQ *req, char *subject, unsigned long chtype, int multirdn)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	X509_NAME *n;
 | 
						X509_NAME *n;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!(n = do_subject(subject, chtype)))
 | 
						if (!(n = parse_name(subject, chtype, multirdn)))
 | 
				
			||||||
		return 0;
 | 
							return 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!X509_REQ_set_subject_name(req, n))
 | 
						if (!X509_REQ_set_subject_name(req, n))
 | 
				
			||||||
@@ -1190,9 +1290,10 @@ static int prompt_info(X509_REQ *req,
 | 
				
			|||||||
	int i;
 | 
						int i;
 | 
				
			||||||
	char *p,*q;
 | 
						char *p,*q;
 | 
				
			||||||
	char buf[100];
 | 
						char buf[100];
 | 
				
			||||||
	int nid;
 | 
						int nid, mval;
 | 
				
			||||||
	long n_min,n_max;
 | 
						long n_min,n_max;
 | 
				
			||||||
	char *type,*def,*value;
 | 
						char *type, *value;
 | 
				
			||||||
 | 
						const char *def;
 | 
				
			||||||
	CONF_VALUE *v;
 | 
						CONF_VALUE *v;
 | 
				
			||||||
	X509_NAME *subj;
 | 
						X509_NAME *subj;
 | 
				
			||||||
	subj = X509_REQ_get_subject_name(req);
 | 
						subj = X509_REQ_get_subject_name(req);
 | 
				
			||||||
@@ -1233,10 +1334,17 @@ start:		for (;;)
 | 
				
			|||||||
					if(*p) type = p;
 | 
										if(*p) type = p;
 | 
				
			||||||
					break;
 | 
										break;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
								if (*type == '+')
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									mval = -1;
 | 
				
			||||||
 | 
									type++;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									mval = 0;
 | 
				
			||||||
			/* If OBJ not recognised ignore it */
 | 
								/* If OBJ not recognised ignore it */
 | 
				
			||||||
			if ((nid=OBJ_txt2nid(type)) == NID_undef) goto start;
 | 
								if ((nid=OBJ_txt2nid(type)) == NID_undef) goto start;
 | 
				
			||||||
			if (BIO_snprintf(buf,sizeof buf,"%s_default",v->name)
 | 
								if (BIO_snprintf(buf,sizeof buf,"%s_default",v->name)
 | 
				
			||||||
				>= sizeof buf)
 | 
									>= (int)sizeof(buf))
 | 
				
			||||||
			   {
 | 
								   {
 | 
				
			||||||
			   BIO_printf(bio_err,"Name '%s' too long\n",v->name);
 | 
								   BIO_printf(bio_err,"Name '%s' too long\n",v->name);
 | 
				
			||||||
			   return 0;
 | 
								   return 0;
 | 
				
			||||||
@@ -1270,7 +1378,7 @@ start:		for (;;)
 | 
				
			|||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if (!add_DN_object(subj,v->value,def,value,nid,
 | 
								if (!add_DN_object(subj,v->value,def,value,nid,
 | 
				
			||||||
				n_min,n_max, chtype))
 | 
									n_min,n_max, chtype, mval))
 | 
				
			||||||
				return 0;
 | 
									return 0;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		if (X509_NAME_entry_count(subj) == 0)
 | 
							if (X509_NAME_entry_count(subj) == 0)
 | 
				
			||||||
@@ -1301,7 +1409,7 @@ start2:			for (;;)
 | 
				
			|||||||
					goto start2;
 | 
										goto start2;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (BIO_snprintf(buf,sizeof buf,"%s_default",type)
 | 
									if (BIO_snprintf(buf,sizeof buf,"%s_default",type)
 | 
				
			||||||
					>= sizeof buf)
 | 
										>= (int)sizeof(buf))
 | 
				
			||||||
				   {
 | 
									   {
 | 
				
			||||||
				   BIO_printf(bio_err,"Name '%s' too long\n",v->name);
 | 
									   BIO_printf(bio_err,"Name '%s' too long\n",v->name);
 | 
				
			||||||
				   return 0;
 | 
									   return 0;
 | 
				
			||||||
@@ -1325,11 +1433,17 @@ start2:			for (;;)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
				BIO_snprintf(buf,sizeof buf,"%s_min",type);
 | 
									BIO_snprintf(buf,sizeof buf,"%s_min",type);
 | 
				
			||||||
				if (!NCONF_get_number(req_conf,attr_sect,buf, &n_min))
 | 
									if (!NCONF_get_number(req_conf,attr_sect,buf, &n_min))
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										ERR_clear_error();
 | 
				
			||||||
					n_min = -1;
 | 
										n_min = -1;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				BIO_snprintf(buf,sizeof buf,"%s_max",type);
 | 
									BIO_snprintf(buf,sizeof buf,"%s_max",type);
 | 
				
			||||||
				if (!NCONF_get_number(req_conf,attr_sect,buf, &n_max))
 | 
									if (!NCONF_get_number(req_conf,attr_sect,buf, &n_max))
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										ERR_clear_error();
 | 
				
			||||||
					n_max = -1;
 | 
										n_max = -1;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (!add_attribute_object(req,
 | 
									if (!add_attribute_object(req,
 | 
				
			||||||
					v->value,def,value,nid,n_min,n_max, chtype))
 | 
										v->value,def,value,nid,n_min,n_max, chtype))
 | 
				
			||||||
@@ -1360,6 +1474,7 @@ static int auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *dn_sk,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	for (i = 0; i < sk_CONF_VALUE_num(dn_sk); i++)
 | 
						for (i = 0; i < sk_CONF_VALUE_num(dn_sk); i++)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
 | 
							int mval;
 | 
				
			||||||
		v=sk_CONF_VALUE_value(dn_sk,i);
 | 
							v=sk_CONF_VALUE_value(dn_sk,i);
 | 
				
			||||||
		p=q=NULL;
 | 
							p=q=NULL;
 | 
				
			||||||
		type=v->name;
 | 
							type=v->name;
 | 
				
			||||||
@@ -1376,8 +1491,19 @@ static int auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *dn_sk,
 | 
				
			|||||||
				if(*p) type = p;
 | 
									if(*p) type = p;
 | 
				
			||||||
				break;
 | 
									break;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					#ifndef CHARSET_EBCDIC
 | 
				
			||||||
 | 
							if (*p == '+')
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
							if (*p == os_toascii['+'])
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								p++;
 | 
				
			||||||
 | 
								mval = -1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								mval = 0;
 | 
				
			||||||
		if (!X509_NAME_add_entry_by_txt(subj,type, chtype,
 | 
							if (!X509_NAME_add_entry_by_txt(subj,type, chtype,
 | 
				
			||||||
				(unsigned char *) v->value,-1,-1,0)) return 0;
 | 
									(unsigned char *) v->value,-1,-1,mval)) return 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1399,8 +1525,8 @@ static int auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *dn_sk,
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int add_DN_object(X509_NAME *n, char *text, char *def, char *value,
 | 
					static int add_DN_object(X509_NAME *n, char *text, const char *def, char *value,
 | 
				
			||||||
	     int nid, int n_min, int n_max, unsigned long chtype)
 | 
						     int nid, int n_min, int n_max, unsigned long chtype, int mval)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int i,ret=0;
 | 
						int i,ret=0;
 | 
				
			||||||
	MS_STATIC char buf[1024];
 | 
						MS_STATIC char buf[1024];
 | 
				
			||||||
@@ -1418,7 +1544,8 @@ start:
 | 
				
			|||||||
		buf[0]='\0';
 | 
							buf[0]='\0';
 | 
				
			||||||
		if (!batch)
 | 
							if (!batch)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			fgets(buf,sizeof buf,stdin);
 | 
								if (!fgets(buf,sizeof buf,stdin))
 | 
				
			||||||
 | 
									return 0;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -1447,16 +1574,22 @@ start:
 | 
				
			|||||||
#ifdef CHARSET_EBCDIC
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
	ebcdic2ascii(buf, buf, i);
 | 
						ebcdic2ascii(buf, buf, i);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	if(!req_check_len(i, n_min, n_max)) goto start;
 | 
						if(!req_check_len(i, n_min, n_max))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (batch || value)
 | 
				
			||||||
 | 
								return 0;
 | 
				
			||||||
 | 
							goto start;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!X509_NAME_add_entry_by_NID(n,nid, chtype,
 | 
						if (!X509_NAME_add_entry_by_NID(n,nid, chtype,
 | 
				
			||||||
				(unsigned char *) buf, -1,-1,0)) goto err;
 | 
									(unsigned char *) buf, -1,-1,mval)) goto err;
 | 
				
			||||||
	ret=1;
 | 
						ret=1;
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	return(ret);
 | 
						return(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int add_attribute_object(X509_REQ *req, char *text,
 | 
					static int add_attribute_object(X509_REQ *req, char *text, const char *def,
 | 
				
			||||||
				char *def, char *value, int nid, int n_min,
 | 
									char *value, int nid, int n_min,
 | 
				
			||||||
				int n_max, unsigned long chtype)
 | 
									int n_max, unsigned long chtype)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int i;
 | 
						int i;
 | 
				
			||||||
@@ -1476,7 +1609,8 @@ start:
 | 
				
			|||||||
		buf[0]='\0';
 | 
							buf[0]='\0';
 | 
				
			||||||
		if (!batch)
 | 
							if (!batch)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			fgets(buf,sizeof buf,stdin);
 | 
								if (!fgets(buf,sizeof buf,stdin))
 | 
				
			||||||
 | 
									return 0;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -1505,7 +1639,12 @@ start:
 | 
				
			|||||||
#ifdef CHARSET_EBCDIC
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
	ebcdic2ascii(buf, buf, i);
 | 
						ebcdic2ascii(buf, buf, i);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	if(!req_check_len(i, n_min, n_max)) goto start;
 | 
						if(!req_check_len(i, n_min, n_max))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (batch || value)
 | 
				
			||||||
 | 
								return 0;
 | 
				
			||||||
 | 
							goto start;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(!X509_REQ_add1_attr_by_NID(req, nid, chtype,
 | 
						if(!X509_REQ_add1_attr_by_NID(req, nid, chtype,
 | 
				
			||||||
					(unsigned char *)buf, -1)) {
 | 
										(unsigned char *)buf, -1)) {
 | 
				
			||||||
@@ -1520,7 +1659,7 @@ err:
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_RSA
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
static void MS_CALLBACK req_cb(int p, int n, void *arg)
 | 
					static int MS_CALLBACK req_cb(int p, int n, BN_GENCB *cb)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char c='*';
 | 
						char c='*';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1528,11 +1667,12 @@ static void MS_CALLBACK req_cb(int p, int n, void *arg)
 | 
				
			|||||||
	if (p == 1) c='+';
 | 
						if (p == 1) c='+';
 | 
				
			||||||
	if (p == 2) c='*';
 | 
						if (p == 2) c='*';
 | 
				
			||||||
	if (p == 3) c='\n';
 | 
						if (p == 3) c='\n';
 | 
				
			||||||
	BIO_write((BIO *)arg,&c,1);
 | 
						BIO_write(cb->arg,&c,1);
 | 
				
			||||||
	(void)BIO_flush((BIO *)arg);
 | 
						(void)BIO_flush(cb->arg);
 | 
				
			||||||
#ifdef LINT
 | 
					#ifdef LINT
 | 
				
			||||||
	p=n;
 | 
						p=n;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1552,10 +1692,10 @@ static int req_check_len(int len, int n_min, int n_max)
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* Check if the end of a string matches 'end' */
 | 
					/* Check if the end of a string matches 'end' */
 | 
				
			||||||
static int check_end(char *str, char *end)
 | 
					static int check_end(const char *str, const char *end)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	int elen, slen;	
 | 
						int elen, slen;	
 | 
				
			||||||
	char *tmp;
 | 
						const char *tmp;
 | 
				
			||||||
	elen = strlen(end);
 | 
						elen = strlen(end);
 | 
				
			||||||
	slen = strlen(str);
 | 
						slen = strlen(str);
 | 
				
			||||||
	if(elen > slen) return 1;
 | 
						if(elen > slen) return 1;
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										15
									
								
								apps/rsa.c
									
									
									
									
									
								
							
							
						
						
									
										15
									
								
								apps/rsa.c
									
									
									
									
									
								
							@@ -56,6 +56,7 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>
 | 
				
			||||||
#ifndef OPENSSL_NO_RSA
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
@@ -68,6 +69,7 @@
 | 
				
			|||||||
#include <openssl/evp.h>
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	rsa_main
 | 
					#define PROG	rsa_main
 | 
				
			||||||
@@ -79,9 +81,13 @@
 | 
				
			|||||||
 * -des		- encrypt output if PEM format with DES in cbc mode
 | 
					 * -des		- encrypt output if PEM format with DES in cbc mode
 | 
				
			||||||
 * -des3	- encrypt output if PEM format
 | 
					 * -des3	- encrypt output if PEM format
 | 
				
			||||||
 * -idea	- encrypt output if PEM format
 | 
					 * -idea	- encrypt output if PEM format
 | 
				
			||||||
 | 
					 * -seed	- encrypt output if PEM format
 | 
				
			||||||
 * -aes128	- encrypt output if PEM format
 | 
					 * -aes128	- encrypt output if PEM format
 | 
				
			||||||
 * -aes192	- encrypt output if PEM format
 | 
					 * -aes192	- encrypt output if PEM format
 | 
				
			||||||
 * -aes256	- encrypt output if PEM format
 | 
					 * -aes256	- encrypt output if PEM format
 | 
				
			||||||
 | 
					 * -camellia128 - encrypt output if PEM format
 | 
				
			||||||
 | 
					 * -camellia192 - encrypt output if PEM format
 | 
				
			||||||
 | 
					 * -camellia256 - encrypt output if PEM format
 | 
				
			||||||
 * -text	- print a text version
 | 
					 * -text	- print a text version
 | 
				
			||||||
 * -modulus	- print the RSA key modulus
 | 
					 * -modulus	- print the RSA key modulus
 | 
				
			||||||
 * -check	- verify key consistency
 | 
					 * -check	- verify key consistency
 | 
				
			||||||
@@ -206,9 +212,16 @@ bad:
 | 
				
			|||||||
#ifndef OPENSSL_NO_IDEA
 | 
					#ifndef OPENSSL_NO_IDEA
 | 
				
			||||||
		BIO_printf(bio_err," -idea           encrypt PEM output with cbc idea\n");
 | 
							BIO_printf(bio_err," -idea           encrypt PEM output with cbc idea\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -seed           encrypt PEM output with cbc seed\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_AES
 | 
					#ifndef OPENSSL_NO_AES
 | 
				
			||||||
		BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
							BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
				
			||||||
		BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
							BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -camellia128, -camellia192, -camellia256\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                 encrypt PEM output with cbc camellia\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		BIO_printf(bio_err," -text           print the key in text\n");
 | 
							BIO_printf(bio_err," -text           print the key in text\n");
 | 
				
			||||||
		BIO_printf(bio_err," -noout          don't print key out\n");
 | 
							BIO_printf(bio_err," -noout          don't print key out\n");
 | 
				
			||||||
@@ -307,7 +320,7 @@ bad:
 | 
				
			|||||||
			BIO_printf(out,"RSA key ok\n");
 | 
								BIO_printf(out,"RSA key ok\n");
 | 
				
			||||||
		else if (r == 0)
 | 
							else if (r == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			long err;
 | 
								unsigned long err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			while ((err = ERR_peek_error()) != 0 &&
 | 
								while ((err = ERR_peek_error()) != 0 &&
 | 
				
			||||||
				ERR_GET_LIB(err) == ERR_LIB_RSA &&
 | 
									ERR_GET_LIB(err) == ERR_LIB_RSA &&
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,9 +1,9 @@
 | 
				
			|||||||
/* rsautl.c */
 | 
					/* rsautl.c */
 | 
				
			||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
					/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
 | 
				
			||||||
 * project 2000.
 | 
					 * project 2000.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
/* ====================================================================
 | 
					/* ====================================================================
 | 
				
			||||||
 * Copyright (c) 2000-2005 The OpenSSL Project.  All rights reserved.
 | 
					 * Copyright (c) 2000 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Redistribution and use in source and binary forms, with or without
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 * modification, are permitted provided that the following conditions
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
@@ -56,12 +56,14 @@
 | 
				
			|||||||
 *
 | 
					 *
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/opensslconf.h>
 | 
				
			||||||
#ifndef OPENSSL_NO_RSA
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/rsa.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define RSA_SIGN 	1
 | 
					#define RSA_SIGN 	1
 | 
				
			||||||
#define RSA_VERIFY 	2
 | 
					#define RSA_VERIFY 	2
 | 
				
			||||||
@@ -117,24 +119,36 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	while(argc >= 1)
 | 
						while(argc >= 1)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
		if (!strcmp(*argv,"-in")) {
 | 
							if (!strcmp(*argv,"-in")) {
 | 
				
			||||||
			if (--argc < 1) badarg = 1;
 | 
								if (--argc < 1)
 | 
				
			||||||
                        infile= *(++argv);
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									infile= *(++argv);
 | 
				
			||||||
		} else if (!strcmp(*argv,"-out")) {
 | 
							} else if (!strcmp(*argv,"-out")) {
 | 
				
			||||||
			if (--argc < 1) badarg = 1;
 | 
								if (--argc < 1)
 | 
				
			||||||
			outfile= *(++argv);
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									outfile= *(++argv);
 | 
				
			||||||
		} else if(!strcmp(*argv, "-inkey")) {
 | 
							} else if(!strcmp(*argv, "-inkey")) {
 | 
				
			||||||
			if (--argc < 1) badarg = 1;
 | 
								if (--argc < 1)
 | 
				
			||||||
			keyfile = *(++argv);
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									keyfile = *(++argv);
 | 
				
			||||||
		} else if (!strcmp(*argv,"-passin")) {
 | 
							} else if (!strcmp(*argv,"-passin")) {
 | 
				
			||||||
			if (--argc < 1) badarg = 1;
 | 
								if (--argc < 1)
 | 
				
			||||||
			passargin= *(++argv);
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									passargin= *(++argv);
 | 
				
			||||||
		} else if (strcmp(*argv,"-keyform") == 0) {
 | 
							} else if (strcmp(*argv,"-keyform") == 0) {
 | 
				
			||||||
			if (--argc < 1) badarg = 1;
 | 
								if (--argc < 1)
 | 
				
			||||||
			keyform=str2fmt(*(++argv));
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									keyform=str2fmt(*(++argv));
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
		} else if(!strcmp(*argv, "-engine")) {
 | 
							} else if(!strcmp(*argv, "-engine")) {
 | 
				
			||||||
			if (--argc < 1) badarg = 1;
 | 
								if (--argc < 1)
 | 
				
			||||||
			engine = *(++argv);
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									engine = *(++argv);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		} else if(!strcmp(*argv, "-pubin")) {
 | 
							} else if(!strcmp(*argv, "-pubin")) {
 | 
				
			||||||
			key_type = KEY_PUBKEY;
 | 
								key_type = KEY_PUBKEY;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -108,8 +108,9 @@
 | 
				
			|||||||
 * Hudson (tjh@cryptsoft.com).
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					#if !defined(OPENSSL_SYS_NETWARE)  /* conflicts with winsock2 stuff on netware */
 | 
				
			||||||
#include <sys/types.h>
 | 
					#include <sys/types.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#include <openssl/opensslconf.h>
 | 
					#include <openssl/opensslconf.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
					#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
				
			||||||
@@ -147,22 +148,29 @@ typedef fd_mask fd_set;
 | 
				
			|||||||
#define PORT_STR        "4433"
 | 
					#define PORT_STR        "4433"
 | 
				
			||||||
#define PROTOCOL        "tcp"
 | 
					#define PROTOCOL        "tcp"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int do_server(int port, int *ret, int (*cb) (), char *context);
 | 
					int do_server(int port, int type, int *ret, int (*cb) (char *hostname, int s, unsigned char *context), unsigned char *context);
 | 
				
			||||||
#ifdef HEADER_X509_H
 | 
					#ifdef HEADER_X509_H
 | 
				
			||||||
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
 | 
					int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
#ifdef HEADER_SSL_H
 | 
					#ifdef HEADER_SSL_H
 | 
				
			||||||
int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
 | 
					int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
 | 
				
			||||||
 | 
					int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
int init_client(int *sock, char *server, int port);
 | 
					int init_client(int *sock, char *server, int port, int type);
 | 
				
			||||||
int should_retry(int i);
 | 
					int should_retry(int i);
 | 
				
			||||||
int extract_port(char *str, short *port_ptr);
 | 
					int extract_port(char *str, short *port_ptr);
 | 
				
			||||||
int extract_host_port(char *str,char **host_ptr,unsigned char *ip,short *p);
 | 
					int extract_host_port(char *str,char **host_ptr,unsigned char *ip,short *p);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp,
 | 
					long MS_CALLBACK bio_dump_callback(BIO *bio, int cmd, const char *argp,
 | 
				
			||||||
	int argi, long argl, long ret);
 | 
						int argi, long argl, long ret);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef HEADER_SSL_H
 | 
					#ifdef HEADER_SSL_H
 | 
				
			||||||
void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret);
 | 
					void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret);
 | 
				
			||||||
void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);
 | 
					void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);
 | 
				
			||||||
 | 
					void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
 | 
				
			||||||
 | 
										unsigned char *data, int len,
 | 
				
			||||||
 | 
										void *arg);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len);
 | 
				
			||||||
 | 
					int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len);
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										238
									
								
								apps/s_cb.c
									
									
									
									
									
								
							
							
						
						
									
										238
									
								
								apps/s_cb.c
									
									
									
									
									
								
							@@ -117,12 +117,17 @@
 | 
				
			|||||||
#undef NON_MAIN
 | 
					#undef NON_MAIN
 | 
				
			||||||
#undef USE_SOCKETS
 | 
					#undef USE_SOCKETS
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/rand.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/ssl.h>
 | 
					#include <openssl/ssl.h>
 | 
				
			||||||
#include "s_apps.h"
 | 
					#include "s_apps.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define	COOKIE_SECRET_LENGTH	16
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int verify_depth=0;
 | 
					int verify_depth=0;
 | 
				
			||||||
int verify_error=X509_V_OK;
 | 
					int verify_error=X509_V_OK;
 | 
				
			||||||
 | 
					unsigned char cookie_secret[COOKIE_SECRET_LENGTH];
 | 
				
			||||||
 | 
					int cookie_initialized=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
 | 
					int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
@@ -229,8 +234,36 @@ int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file)
 | 
				
			|||||||
	return(1);
 | 
						return(1);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp, int argi,
 | 
					int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key)
 | 
				
			||||||
	     long argl, long ret)
 | 
						{
 | 
				
			||||||
 | 
						if (cert ==  NULL)
 | 
				
			||||||
 | 
							return 1;
 | 
				
			||||||
 | 
						if (SSL_CTX_use_certificate(ctx,cert) <= 0)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"error setting certificate\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (SSL_CTX_use_PrivateKey(ctx,key) <= 0)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"error setting private key\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							/* Now we know that a key and cert have been set against
 | 
				
			||||||
 | 
							 * the SSL context */
 | 
				
			||||||
 | 
						if (!SSL_CTX_check_private_key(ctx))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"Private key does not match the certificate public key\n");
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					long MS_CALLBACK bio_dump_callback(BIO *bio, int cmd, const char *argp,
 | 
				
			||||||
 | 
						int argi, long argl, long ret)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	BIO *out;
 | 
						BIO *out;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -239,15 +272,15 @@ long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp, int argi,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (cmd == (BIO_CB_READ|BIO_CB_RETURN))
 | 
						if (cmd == (BIO_CB_READ|BIO_CB_RETURN))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(out,"read from %08X [%08lX] (%d bytes => %ld (0x%X))\n",
 | 
							BIO_printf(out,"read from %p [%p] (%d bytes => %ld (0x%lX))\n",
 | 
				
			||||||
			bio,argp,argi,ret,ret);
 | 
					 			(void *)bio,argp,argi,ret,ret);
 | 
				
			||||||
		BIO_dump(out,argp,(int)ret);
 | 
							BIO_dump(out,argp,(int)ret);
 | 
				
			||||||
		return(ret);
 | 
							return(ret);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else if (cmd == (BIO_CB_WRITE|BIO_CB_RETURN))
 | 
						else if (cmd == (BIO_CB_WRITE|BIO_CB_RETURN))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(out,"write to %08X [%08lX] (%d bytes => %ld (0x%X))\n",
 | 
							BIO_printf(out,"write to %p [%p] (%d bytes => %ld (0x%lX))\n",
 | 
				
			||||||
			bio,argp,argi,ret,ret);
 | 
								(void *)bio,argp,argi,ret,ret);
 | 
				
			||||||
		BIO_dump(out,argp,(int)ret);
 | 
							BIO_dump(out,argp,(int)ret);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	return(ret);
 | 
						return(ret);
 | 
				
			||||||
@@ -255,7 +288,7 @@ long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp, int argi,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret)
 | 
					void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char *str;
 | 
						const char *str;
 | 
				
			||||||
	int w;
 | 
						int w;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	w=where& ~SSL_ST_MASK;
 | 
						w=where& ~SSL_ST_MASK;
 | 
				
			||||||
@@ -310,6 +343,12 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
				
			|||||||
		break;
 | 
							break;
 | 
				
			||||||
	default:
 | 
						default:
 | 
				
			||||||
		str_version = "???";
 | 
							str_version = "???";
 | 
				
			||||||
 | 
						case DTLS1_VERSION:
 | 
				
			||||||
 | 
							str_version = "DTLS 1.0 ";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
						case DTLS1_BAD_VER:
 | 
				
			||||||
 | 
							str_version = "DTLS 1.0 (bad) ";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (version == SSL2_VERSION)
 | 
						if (version == SSL2_VERSION)
 | 
				
			||||||
@@ -318,14 +357,14 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		if (len > 0)
 | 
							if (len > 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			switch (((unsigned char*)buf)[0])
 | 
								switch (((const unsigned char*)buf)[0])
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				case 0:
 | 
									case 0:
 | 
				
			||||||
					str_details1 = ", ERROR:";
 | 
										str_details1 = ", ERROR:";
 | 
				
			||||||
					str_details2 = " ???";
 | 
										str_details2 = " ???";
 | 
				
			||||||
					if (len >= 3)
 | 
										if (len >= 3)
 | 
				
			||||||
						{
 | 
											{
 | 
				
			||||||
						unsigned err = (((unsigned char*)buf)[1]<<8) + ((unsigned char*)buf)[2];
 | 
											unsigned err = (((const unsigned char*)buf)[1]<<8) + ((const unsigned char*)buf)[2];
 | 
				
			||||||
						
 | 
											
 | 
				
			||||||
						switch (err)
 | 
											switch (err)
 | 
				
			||||||
							{
 | 
												{
 | 
				
			||||||
@@ -373,7 +412,10 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (version == SSL3_VERSION || version == TLS1_VERSION)
 | 
						if (version == SSL3_VERSION ||
 | 
				
			||||||
 | 
						    version == TLS1_VERSION ||
 | 
				
			||||||
 | 
						    version == DTLS1_VERSION ||
 | 
				
			||||||
 | 
						    version == DTLS1_BAD_VER)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		switch (content_type)
 | 
							switch (content_type)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -394,7 +436,7 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
				
			|||||||
			
 | 
								
 | 
				
			||||||
			if (len == 2)
 | 
								if (len == 2)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				switch (((unsigned char*)buf)[0])
 | 
									switch (((const unsigned char*)buf)[0])
 | 
				
			||||||
					{
 | 
										{
 | 
				
			||||||
				case 1:
 | 
									case 1:
 | 
				
			||||||
					str_details1 = ", warning";
 | 
										str_details1 = ", warning";
 | 
				
			||||||
@@ -405,7 +447,7 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
				
			|||||||
					}
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				str_details2 = " ???";
 | 
									str_details2 = " ???";
 | 
				
			||||||
				switch (((unsigned char*)buf)[1])
 | 
									switch (((const unsigned char*)buf)[1])
 | 
				
			||||||
					{
 | 
										{
 | 
				
			||||||
				case 0:
 | 
									case 0:
 | 
				
			||||||
					str_details2 = " close_notify";
 | 
										str_details2 = " close_notify";
 | 
				
			||||||
@@ -476,6 +518,24 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
				
			|||||||
				case 100:
 | 
									case 100:
 | 
				
			||||||
					str_details2 = " no_renegotiation";
 | 
										str_details2 = " no_renegotiation";
 | 
				
			||||||
					break;
 | 
										break;
 | 
				
			||||||
 | 
									case 110:
 | 
				
			||||||
 | 
										str_details2 = " unsupported_extension";
 | 
				
			||||||
 | 
										break;
 | 
				
			||||||
 | 
									case 111:
 | 
				
			||||||
 | 
										str_details2 = " certificate_unobtainable";
 | 
				
			||||||
 | 
										break;
 | 
				
			||||||
 | 
									case 112:
 | 
				
			||||||
 | 
										str_details2 = " unrecognized_name";
 | 
				
			||||||
 | 
										break;
 | 
				
			||||||
 | 
									case 113:
 | 
				
			||||||
 | 
										str_details2 = " bad_certificate_status_response";
 | 
				
			||||||
 | 
										break;
 | 
				
			||||||
 | 
									case 114:
 | 
				
			||||||
 | 
										str_details2 = " bad_certificate_hash_value";
 | 
				
			||||||
 | 
										break;
 | 
				
			||||||
 | 
									case 115:
 | 
				
			||||||
 | 
										str_details2 = " unknown_psk_identity";
 | 
				
			||||||
 | 
										break;
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -486,7 +546,7 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
			if (len > 0)
 | 
								if (len > 0)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				switch (((unsigned char*)buf)[0])
 | 
									switch (((const unsigned char*)buf)[0])
 | 
				
			||||||
					{
 | 
										{
 | 
				
			||||||
				case 0:
 | 
									case 0:
 | 
				
			||||||
					str_details1 = ", HelloRequest";
 | 
										str_details1 = ", HelloRequest";
 | 
				
			||||||
@@ -512,6 +572,9 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
				
			|||||||
				case 15:
 | 
									case 15:
 | 
				
			||||||
					str_details1 = ", CertificateVerify";
 | 
										str_details1 = ", CertificateVerify";
 | 
				
			||||||
					break;
 | 
										break;
 | 
				
			||||||
 | 
									case 3:
 | 
				
			||||||
 | 
										str_details1 = ", HelloVerifyRequest";
 | 
				
			||||||
 | 
										break;
 | 
				
			||||||
				case 16:
 | 
									case 16:
 | 
				
			||||||
					str_details1 = ", ClientKeyExchange";
 | 
										str_details1 = ", ClientKeyExchange";
 | 
				
			||||||
					break;
 | 
										break;
 | 
				
			||||||
@@ -539,11 +602,156 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
 | 
				
			|||||||
			{
 | 
								{
 | 
				
			||||||
			if (i % 16 == 0 && i > 0)
 | 
								if (i % 16 == 0 && i > 0)
 | 
				
			||||||
				BIO_printf(bio, "\n   ");
 | 
									BIO_printf(bio, "\n   ");
 | 
				
			||||||
			BIO_printf(bio, " %02x", ((unsigned char*)buf)[i]);
 | 
								BIO_printf(bio, " %02x", ((const unsigned char*)buf)[i]);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		if (i < len)
 | 
							if (i < len)
 | 
				
			||||||
			BIO_printf(bio, " ...");
 | 
								BIO_printf(bio, " ...");
 | 
				
			||||||
		BIO_printf(bio, "\n");
 | 
							BIO_printf(bio, "\n");
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	BIO_flush(bio);
 | 
						(void)BIO_flush(bio);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
 | 
				
			||||||
 | 
										unsigned char *data, int len,
 | 
				
			||||||
 | 
										void *arg)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIO *bio = arg;
 | 
				
			||||||
 | 
						char *extname;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						switch(type)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							case TLSEXT_TYPE_server_name:
 | 
				
			||||||
 | 
							extname = "server name";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case TLSEXT_TYPE_max_fragment_length:
 | 
				
			||||||
 | 
							extname = "max fragment length";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case TLSEXT_TYPE_client_certificate_url:
 | 
				
			||||||
 | 
							extname = "client certificate URL";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case TLSEXT_TYPE_trusted_ca_keys:
 | 
				
			||||||
 | 
							extname = "trusted CA keys";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case TLSEXT_TYPE_truncated_hmac:
 | 
				
			||||||
 | 
							extname = "truncated HMAC";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case TLSEXT_TYPE_status_request:
 | 
				
			||||||
 | 
							extname = "status request";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case TLSEXT_TYPE_elliptic_curves:
 | 
				
			||||||
 | 
							extname = "elliptic curves";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case TLSEXT_TYPE_ec_point_formats:
 | 
				
			||||||
 | 
							extname = "EC point formats";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case TLSEXT_TYPE_session_ticket:
 | 
				
			||||||
 | 
							extname = "server ticket";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case TLSEXT_TYPE_renegotiate:
 | 
				
			||||||
 | 
							extname = "renegotiate";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							default:
 | 
				
			||||||
 | 
							extname = "unknown";
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						BIO_printf(bio, "TLS %s extension \"%s\" (id=%d), len=%d\n",
 | 
				
			||||||
 | 
								client_server ? "server": "client",
 | 
				
			||||||
 | 
								extname, type, len);
 | 
				
			||||||
 | 
						BIO_dump(bio, (char *)data, len);
 | 
				
			||||||
 | 
						(void)BIO_flush(bio);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						unsigned char *buffer, result[EVP_MAX_MD_SIZE];
 | 
				
			||||||
 | 
						unsigned int length, resultlength;
 | 
				
			||||||
 | 
						struct sockaddr_in peer;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						/* Initialize a random secret */
 | 
				
			||||||
 | 
						if (!cookie_initialized)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!RAND_bytes(cookie_secret, COOKIE_SECRET_LENGTH))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"error setting random cookie secret\n");
 | 
				
			||||||
 | 
								return 0;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							cookie_initialized = 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* Read peer information */
 | 
				
			||||||
 | 
						(void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* Create buffer with peer's address and port */
 | 
				
			||||||
 | 
						length = sizeof(peer.sin_addr);
 | 
				
			||||||
 | 
						length += sizeof(peer.sin_port);
 | 
				
			||||||
 | 
						buffer = OPENSSL_malloc(length);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (buffer == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"out of memory\n");
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						memcpy(buffer, &peer.sin_addr, sizeof(peer.sin_addr));
 | 
				
			||||||
 | 
						memcpy(buffer + sizeof(peer.sin_addr), &peer.sin_port, sizeof(peer.sin_port));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* Calculate HMAC of buffer using the secret */
 | 
				
			||||||
 | 
						HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
 | 
				
			||||||
 | 
						     buffer, length, result, &resultlength);
 | 
				
			||||||
 | 
						OPENSSL_free(buffer);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						memcpy(cookie, result, resultlength);
 | 
				
			||||||
 | 
						*cookie_len = resultlength;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						unsigned char *buffer, result[EVP_MAX_MD_SIZE];
 | 
				
			||||||
 | 
						unsigned int length, resultlength;
 | 
				
			||||||
 | 
						struct sockaddr_in peer;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						/* If secret isn't initialized yet, the cookie can't be valid */
 | 
				
			||||||
 | 
						if (!cookie_initialized)
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* Read peer information */
 | 
				
			||||||
 | 
						(void)BIO_dgram_get_peer(SSL_get_rbio(ssl), &peer);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* Create buffer with peer's address and port */
 | 
				
			||||||
 | 
						length = sizeof(peer.sin_addr);
 | 
				
			||||||
 | 
						length += sizeof(peer.sin_port);
 | 
				
			||||||
 | 
						buffer = (unsigned char*) OPENSSL_malloc(length);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (buffer == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"out of memory\n");
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						memcpy(buffer, &peer.sin_addr, sizeof(peer.sin_addr));
 | 
				
			||||||
 | 
						memcpy(buffer + sizeof(peer.sin_addr), &peer.sin_port, sizeof(peer.sin_port));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* Calculate HMAC of buffer using the secret */
 | 
				
			||||||
 | 
						HMAC(EVP_sha1(), cookie_secret, COOKIE_SECRET_LENGTH,
 | 
				
			||||||
 | 
						     buffer, length, result, &resultlength);
 | 
				
			||||||
 | 
						OPENSSL_free(buffer);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (cookie_len == resultlength && memcmp(result, cookie, resultlength) == 0)
 | 
				
			||||||
 | 
							return 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return 0;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										587
									
								
								apps/s_client.c
									
									
									
									
									
								
							
							
						
						
									
										587
									
								
								apps/s_client.c
									
									
									
									
									
								
							@@ -134,7 +134,9 @@ typedef unsigned int u_int;
 | 
				
			|||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
#include <openssl/rand.h>
 | 
					#include <openssl/rand.h>
 | 
				
			||||||
 | 
					#include <openssl/ocsp.h>
 | 
				
			||||||
#include "s_apps.h"
 | 
					#include "s_apps.h"
 | 
				
			||||||
 | 
					#include "timeouts.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef OPENSSL_SYS_WINCE
 | 
					#ifdef OPENSSL_SYS_WINCE
 | 
				
			||||||
/* Windows CE incorrectly defines fileno as returning void*, so to avoid problems below... */
 | 
					/* Windows CE incorrectly defines fileno as returning void*, so to avoid problems below... */
 | 
				
			||||||
@@ -170,11 +172,18 @@ static int c_nbio=0;
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
static int c_Pause=0;
 | 
					static int c_Pause=0;
 | 
				
			||||||
static int c_debug=0;
 | 
					static int c_debug=0;
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
					static int c_tlsextdebug=0;
 | 
				
			||||||
 | 
					static int c_status_req=0;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
static int c_msg=0;
 | 
					static int c_msg=0;
 | 
				
			||||||
static int c_showcerts=0;
 | 
					static int c_showcerts=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void sc_usage(void);
 | 
					static void sc_usage(void);
 | 
				
			||||||
static void print_stuff(BIO *berr,SSL *con,int full);
 | 
					static void print_stuff(BIO *berr,SSL *con,int full);
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
					static int ocsp_resp_cb(SSL *s, void *arg);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
static BIO *bio_c_out=NULL;
 | 
					static BIO *bio_c_out=NULL;
 | 
				
			||||||
static int c_quiet=0;
 | 
					static int c_quiet=0;
 | 
				
			||||||
static int c_ign_eof=0;
 | 
					static int c_ign_eof=0;
 | 
				
			||||||
@@ -187,10 +196,13 @@ static void sc_usage(void)
 | 
				
			|||||||
	BIO_printf(bio_err," -port port     - use -connect instead\n");
 | 
						BIO_printf(bio_err," -port port     - use -connect instead\n");
 | 
				
			||||||
	BIO_printf(bio_err," -connect host:port - who to connect to (default is %s:%s)\n",SSL_HOST_NAME,PORT_STR);
 | 
						BIO_printf(bio_err," -connect host:port - who to connect to (default is %s:%s)\n",SSL_HOST_NAME,PORT_STR);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_err," -verify arg   - turn on peer certificate verification\n");
 | 
						BIO_printf(bio_err," -verify depth - turn on peer certificate verification\n");
 | 
				
			||||||
	BIO_printf(bio_err," -cert arg     - certificate file to use, PEM format assumed\n");
 | 
						BIO_printf(bio_err," -cert arg     - certificate file to use, PEM format assumed\n");
 | 
				
			||||||
	BIO_printf(bio_err," -key arg      - Private key file to use, PEM format assumed, in cert file if\n");
 | 
						BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -key arg      - Private key file to use, in cert file if\n");
 | 
				
			||||||
	BIO_printf(bio_err,"                 not specified but cert file is.\n");
 | 
						BIO_printf(bio_err,"                 not specified but cert file is.\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -keyform arg  - key format (PEM or DER) PEM default\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -pass arg     - private key file pass phrase source\n");
 | 
				
			||||||
	BIO_printf(bio_err," -CApath arg   - PEM format directory of CA's\n");
 | 
						BIO_printf(bio_err," -CApath arg   - PEM format directory of CA's\n");
 | 
				
			||||||
	BIO_printf(bio_err," -CAfile arg   - PEM format file of CA's\n");
 | 
						BIO_printf(bio_err," -CAfile arg   - PEM format file of CA's\n");
 | 
				
			||||||
	BIO_printf(bio_err," -reconnect    - Drop and re-make the connection with the same Session-ID\n");
 | 
						BIO_printf(bio_err," -reconnect    - Drop and re-make the connection with the same Session-ID\n");
 | 
				
			||||||
@@ -209,9 +221,13 @@ static void sc_usage(void)
 | 
				
			|||||||
	BIO_printf(bio_err," -crlf         - convert LF from terminal into CRLF\n");
 | 
						BIO_printf(bio_err," -crlf         - convert LF from terminal into CRLF\n");
 | 
				
			||||||
	BIO_printf(bio_err," -quiet        - no s_client output\n");
 | 
						BIO_printf(bio_err," -quiet        - no s_client output\n");
 | 
				
			||||||
	BIO_printf(bio_err," -ign_eof      - ignore input eof (default when -quiet)\n");
 | 
						BIO_printf(bio_err," -ign_eof      - ignore input eof (default when -quiet)\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -no_ign_eof   - don't ignore input eof\n");
 | 
				
			||||||
	BIO_printf(bio_err," -ssl2         - just use SSLv2\n");
 | 
						BIO_printf(bio_err," -ssl2         - just use SSLv2\n");
 | 
				
			||||||
	BIO_printf(bio_err," -ssl3         - just use SSLv3\n");
 | 
						BIO_printf(bio_err," -ssl3         - just use SSLv3\n");
 | 
				
			||||||
	BIO_printf(bio_err," -tls1         - just use TLSv1\n");
 | 
						BIO_printf(bio_err," -tls1         - just use TLSv1\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -dtls1        - just use DTLSv1\n");    
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -fallback_scsv - send TLS_FALLBACK_SCSV\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -mtu          - set the link layer MTU\n");
 | 
				
			||||||
	BIO_printf(bio_err," -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
 | 
						BIO_printf(bio_err," -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
 | 
				
			||||||
	BIO_printf(bio_err," -bugs         - Switch on all SSL implementation bug workarounds\n");
 | 
						BIO_printf(bio_err," -bugs         - Switch on all SSL implementation bug workarounds\n");
 | 
				
			||||||
	BIO_printf(bio_err," -serverpref   - Use server's cipher preferences (only SSLv2)\n");
 | 
						BIO_printf(bio_err," -serverpref   - Use server's cipher preferences (only SSLv2)\n");
 | 
				
			||||||
@@ -220,19 +236,59 @@ static void sc_usage(void)
 | 
				
			|||||||
	BIO_printf(bio_err," -starttls prot - use the STARTTLS command before starting TLS\n");
 | 
						BIO_printf(bio_err," -starttls prot - use the STARTTLS command before starting TLS\n");
 | 
				
			||||||
	BIO_printf(bio_err,"                 for those protocols that support it, where\n");
 | 
						BIO_printf(bio_err,"                 for those protocols that support it, where\n");
 | 
				
			||||||
	BIO_printf(bio_err,"                 'prot' defines which one to assume.  Currently,\n");
 | 
						BIO_printf(bio_err,"                 'prot' defines which one to assume.  Currently,\n");
 | 
				
			||||||
	BIO_printf(bio_err,"                 only \"smtp\" and \"pop3\" are supported.\n");
 | 
						BIO_printf(bio_err,"                 only \"smtp\", \"pop3\", \"imap\", \"ftp\" and \"xmpp\"\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err,"                 are supported.\n");
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
	BIO_printf(bio_err," -engine id    - Initialise and use the specified engine\n");
 | 
						BIO_printf(bio_err," -engine id    - Initialise and use the specified engine\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
						BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -sess_out arg - file to write SSL session to\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -sess_in arg  - file to read SSL session from\n");
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -servername host  - Set TLS extension servername in ClientHello\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -tlsextdebug      - hex dump of all TLS extensions received\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -status           - request certificate status from server\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -no_ticket        - disable use of RFC4507bis session tickets\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -legacy_renegotiation - enable use of legacy renegotiation (dangerous)\n");
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* This is a context that we pass to callbacks */
 | 
				
			||||||
 | 
					typedef struct tlsextctx_st {
 | 
				
			||||||
 | 
					   BIO * biodebug;
 | 
				
			||||||
 | 
					   int ack;
 | 
				
			||||||
 | 
					} tlsextctx;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int MS_CALLBACK ssl_servername_cb(SSL *s, int *ad, void *arg)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						tlsextctx * p = (tlsextctx *) arg;
 | 
				
			||||||
 | 
						const char * hn= SSL_get_servername(s, TLSEXT_NAMETYPE_host_name);
 | 
				
			||||||
 | 
						if (SSL_get_servername_type(s) != -1) 
 | 
				
			||||||
 | 
					 	        p->ack = !SSL_session_reused(s) && hn != NULL;
 | 
				
			||||||
 | 
						else 
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"Can't use SSL_get_servername\n");
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						return SSL_TLSEXT_ERR_OK;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					enum
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						PROTO_OFF	= 0,
 | 
				
			||||||
 | 
						PROTO_SMTP,
 | 
				
			||||||
 | 
						PROTO_POP3,
 | 
				
			||||||
 | 
						PROTO_IMAP,
 | 
				
			||||||
 | 
						PROTO_FTP,
 | 
				
			||||||
 | 
						PROTO_XMPP
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int, char **);
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int off=0;
 | 
						int off=0, clr = 0;
 | 
				
			||||||
	SSL *con=NULL,*con2=NULL;
 | 
						SSL *con=NULL,*con2=NULL;
 | 
				
			||||||
	X509_STORE *store = NULL;
 | 
						X509_STORE *store = NULL;
 | 
				
			||||||
	int s,k,width,state=0;
 | 
						int s,k,width,state=0;
 | 
				
			||||||
@@ -244,32 +300,54 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	int full_log=1;
 | 
						int full_log=1;
 | 
				
			||||||
	char *host=SSL_HOST_NAME;
 | 
						char *host=SSL_HOST_NAME;
 | 
				
			||||||
	char *cert_file=NULL,*key_file=NULL;
 | 
						char *cert_file=NULL,*key_file=NULL;
 | 
				
			||||||
 | 
						int cert_format = FORMAT_PEM, key_format = FORMAT_PEM;
 | 
				
			||||||
 | 
						char *passarg = NULL, *pass = NULL;
 | 
				
			||||||
 | 
						X509 *cert = NULL;
 | 
				
			||||||
 | 
						EVP_PKEY *key = NULL;
 | 
				
			||||||
	char *CApath=NULL,*CAfile=NULL,*cipher=NULL;
 | 
						char *CApath=NULL,*CAfile=NULL,*cipher=NULL;
 | 
				
			||||||
	int reconnect=0,badop=0,verify=SSL_VERIFY_NONE,bugs=0;
 | 
						int reconnect=0,badop=0,verify=SSL_VERIFY_NONE,bugs=0;
 | 
				
			||||||
	int crlf=0;
 | 
						int crlf=0;
 | 
				
			||||||
	int write_tty,read_tty,write_ssl,read_ssl,tty_on,ssl_pending;
 | 
						int write_tty,read_tty,write_ssl,read_ssl,tty_on,ssl_pending;
 | 
				
			||||||
	SSL_CTX *ctx=NULL;
 | 
						SSL_CTX *ctx=NULL;
 | 
				
			||||||
	int ret=1,in_init=1,i,nbio_test=0;
 | 
						int ret=1,in_init=1,i,nbio_test=0;
 | 
				
			||||||
	int starttls_proto = 0;
 | 
						int starttls_proto = PROTO_OFF;
 | 
				
			||||||
	int prexit = 0, vflags = 0;
 | 
						int prexit = 0, vflags = 0;
 | 
				
			||||||
	SSL_METHOD *meth=NULL;
 | 
						SSL_METHOD *meth=NULL;
 | 
				
			||||||
 | 
					#ifdef sock_type
 | 
				
			||||||
 | 
					#undef sock_type
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						int sock_type=SOCK_STREAM;
 | 
				
			||||||
	BIO *sbio;
 | 
						BIO *sbio;
 | 
				
			||||||
	char *inrand=NULL;
 | 
						char *inrand=NULL;
 | 
				
			||||||
 | 
						int mbuf_len=0;
 | 
				
			||||||
 | 
						struct timeval timeout, *timeoutp;
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
	char *engine_id=NULL;
 | 
						char *engine_id=NULL;
 | 
				
			||||||
	ENGINE *e=NULL;
 | 
						char *ssl_client_engine_id=NULL;
 | 
				
			||||||
 | 
						ENGINE *ssl_client_engine=NULL;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
						ENGINE *e=NULL;
 | 
				
			||||||
 | 
					#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE)
 | 
				
			||||||
	struct timeval tv;
 | 
						struct timeval tv;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
	meth=SSLv23_client_method();
 | 
						char *servername = NULL; 
 | 
				
			||||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
					        tlsextctx tlsextcbp = 
 | 
				
			||||||
	meth=SSLv3_client_method();
 | 
					        {NULL,0};
 | 
				
			||||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
					 | 
				
			||||||
	meth=SSLv2_client_method();
 | 
					 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
						char *sess_in = NULL;
 | 
				
			||||||
 | 
						char *sess_out = NULL;
 | 
				
			||||||
 | 
						struct sockaddr peer;
 | 
				
			||||||
 | 
						int peerlen = sizeof(peer);
 | 
				
			||||||
 | 
						int fallback_scsv = 0;
 | 
				
			||||||
 | 
						int enable_timeouts = 0 ;
 | 
				
			||||||
 | 
						long socket_mtu = 0;
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_JPAKE
 | 
				
			||||||
 | 
						char *jpake_secret = NULL;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						meth=SSLv23_client_method();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
	c_Pause=0;
 | 
						c_Pause=0;
 | 
				
			||||||
@@ -332,6 +410,21 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			cert_file= *(++argv);
 | 
								cert_file= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-sess_out") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								sess_out = *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-sess_in") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								sess_in = *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-certform") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								cert_format = str2fmt(*(++argv));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if	(strcmp(*argv,"-crl_check") == 0)
 | 
							else if	(strcmp(*argv,"-crl_check") == 0)
 | 
				
			||||||
			vflags |= X509_V_FLAG_CRL_CHECK;
 | 
								vflags |= X509_V_FLAG_CRL_CHECK;
 | 
				
			||||||
		else if	(strcmp(*argv,"-crl_check_all") == 0)
 | 
							else if	(strcmp(*argv,"-crl_check_all") == 0)
 | 
				
			||||||
@@ -347,12 +440,20 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		else if	(strcmp(*argv,"-ign_eof") == 0)
 | 
							else if	(strcmp(*argv,"-ign_eof") == 0)
 | 
				
			||||||
			c_ign_eof=1;
 | 
								c_ign_eof=1;
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-no_ign_eof") == 0)
 | 
				
			||||||
 | 
								c_ign_eof=0;
 | 
				
			||||||
		else if	(strcmp(*argv,"-pause") == 0)
 | 
							else if	(strcmp(*argv,"-pause") == 0)
 | 
				
			||||||
			c_Pause=1;
 | 
								c_Pause=1;
 | 
				
			||||||
		else if	(strcmp(*argv,"-debug") == 0)
 | 
							else if	(strcmp(*argv,"-debug") == 0)
 | 
				
			||||||
			c_debug=1;
 | 
								c_debug=1;
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-tlsextdebug") == 0)
 | 
				
			||||||
 | 
								c_tlsextdebug=1;
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-status") == 0)
 | 
				
			||||||
 | 
								c_status_req=1;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifdef WATT32
 | 
					#ifdef WATT32
 | 
				
			||||||
		else if	(strcmp(*argv,"-wdebug") == 0)
 | 
							else if (strcmp(*argv,"-wdebug") == 0)
 | 
				
			||||||
			dbug_init();
 | 
								dbug_init();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		else if	(strcmp(*argv,"-msg") == 0)
 | 
							else if	(strcmp(*argv,"-msg") == 0)
 | 
				
			||||||
@@ -375,8 +476,36 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		else if	(strcmp(*argv,"-tls1") == 0)
 | 
							else if	(strcmp(*argv,"-tls1") == 0)
 | 
				
			||||||
			meth=TLSv1_client_method();
 | 
								meth=TLSv1_client_method();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_DTLS1
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-dtls1") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								meth=DTLSv1_client_method();
 | 
				
			||||||
 | 
								sock_type=SOCK_DGRAM;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-timeout") == 0)
 | 
				
			||||||
 | 
								enable_timeouts=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-mtu") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								socket_mtu = atol(*(++argv));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-fallback_scsv") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								fallback_scsv = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-bugs") == 0)
 | 
							else if (strcmp(*argv,"-bugs") == 0)
 | 
				
			||||||
			bugs=1;
 | 
								bugs=1;
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-keyform") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								key_format = str2fmt(*(++argv));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-pass") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passarg = *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if	(strcmp(*argv,"-key") == 0)
 | 
							else if	(strcmp(*argv,"-key") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -402,8 +531,18 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			off|=SSL_OP_NO_SSLv3;
 | 
								off|=SSL_OP_NO_SSLv3;
 | 
				
			||||||
		else if (strcmp(*argv,"-no_ssl2") == 0)
 | 
							else if (strcmp(*argv,"-no_ssl2") == 0)
 | 
				
			||||||
			off|=SSL_OP_NO_SSLv2;
 | 
								off|=SSL_OP_NO_SSLv2;
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-no_ticket") == 0)
 | 
				
			||||||
 | 
								{ off|=SSL_OP_NO_TICKET; }
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
		else if (strcmp(*argv,"-serverpref") == 0)
 | 
							else if (strcmp(*argv,"-serverpref") == 0)
 | 
				
			||||||
			off|=SSL_OP_CIPHER_SERVER_PREFERENCE;
 | 
								off|=SSL_OP_CIPHER_SERVER_PREFERENCE;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-legacy_renegotiation") == 0)
 | 
				
			||||||
 | 
								off|=SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION;
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-legacy_server_connect") == 0)
 | 
				
			||||||
 | 
								{ off|=SSL_OP_LEGACY_SERVER_CONNECT; }
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-no_legacy_server_connect") == 0)
 | 
				
			||||||
 | 
								{ clr|=SSL_OP_LEGACY_SERVER_CONNECT; }
 | 
				
			||||||
		else if	(strcmp(*argv,"-cipher") == 0)
 | 
							else if	(strcmp(*argv,"-cipher") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -418,9 +557,15 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			++argv;
 | 
								++argv;
 | 
				
			||||||
			if (strcmp(*argv,"smtp") == 0)
 | 
								if (strcmp(*argv,"smtp") == 0)
 | 
				
			||||||
				starttls_proto = 1;
 | 
									starttls_proto = PROTO_SMTP;
 | 
				
			||||||
			else if (strcmp(*argv,"pop3") == 0)
 | 
								else if (strcmp(*argv,"pop3") == 0)
 | 
				
			||||||
				starttls_proto = 2;
 | 
									starttls_proto = PROTO_POP3;
 | 
				
			||||||
 | 
								else if (strcmp(*argv,"imap") == 0)
 | 
				
			||||||
 | 
									starttls_proto = PROTO_IMAP;
 | 
				
			||||||
 | 
								else if (strcmp(*argv,"ftp") == 0)
 | 
				
			||||||
 | 
									starttls_proto = PROTO_FTP;
 | 
				
			||||||
 | 
								else if (strcmp(*argv, "xmpp") == 0)
 | 
				
			||||||
 | 
									starttls_proto = PROTO_XMPP;
 | 
				
			||||||
			else
 | 
								else
 | 
				
			||||||
				goto bad;
 | 
									goto bad;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -430,12 +575,32 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			engine_id = *(++argv);
 | 
								engine_id = *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-ssl_client_engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								ssl_client_engine_id = *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		else if (strcmp(*argv,"-rand") == 0)
 | 
							else if (strcmp(*argv,"-rand") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			inrand= *(++argv);
 | 
								inrand= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-servername") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								servername= *(++argv);
 | 
				
			||||||
 | 
								/* meth=TLSv1_client_method(); */
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_JPAKE
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-jpake") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								jpake_secret = *++argv;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
								BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
				
			||||||
@@ -457,7 +622,53 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine_id, 1);
 | 
					        e = setup_engine(bio_err, engine_id, 1);
 | 
				
			||||||
 | 
						if (ssl_client_engine_id)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ssl_client_engine = ENGINE_by_id(ssl_client_engine_id);
 | 
				
			||||||
 | 
							if (!ssl_client_engine)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,
 | 
				
			||||||
 | 
										"Error getting client auth engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
						if (!app_passwd(bio_err, passarg, NULL, &pass, NULL))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting password\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (key_file == NULL)
 | 
				
			||||||
 | 
							key_file = cert_file;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (key_file)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							key = load_key(bio_err, key_file, key_format, 0, pass, e,
 | 
				
			||||||
 | 
								       "client certificate private key file");
 | 
				
			||||||
 | 
							if (!key)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (cert_file)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							cert = load_cert(bio_err,cert_file,cert_format,
 | 
				
			||||||
 | 
									NULL, e, "client certificate file");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (!cert)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
 | 
						if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
 | 
				
			||||||
		&& !RAND_status())
 | 
							&& !RAND_status())
 | 
				
			||||||
@@ -488,11 +699,32 @@ bad:
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
 | 
						if (ssl_client_engine)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!SSL_CTX_set_client_cert_engine(ctx, ssl_client_engine))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_puts(bio_err, "Error setting client auth engine\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								ENGINE_free(ssl_client_engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							ENGINE_free(ssl_client_engine);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bugs)
 | 
						if (bugs)
 | 
				
			||||||
		SSL_CTX_set_options(ctx,SSL_OP_ALL|off);
 | 
							SSL_CTX_set_options(ctx,SSL_OP_ALL|off);
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		SSL_CTX_set_options(ctx,off);
 | 
							SSL_CTX_set_options(ctx,off);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (clr)
 | 
				
			||||||
 | 
							SSL_CTX_clear_options(ctx, clr);
 | 
				
			||||||
 | 
						/* DTLS: partial reads end up discarding unread UDP bytes :-( 
 | 
				
			||||||
 | 
						 * Setting read ahead solves this problem.
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						if (sock_type == SOCK_DGRAM) SSL_CTX_set_read_ahead(ctx, 1);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
 | 
						if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
 | 
				
			||||||
	if (cipher != NULL)
 | 
						if (cipher != NULL)
 | 
				
			||||||
		if(!SSL_CTX_set_cipher_list(ctx,cipher)) {
 | 
							if(!SSL_CTX_set_cipher_list(ctx,cipher)) {
 | 
				
			||||||
@@ -506,7 +738,7 @@ bad:
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	SSL_CTX_set_verify(ctx,verify,verify_callback);
 | 
						SSL_CTX_set_verify(ctx,verify,verify_callback);
 | 
				
			||||||
	if (!set_cert_stuff(ctx,cert_file,key_file))
 | 
						if (!set_cert_key_stuff(ctx,cert,key))
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
 | 
						if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
 | 
				
			||||||
@@ -519,8 +751,55 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	store = SSL_CTX_get_cert_store(ctx);
 | 
						store = SSL_CTX_get_cert_store(ctx);
 | 
				
			||||||
	X509_STORE_set_flags(store, vflags);
 | 
						X509_STORE_set_flags(store, vflags);
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
						if (servername != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							tlsextcbp.biodebug = bio_err;
 | 
				
			||||||
 | 
							SSL_CTX_set_tlsext_servername_callback(ctx, ssl_servername_cb);
 | 
				
			||||||
 | 
							SSL_CTX_set_tlsext_servername_arg(ctx, &tlsextcbp);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	con=SSL_new(ctx);
 | 
						con=SSL_new(ctx);
 | 
				
			||||||
 | 
						if (sess_in)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							SSL_SESSION *sess;
 | 
				
			||||||
 | 
							BIO *stmp = BIO_new_file(sess_in, "r");
 | 
				
			||||||
 | 
							if (!stmp)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Can't open session file %s\n",
 | 
				
			||||||
 | 
											sess_in);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							sess = PEM_read_bio_SSL_SESSION(stmp, NULL, 0, NULL);
 | 
				
			||||||
 | 
							BIO_free(stmp);
 | 
				
			||||||
 | 
							if (!sess)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Can't open session file %s\n",
 | 
				
			||||||
 | 
											sess_in);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							SSL_set_session(con, sess);
 | 
				
			||||||
 | 
							SSL_SESSION_free(sess);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (fallback_scsv)
 | 
				
			||||||
 | 
							SSL_set_mode(con, SSL_MODE_SEND_FALLBACK_SCSV);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
						if (servername != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!SSL_set_tlsext_host_name(con,servername))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"Unable to set TLS servername extension.\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_KRB5
 | 
					#ifndef OPENSSL_NO_KRB5
 | 
				
			||||||
	if (con  &&  (con->kssl_ctx = kssl_ctx_new()) != NULL)
 | 
						if (con  &&  (con->kssl_ctx = kssl_ctx_new()) != NULL)
 | 
				
			||||||
                {
 | 
					                {
 | 
				
			||||||
@@ -531,7 +810,7 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
re_start:
 | 
					re_start:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (init_client(&s,host,port) == 0)
 | 
						if (init_client(&s,host,port,sock_type) == 0)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"connect:errno=%d\n",get_last_socket_error());
 | 
							BIO_printf(bio_err,"connect:errno=%d\n",get_last_socket_error());
 | 
				
			||||||
		SHUTDOWN(s);
 | 
							SHUTDOWN(s);
 | 
				
			||||||
@@ -552,7 +831,43 @@ re_start:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
#endif                                              
 | 
					#endif                                              
 | 
				
			||||||
	if (c_Pause & 0x01) con->debug=1;
 | 
						if (c_Pause & 0x01) con->debug=1;
 | 
				
			||||||
	sbio=BIO_new_socket(s,BIO_NOCLOSE);
 | 
					
 | 
				
			||||||
 | 
						if ( SSL_version(con) == DTLS1_VERSION)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							sbio=BIO_new_dgram(s,BIO_NOCLOSE);
 | 
				
			||||||
 | 
							if (getsockname(s, &peer, (void *)&peerlen) < 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "getsockname:errno=%d\n",
 | 
				
			||||||
 | 
									get_last_socket_error());
 | 
				
			||||||
 | 
								SHUTDOWN(s);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							(void)BIO_ctrl_set_connected(sbio, 1, &peer);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if ( enable_timeouts)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								timeout.tv_sec = 0;
 | 
				
			||||||
 | 
								timeout.tv_usec = DGRAM_RCV_TIMEOUT;
 | 
				
			||||||
 | 
								BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_RECV_TIMEOUT, 0, &timeout);
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
								timeout.tv_sec = 0;
 | 
				
			||||||
 | 
								timeout.tv_usec = DGRAM_SND_TIMEOUT;
 | 
				
			||||||
 | 
								BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_SEND_TIMEOUT, 0, &timeout);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (socket_mtu > 28)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								SSL_set_options(con, SSL_OP_NO_QUERY_MTU);
 | 
				
			||||||
 | 
								SSL_set_mtu(con, socket_mtu - 28);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								/* want to do MTU discovery */
 | 
				
			||||||
 | 
								BIO_ctrl(sbio, BIO_CTRL_DGRAM_MTU_DISCOVER, 0, NULL);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							sbio=BIO_new_socket(s,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (nbio_test)
 | 
						if (nbio_test)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -565,14 +880,42 @@ re_start:
 | 
				
			|||||||
	if (c_debug)
 | 
						if (c_debug)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		con->debug=1;
 | 
							con->debug=1;
 | 
				
			||||||
		BIO_set_callback(sbio,bio_dump_cb);
 | 
							BIO_set_callback(sbio,bio_dump_callback);
 | 
				
			||||||
		BIO_set_callback_arg(sbio,bio_c_out);
 | 
							BIO_set_callback_arg(sbio,(char *)bio_c_out);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (c_msg)
 | 
						if (c_msg)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		SSL_set_msg_callback(con, msg_cb);
 | 
							SSL_set_msg_callback(con, msg_cb);
 | 
				
			||||||
		SSL_set_msg_callback_arg(con, bio_c_out);
 | 
							SSL_set_msg_callback_arg(con, bio_c_out);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
						if (c_tlsextdebug)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							SSL_set_tlsext_debug_callback(con, tlsext_cb);
 | 
				
			||||||
 | 
							SSL_set_tlsext_debug_arg(con, bio_c_out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (c_status_req)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							SSL_set_tlsext_status_type(con, TLSEXT_STATUSTYPE_ocsp);
 | 
				
			||||||
 | 
							SSL_CTX_set_tlsext_status_cb(ctx, ocsp_resp_cb);
 | 
				
			||||||
 | 
							SSL_CTX_set_tlsext_status_arg(ctx, bio_c_out);
 | 
				
			||||||
 | 
					#if 0
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					STACK_OF(OCSP_RESPID) *ids = sk_OCSP_RESPID_new_null();
 | 
				
			||||||
 | 
					OCSP_RESPID *id = OCSP_RESPID_new();
 | 
				
			||||||
 | 
					id->value.byKey = ASN1_OCTET_STRING_new();
 | 
				
			||||||
 | 
					id->type = V_OCSP_RESPID_KEY;
 | 
				
			||||||
 | 
					ASN1_STRING_set(id->value.byKey, "Hello World", -1);
 | 
				
			||||||
 | 
					sk_OCSP_RESPID_push(ids, id);
 | 
				
			||||||
 | 
					SSL_set_tlsext_status_ids(con, ids);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_JPAKE
 | 
				
			||||||
 | 
						if (jpake_secret)
 | 
				
			||||||
 | 
							jpake_client_auth(bio_c_out, sbio, jpake_secret);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	SSL_set_bio(con,sbio,sbio);
 | 
						SSL_set_bio(con,sbio,sbio);
 | 
				
			||||||
	SSL_set_connect_state(con);
 | 
						SSL_set_connect_state(con);
 | 
				
			||||||
@@ -592,26 +935,127 @@ re_start:
 | 
				
			|||||||
	sbuf_off=0;
 | 
						sbuf_off=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* This is an ugly hack that does a lot of assumptions */
 | 
						/* This is an ugly hack that does a lot of assumptions */
 | 
				
			||||||
	if (starttls_proto == 1)
 | 
						/* We do have to handle multi-line responses which may come
 | 
				
			||||||
 | 
					 	   in a single packet or not. We therefore have to use
 | 
				
			||||||
 | 
						   BIO_gets() which does need a buffering BIO. So during
 | 
				
			||||||
 | 
						   the initial chitchat we do push a buffering BIO into the
 | 
				
			||||||
 | 
						   chain that is removed again later on to not disturb the
 | 
				
			||||||
 | 
						   rest of the s_client operation. */
 | 
				
			||||||
 | 
						if (starttls_proto == PROTO_SMTP)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_read(sbio,mbuf,BUFSIZZ);
 | 
							int foundit=0;
 | 
				
			||||||
		BIO_printf(sbio,"EHLO some.host.name\r\n");
 | 
							BIO *fbio = BIO_new(BIO_f_buffer());
 | 
				
			||||||
		BIO_read(sbio,mbuf,BUFSIZZ);
 | 
							BIO_push(fbio, sbio);
 | 
				
			||||||
 | 
							/* wait for multi-line response to end from SMTP */
 | 
				
			||||||
 | 
							do
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							while (mbuf_len>3 && mbuf[3]=='-');
 | 
				
			||||||
 | 
							/* STARTTLS command requires EHLO... */
 | 
				
			||||||
 | 
							BIO_printf(fbio,"EHLO openssl.client.net\r\n");
 | 
				
			||||||
 | 
							(void)BIO_flush(fbio);
 | 
				
			||||||
 | 
							/* wait for multi-line response to end EHLO SMTP response */
 | 
				
			||||||
 | 
							do
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
 | 
				
			||||||
 | 
								if (strstr(mbuf,"STARTTLS"))
 | 
				
			||||||
 | 
									foundit=1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							while (mbuf_len>3 && mbuf[3]=='-');
 | 
				
			||||||
 | 
							(void)BIO_flush(fbio);
 | 
				
			||||||
 | 
							BIO_pop(fbio);
 | 
				
			||||||
 | 
							BIO_free(fbio);
 | 
				
			||||||
 | 
							if (!foundit)
 | 
				
			||||||
 | 
								BIO_printf(bio_err,
 | 
				
			||||||
 | 
									   "didn't found starttls in server response,"
 | 
				
			||||||
 | 
									   " try anyway...\n");
 | 
				
			||||||
		BIO_printf(sbio,"STARTTLS\r\n");
 | 
							BIO_printf(sbio,"STARTTLS\r\n");
 | 
				
			||||||
		BIO_read(sbio,sbuf,BUFSIZZ);
 | 
							BIO_read(sbio,sbuf,BUFSIZZ);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (starttls_proto == 2)
 | 
						else if (starttls_proto == PROTO_POP3)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_read(sbio,mbuf,BUFSIZZ);
 | 
							BIO_read(sbio,mbuf,BUFSIZZ);
 | 
				
			||||||
		BIO_printf(sbio,"STLS\r\n");
 | 
							BIO_printf(sbio,"STLS\r\n");
 | 
				
			||||||
		BIO_read(sbio,sbuf,BUFSIZZ);
 | 
							BIO_read(sbio,sbuf,BUFSIZZ);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
						else if (starttls_proto == PROTO_IMAP)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							int foundit=0;
 | 
				
			||||||
 | 
							BIO *fbio = BIO_new(BIO_f_buffer());
 | 
				
			||||||
 | 
							BIO_push(fbio, sbio);
 | 
				
			||||||
 | 
							BIO_gets(fbio,mbuf,BUFSIZZ);
 | 
				
			||||||
 | 
							/* STARTTLS command requires CAPABILITY... */
 | 
				
			||||||
 | 
							BIO_printf(fbio,". CAPABILITY\r\n");
 | 
				
			||||||
 | 
							(void)BIO_flush(fbio);
 | 
				
			||||||
 | 
							/* wait for multi-line CAPABILITY response */
 | 
				
			||||||
 | 
							do
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
 | 
				
			||||||
 | 
								if (strstr(mbuf,"STARTTLS"))
 | 
				
			||||||
 | 
									foundit=1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							while (mbuf_len>3 && mbuf[0]!='.');
 | 
				
			||||||
 | 
							(void)BIO_flush(fbio);
 | 
				
			||||||
 | 
							BIO_pop(fbio);
 | 
				
			||||||
 | 
							BIO_free(fbio);
 | 
				
			||||||
 | 
							if (!foundit)
 | 
				
			||||||
 | 
								BIO_printf(bio_err,
 | 
				
			||||||
 | 
									   "didn't found STARTTLS in server response,"
 | 
				
			||||||
 | 
									   " try anyway...\n");
 | 
				
			||||||
 | 
							BIO_printf(sbio,". STARTTLS\r\n");
 | 
				
			||||||
 | 
							BIO_read(sbio,sbuf,BUFSIZZ);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else if (starttls_proto == PROTO_FTP)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *fbio = BIO_new(BIO_f_buffer());
 | 
				
			||||||
 | 
							BIO_push(fbio, sbio);
 | 
				
			||||||
 | 
							/* wait for multi-line response to end from FTP */
 | 
				
			||||||
 | 
							do
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							while (mbuf_len>3 && mbuf[3]=='-');
 | 
				
			||||||
 | 
							(void)BIO_flush(fbio);
 | 
				
			||||||
 | 
							BIO_pop(fbio);
 | 
				
			||||||
 | 
							BIO_free(fbio);
 | 
				
			||||||
 | 
							BIO_printf(sbio,"AUTH TLS\r\n");
 | 
				
			||||||
 | 
							BIO_read(sbio,sbuf,BUFSIZZ);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (starttls_proto == PROTO_XMPP)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							int seen = 0;
 | 
				
			||||||
 | 
							BIO_printf(sbio,"<stream:stream "
 | 
				
			||||||
 | 
							    "xmlns:stream='http://etherx.jabber.org/streams' "
 | 
				
			||||||
 | 
							    "xmlns='jabber:client' to='%s' version='1.0'>", host);
 | 
				
			||||||
 | 
							seen = BIO_read(sbio,mbuf,BUFSIZZ);
 | 
				
			||||||
 | 
							mbuf[seen] = 0;
 | 
				
			||||||
 | 
							while (!strstr(mbuf, "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (strstr(mbuf, "/stream:features>"))
 | 
				
			||||||
 | 
									goto shut;
 | 
				
			||||||
 | 
								seen = BIO_read(sbio,mbuf,BUFSIZZ);
 | 
				
			||||||
 | 
								mbuf[seen] = 0;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(sbio, "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'/>");
 | 
				
			||||||
 | 
							seen = BIO_read(sbio,sbuf,BUFSIZZ);
 | 
				
			||||||
 | 
							sbuf[seen] = 0;
 | 
				
			||||||
 | 
							if (!strstr(sbuf, "<proceed"))
 | 
				
			||||||
 | 
								goto shut;
 | 
				
			||||||
 | 
							mbuf[0] = 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	for (;;)
 | 
						for (;;)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		FD_ZERO(&readfds);
 | 
							FD_ZERO(&readfds);
 | 
				
			||||||
		FD_ZERO(&writefds);
 | 
							FD_ZERO(&writefds);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if ((SSL_version(con) == DTLS1_VERSION) &&
 | 
				
			||||||
 | 
								DTLSv1_get_timeout(con, &timeout))
 | 
				
			||||||
 | 
								timeoutp = &timeout;
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								timeoutp = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (SSL_in_init(con) && !SSL_total_renegotiations(con))
 | 
							if (SSL_in_init(con) && !SSL_total_renegotiations(con))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			in_init=1;
 | 
								in_init=1;
 | 
				
			||||||
@@ -623,6 +1067,17 @@ re_start:
 | 
				
			|||||||
			if (in_init)
 | 
								if (in_init)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				in_init=0;
 | 
									in_init=0;
 | 
				
			||||||
 | 
									if (sess_out)
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										BIO *stmp = BIO_new_file(sess_out, "w");
 | 
				
			||||||
 | 
										if (stmp)
 | 
				
			||||||
 | 
											{
 | 
				
			||||||
 | 
											PEM_write_bio_SSL_SESSION(stmp, SSL_get_session(con));
 | 
				
			||||||
 | 
											BIO_free(stmp);
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
										else 
 | 
				
			||||||
 | 
											BIO_printf(bio_err, "Error writing session file %s\n", sess_out);
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
				print_stuff(bio_c_out,con,full_log);
 | 
									print_stuff(bio_c_out,con,full_log);
 | 
				
			||||||
				if (full_log > 0) full_log--;
 | 
									if (full_log > 0) full_log--;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -630,7 +1085,7 @@ re_start:
 | 
				
			|||||||
					{
 | 
										{
 | 
				
			||||||
					BIO_printf(bio_err,"%s",mbuf);
 | 
										BIO_printf(bio_err,"%s",mbuf);
 | 
				
			||||||
					/* We don't need to know any more */
 | 
										/* We don't need to know any more */
 | 
				
			||||||
					starttls_proto = 0;
 | 
										starttls_proto = PROTO_OFF;
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (reconnect)
 | 
									if (reconnect)
 | 
				
			||||||
@@ -649,7 +1104,7 @@ re_start:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		if (!ssl_pending)
 | 
							if (!ssl_pending)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS)
 | 
					#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_NETWARE)
 | 
				
			||||||
			if (tty_on)
 | 
								if (tty_on)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				if (read_tty)  FD_SET(fileno(stdin),&readfds);
 | 
									if (read_tty)  FD_SET(fileno(stdin),&readfds);
 | 
				
			||||||
@@ -697,11 +1152,21 @@ re_start:
 | 
				
			|||||||
					if(!i && (!((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0))) || !read_tty) ) continue;
 | 
										if(!i && (!((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0))) || !read_tty) ) continue;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
				} else 	i=select(width,(void *)&readfds,(void *)&writefds,
 | 
									} else 	i=select(width,(void *)&readfds,(void *)&writefds,
 | 
				
			||||||
					 NULL,NULL);
 | 
										 NULL,timeoutp);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#elif defined(OPENSSL_SYS_NETWARE)
 | 
				
			||||||
 | 
								if(!write_tty) {
 | 
				
			||||||
 | 
									if(read_tty) {
 | 
				
			||||||
 | 
										tv.tv_sec = 1;
 | 
				
			||||||
 | 
										tv.tv_usec = 0;
 | 
				
			||||||
 | 
										i=select(width,(void *)&readfds,(void *)&writefds,
 | 
				
			||||||
 | 
											NULL,&tv);
 | 
				
			||||||
 | 
									} else 	i=select(width,(void *)&readfds,(void *)&writefds,
 | 
				
			||||||
 | 
										NULL,timeoutp);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
			i=select(width,(void *)&readfds,(void *)&writefds,
 | 
								i=select(width,(void *)&readfds,(void *)&writefds,
 | 
				
			||||||
				 NULL,NULL);
 | 
									 NULL,timeoutp);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
			if ( i < 0)
 | 
								if ( i < 0)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
@@ -712,6 +1177,11 @@ re_start:
 | 
				
			|||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if ((SSL_version(con) == DTLS1_VERSION) && DTLSv1_handle_timeout(con) > 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"TIMEOUT occured\n");
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (!ssl_pending && FD_ISSET(SSL_get_fd(con),&writefds))
 | 
							if (!ssl_pending && FD_ISSET(SSL_get_fd(con),&writefds))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			k=SSL_write(con,&(cbuf[cbuf_off]),
 | 
								k=SSL_write(con,&(cbuf[cbuf_off]),
 | 
				
			||||||
@@ -779,7 +1249,7 @@ re_start:
 | 
				
			|||||||
				goto shut;
 | 
									goto shut;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
					#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE)
 | 
				
			||||||
		/* Assume Windows/DOS can always write */
 | 
							/* Assume Windows/DOS can always write */
 | 
				
			||||||
		else if (!ssl_pending && write_tty)
 | 
							else if (!ssl_pending && write_tty)
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
@@ -866,6 +1336,8 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
 | 
				
			|||||||
#else
 | 
					#else
 | 
				
			||||||
		else if ((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0)))
 | 
							else if ((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0)))
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#elif defined (OPENSSL_SYS_NETWARE)
 | 
				
			||||||
 | 
					        else if (_kbhit())
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
		else if (FD_ISSET(fileno(stdin),&readfds))
 | 
							else if (FD_ISSET(fileno(stdin),&readfds))
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -929,6 +1401,12 @@ end:
 | 
				
			|||||||
	if (con != NULL) SSL_free(con);
 | 
						if (con != NULL) SSL_free(con);
 | 
				
			||||||
	if (con2 != NULL) SSL_free(con2);
 | 
						if (con2 != NULL) SSL_free(con2);
 | 
				
			||||||
	if (ctx != NULL) SSL_CTX_free(ctx);
 | 
						if (ctx != NULL) SSL_CTX_free(ctx);
 | 
				
			||||||
 | 
						if (cert)
 | 
				
			||||||
 | 
							X509_free(cert);
 | 
				
			||||||
 | 
						if (key)
 | 
				
			||||||
 | 
							EVP_PKEY_free(key);
 | 
				
			||||||
 | 
						if (pass)
 | 
				
			||||||
 | 
							OPENSSL_free(pass);
 | 
				
			||||||
	if (cbuf != NULL) { OPENSSL_cleanse(cbuf,BUFSIZZ); OPENSSL_free(cbuf); }
 | 
						if (cbuf != NULL) { OPENSSL_cleanse(cbuf,BUFSIZZ); OPENSSL_free(cbuf); }
 | 
				
			||||||
	if (sbuf != NULL) { OPENSSL_cleanse(sbuf,BUFSIZZ); OPENSSL_free(sbuf); }
 | 
						if (sbuf != NULL) { OPENSSL_cleanse(sbuf,BUFSIZZ); OPENSSL_free(sbuf); }
 | 
				
			||||||
	if (mbuf != NULL) { OPENSSL_cleanse(mbuf,BUFSIZZ); OPENSSL_free(mbuf); }
 | 
						if (mbuf != NULL) { OPENSSL_cleanse(mbuf,BUFSIZZ); OPENSSL_free(mbuf); }
 | 
				
			||||||
@@ -946,13 +1424,16 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
				
			|||||||
	{
 | 
						{
 | 
				
			||||||
	X509 *peer=NULL;
 | 
						X509 *peer=NULL;
 | 
				
			||||||
	char *p;
 | 
						char *p;
 | 
				
			||||||
	static char *space="                ";
 | 
						static const char *space="                ";
 | 
				
			||||||
	char buf[BUFSIZ];
 | 
						char buf[BUFSIZ];
 | 
				
			||||||
	STACK_OF(X509) *sk;
 | 
						STACK_OF(X509) *sk;
 | 
				
			||||||
	STACK_OF(X509_NAME) *sk2;
 | 
						STACK_OF(X509_NAME) *sk2;
 | 
				
			||||||
	SSL_CIPHER *c;
 | 
						SSL_CIPHER *c;
 | 
				
			||||||
	X509_NAME *xn;
 | 
						X509_NAME *xn;
 | 
				
			||||||
	int j,i;
 | 
						int j,i;
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_COMP
 | 
				
			||||||
 | 
						const COMP_METHOD *comp, *expansion;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (full)
 | 
						if (full)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -1055,11 +1536,49 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
				
			|||||||
							 EVP_PKEY_bits(pktmp));
 | 
												 EVP_PKEY_bits(pktmp));
 | 
				
			||||||
		EVP_PKEY_free(pktmp);
 | 
							EVP_PKEY_free(pktmp);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
						BIO_printf(bio, "Secure Renegotiation IS%s supported\n",
 | 
				
			||||||
 | 
								SSL_get_secure_renegotiation_support(s) ? "" : " NOT");
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_COMP
 | 
				
			||||||
 | 
						comp=SSL_get_current_compression(s);
 | 
				
			||||||
 | 
						expansion=SSL_get_current_expansion(s);
 | 
				
			||||||
 | 
						BIO_printf(bio,"Compression: %s\n",
 | 
				
			||||||
 | 
							comp ? SSL_COMP_get_name(comp) : "NONE");
 | 
				
			||||||
 | 
						BIO_printf(bio,"Expansion: %s\n",
 | 
				
			||||||
 | 
							expansion ? SSL_COMP_get_name(expansion) : "NONE");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
	SSL_SESSION_print(bio,SSL_get_session(s));
 | 
						SSL_SESSION_print(bio,SSL_get_session(s));
 | 
				
			||||||
	BIO_printf(bio,"---\n");
 | 
						BIO_printf(bio,"---\n");
 | 
				
			||||||
	if (peer != NULL)
 | 
						if (peer != NULL)
 | 
				
			||||||
		X509_free(peer);
 | 
							X509_free(peer);
 | 
				
			||||||
	/* flush, or debugging output gets mixed with http response */
 | 
						/* flush, or debugging output gets mixed with http response */
 | 
				
			||||||
	BIO_flush(bio);
 | 
						(void)BIO_flush(bio);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_TLSEXT
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int ocsp_resp_cb(SSL *s, void *arg)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						const unsigned char *p;
 | 
				
			||||||
 | 
						int len;
 | 
				
			||||||
 | 
						OCSP_RESPONSE *rsp;
 | 
				
			||||||
 | 
						len = SSL_get_tlsext_status_ocsp_resp(s, &p);
 | 
				
			||||||
 | 
						BIO_puts(arg, "OCSP response: ");
 | 
				
			||||||
 | 
						if (!p)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_puts(arg, "no response sent\n");
 | 
				
			||||||
 | 
							return 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						rsp = d2i_OCSP_RESPONSE(NULL, &p, len);
 | 
				
			||||||
 | 
						if (!rsp)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_puts(arg, "response parse error\n");
 | 
				
			||||||
 | 
							BIO_dump_indent(arg, (char *)p, len, 4);
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						BIO_puts(arg, "\n======================================\n");
 | 
				
			||||||
 | 
						OCSP_RESPONSE_print(arg, rsp, 0);
 | 
				
			||||||
 | 
						BIO_puts(arg, "======================================\n");
 | 
				
			||||||
 | 
						OCSP_RESPONSE_free(rsp);
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#endif  /* ndef OPENSSL_NO_TLSEXT */
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										921
									
								
								apps/s_server.c
									
									
									
									
									
								
							
							
						
						
									
										921
									
								
								apps/s_server.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										130
									
								
								apps/s_socket.c
									
									
									
									
									
								
							
							
						
						
									
										130
									
								
								apps/s_socket.c
									
									
									
									
									
								
							@@ -62,7 +62,11 @@
 | 
				
			|||||||
#include <errno.h>
 | 
					#include <errno.h>
 | 
				
			||||||
#include <signal.h>
 | 
					#include <signal.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#include <openssl/e_os2.h>
 | 
					#ifdef FLAT_INC
 | 
				
			||||||
 | 
					#include "e_os2.h"
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
					#include "../e_os2.h"
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* With IPv6, it looks like Digital has mixed up the proper order of
 | 
					/* With IPv6, it looks like Digital has mixed up the proper order of
 | 
				
			||||||
   recursive header file inclusion, resulting in the compiler complaining
 | 
					   recursive header file inclusion, resulting in the compiler complaining
 | 
				
			||||||
@@ -81,14 +85,26 @@ typedef unsigned int u_int;
 | 
				
			|||||||
#include "s_apps.h"
 | 
					#include "s_apps.h"
 | 
				
			||||||
#include <openssl/ssl.h>
 | 
					#include <openssl/ssl.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef FLAT_INC
 | 
				
			||||||
 | 
					#include "e_os.h"
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
					#include "../e_os.h"
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SOCK
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(OPENSSL_SYS_NETWARE) && defined(NETWARE_BSDSOCK)
 | 
				
			||||||
 | 
					#include "netdb.h"
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static struct hostent *GetHostByName(char *name);
 | 
					static struct hostent *GetHostByName(char *name);
 | 
				
			||||||
#ifdef OPENSSL_SYS_WINDOWS
 | 
					#if defined(OPENSSL_SYS_WINDOWS) || (defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK))
 | 
				
			||||||
static void ssl_sock_cleanup(void);
 | 
					static void ssl_sock_cleanup(void);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
static int ssl_sock_init(void);
 | 
					static int ssl_sock_init(void);
 | 
				
			||||||
static int init_client_ip(int *sock,unsigned char ip[4], int port);
 | 
					static int init_client_ip(int *sock,unsigned char ip[4], int port, int type);
 | 
				
			||||||
static int init_server(int *sock, int port);
 | 
					static int init_server(int *sock, int port, int type);
 | 
				
			||||||
static int init_server_long(int *sock, int port,char *ip);
 | 
					static int init_server_long(int *sock, int port,char *ip, int type);
 | 
				
			||||||
static int do_accept(int acc_sock, int *sock, char **host);
 | 
					static int do_accept(int acc_sock, int *sock, char **host);
 | 
				
			||||||
static int host_ip(char *str, unsigned char ip[4]);
 | 
					static int host_ip(char *str, unsigned char ip[4]);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -98,6 +114,10 @@ static int host_ip(char *str, unsigned char ip[4]);
 | 
				
			|||||||
#define SOCKET_PROTOCOL	IPPROTO_TCP
 | 
					#define SOCKET_PROTOCOL	IPPROTO_TCP
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK)
 | 
				
			||||||
 | 
					static int wsa_init_done=0;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef OPENSSL_SYS_WINDOWS
 | 
					#ifdef OPENSSL_SYS_WINDOWS
 | 
				
			||||||
static struct WSAData wsa_state;
 | 
					static struct WSAData wsa_state;
 | 
				
			||||||
static int wsa_init_done=0;
 | 
					static int wsa_init_done=0;
 | 
				
			||||||
@@ -146,6 +166,15 @@ static void ssl_sock_cleanup(void)
 | 
				
			|||||||
		WSACleanup();
 | 
							WSACleanup();
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					#elif defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK)
 | 
				
			||||||
 | 
					static void sock_cleanup(void)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					    if (wsa_init_done)
 | 
				
			||||||
 | 
					        {
 | 
				
			||||||
 | 
					        wsa_init_done=0;
 | 
				
			||||||
 | 
							WSACleanup();
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int ssl_sock_init(void)
 | 
					static int ssl_sock_init(void)
 | 
				
			||||||
@@ -180,11 +209,32 @@ static int ssl_sock_init(void)
 | 
				
			|||||||
		SetWindowLong(topWnd,GWL_WNDPROC,(LONG)lpTopHookProc);
 | 
							SetWindowLong(topWnd,GWL_WNDPROC,(LONG)lpTopHookProc);
 | 
				
			||||||
#endif /* OPENSSL_SYS_WIN16 */
 | 
					#endif /* OPENSSL_SYS_WIN16 */
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					#elif defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK)
 | 
				
			||||||
 | 
					   WORD wVerReq;
 | 
				
			||||||
 | 
					   WSADATA wsaData;
 | 
				
			||||||
 | 
					   int err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   if (!wsa_init_done)
 | 
				
			||||||
 | 
					      {
 | 
				
			||||||
 | 
					   
 | 
				
			||||||
 | 
					# ifdef SIGINT
 | 
				
			||||||
 | 
					      signal(SIGINT,(void (*)(int))sock_cleanup);
 | 
				
			||||||
 | 
					# endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      wsa_init_done=1;
 | 
				
			||||||
 | 
					      wVerReq = MAKEWORD( 2, 0 );
 | 
				
			||||||
 | 
					      err = WSAStartup(wVerReq,&wsaData);
 | 
				
			||||||
 | 
					      if (err != 0)
 | 
				
			||||||
 | 
					         {
 | 
				
			||||||
 | 
					         BIO_printf(bio_err,"unable to start WINSOCK2, error code=%d\n",err);
 | 
				
			||||||
 | 
					         return(0);
 | 
				
			||||||
 | 
					         }
 | 
				
			||||||
 | 
					      }
 | 
				
			||||||
#endif /* OPENSSL_SYS_WINDOWS */
 | 
					#endif /* OPENSSL_SYS_WINDOWS */
 | 
				
			||||||
	return(1);
 | 
						return(1);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int init_client(int *sock, char *host, int port)
 | 
					int init_client(int *sock, char *host, int port, int type)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	unsigned char ip[4];
 | 
						unsigned char ip[4];
 | 
				
			||||||
	short p=0;
 | 
						short p=0;
 | 
				
			||||||
@@ -194,10 +244,10 @@ int init_client(int *sock, char *host, int port)
 | 
				
			|||||||
		return(0);
 | 
							return(0);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (p != 0) port=p;
 | 
						if (p != 0) port=p;
 | 
				
			||||||
	return(init_client_ip(sock,ip,port));
 | 
						return(init_client_ip(sock,ip,port,type));
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int init_client_ip(int *sock, unsigned char ip[4], int port)
 | 
					static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	unsigned long addr;
 | 
						unsigned long addr;
 | 
				
			||||||
	struct sockaddr_in them;
 | 
						struct sockaddr_in them;
 | 
				
			||||||
@@ -215,13 +265,20 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port)
 | 
				
			|||||||
		((unsigned long)ip[3]);
 | 
							((unsigned long)ip[3]);
 | 
				
			||||||
	them.sin_addr.s_addr=htonl(addr);
 | 
						them.sin_addr.s_addr=htonl(addr);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
 | 
						if (type == SOCK_STREAM)
 | 
				
			||||||
 | 
							s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
 | 
				
			||||||
 | 
						else /* ( type == SOCK_DGRAM) */
 | 
				
			||||||
 | 
							s=socket(AF_INET,SOCK_DGRAM,IPPROTO_UDP);
 | 
				
			||||||
 | 
								
 | 
				
			||||||
	if (s == INVALID_SOCKET) { perror("socket"); return(0); }
 | 
						if (s == INVALID_SOCKET) { perror("socket"); return(0); }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_SYS_MPE
 | 
					#ifndef OPENSSL_SYS_MPE
 | 
				
			||||||
	i=0;
 | 
						if (type == SOCK_STREAM)
 | 
				
			||||||
	i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
 | 
							{
 | 
				
			||||||
	if (i < 0) { perror("keepalive"); return(0); }
 | 
							i=0;
 | 
				
			||||||
 | 
							i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
 | 
				
			||||||
 | 
							if (i < 0) { perror("keepalive"); return(0); }
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (connect(s,(struct sockaddr *)&them,sizeof(them)) == -1)
 | 
						if (connect(s,(struct sockaddr *)&them,sizeof(them)) == -1)
 | 
				
			||||||
@@ -230,30 +287,36 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port)
 | 
				
			|||||||
	return(1);
 | 
						return(1);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int do_server(int port, int *ret, int (*cb)(), char *context)
 | 
					int do_server(int port, int type, int *ret, int (*cb)(char *hostname, int s, unsigned char *context), unsigned char *context)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int sock;
 | 
						int sock;
 | 
				
			||||||
	char *name;
 | 
						char *name = NULL;
 | 
				
			||||||
	int accept_socket;
 | 
						int accept_socket;
 | 
				
			||||||
	int i;
 | 
						int i;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!init_server(&accept_socket,port)) return(0);
 | 
						if (!init_server(&accept_socket,port,type)) return(0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (ret != NULL)
 | 
						if (ret != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		*ret=accept_socket;
 | 
							*ret=accept_socket;
 | 
				
			||||||
		/* return(1);*/
 | 
							/* return(1);*/
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	for (;;)
 | 
					  	for (;;)
 | 
				
			||||||
		{
 | 
					  		{
 | 
				
			||||||
		if (do_accept(accept_socket,&sock,&name) == 0)
 | 
							if (type==SOCK_STREAM)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			SHUTDOWN(accept_socket);
 | 
								if (do_accept(accept_socket,&sock,&name) == 0)
 | 
				
			||||||
			return(0);
 | 
									{
 | 
				
			||||||
 | 
									SHUTDOWN(accept_socket);
 | 
				
			||||||
 | 
									return(0);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								sock = accept_socket;
 | 
				
			||||||
		i=(*cb)(name,sock, context);
 | 
							i=(*cb)(name,sock, context);
 | 
				
			||||||
		if (name != NULL) OPENSSL_free(name);
 | 
							if (name != NULL) OPENSSL_free(name);
 | 
				
			||||||
		SHUTDOWN2(sock);
 | 
							if (type==SOCK_STREAM)
 | 
				
			||||||
 | 
								SHUTDOWN2(sock);
 | 
				
			||||||
		if (i < 0)
 | 
							if (i < 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			SHUTDOWN2(accept_socket);
 | 
								SHUTDOWN2(accept_socket);
 | 
				
			||||||
@@ -262,11 +325,11 @@ int do_server(int port, int *ret, int (*cb)(), char *context)
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int init_server_long(int *sock, int port, char *ip)
 | 
					static int init_server_long(int *sock, int port, char *ip, int type)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int ret=0;
 | 
						int ret=0;
 | 
				
			||||||
	struct sockaddr_in server;
 | 
						struct sockaddr_in server;
 | 
				
			||||||
	int s= -1,i;
 | 
						int s= -1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!ssl_sock_init()) return(0);
 | 
						if (!ssl_sock_init()) return(0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -282,7 +345,11 @@ static int init_server_long(int *sock, int port, char *ip)
 | 
				
			|||||||
#else
 | 
					#else
 | 
				
			||||||
		memcpy(&server.sin_addr,ip,4);
 | 
							memcpy(&server.sin_addr,ip,4);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
 | 
						
 | 
				
			||||||
 | 
							if (type == SOCK_STREAM)
 | 
				
			||||||
 | 
								s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
 | 
				
			||||||
 | 
							else /* type == SOCK_DGRAM */
 | 
				
			||||||
 | 
								s=socket(AF_INET, SOCK_DGRAM,IPPROTO_UDP);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (s == INVALID_SOCKET) goto err;
 | 
						if (s == INVALID_SOCKET) goto err;
 | 
				
			||||||
#if defined SOL_SOCKET && defined SO_REUSEADDR
 | 
					#if defined SOL_SOCKET && defined SO_REUSEADDR
 | 
				
			||||||
@@ -300,8 +367,7 @@ static int init_server_long(int *sock, int port, char *ip)
 | 
				
			|||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	/* Make it 128 for linux */
 | 
						/* Make it 128 for linux */
 | 
				
			||||||
	if (listen(s,128) == -1) goto err;
 | 
						if (type==SOCK_STREAM && listen(s,128) == -1) goto err;
 | 
				
			||||||
	i=0;
 | 
					 | 
				
			||||||
	*sock=s;
 | 
						*sock=s;
 | 
				
			||||||
	ret=1;
 | 
						ret=1;
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
@@ -312,14 +378,14 @@ err:
 | 
				
			|||||||
	return(ret);
 | 
						return(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int init_server(int *sock, int port)
 | 
					static int init_server(int *sock, int port, int type)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	return(init_server_long(sock, port, NULL));
 | 
						return(init_server_long(sock, port, NULL, type));
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int do_accept(int acc_sock, int *sock, char **host)
 | 
					static int do_accept(int acc_sock, int *sock, char **host)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int ret,i;
 | 
						int ret;
 | 
				
			||||||
	struct hostent *h1,*h2;
 | 
						struct hostent *h1,*h2;
 | 
				
			||||||
	static struct sockaddr_in from;
 | 
						static struct sockaddr_in from;
 | 
				
			||||||
	int len;
 | 
						int len;
 | 
				
			||||||
@@ -341,7 +407,8 @@ redoit:
 | 
				
			|||||||
	ret=accept(acc_sock,(struct sockaddr *)&from,(void *)&len);
 | 
						ret=accept(acc_sock,(struct sockaddr *)&from,(void *)&len);
 | 
				
			||||||
	if (ret == INVALID_SOCKET)
 | 
						if (ret == INVALID_SOCKET)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
#ifdef OPENSSL_SYS_WINDOWS
 | 
					#if defined(OPENSSL_SYS_WINDOWS) || (defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK))
 | 
				
			||||||
 | 
							int i;
 | 
				
			||||||
		i=WSAGetLastError();
 | 
							i=WSAGetLastError();
 | 
				
			||||||
		BIO_printf(bio_err,"accept error %d\n",i);
 | 
							BIO_printf(bio_err,"accept error %d\n",i);
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
@@ -396,7 +463,6 @@ redoit:
 | 
				
			|||||||
			BIO_printf(bio_err,"gethostbyname failure\n");
 | 
								BIO_printf(bio_err,"gethostbyname failure\n");
 | 
				
			||||||
			return(0);
 | 
								return(0);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		i=0;
 | 
					 | 
				
			||||||
		if (h2->h_addrtype != AF_INET)
 | 
							if (h2->h_addrtype != AF_INET)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"gethostbyname addr is not AF_INET\n");
 | 
								BIO_printf(bio_err,"gethostbyname addr is not AF_INET\n");
 | 
				
			||||||
@@ -552,3 +618,5 @@ static struct hostent *GetHostByName(char *name)
 | 
				
			|||||||
		return(ret);
 | 
							return(ret);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -85,7 +85,7 @@
 | 
				
			|||||||
#include OPENSSL_UNISTD
 | 
					#include OPENSSL_UNISTD
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_VXWORKS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC))
 | 
					#if !defined(OPENSSL_SYS_NETWARE) && !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_VXWORKS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC))
 | 
				
			||||||
#define TIMES
 | 
					#define TIMES
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -105,7 +105,7 @@
 | 
				
			|||||||
#undef TIMES
 | 
					#undef TIMES
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if !defined(TIMES) && !defined(OPENSSL_SYS_VXWORKS)
 | 
					#if !defined(TIMES) && !defined(OPENSSL_SYS_VXWORKS) && !defined(OPENSSL_SYS_NETWARE)
 | 
				
			||||||
#include <sys/timeb.h>
 | 
					#include <sys/timeb.h>
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -384,6 +384,20 @@ static double tm_Time_F(int s)
 | 
				
			|||||||
		ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
 | 
							ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
 | 
				
			||||||
		return((ret == 0.0)?1e-6:ret);
 | 
							return((ret == 0.0)?1e-6:ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					#elif defined(OPENSSL_SYS_NETWARE)
 | 
				
			||||||
 | 
					    static clock_t tstart,tend;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    if (s == START)
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        tstart=clock();
 | 
				
			||||||
 | 
					        return(0);
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    else
 | 
				
			||||||
 | 
					    {
 | 
				
			||||||
 | 
					        tend=clock();
 | 
				
			||||||
 | 
					        ret=(double)((double)(tend)-(double)(tstart));
 | 
				
			||||||
 | 
					        return((ret < 0.001)?0.001:ret);
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
#elif defined(OPENSSL_SYS_VXWORKS)
 | 
					#elif defined(OPENSSL_SYS_VXWORKS)
 | 
				
			||||||
        {
 | 
					        {
 | 
				
			||||||
	static unsigned long tick_start, tick_end;
 | 
						static unsigned long tick_start, tick_end;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -69,7 +69,7 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	sess_id_main
 | 
					#define PROG	sess_id_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static char *sess_id_usage[]={
 | 
					static const char *sess_id_usage[]={
 | 
				
			||||||
"usage: sess_id args\n",
 | 
					"usage: sess_id args\n",
 | 
				
			||||||
"\n",
 | 
					"\n",
 | 
				
			||||||
" -inform arg     - input format - default PEM (DER or PEM)\n",
 | 
					" -inform arg     - input format - default PEM (DER or PEM)\n",
 | 
				
			||||||
@@ -95,7 +95,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	int informat,outformat;
 | 
						int informat,outformat;
 | 
				
			||||||
	char *infile=NULL,*outfile=NULL,*context=NULL;
 | 
						char *infile=NULL,*outfile=NULL,*context=NULL;
 | 
				
			||||||
	int cert=0,noout=0,text=0;
 | 
						int cert=0,noout=0,text=0;
 | 
				
			||||||
	char **pp;
 | 
						const char **pp;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -241,7 +241,7 @@ bad:
 | 
				
			|||||||
	if (!noout && !cert)
 | 
						if (!noout && !cert)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if 	(outformat == FORMAT_ASN1)
 | 
							if 	(outformat == FORMAT_ASN1)
 | 
				
			||||||
			i=(int)i2d_SSL_SESSION_bio(out,x);
 | 
								i=i2d_SSL_SESSION_bio(out,x);
 | 
				
			||||||
		else if (outformat == FORMAT_PEM)
 | 
							else if (outformat == FORMAT_PEM)
 | 
				
			||||||
			i=PEM_write_bio_SSL_SESSION(out,x);
 | 
								i=PEM_write_bio_SSL_SESSION(out,x);
 | 
				
			||||||
		else	{
 | 
							else	{
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										572
									
								
								apps/smime.c
									
									
									
									
									
								
							
							
						
						
									
										572
									
								
								apps/smime.c
									
									
									
									
									
								
							@@ -1,9 +1,9 @@
 | 
				
			|||||||
/* smime.c */
 | 
					/* smime.c */
 | 
				
			||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
					/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
 | 
				
			||||||
 * project 1999.
 | 
					 * project.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
/* ====================================================================
 | 
					/* ====================================================================
 | 
				
			||||||
 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
 | 
					 * Copyright (c) 1999-2004 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Redistribution and use in source and binary forms, with or without
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 * modification, are permitted provided that the following conditions
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
@@ -64,10 +64,13 @@
 | 
				
			|||||||
#include <openssl/crypto.h>
 | 
					#include <openssl/crypto.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/x509_vfy.h>
 | 
				
			||||||
 | 
					#include <openssl/x509v3.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG smime_main
 | 
					#define PROG smime_main
 | 
				
			||||||
static int save_certs(char *signerfile, STACK_OF(X509) *signers);
 | 
					static int save_certs(char *signerfile, STACK_OF(X509) *signers);
 | 
				
			||||||
 | 
					static int smime_cb(int ok, X509_STORE_CTX *ctx);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define SMIME_OP	0x10
 | 
					#define SMIME_OP	0x10
 | 
				
			||||||
#define SMIME_ENCRYPT	(1 | SMIME_OP)
 | 
					#define SMIME_ENCRYPT	(1 | SMIME_OP)
 | 
				
			||||||
@@ -79,12 +82,12 @@ static int save_certs(char *signerfile, STACK_OF(X509) *signers);
 | 
				
			|||||||
int MAIN(int, char **);
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
{
 | 
						{
 | 
				
			||||||
	ENGINE *e = NULL;
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	int operation = 0;
 | 
						int operation = 0;
 | 
				
			||||||
	int ret = 0;
 | 
						int ret = 0;
 | 
				
			||||||
	char **args;
 | 
						char **args;
 | 
				
			||||||
	char *inmode = "r", *outmode = "w";
 | 
						const char *inmode = "r", *outmode = "w";
 | 
				
			||||||
	char *infile = NULL, *outfile = NULL;
 | 
						char *infile = NULL, *outfile = NULL;
 | 
				
			||||||
	char *signerfile = NULL, *recipfile = NULL;
 | 
						char *signerfile = NULL, *recipfile = NULL;
 | 
				
			||||||
	char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
 | 
						char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
 | 
				
			||||||
@@ -96,7 +99,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	STACK_OF(X509) *encerts = NULL, *other = NULL;
 | 
						STACK_OF(X509) *encerts = NULL, *other = NULL;
 | 
				
			||||||
	BIO *in = NULL, *out = NULL, *indata = NULL;
 | 
						BIO *in = NULL, *out = NULL, *indata = NULL;
 | 
				
			||||||
	int badarg = 0;
 | 
						int badarg = 0;
 | 
				
			||||||
	int flags = PKCS7_DETACHED, store_flags = 0;
 | 
						int flags = PKCS7_DETACHED;
 | 
				
			||||||
	char *to = NULL, *from = NULL, *subject = NULL;
 | 
						char *to = NULL, *from = NULL, *subject = NULL;
 | 
				
			||||||
	char *CAfile = NULL, *CApath = NULL;
 | 
						char *CAfile = NULL, *CApath = NULL;
 | 
				
			||||||
	char *passargin = NULL, *passin = NULL;
 | 
						char *passargin = NULL, *passin = NULL;
 | 
				
			||||||
@@ -108,30 +111,44 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	char *engine=NULL;
 | 
						char *engine=NULL;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						X509_VERIFY_PARAM *vpm = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	args = argv + 1;
 | 
						args = argv + 1;
 | 
				
			||||||
	ret = 1;
 | 
						ret = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bio_err == NULL)
 | 
						if (bio_err == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		if ((bio_err = BIO_new(BIO_s_file())) != NULL)
 | 
							if ((bio_err = BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
			BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
 | 
								BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!load_config(bio_err, NULL))
 | 
						if (!load_config(bio_err, NULL))
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	while (!badarg && *args && *args[0] == '-') {
 | 
						while (!badarg && *args && *args[0] == '-')
 | 
				
			||||||
		if (!strcmp (*args, "-encrypt")) operation = SMIME_ENCRYPT;
 | 
							{
 | 
				
			||||||
		else if (!strcmp (*args, "-decrypt")) operation = SMIME_DECRYPT;
 | 
							if (!strcmp (*args, "-encrypt"))
 | 
				
			||||||
		else if (!strcmp (*args, "-sign")) operation = SMIME_SIGN;
 | 
								operation = SMIME_ENCRYPT;
 | 
				
			||||||
		else if (!strcmp (*args, "-verify")) operation = SMIME_VERIFY;
 | 
							else if (!strcmp (*args, "-decrypt"))
 | 
				
			||||||
		else if (!strcmp (*args, "-pk7out")) operation = SMIME_PK7OUT;
 | 
								operation = SMIME_DECRYPT;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-sign"))
 | 
				
			||||||
 | 
								operation = SMIME_SIGN;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-verify"))
 | 
				
			||||||
 | 
								operation = SMIME_VERIFY;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-pk7out"))
 | 
				
			||||||
 | 
								operation = SMIME_PK7OUT;
 | 
				
			||||||
#ifndef OPENSSL_NO_DES
 | 
					#ifndef OPENSSL_NO_DES
 | 
				
			||||||
		else if (!strcmp (*args, "-des3")) 
 | 
							else if (!strcmp (*args, "-des3")) 
 | 
				
			||||||
				cipher = EVP_des_ede3_cbc();
 | 
									cipher = EVP_des_ede3_cbc();
 | 
				
			||||||
		else if (!strcmp (*args, "-des")) 
 | 
							else if (!strcmp (*args, "-des")) 
 | 
				
			||||||
				cipher = EVP_des_cbc();
 | 
									cipher = EVP_des_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-seed")) 
 | 
				
			||||||
 | 
									cipher = EVP_seed_cbc();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_RC2
 | 
					#ifndef OPENSSL_NO_RC2
 | 
				
			||||||
		else if (!strcmp (*args, "-rc2-40")) 
 | 
							else if (!strcmp (*args, "-rc2-40")) 
 | 
				
			||||||
				cipher = EVP_rc2_40_cbc();
 | 
									cipher = EVP_rc2_40_cbc();
 | 
				
			||||||
@@ -147,6 +164,14 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
				cipher = EVP_aes_192_cbc();
 | 
									cipher = EVP_aes_192_cbc();
 | 
				
			||||||
		else if (!strcmp(*args,"-aes256"))
 | 
							else if (!strcmp(*args,"-aes256"))
 | 
				
			||||||
				cipher = EVP_aes_256_cbc();
 | 
									cipher = EVP_aes_256_cbc();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
							else if (!strcmp(*args,"-camellia128"))
 | 
				
			||||||
 | 
									cipher = EVP_camellia_128_cbc();
 | 
				
			||||||
 | 
							else if (!strcmp(*args,"-camellia192"))
 | 
				
			||||||
 | 
									cipher = EVP_camellia_192_cbc();
 | 
				
			||||||
 | 
							else if (!strcmp(*args,"-camellia256"))
 | 
				
			||||||
 | 
									cipher = EVP_camellia_256_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		else if (!strcmp (*args, "-text")) 
 | 
							else if (!strcmp (*args, "-text")) 
 | 
				
			||||||
				flags |= PKCS7_TEXT;
 | 
									flags |= PKCS7_TEXT;
 | 
				
			||||||
@@ -172,127 +197,225 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
				flags |= PKCS7_NOOLDMIMETYPE;
 | 
									flags |= PKCS7_NOOLDMIMETYPE;
 | 
				
			||||||
		else if (!strcmp (*args, "-crlfeol"))
 | 
							else if (!strcmp (*args, "-crlfeol"))
 | 
				
			||||||
				flags |= PKCS7_CRLFEOL;
 | 
									flags |= PKCS7_CRLFEOL;
 | 
				
			||||||
		else if (!strcmp (*args, "-crl_check"))
 | 
							else if (!strcmp(*args,"-rand"))
 | 
				
			||||||
				store_flags |= X509_V_FLAG_CRL_CHECK;
 | 
								{
 | 
				
			||||||
		else if (!strcmp (*args, "-crl_check_all"))
 | 
								if (args[1])
 | 
				
			||||||
				store_flags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
 | 
									{
 | 
				
			||||||
		else if (!strcmp(*args,"-rand")) {
 | 
					 | 
				
			||||||
			if (args[1]) {
 | 
					 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				inrand = *args;
 | 
									inrand = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									badarg = 1;
 | 
				
			||||||
			need_rand = 1;
 | 
								need_rand = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
		} else if (!strcmp(*args,"-engine")) {
 | 
							else if (!strcmp(*args,"-engine"))
 | 
				
			||||||
			if (args[1]) {
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				engine = *args;
 | 
									engine = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
 | 
								else badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		} else if (!strcmp(*args,"-passin")) {
 | 
							else if (!strcmp(*args,"-passin"))
 | 
				
			||||||
			if (args[1]) {
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				passargin = *args;
 | 
									passargin = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-to")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-to"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				to = *args;
 | 
									to = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-from")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-from"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				from = *args;
 | 
									from = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-subject")) {
 | 
								else badarg = 1;
 | 
				
			||||||
			if (args[1]) {
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-subject"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				subject = *args;
 | 
									subject = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-signer")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-signer"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				signerfile = *args;
 | 
									signerfile = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-recip")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-recip"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				recipfile = *args;
 | 
									recipfile = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-inkey")) {
 | 
								else badarg = 1;
 | 
				
			||||||
			if (args[1]) {
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-inkey"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				keyfile = *args;
 | 
									keyfile = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-keyform")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-keyform"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				keyform = str2fmt(*args);
 | 
									keyform = str2fmt(*args);
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-certfile")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-certfile"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				certfile = *args;
 | 
									certfile = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-CAfile")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-CAfile"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				CAfile = *args;
 | 
									CAfile = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-CApath")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-CApath"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				CApath = *args;
 | 
									CApath = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-in")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-in"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				infile = *args;
 | 
									infile = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-inform")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-inform"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				informat = str2fmt(*args);
 | 
									informat = str2fmt(*args);
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-outform")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-outform"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				outformat = str2fmt(*args);
 | 
									outformat = str2fmt(*args);
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-out")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-out"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				outfile = *args;
 | 
									outfile = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else if (!strcmp (*args, "-content")) {
 | 
								else
 | 
				
			||||||
			if (args[1]) {
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-content"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (args[1])
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				args++;
 | 
									args++;
 | 
				
			||||||
				contfile = *args;
 | 
									contfile = *args;
 | 
				
			||||||
			} else badarg = 1;
 | 
									}
 | 
				
			||||||
		} else badarg = 1;
 | 
								else
 | 
				
			||||||
 | 
									badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (args_verify(&args, NULL, &badarg, bio_err, &vpm))
 | 
				
			||||||
 | 
								continue;
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								badarg = 1;
 | 
				
			||||||
		args++;
 | 
							args++;
 | 
				
			||||||
	}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(operation == SMIME_SIGN) {
 | 
					
 | 
				
			||||||
		if(!signerfile) {
 | 
						if (operation == SMIME_SIGN)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!signerfile)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "No signer certificate specified\n");
 | 
								BIO_printf(bio_err, "No signer certificate specified\n");
 | 
				
			||||||
			badarg = 1;
 | 
								badarg = 1;
 | 
				
			||||||
		}
 | 
								}
 | 
				
			||||||
		need_rand = 1;
 | 
							need_rand = 1;
 | 
				
			||||||
	} else if(operation == SMIME_DECRYPT) {
 | 
					 | 
				
			||||||
		if(!recipfile) {
 | 
					 | 
				
			||||||
			BIO_printf(bio_err, "No recipient certificate and key specified\n");
 | 
					 | 
				
			||||||
			badarg = 1;
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	} else if(operation == SMIME_ENCRYPT) {
 | 
						else if (operation == SMIME_DECRYPT)
 | 
				
			||||||
		if(!*args) {
 | 
							{
 | 
				
			||||||
 | 
							if (!recipfile && !keyfile)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "No recipient certificate or key specified\n");
 | 
				
			||||||
 | 
								badarg = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else if (operation == SMIME_ENCRYPT)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!*args)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n");
 | 
								BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n");
 | 
				
			||||||
			badarg = 1;
 | 
								badarg = 1;
 | 
				
			||||||
		}
 | 
								}
 | 
				
			||||||
		need_rand = 1;
 | 
							need_rand = 1;
 | 
				
			||||||
	} else if(!operation) badarg = 1;
 | 
							}
 | 
				
			||||||
 | 
						else if (!operation)
 | 
				
			||||||
 | 
							badarg = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (badarg) {
 | 
						if (badarg)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n");
 | 
							BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n");
 | 
				
			||||||
		BIO_printf (bio_err, "where options are\n");
 | 
							BIO_printf (bio_err, "where options are\n");
 | 
				
			||||||
		BIO_printf (bio_err, "-encrypt       encrypt message\n");
 | 
							BIO_printf (bio_err, "-encrypt       encrypt message\n");
 | 
				
			||||||
@@ -304,6 +427,9 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		BIO_printf (bio_err, "-des3          encrypt with triple DES\n");
 | 
							BIO_printf (bio_err, "-des3          encrypt with triple DES\n");
 | 
				
			||||||
		BIO_printf (bio_err, "-des           encrypt with DES\n");
 | 
							BIO_printf (bio_err, "-des           encrypt with DES\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_SEED
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-seed          encrypt with SEED\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef OPENSSL_NO_RC2
 | 
					#ifndef OPENSSL_NO_RC2
 | 
				
			||||||
		BIO_printf (bio_err, "-rc2-40        encrypt with RC2-40 (default)\n");
 | 
							BIO_printf (bio_err, "-rc2-40        encrypt with RC2-40 (default)\n");
 | 
				
			||||||
		BIO_printf (bio_err, "-rc2-64        encrypt with RC2-64\n");
 | 
							BIO_printf (bio_err, "-rc2-64        encrypt with RC2-64\n");
 | 
				
			||||||
@@ -312,6 +438,10 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
#ifndef OPENSSL_NO_AES
 | 
					#ifndef OPENSSL_NO_AES
 | 
				
			||||||
		BIO_printf (bio_err, "-aes128, -aes192, -aes256\n");
 | 
							BIO_printf (bio_err, "-aes128, -aes192, -aes256\n");
 | 
				
			||||||
		BIO_printf (bio_err, "               encrypt PEM output with cbc aes\n");
 | 
							BIO_printf (bio_err, "               encrypt PEM output with cbc aes\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_CAMELLIA
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-camellia128, -camellia192, -camellia256\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "               encrypt PEM output with cbc camellia\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		BIO_printf (bio_err, "-nointern      don't search certificates in message for signer\n");
 | 
							BIO_printf (bio_err, "-nointern      don't search certificates in message for signer\n");
 | 
				
			||||||
		BIO_printf (bio_err, "-nosigs        don't verify message signature\n");
 | 
							BIO_printf (bio_err, "-nosigs        don't verify message signature\n");
 | 
				
			||||||
@@ -347,121 +477,155 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		BIO_printf(bio_err,  "               the random number generator\n");
 | 
							BIO_printf(bio_err,  "               the random number generator\n");
 | 
				
			||||||
		BIO_printf (bio_err, "cert.pem       recipient certificate(s) for encryption\n");
 | 
							BIO_printf (bio_err, "cert.pem       recipient certificate(s) for encryption\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
	}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        e = setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
 | 
						if (!app_passwd(bio_err, passargin, NULL, &passin, NULL))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err, "Error getting password\n");
 | 
							BIO_printf(bio_err, "Error getting password\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
	}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (need_rand) {
 | 
						if (need_rand)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
							app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
				
			||||||
		if (inrand != NULL)
 | 
							if (inrand != NULL)
 | 
				
			||||||
			BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
								BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
				app_RAND_load_files(inrand));
 | 
									app_RAND_load_files(inrand));
 | 
				
			||||||
	}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ret = 2;
 | 
						ret = 2;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(operation != SMIME_SIGN) flags &= ~PKCS7_DETACHED;
 | 
						if (operation != SMIME_SIGN)
 | 
				
			||||||
 | 
							flags &= ~PKCS7_DETACHED;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(operation & SMIME_OP) {
 | 
						if (operation & SMIME_OP)
 | 
				
			||||||
		if(flags & PKCS7_BINARY) inmode = "rb";
 | 
							{
 | 
				
			||||||
		if(outformat == FORMAT_ASN1) outmode = "wb";
 | 
							if (flags & PKCS7_BINARY)
 | 
				
			||||||
	} else {
 | 
								inmode = "rb";
 | 
				
			||||||
		if(flags & PKCS7_BINARY) outmode = "wb";
 | 
							if (outformat == FORMAT_ASN1)
 | 
				
			||||||
		if(informat == FORMAT_ASN1) inmode = "rb";
 | 
								outmode = "wb";
 | 
				
			||||||
	}
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (flags & PKCS7_BINARY)
 | 
				
			||||||
 | 
								outmode = "wb";
 | 
				
			||||||
 | 
							if (informat == FORMAT_ASN1)
 | 
				
			||||||
 | 
								inmode = "rb";
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(operation == SMIME_ENCRYPT) {
 | 
						if (operation == SMIME_ENCRYPT)
 | 
				
			||||||
		if (!cipher) {
 | 
							{
 | 
				
			||||||
#ifndef OPENSSL_NO_RC2			
 | 
							if (!cipher)
 | 
				
			||||||
			cipher = EVP_rc2_40_cbc();
 | 
								{
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_DES			
 | 
				
			||||||
 | 
								cipher = EVP_des_ede3_cbc();
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
			BIO_printf(bio_err, "No cipher selected\n");
 | 
								BIO_printf(bio_err, "No cipher selected\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		}
 | 
								}
 | 
				
			||||||
		encerts = sk_X509_new_null();
 | 
							encerts = sk_X509_new_null();
 | 
				
			||||||
		while (*args) {
 | 
							while (*args)
 | 
				
			||||||
			if(!(cert = load_cert(bio_err,*args,FORMAT_PEM,
 | 
								{
 | 
				
			||||||
				NULL, e, "recipient certificate file"))) {
 | 
								if (!(cert = load_cert(bio_err,*args,FORMAT_PEM,
 | 
				
			||||||
 | 
									NULL, e, "recipient certificate file")))
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
#if 0				/* An appropriate message is already printed */
 | 
					#if 0				/* An appropriate message is already printed */
 | 
				
			||||||
				BIO_printf(bio_err, "Can't read recipient certificate file %s\n", *args);
 | 
									BIO_printf(bio_err, "Can't read recipient certificate file %s\n", *args);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
				goto end;
 | 
									goto end;
 | 
				
			||||||
			}
 | 
									}
 | 
				
			||||||
			sk_X509_push(encerts, cert);
 | 
								sk_X509_push(encerts, cert);
 | 
				
			||||||
			cert = NULL;
 | 
								cert = NULL;
 | 
				
			||||||
			args++;
 | 
								args++;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(signerfile && (operation == SMIME_SIGN)) {
 | 
						if (signerfile && (operation == SMIME_SIGN))
 | 
				
			||||||
		if(!(signer = load_cert(bio_err,signerfile,FORMAT_PEM, NULL,
 | 
							{
 | 
				
			||||||
			e, "signer certificate"))) {
 | 
							if (!(signer = load_cert(bio_err,signerfile,FORMAT_PEM, NULL,
 | 
				
			||||||
 | 
								e, "signer certificate")))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
#if 0			/* An appropri message has already been printed */
 | 
					#if 0			/* An appropri message has already been printed */
 | 
				
			||||||
			BIO_printf(bio_err, "Can't read signer certificate file %s\n", signerfile);
 | 
								BIO_printf(bio_err, "Can't read signer certificate file %s\n", signerfile);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(certfile) {
 | 
						if (certfile)
 | 
				
			||||||
		if(!(other = load_certs(bio_err,certfile,FORMAT_PEM, NULL,
 | 
							{
 | 
				
			||||||
			e, "certificate file"))) {
 | 
							if (!(other = load_certs(bio_err,certfile,FORMAT_PEM, NULL,
 | 
				
			||||||
 | 
								e, "certificate file")))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
#if 0			/* An appropriate message has already been printed */
 | 
					#if 0			/* An appropriate message has already been printed */
 | 
				
			||||||
			BIO_printf(bio_err, "Can't read certificate file %s\n", certfile);
 | 
								BIO_printf(bio_err, "Can't read certificate file %s\n", certfile);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(recipfile && (operation == SMIME_DECRYPT)) {
 | 
						if (recipfile && (operation == SMIME_DECRYPT))
 | 
				
			||||||
		if(!(recip = load_cert(bio_err,recipfile,FORMAT_PEM,NULL,
 | 
							{
 | 
				
			||||||
			e, "recipient certificate file"))) {
 | 
							if (!(recip = load_cert(bio_err,recipfile,FORMAT_PEM,NULL,
 | 
				
			||||||
 | 
								e, "recipient certificate file")))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
#if 0			/* An appropriate message has alrady been printed */
 | 
					#if 0			/* An appropriate message has alrady been printed */
 | 
				
			||||||
			BIO_printf(bio_err, "Can't read recipient certificate file %s\n", recipfile);
 | 
								BIO_printf(bio_err, "Can't read recipient certificate file %s\n", recipfile);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(operation == SMIME_DECRYPT) {
 | 
						if (operation == SMIME_DECRYPT)
 | 
				
			||||||
		if(!keyfile) keyfile = recipfile;
 | 
							{
 | 
				
			||||||
	} else if(operation == SMIME_SIGN) {
 | 
							if (!keyfile)
 | 
				
			||||||
		if(!keyfile) keyfile = signerfile;
 | 
								keyfile = recipfile;
 | 
				
			||||||
	} else keyfile = NULL;
 | 
							}
 | 
				
			||||||
 | 
						else if (operation == SMIME_SIGN)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!keyfile)
 | 
				
			||||||
 | 
								keyfile = signerfile;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else keyfile = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(keyfile) {
 | 
						if (keyfile)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		key = load_key(bio_err, keyfile, keyform, 0, passin, e,
 | 
							key = load_key(bio_err, keyfile, keyform, 0, passin, e,
 | 
				
			||||||
			       "signing key file");
 | 
								       "signing key file");
 | 
				
			||||||
		if (!key) {
 | 
							if (!key)
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
                }
 | 
							}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (infile) {
 | 
						if (infile)
 | 
				
			||||||
		if (!(in = BIO_new_file(infile, inmode))) {
 | 
							{
 | 
				
			||||||
 | 
							if (!(in = BIO_new_file(infile, inmode)))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_printf (bio_err,
 | 
								BIO_printf (bio_err,
 | 
				
			||||||
				 "Can't open input file %s\n", infile);
 | 
									 "Can't open input file %s\n", infile);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	} else in = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
						else
 | 
				
			||||||
 | 
							in = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile) {
 | 
						if (outfile)
 | 
				
			||||||
		if (!(out = BIO_new_file(outfile, outmode))) {
 | 
							{
 | 
				
			||||||
 | 
							if (!(out = BIO_new_file(outfile, outmode)))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_printf (bio_err,
 | 
								BIO_printf (bio_err,
 | 
				
			||||||
				 "Can't open output file %s\n", outfile);
 | 
									 "Can't open output file %s\n", outfile);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	} else {
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
							out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
				
			||||||
#ifdef OPENSSL_SYS_VMS
 | 
					#ifdef OPENSSL_SYS_VMS
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -469,100 +633,127 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		    out = BIO_push(tmpbio, out);
 | 
							    out = BIO_push(tmpbio, out);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(operation == SMIME_VERIFY) {
 | 
						if (operation == SMIME_VERIFY)
 | 
				
			||||||
		if(!(store = setup_verify(bio_err, CAfile, CApath))) goto end;
 | 
							{
 | 
				
			||||||
		X509_STORE_set_flags(store, store_flags);
 | 
							if (!(store = setup_verify(bio_err, CAfile, CApath)))
 | 
				
			||||||
	}
 | 
								goto end;
 | 
				
			||||||
 | 
							X509_STORE_set_verify_cb_func(store, smime_cb);
 | 
				
			||||||
 | 
							if (vpm)
 | 
				
			||||||
 | 
								X509_STORE_set1_param(store, vpm);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ret = 3;
 | 
						ret = 3;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(operation == SMIME_ENCRYPT) {
 | 
						if (operation == SMIME_ENCRYPT)
 | 
				
			||||||
		p7 = PKCS7_encrypt(encerts, in, cipher, flags);
 | 
							p7 = PKCS7_encrypt(encerts, in, cipher, flags);
 | 
				
			||||||
	} else if(operation == SMIME_SIGN) {
 | 
						else if (operation == SMIME_SIGN)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							/* If detached data and SMIME output enable partial
 | 
				
			||||||
 | 
							 * signing.
 | 
				
			||||||
 | 
							 */
 | 
				
			||||||
 | 
							if ((flags & PKCS7_DETACHED) && (outformat == FORMAT_SMIME))
 | 
				
			||||||
 | 
								flags |= PKCS7_STREAM;
 | 
				
			||||||
		p7 = PKCS7_sign(signer, key, other, in, flags);
 | 
							p7 = PKCS7_sign(signer, key, other, in, flags);
 | 
				
			||||||
		if (BIO_reset(in) != 0 && (flags & PKCS7_DETACHED)) {
 | 
					 | 
				
			||||||
		  BIO_printf(bio_err, "Can't rewind input file\n");
 | 
					 | 
				
			||||||
		  goto end;
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	} else {
 | 
						else
 | 
				
			||||||
		if(informat == FORMAT_SMIME) 
 | 
							{
 | 
				
			||||||
 | 
							if (informat == FORMAT_SMIME) 
 | 
				
			||||||
			p7 = SMIME_read_PKCS7(in, &indata);
 | 
								p7 = SMIME_read_PKCS7(in, &indata);
 | 
				
			||||||
		else if(informat == FORMAT_PEM) 
 | 
							else if (informat == FORMAT_PEM) 
 | 
				
			||||||
			p7 = PEM_read_bio_PKCS7(in, NULL, NULL, NULL);
 | 
								p7 = PEM_read_bio_PKCS7(in, NULL, NULL, NULL);
 | 
				
			||||||
		else if(informat == FORMAT_ASN1) 
 | 
							else if (informat == FORMAT_ASN1) 
 | 
				
			||||||
			p7 = d2i_PKCS7_bio(in, NULL);
 | 
								p7 = d2i_PKCS7_bio(in, NULL);
 | 
				
			||||||
		else {
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "Bad input format for PKCS#7 file\n");
 | 
								BIO_printf(bio_err, "Bad input format for PKCS#7 file\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
		}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if(!p7) {
 | 
							if (!p7)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "Error reading S/MIME message\n");
 | 
								BIO_printf(bio_err, "Error reading S/MIME message\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
		}
 | 
								}
 | 
				
			||||||
		if(contfile) {
 | 
							if (contfile)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_free(indata);
 | 
								BIO_free(indata);
 | 
				
			||||||
			if(!(indata = BIO_new_file(contfile, "rb"))) {
 | 
								if (!(indata = BIO_new_file(contfile, "rb")))
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
				BIO_printf(bio_err, "Can't read content file %s\n", contfile);
 | 
									BIO_printf(bio_err, "Can't read content file %s\n", contfile);
 | 
				
			||||||
				goto end;
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(!p7) {
 | 
						if (!p7)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err, "Error creating PKCS#7 structure\n");
 | 
							BIO_printf(bio_err, "Error creating PKCS#7 structure\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
	}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ret = 4;
 | 
						ret = 4;
 | 
				
			||||||
	if(operation == SMIME_DECRYPT) {
 | 
						if (operation == SMIME_DECRYPT)
 | 
				
			||||||
		if(!PKCS7_decrypt(p7, key, recip, out, flags)) {
 | 
							{
 | 
				
			||||||
 | 
							if (!PKCS7_decrypt(p7, key, recip, out, flags))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "Error decrypting PKCS#7 structure\n");
 | 
								BIO_printf(bio_err, "Error decrypting PKCS#7 structure\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	} else if(operation == SMIME_VERIFY) {
 | 
						else if (operation == SMIME_VERIFY)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		STACK_OF(X509) *signers;
 | 
							STACK_OF(X509) *signers;
 | 
				
			||||||
		if(PKCS7_verify(p7, other, store, indata, out, flags)) {
 | 
							if (PKCS7_verify(p7, other, store, indata, out, flags))
 | 
				
			||||||
			BIO_printf(bio_err, "Verification successful\n");
 | 
								BIO_printf(bio_err, "Verification successful\n");
 | 
				
			||||||
		} else {
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "Verification failure\n");
 | 
								BIO_printf(bio_err, "Verification failure\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
		}
 | 
								}
 | 
				
			||||||
		signers = PKCS7_get0_signers(p7, other, flags);
 | 
							signers = PKCS7_get0_signers(p7, other, flags);
 | 
				
			||||||
		if(!save_certs(signerfile, signers)) {
 | 
							if (!save_certs(signerfile, signers))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "Error writing signers to %s\n",
 | 
								BIO_printf(bio_err, "Error writing signers to %s\n",
 | 
				
			||||||
								signerfile);
 | 
													signerfile);
 | 
				
			||||||
			ret = 5;
 | 
								ret = 5;
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
		}
 | 
								}
 | 
				
			||||||
		sk_X509_free(signers);
 | 
							sk_X509_free(signers);
 | 
				
			||||||
	} else if(operation == SMIME_PK7OUT) {
 | 
							}
 | 
				
			||||||
 | 
						else if (operation == SMIME_PK7OUT)
 | 
				
			||||||
		PEM_write_bio_PKCS7(out, p7);
 | 
							PEM_write_bio_PKCS7(out, p7);
 | 
				
			||||||
	} else {
 | 
						else
 | 
				
			||||||
		if(to) BIO_printf(out, "To: %s\n", to);
 | 
							{
 | 
				
			||||||
		if(from) BIO_printf(out, "From: %s\n", from);
 | 
							if (to)
 | 
				
			||||||
		if(subject) BIO_printf(out, "Subject: %s\n", subject);
 | 
								BIO_printf(out, "To: %s\n", to);
 | 
				
			||||||
		if(outformat == FORMAT_SMIME) 
 | 
							if (from)
 | 
				
			||||||
 | 
								BIO_printf(out, "From: %s\n", from);
 | 
				
			||||||
 | 
							if (subject)
 | 
				
			||||||
 | 
								BIO_printf(out, "Subject: %s\n", subject);
 | 
				
			||||||
 | 
							if (outformat == FORMAT_SMIME) 
 | 
				
			||||||
			SMIME_write_PKCS7(out, p7, in, flags);
 | 
								SMIME_write_PKCS7(out, p7, in, flags);
 | 
				
			||||||
		else if(outformat == FORMAT_PEM) 
 | 
							else if (outformat == FORMAT_PEM) 
 | 
				
			||||||
			PEM_write_bio_PKCS7(out,p7);
 | 
								PEM_write_bio_PKCS7(out,p7);
 | 
				
			||||||
		else if(outformat == FORMAT_ASN1) 
 | 
							else if (outformat == FORMAT_ASN1) 
 | 
				
			||||||
			i2d_PKCS7_bio(out,p7);
 | 
								i2d_PKCS7_bio(out,p7);
 | 
				
			||||||
		else {
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err, "Bad output format for PKCS#7 file\n");
 | 
								BIO_printf(bio_err, "Bad output format for PKCS#7 file\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	ret = 0;
 | 
						ret = 0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (need_rand)
 | 
						if (need_rand)
 | 
				
			||||||
		app_RAND_write_file(NULL, bio_err);
 | 
							app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
	if(ret) ERR_print_errors(bio_err);
 | 
						if (ret) ERR_print_errors(bio_err);
 | 
				
			||||||
	sk_X509_pop_free(encerts, X509_free);
 | 
						sk_X509_pop_free(encerts, X509_free);
 | 
				
			||||||
	sk_X509_pop_free(other, X509_free);
 | 
						sk_X509_pop_free(other, X509_free);
 | 
				
			||||||
 | 
						if (vpm)
 | 
				
			||||||
 | 
							X509_VERIFY_PARAM_free(vpm);
 | 
				
			||||||
	X509_STORE_free(store);
 | 
						X509_STORE_free(store);
 | 
				
			||||||
	X509_free(cert);
 | 
						X509_free(cert);
 | 
				
			||||||
	X509_free(recip);
 | 
						X509_free(recip);
 | 
				
			||||||
@@ -572,20 +763,39 @@ end:
 | 
				
			|||||||
	BIO_free(in);
 | 
						BIO_free(in);
 | 
				
			||||||
	BIO_free(indata);
 | 
						BIO_free(indata);
 | 
				
			||||||
	BIO_free_all(out);
 | 
						BIO_free_all(out);
 | 
				
			||||||
	if(passin) OPENSSL_free(passin);
 | 
						if (passin) OPENSSL_free(passin);
 | 
				
			||||||
	return (ret);
 | 
						return (ret);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int save_certs(char *signerfile, STACK_OF(X509) *signers)
 | 
					static int save_certs(char *signerfile, STACK_OF(X509) *signers)
 | 
				
			||||||
{
 | 
						{
 | 
				
			||||||
	int i;
 | 
						int i;
 | 
				
			||||||
	BIO *tmp;
 | 
						BIO *tmp;
 | 
				
			||||||
	if(!signerfile) return 1;
 | 
						if (!signerfile)
 | 
				
			||||||
 | 
							return 1;
 | 
				
			||||||
	tmp = BIO_new_file(signerfile, "w");
 | 
						tmp = BIO_new_file(signerfile, "w");
 | 
				
			||||||
	if(!tmp) return 0;
 | 
						if (!tmp) return 0;
 | 
				
			||||||
	for(i = 0; i < sk_X509_num(signers); i++)
 | 
						for(i = 0; i < sk_X509_num(signers); i++)
 | 
				
			||||||
		PEM_write_bio_X509(tmp, sk_X509_value(signers, i));
 | 
							PEM_write_bio_X509(tmp, sk_X509_value(signers, i));
 | 
				
			||||||
	BIO_free(tmp);
 | 
						BIO_free(tmp);
 | 
				
			||||||
	return 1;
 | 
						return 1;
 | 
				
			||||||
}
 | 
						}
 | 
				
			||||||
	
 | 
						
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Minimal callback just to output policy info (if any) */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int smime_cb(int ok, X509_STORE_CTX *ctx)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						int error;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						error = X509_STORE_CTX_get_error(ctx);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if ((error != X509_V_ERR_NO_EXPLICIT_POLICY)
 | 
				
			||||||
 | 
							&& ((error != X509_V_OK) || (ok != 2)))
 | 
				
			||||||
 | 
							return ok;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						policies_print(NULL, ctx);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return ok;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										1089
									
								
								apps/speed.c
									
									
									
									
									
								
							
							
						
						
									
										1089
									
								
								apps/speed.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -1,6 +1,6 @@
 | 
				
			|||||||
/* apps/spkac.c */
 | 
					/* apps/spkac.c */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
					/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
 | 
				
			||||||
 * project 1999. Based on an original idea by Massimiliano Pala
 | 
					 * project 1999. Based on an original idea by Massimiliano Pala
 | 
				
			||||||
 * (madwolf@openca.org).
 | 
					 * (madwolf@openca.org).
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
@@ -87,7 +87,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	int verify=0,noout=0,pubkey=0;
 | 
						int verify=0,noout=0,pubkey=0;
 | 
				
			||||||
	char *infile = NULL,*outfile = NULL,*prog;
 | 
						char *infile = NULL,*outfile = NULL,*prog;
 | 
				
			||||||
	char *passargin = NULL, *passin = NULL;
 | 
						char *passargin = NULL, *passin = NULL;
 | 
				
			||||||
	char *spkac = "SPKAC", *spksect = "default", *spkstr = NULL;
 | 
						const char *spkac = "SPKAC", *spksect = "default";
 | 
				
			||||||
 | 
						char *spkstr = NULL;
 | 
				
			||||||
	char *challenge = NULL, *keyfile = NULL;
 | 
						char *challenge = NULL, *keyfile = NULL;
 | 
				
			||||||
	CONF *conf = NULL;
 | 
						CONF *conf = NULL;
 | 
				
			||||||
	NETSCAPE_SPKI *spki = NULL;
 | 
						NETSCAPE_SPKI *spki = NULL;
 | 
				
			||||||
@@ -200,7 +201,7 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
		spki = NETSCAPE_SPKI_new();
 | 
							spki = NETSCAPE_SPKI_new();
 | 
				
			||||||
		if(challenge) ASN1_STRING_set(spki->spkac->challenge,
 | 
							if(challenge) ASN1_STRING_set(spki->spkac->challenge,
 | 
				
			||||||
						 challenge, strlen(challenge));
 | 
											 challenge, (int)strlen(challenge));
 | 
				
			||||||
		NETSCAPE_SPKI_set_pubkey(spki, pkey);
 | 
							NETSCAPE_SPKI_set_pubkey(spki, pkey);
 | 
				
			||||||
		NETSCAPE_SPKI_sign(spki, pkey, EVP_md5());
 | 
							NETSCAPE_SPKI_sign(spki, pkey, EVP_md5());
 | 
				
			||||||
		spkstr = NETSCAPE_SPKI_b64_encode(spki);
 | 
							spkstr = NETSCAPE_SPKI_b64_encode(spki);
 | 
				
			||||||
@@ -284,7 +285,7 @@ bad:
 | 
				
			|||||||
	pkey = NETSCAPE_SPKI_get_pubkey(spki);
 | 
						pkey = NETSCAPE_SPKI_get_pubkey(spki);
 | 
				
			||||||
	if(verify) {
 | 
						if(verify) {
 | 
				
			||||||
		i = NETSCAPE_SPKI_verify(spki, pkey);
 | 
							i = NETSCAPE_SPKI_verify(spki, pkey);
 | 
				
			||||||
		if(i) BIO_printf(bio_err, "Signature OK\n");
 | 
							if (i > 0) BIO_printf(bio_err, "Signature OK\n");
 | 
				
			||||||
		else {
 | 
							else {
 | 
				
			||||||
			BIO_printf(bio_err, "Signature Failure\n");
 | 
								BIO_printf(bio_err, "Signature Failure\n");
 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										67
									
								
								apps/timeouts.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										67
									
								
								apps/timeouts.h
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,67 @@
 | 
				
			|||||||
 | 
					/* apps/timeouts.h */
 | 
				
			||||||
 | 
					/* 
 | 
				
			||||||
 | 
					 * DTLS implementation written by Nagendra Modadugu
 | 
				
			||||||
 | 
					 * (nagendra@cs.stanford.edu) for the OpenSSL project 2005.  
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright (c) 1999-2005 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer. 
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in
 | 
				
			||||||
 | 
					 *    the documentation and/or other materials provided with the
 | 
				
			||||||
 | 
					 *    distribution.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this
 | 
				
			||||||
 | 
					 *    software must display the following acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
				
			||||||
 | 
					 *    endorse or promote products derived from this software without
 | 
				
			||||||
 | 
					 *    prior written permission. For written permission, please contact
 | 
				
			||||||
 | 
					 *    openssl-core@OpenSSL.org.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 5. Products derived from this software may not be called "OpenSSL"
 | 
				
			||||||
 | 
					 *    nor may "OpenSSL" appear in their names without prior written
 | 
				
			||||||
 | 
					 *    permission of the OpenSSL Project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 6. Redistributions of any form whatsoever must retain the following
 | 
				
			||||||
 | 
					 *    acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
				
			||||||
 | 
					 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
				
			||||||
 | 
					 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
				
			||||||
 | 
					 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
				
			||||||
 | 
					 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
				
			||||||
 | 
					 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
				
			||||||
 | 
					 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
				
			||||||
 | 
					 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
				
			||||||
 | 
					 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
				
			||||||
 | 
					 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * ====================================================================
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This product includes cryptographic software written by Eric Young
 | 
				
			||||||
 | 
					 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
				
			||||||
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef INCLUDED_TIMEOUTS_H
 | 
				
			||||||
 | 
					#define INCLUDED_TIMEOUTS_H
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* numbers in us */
 | 
				
			||||||
 | 
					#define DGRAM_RCV_TIMEOUT         250000
 | 
				
			||||||
 | 
					#define DGRAM_SND_TIMEOUT         250000
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif /* ! INCLUDED_TIMEOUTS_H */
 | 
				
			||||||
@@ -79,13 +79,14 @@ int MAIN(int, char **);
 | 
				
			|||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	ENGINE *e = NULL;
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	int i,ret=1;
 | 
						int i,ret=1, badarg = 0;
 | 
				
			||||||
	int purpose = -1;
 | 
						int purpose = -1;
 | 
				
			||||||
	char *CApath=NULL,*CAfile=NULL;
 | 
						char *CApath=NULL,*CAfile=NULL;
 | 
				
			||||||
	char *untfile = NULL, *trustfile = NULL;
 | 
						char *untfile = NULL, *trustfile = NULL;
 | 
				
			||||||
	STACK_OF(X509) *untrusted = NULL, *trusted = NULL;
 | 
						STACK_OF(X509) *untrusted = NULL, *trusted = NULL;
 | 
				
			||||||
	X509_STORE *cert_ctx=NULL;
 | 
						X509_STORE *cert_ctx=NULL;
 | 
				
			||||||
	X509_LOOKUP *lookup=NULL;
 | 
						X509_LOOKUP *lookup=NULL;
 | 
				
			||||||
 | 
						X509_VERIFY_PARAM *vpm = NULL;
 | 
				
			||||||
#ifndef OPENSSL_NO_ENGINE
 | 
					#ifndef OPENSSL_NO_ENGINE
 | 
				
			||||||
	char *engine=NULL;
 | 
						char *engine=NULL;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -121,18 +122,12 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
				if (argc-- < 1) goto end;
 | 
									if (argc-- < 1) goto end;
 | 
				
			||||||
				CAfile= *(++argv);
 | 
									CAfile= *(++argv);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			else if (strcmp(*argv,"-purpose") == 0)
 | 
								else if (args_verify(&argv, &argc, &badarg, bio_err,
 | 
				
			||||||
 | 
														&vpm))
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				X509_PURPOSE *xptmp;
 | 
									if (badarg)
 | 
				
			||||||
				if (argc-- < 1) goto end;
 | 
					 | 
				
			||||||
				i = X509_PURPOSE_get_by_sname(*(++argv));
 | 
					 | 
				
			||||||
				if(i < 0)
 | 
					 | 
				
			||||||
					{
 | 
					 | 
				
			||||||
					BIO_printf(bio_err, "unrecognized purpose\n");
 | 
					 | 
				
			||||||
					goto end;
 | 
										goto end;
 | 
				
			||||||
					}
 | 
									continue;
 | 
				
			||||||
				xptmp = X509_PURPOSE_get0(i);
 | 
					 | 
				
			||||||
				purpose = X509_PURPOSE_get_id(xptmp);
 | 
					 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			else if (strcmp(*argv,"-untrusted") == 0)
 | 
								else if (strcmp(*argv,"-untrusted") == 0)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
@@ -153,14 +148,6 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
			else if (strcmp(*argv,"-help") == 0)
 | 
								else if (strcmp(*argv,"-help") == 0)
 | 
				
			||||||
				goto end;
 | 
									goto end;
 | 
				
			||||||
			else if (strcmp(*argv,"-ignore_critical") == 0)
 | 
					 | 
				
			||||||
				vflags |= X509_V_FLAG_IGNORE_CRITICAL;
 | 
					 | 
				
			||||||
			else if (strcmp(*argv,"-issuer_checks") == 0)
 | 
					 | 
				
			||||||
				vflags |= X509_V_FLAG_CB_ISSUER_CHECK;
 | 
					 | 
				
			||||||
			else if (strcmp(*argv,"-crl_check") == 0)
 | 
					 | 
				
			||||||
				vflags |= X509_V_FLAG_CRL_CHECK;
 | 
					 | 
				
			||||||
			else if (strcmp(*argv,"-crl_check_all") == 0)
 | 
					 | 
				
			||||||
				vflags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
 | 
					 | 
				
			||||||
			else if (strcmp(*argv,"-verbose") == 0)
 | 
								else if (strcmp(*argv,"-verbose") == 0)
 | 
				
			||||||
				v_verbose=1;
 | 
									v_verbose=1;
 | 
				
			||||||
			else if (argv[0][0] == '-')
 | 
								else if (argv[0][0] == '-')
 | 
				
			||||||
@@ -178,6 +165,9 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
        e = setup_engine(bio_err, engine, 0);
 | 
					        e = setup_engine(bio_err, engine, 0);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (vpm)
 | 
				
			||||||
 | 
							X509_STORE_set1_param(cert_ctx, vpm);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	lookup=X509_STORE_add_lookup(cert_ctx,X509_LOOKUP_file());
 | 
						lookup=X509_STORE_add_lookup(cert_ctx,X509_LOOKUP_file());
 | 
				
			||||||
	if (lookup == NULL) abort();
 | 
						if (lookup == NULL) abort();
 | 
				
			||||||
	if (CAfile) {
 | 
						if (CAfile) {
 | 
				
			||||||
@@ -238,6 +228,7 @@ end:
 | 
				
			|||||||
								X509_PURPOSE_get0_name(ptmp));
 | 
													X509_PURPOSE_get0_name(ptmp));
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
						if (vpm) X509_VERIFY_PARAM_free(vpm);
 | 
				
			||||||
	if (cert_ctx != NULL) X509_STORE_free(cert_ctx);
 | 
						if (cert_ctx != NULL) X509_STORE_free(cert_ctx);
 | 
				
			||||||
	sk_X509_pop_free(untrusted, X509_free);
 | 
						sk_X509_pop_free(untrusted, X509_free);
 | 
				
			||||||
	sk_X509_pop_free(trusted, X509_free);
 | 
						sk_X509_pop_free(trusted, X509_free);
 | 
				
			||||||
@@ -275,7 +266,7 @@ static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (i)
 | 
						if (i > 0)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		fprintf(stdout,"OK\n");
 | 
							fprintf(stdout,"OK\n");
 | 
				
			||||||
		ret=1;
 | 
							ret=1;
 | 
				
			||||||
@@ -339,10 +330,13 @@ static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (!ok)
 | 
						if (!ok)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		X509_NAME_oneline(
 | 
							if (ctx->current_cert)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								X509_NAME_oneline(
 | 
				
			||||||
				X509_get_subject_name(ctx->current_cert),buf,
 | 
									X509_get_subject_name(ctx->current_cert),buf,
 | 
				
			||||||
				sizeof buf);
 | 
									sizeof buf);
 | 
				
			||||||
		printf("%s\n",buf);
 | 
								printf("%s\n",buf);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		printf("error %d at %d depth lookup:%s\n",ctx->error,
 | 
							printf("error %d at %d depth lookup:%s\n",ctx->error,
 | 
				
			||||||
			ctx->error_depth,
 | 
								ctx->error_depth,
 | 
				
			||||||
			X509_verify_cert_error_string(ctx->error));
 | 
								X509_verify_cert_error_string(ctx->error));
 | 
				
			||||||
@@ -361,9 +355,15 @@ static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
 | 
				
			|||||||
		if (ctx->error == X509_V_ERR_CRL_HAS_EXPIRED) ok=1;
 | 
							if (ctx->error == X509_V_ERR_CRL_HAS_EXPIRED) ok=1;
 | 
				
			||||||
		if (ctx->error == X509_V_ERR_CRL_NOT_YET_VALID) ok=1;
 | 
							if (ctx->error == X509_V_ERR_CRL_NOT_YET_VALID) ok=1;
 | 
				
			||||||
		if (ctx->error == X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION) ok=1;
 | 
							if (ctx->error == X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION) ok=1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (ctx->error == X509_V_ERR_NO_EXPLICIT_POLICY)
 | 
				
			||||||
 | 
								policies_print(NULL, ctx);
 | 
				
			||||||
 | 
							return ok;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
						if ((ctx->error == X509_V_OK) && (ok == 2))
 | 
				
			||||||
 | 
							policies_print(NULL, ctx);
 | 
				
			||||||
	if (!v_verbose)
 | 
						if (!v_verbose)
 | 
				
			||||||
		ERR_clear_error();
 | 
							ERR_clear_error();
 | 
				
			||||||
	return(ok);
 | 
						return(ok);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
@@ -115,6 +115,7 @@
 | 
				
			|||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
#include <openssl/evp.h>
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
#include <openssl/crypto.h>
 | 
					#include <openssl/crypto.h>
 | 
				
			||||||
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
#ifndef OPENSSL_NO_MD2
 | 
					#ifndef OPENSSL_NO_MD2
 | 
				
			||||||
# include <openssl/md2.h>
 | 
					# include <openssl/md2.h>
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -166,13 +167,25 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			date=version=cflags=options=platform=dir=1;
 | 
								date=version=cflags=options=platform=dir=1;
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"usage:version -[avbofp]\n");
 | 
								BIO_printf(bio_err,"usage:version -[avbofpd]\n");
 | 
				
			||||||
			ret=1;
 | 
								ret=1;
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (version) printf("%s\n",SSLeay_version(SSLEAY_VERSION));
 | 
						if (version)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (SSLeay() == SSLEAY_VERSION_NUMBER)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								printf("%s\n",SSLeay_version(SSLEAY_VERSION));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								printf("%s (Library: %s)\n",
 | 
				
			||||||
 | 
									OPENSSL_VERSION_TEXT,
 | 
				
			||||||
 | 
									SSLeay_version(SSLEAY_VERSION));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	if (date)    printf("%s\n",SSLeay_version(SSLEAY_BUILT_ON));
 | 
						if (date)    printf("%s\n",SSLeay_version(SSLEAY_BUILT_ON));
 | 
				
			||||||
	if (platform) printf("%s\n",SSLeay_version(SSLEAY_PLATFORM));
 | 
						if (platform) printf("%s\n",SSLeay_version(SSLEAY_PLATFORM));
 | 
				
			||||||
	if (options) 
 | 
						if (options) 
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										77
									
								
								apps/x509.c
									
									
									
									
									
								
							
							
						
						
									
										77
									
								
								apps/x509.c
									
									
									
									
									
								
							@@ -73,6 +73,12 @@
 | 
				
			|||||||
#include <openssl/x509v3.h>
 | 
					#include <openssl/x509v3.h>
 | 
				
			||||||
#include <openssl/objects.h>
 | 
					#include <openssl/objects.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_RSA
 | 
				
			||||||
 | 
					#include <openssl/rsa.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_DSA
 | 
				
			||||||
 | 
					#include <openssl/dsa.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG x509_main
 | 
					#define PROG x509_main
 | 
				
			||||||
@@ -81,7 +87,7 @@
 | 
				
			|||||||
#define	POSTFIX	".srl"
 | 
					#define	POSTFIX	".srl"
 | 
				
			||||||
#define DEF_DAYS	30
 | 
					#define DEF_DAYS	30
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static char *x509_usage[]={
 | 
					static const char *x509_usage[]={
 | 
				
			||||||
"usage: x509 args\n",
 | 
					"usage: x509 args\n",
 | 
				
			||||||
" -inform arg     - input format - default PEM (one of DER, NET or PEM)\n",
 | 
					" -inform arg     - input format - default PEM (one of DER, NET or PEM)\n",
 | 
				
			||||||
" -outform arg    - output format - default PEM (one of DER, NET or PEM)\n",
 | 
					" -outform arg    - output format - default PEM (one of DER, NET or PEM)\n",
 | 
				
			||||||
@@ -92,7 +98,9 @@ static char *x509_usage[]={
 | 
				
			|||||||
" -out arg        - output file - default stdout\n",
 | 
					" -out arg        - output file - default stdout\n",
 | 
				
			||||||
" -passin arg     - private key password source\n",
 | 
					" -passin arg     - private key password source\n",
 | 
				
			||||||
" -serial         - print serial number value\n",
 | 
					" -serial         - print serial number value\n",
 | 
				
			||||||
" -hash           - print hash value\n",
 | 
					" -subject_hash   - print subject hash value\n",
 | 
				
			||||||
 | 
					" -issuer_hash    - print issuer hash value\n",
 | 
				
			||||||
 | 
					" -hash           - synonym for -subject_hash\n",
 | 
				
			||||||
" -subject        - print subject DN\n",
 | 
					" -subject        - print subject DN\n",
 | 
				
			||||||
" -issuer         - print issuer DN\n",
 | 
					" -issuer         - print issuer DN\n",
 | 
				
			||||||
" -email          - print email address(es)\n",
 | 
					" -email          - print email address(es)\n",
 | 
				
			||||||
@@ -106,6 +114,7 @@ static char *x509_usage[]={
 | 
				
			|||||||
" -alias          - output certificate alias\n",
 | 
					" -alias          - output certificate alias\n",
 | 
				
			||||||
" -noout          - no certificate output\n",
 | 
					" -noout          - no certificate output\n",
 | 
				
			||||||
" -ocspid         - print OCSP hash values for the subject name and public key\n",
 | 
					" -ocspid         - print OCSP hash values for the subject name and public key\n",
 | 
				
			||||||
 | 
					" -ocsp_uri       - print OCSP Responder URL(s)\n",
 | 
				
			||||||
" -trustout       - output a \"trusted\" certificate\n",
 | 
					" -trustout       - output a \"trusted\" certificate\n",
 | 
				
			||||||
" -clrtrust       - clear all trusted purposes\n",
 | 
					" -clrtrust       - clear all trusted purposes\n",
 | 
				
			||||||
" -clrreject      - clear all rejected purposes\n",
 | 
					" -clrreject      - clear all rejected purposes\n",
 | 
				
			||||||
@@ -167,19 +176,21 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL;
 | 
						char *infile=NULL,*outfile=NULL,*keyfile=NULL,*CAfile=NULL;
 | 
				
			||||||
	char *CAkeyfile=NULL,*CAserial=NULL;
 | 
						char *CAkeyfile=NULL,*CAserial=NULL;
 | 
				
			||||||
	char *alias=NULL;
 | 
						char *alias=NULL;
 | 
				
			||||||
	int text=0,serial=0,hash=0,subject=0,issuer=0,startdate=0,enddate=0;
 | 
						int text=0,serial=0,subject=0,issuer=0,startdate=0,enddate=0;
 | 
				
			||||||
	int next_serial=0,ocspid=0;
 | 
						int next_serial=0;
 | 
				
			||||||
 | 
						int subject_hash=0,issuer_hash=0,ocspid=0;
 | 
				
			||||||
	int noout=0,sign_flag=0,CA_flag=0,CA_createserial=0,email=0;
 | 
						int noout=0,sign_flag=0,CA_flag=0,CA_createserial=0,email=0;
 | 
				
			||||||
 | 
						int ocsp_uri=0;
 | 
				
			||||||
	int trustout=0,clrtrust=0,clrreject=0,aliasout=0,clrext=0;
 | 
						int trustout=0,clrtrust=0,clrreject=0,aliasout=0,clrext=0;
 | 
				
			||||||
	int C=0;
 | 
						int C=0;
 | 
				
			||||||
	int x509req=0,days=DEF_DAYS,modulus=0,pubkey=0;
 | 
						int x509req=0,days=DEF_DAYS,modulus=0,pubkey=0;
 | 
				
			||||||
	int pprint = 0;
 | 
						int pprint = 0;
 | 
				
			||||||
	char **pp;
 | 
						const char **pp;
 | 
				
			||||||
	X509_STORE *ctx=NULL;
 | 
						X509_STORE *ctx=NULL;
 | 
				
			||||||
	X509_REQ *rq=NULL;
 | 
						X509_REQ *rq=NULL;
 | 
				
			||||||
	int fingerprint=0;
 | 
						int fingerprint=0;
 | 
				
			||||||
	char buf[256];
 | 
						char buf[256];
 | 
				
			||||||
	const EVP_MD *md_alg,*digest;
 | 
						const EVP_MD *md_alg,*digest=EVP_sha1();
 | 
				
			||||||
	CONF *extconf = NULL;
 | 
						CONF *extconf = NULL;
 | 
				
			||||||
	char *extsect = NULL, *extfile = NULL, *passin = NULL, *passargin = NULL;
 | 
						char *extsect = NULL, *extfile = NULL, *passin = NULL, *passargin = NULL;
 | 
				
			||||||
	int need_rand = 0;
 | 
						int need_rand = 0;
 | 
				
			||||||
@@ -216,13 +227,6 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	if (ctx == NULL) goto end;
 | 
						if (ctx == NULL) goto end;
 | 
				
			||||||
	X509_STORE_set_verify_cb_func(ctx,callb);
 | 
						X509_STORE_set_verify_cb_func(ctx,callb);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef  OPENSSL_FIPS
 | 
					 | 
				
			||||||
	if (FIPS_mode())
 | 
					 | 
				
			||||||
		digest = EVP_sha1();
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
		digest = EVP_md5();
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	argc--;
 | 
						argc--;
 | 
				
			||||||
	argv++;
 | 
						argv++;
 | 
				
			||||||
	num=0;
 | 
						num=0;
 | 
				
			||||||
@@ -376,6 +380,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			C= ++num;
 | 
								C= ++num;
 | 
				
			||||||
		else if (strcmp(*argv,"-email") == 0)
 | 
							else if (strcmp(*argv,"-email") == 0)
 | 
				
			||||||
			email= ++num;
 | 
								email= ++num;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-ocsp_uri") == 0)
 | 
				
			||||||
 | 
								ocsp_uri= ++num;
 | 
				
			||||||
		else if (strcmp(*argv,"-serial") == 0)
 | 
							else if (strcmp(*argv,"-serial") == 0)
 | 
				
			||||||
			serial= ++num;
 | 
								serial= ++num;
 | 
				
			||||||
		else if (strcmp(*argv,"-next_serial") == 0)
 | 
							else if (strcmp(*argv,"-next_serial") == 0)
 | 
				
			||||||
@@ -388,8 +394,11 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			x509req= ++num;
 | 
								x509req= ++num;
 | 
				
			||||||
		else if (strcmp(*argv,"-text") == 0)
 | 
							else if (strcmp(*argv,"-text") == 0)
 | 
				
			||||||
			text= ++num;
 | 
								text= ++num;
 | 
				
			||||||
		else if (strcmp(*argv,"-hash") == 0)
 | 
							else if (strcmp(*argv,"-hash") == 0
 | 
				
			||||||
			hash= ++num;
 | 
								|| strcmp(*argv,"-subject_hash") == 0)
 | 
				
			||||||
 | 
								subject_hash= ++num;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-issuer_hash") == 0)
 | 
				
			||||||
 | 
								issuer_hash= ++num;
 | 
				
			||||||
		else if (strcmp(*argv,"-subject") == 0)
 | 
							else if (strcmp(*argv,"-subject") == 0)
 | 
				
			||||||
			subject= ++num;
 | 
								subject= ++num;
 | 
				
			||||||
		else if (strcmp(*argv,"-issuer") == 0)
 | 
							else if (strcmp(*argv,"-issuer") == 0)
 | 
				
			||||||
@@ -530,7 +539,6 @@ bad:
 | 
				
			|||||||
	if (reqfile)
 | 
						if (reqfile)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		EVP_PKEY *pkey;
 | 
							EVP_PKEY *pkey;
 | 
				
			||||||
		X509_CINF *ci;
 | 
					 | 
				
			||||||
		BIO *in;
 | 
							BIO *in;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (!sign_flag && !CA_flag)
 | 
							if (!sign_flag && !CA_flag)
 | 
				
			||||||
@@ -598,7 +606,6 @@ bad:
 | 
				
			|||||||
		print_name(bio_err, "subject=", X509_REQ_get_subject_name(req), nmflag);
 | 
							print_name(bio_err, "subject=", X509_REQ_get_subject_name(req), nmflag);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if ((x=X509_new()) == NULL) goto end;
 | 
							if ((x=X509_new()) == NULL) goto end;
 | 
				
			||||||
		ci=x->cert_info;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (sno == NULL)
 | 
							if (sno == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -704,7 +711,8 @@ bad:
 | 
				
			|||||||
			else if (serial == i)
 | 
								else if (serial == i)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(STDout,"serial=");
 | 
									BIO_printf(STDout,"serial=");
 | 
				
			||||||
				i2a_ASN1_INTEGER(STDout,x->cert_info->serialNumber);
 | 
									i2a_ASN1_INTEGER(STDout,
 | 
				
			||||||
 | 
										X509_get_serialNumber(x));
 | 
				
			||||||
				BIO_printf(STDout,"\n");
 | 
									BIO_printf(STDout,"\n");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			else if (next_serial == i)
 | 
								else if (next_serial == i)
 | 
				
			||||||
@@ -725,11 +733,14 @@ bad:
 | 
				
			|||||||
				ASN1_INTEGER_free(ser);
 | 
									ASN1_INTEGER_free(ser);
 | 
				
			||||||
				BIO_puts(out, "\n");
 | 
									BIO_puts(out, "\n");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			else if (email == i) 
 | 
								else if ((email == i) || (ocsp_uri == i))
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				int j;
 | 
									int j;
 | 
				
			||||||
				STACK *emlst;
 | 
									STACK *emlst;
 | 
				
			||||||
				emlst = X509_get1_email(x);
 | 
									if (email == i)
 | 
				
			||||||
 | 
										emlst = X509_get1_email(x);
 | 
				
			||||||
 | 
									else
 | 
				
			||||||
 | 
										emlst = X509_get1_ocsp(x);
 | 
				
			||||||
				for (j = 0; j < sk_num(emlst); j++)
 | 
									for (j = 0; j < sk_num(emlst); j++)
 | 
				
			||||||
					BIO_printf(STDout, "%s\n", sk_value(emlst, j));
 | 
										BIO_printf(STDout, "%s\n", sk_value(emlst, j));
 | 
				
			||||||
				X509_email_free(emlst);
 | 
									X509_email_free(emlst);
 | 
				
			||||||
@@ -741,10 +752,14 @@ bad:
 | 
				
			|||||||
				if (alstr) BIO_printf(STDout,"%s\n", alstr);
 | 
									if (alstr) BIO_printf(STDout,"%s\n", alstr);
 | 
				
			||||||
				else BIO_puts(STDout,"<No Alias>\n");
 | 
									else BIO_puts(STDout,"<No Alias>\n");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			else if (hash == i)
 | 
								else if (subject_hash == i)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(STDout,"%08lx\n",X509_subject_name_hash(x));
 | 
									BIO_printf(STDout,"%08lx\n",X509_subject_name_hash(x));
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
								else if (issuer_hash == i)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(STDout,"%08lx\n",X509_issuer_name_hash(x));
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			else if (pprint == i)
 | 
								else if (pprint == i)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				X509_PURPOSE *ptmp;
 | 
									X509_PURPOSE *ptmp;
 | 
				
			||||||
@@ -906,6 +921,10 @@ bad:
 | 
				
			|||||||
		                if (Upkey->type == EVP_PKEY_DSA)
 | 
							                if (Upkey->type == EVP_PKEY_DSA)
 | 
				
			||||||
		                        digest=EVP_dss1();
 | 
							                        digest=EVP_dss1();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
									if (Upkey->type == EVP_PKEY_EC)
 | 
				
			||||||
 | 
										digest=EVP_ecdsa();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				assert(need_rand);
 | 
									assert(need_rand);
 | 
				
			||||||
				if (!sign(x,Upkey,days,clrext,digest,
 | 
									if (!sign(x,Upkey,days,clrext,digest,
 | 
				
			||||||
@@ -926,6 +945,10 @@ bad:
 | 
				
			|||||||
		                if (CApkey->type == EVP_PKEY_DSA)
 | 
							                if (CApkey->type == EVP_PKEY_DSA)
 | 
				
			||||||
		                        digest=EVP_dss1();
 | 
							                        digest=EVP_dss1();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
									if (CApkey->type == EVP_PKEY_EC)
 | 
				
			||||||
 | 
										digest = EVP_ecdsa();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
				
 | 
									
 | 
				
			||||||
				assert(need_rand);
 | 
									assert(need_rand);
 | 
				
			||||||
				if (!x509_certify(ctx,CAfile,digest,x,xca,
 | 
									if (!x509_certify(ctx,CAfile,digest,x,xca,
 | 
				
			||||||
@@ -946,7 +969,7 @@ bad:
 | 
				
			|||||||
				else
 | 
									else
 | 
				
			||||||
					{
 | 
										{
 | 
				
			||||||
					pk=load_key(bio_err,
 | 
										pk=load_key(bio_err,
 | 
				
			||||||
						keyfile, FORMAT_PEM, 0,
 | 
											keyfile, keyformat, 0,
 | 
				
			||||||
						passin, e, "request key");
 | 
											passin, e, "request key");
 | 
				
			||||||
					if (pk == NULL) goto end;
 | 
										if (pk == NULL) goto end;
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
@@ -957,6 +980,10 @@ bad:
 | 
				
			|||||||
		                if (pk->type == EVP_PKEY_DSA)
 | 
							                if (pk->type == EVP_PKEY_DSA)
 | 
				
			||||||
		                        digest=EVP_dss1();
 | 
							                        digest=EVP_dss1();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef OPENSSL_NO_ECDSA
 | 
				
			||||||
 | 
									if (pk->type == EVP_PKEY_EC)
 | 
				
			||||||
 | 
										digest=EVP_ecdsa();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				rq=X509_to_X509_REQ(x,pk,digest);
 | 
									rq=X509_to_X509_REQ(x,pk,digest);
 | 
				
			||||||
				EVP_PKEY_free(pk);
 | 
									EVP_PKEY_free(pk);
 | 
				
			||||||
@@ -1020,8 +1047,7 @@ bad:
 | 
				
			|||||||
		ah.data=(char *)x;
 | 
							ah.data=(char *)x;
 | 
				
			||||||
		ah.meth=X509_asn1_meth();
 | 
							ah.meth=X509_asn1_meth();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/* no macro for this one yet */
 | 
							i=ASN1_i2d_bio_of(ASN1_HEADER,i2d_ASN1_HEADER,out,&ah);
 | 
				
			||||||
		i=ASN1_i2d_bio(i2d_ASN1_HEADER,out,(unsigned char *)&ah);
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else	{
 | 
						else	{
 | 
				
			||||||
		BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
							BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
				
			||||||
@@ -1123,7 +1149,8 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
				
			|||||||
	/* NOTE: this certificate can/should be self signed, unless it was
 | 
						/* NOTE: this certificate can/should be self signed, unless it was
 | 
				
			||||||
	 * a certificate request in which case it is not. */
 | 
						 * a certificate request in which case it is not. */
 | 
				
			||||||
	X509_STORE_CTX_set_cert(&xsc,x);
 | 
						X509_STORE_CTX_set_cert(&xsc,x);
 | 
				
			||||||
	if (!reqfile && !X509_verify_cert(&xsc))
 | 
						X509_STORE_CTX_set_flags(&xsc, X509_V_FLAG_CHECK_SS_SIGNATURE);
 | 
				
			||||||
 | 
						if (!reqfile && X509_verify_cert(&xsc) <= 0)
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!X509_check_private_key(xca,pkey))
 | 
						if (!X509_check_private_key(xca,pkey))
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										39
									
								
								argena.pem
									
									
									
									
									
								
							
							
						
						
									
										39
									
								
								argena.pem
									
									
									
									
									
								
							@@ -1,39 +0,0 @@
 | 
				
			|||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIIG0zCCBbugAwIBAgIBADANBgkqhkiG9w0BAQUFADCBzDELMAkGA1UEBhMCQVQx
 | 
					 | 
				
			||||||
EDAOBgNVBAgTB0F1c3RyaWExDzANBgNVBAcTBlZpZW5uYTE6MDgGA1UEChMxQVJH
 | 
					 | 
				
			||||||
RSBEQVRFTiAtIEF1c3RyaWFuIFNvY2lldHkgZm9yIERhdGEgUHJvdGVjdGlvbjEl
 | 
					 | 
				
			||||||
MCMGA1UECxMcQS1DRVJUIENlcnRpZmljYXRpb24gU2VydmljZTEYMBYGA1UEAxMP
 | 
					 | 
				
			||||||
QS1DRVJUIEFEVkFOQ0VEMR0wGwYJKoZIhvcNAQkBFg5pbmZvQGEtY2VydC5hdDAe
 | 
					 | 
				
			||||||
Fw0wNDEwMjMxNDE0MTRaFw0xMTEwMjMxNDE0MTRaMIHMMQswCQYDVQQGEwJBVDEQ
 | 
					 | 
				
			||||||
MA4GA1UECBMHQXVzdHJpYTEPMA0GA1UEBxMGVmllbm5hMTowOAYDVQQKEzFBUkdF
 | 
					 | 
				
			||||||
IERBVEVOIC0gQXVzdHJpYW4gU29jaWV0eSBmb3IgRGF0YSBQcm90ZWN0aW9uMSUw
 | 
					 | 
				
			||||||
IwYDVQQLExxBLUNFUlQgQ2VydGlmaWNhdGlvbiBTZXJ2aWNlMRgwFgYDVQQDEw9B
 | 
					 | 
				
			||||||
LUNFUlQgQURWQU5DRUQxHTAbBgkqhkiG9w0BCQEWDmluZm9AYS1jZXJ0LmF0MIIB
 | 
					 | 
				
			||||||
IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3euXIy+mnf6BYKbK+QH5k679
 | 
					 | 
				
			||||||
tUFqeT8jlZxMew8eNiHuw9KoxWBzL6KksK+5uK7Gatw+sbAYntEGE80P+Jg1hADM
 | 
					 | 
				
			||||||
e+Fr5V0bc6QS3gkVtfUCW/RIvfMM39oxvmqJmOgPnJU7H6+nmLtsq61tv9kVJi/2
 | 
					 | 
				
			||||||
4Y5wXW3odet72sF57EoG6s78w0BUVLNcMngS9bZZzmdG3/d6JbkGgoNF/8DcgCBJ
 | 
					 | 
				
			||||||
W/t0JrcIzyppXIOVtUzzOrrU86zuUgT3Rtkl5kjG7DEHpFb9H0fTOY1v8+gRoaO6
 | 
					 | 
				
			||||||
2gA0PCiysgVZjwgVeYe3KAg11nznyleDv198uK3Dc1oXIGYjJx2FpKWUvAuAEwID
 | 
					 | 
				
			||||||
AQABo4ICvDCCArgwHQYDVR0OBBYEFDd/Pj6ZcWDKJNSRE3nQdCm0qCTYMIH5BgNV
 | 
					 | 
				
			||||||
HSMEgfEwge6AFDd/Pj6ZcWDKJNSRE3nQdCm0qCTYoYHSpIHPMIHMMQswCQYDVQQG
 | 
					 | 
				
			||||||
EwJBVDEQMA4GA1UECBMHQXVzdHJpYTEPMA0GA1UEBxMGVmllbm5hMTowOAYDVQQK
 | 
					 | 
				
			||||||
EzFBUkdFIERBVEVOIC0gQXVzdHJpYW4gU29jaWV0eSBmb3IgRGF0YSBQcm90ZWN0
 | 
					 | 
				
			||||||
aW9uMSUwIwYDVQQLExxBLUNFUlQgQ2VydGlmaWNhdGlvbiBTZXJ2aWNlMRgwFgYD
 | 
					 | 
				
			||||||
VQQDEw9BLUNFUlQgQURWQU5DRUQxHTAbBgkqhkiG9w0BCQEWDmluZm9AYS1jZXJ0
 | 
					 | 
				
			||||||
LmF0ggEAMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgHmMEcGA1UdJQRAMD4G
 | 
					 | 
				
			||||||
CCsGAQUFBwMBBggrBgEFBQcDAgYIKwYBBQUHAwMGCCsGAQUFBwMEBggrBgEFBQcD
 | 
					 | 
				
			||||||
CAYKKwYBBAGCNwoDBDARBglghkgBhvhCAQEEBAMCAP8wUQYDVR0gBEowSDBGBggq
 | 
					 | 
				
			||||||
KAAYAQEBAzA6MDgGCCsGAQUFBwIBFixodHRwOi8vd3d3LmEtY2VydC5hdC9jZXJ0
 | 
					 | 
				
			||||||
aWZpY2F0ZS1wb2xpY3kuaHRtbDA7BglghkgBhvhCAQgELhYsaHR0cDovL3d3dy5h
 | 
					 | 
				
			||||||
LWNlcnQuYXQvY2VydGlmaWNhdGUtcG9saWN5Lmh0bWwwGQYDVR0RBBIwEIEOaW5m
 | 
					 | 
				
			||||||
b0BhLWNlcnQuYXQwLwYDVR0SBCgwJoEOaW5mb0BhLWNlcnQuYXSGFGh0dHA6Ly93
 | 
					 | 
				
			||||||
d3cuYS1jZXJ0LmF0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHBzOi8vc2VjdXJlLmEt
 | 
					 | 
				
			||||||
Y2VydC5hdC9jZ2ktYmluL2EtY2VydC1hZHZhbmNlZC5jZ2kwDQYJKoZIhvcNAQEF
 | 
					 | 
				
			||||||
BQADggEBACX1IvgfdG2rvfv35O48vSEvcVaEdlN8USFBHWz3JRAozgzvaBtwHkjK
 | 
					 | 
				
			||||||
Zwt5l/BWOtjbvHfRjDt7ijlBEcxOOrNC1ffyMHwHrXpvff6YpQ5wnxmIYEQcURiG
 | 
					 | 
				
			||||||
HMqruEX0WkuDNgSKwefsgXs27eeBauHgNGVcTYH1rmHu/ZyLpLxOyJQ2PCzA1DzW
 | 
					 | 
				
			||||||
3rWkIX92ogJ7lTRdWrbxwUL1XGinxnnaQ74+/y0pI9JNEv7ic2tpkweRMpkedaLW
 | 
					 | 
				
			||||||
msC1+orfKTebsg69aMaCx7o6jNONRmR/7TVaPf8/k6g52cHZ9YWjQvup22b5rWxG
 | 
					 | 
				
			||||||
J5r5LZ4vCPmF4+T4lutjUYAa/lGuQTg=
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
							
								
								
									
										23
									
								
								argeng.pem
									
									
									
									
									
								
							
							
						
						
									
										23
									
								
								argeng.pem
									
									
									
									
									
								
							@@ -1,23 +0,0 @@
 | 
				
			|||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIIDwzCCAyygAwIBAgIBADANBgkqhkiG9w0BAQQFADCBmDELMAkGA1UEBhMCQVQx
 | 
					 | 
				
			||||||
EDAOBgNVBAgTB0F1c3RyaWExDzANBgNVBAcTBlZpZW5uYTFCMEAGA1UEChM5QXJn
 | 
					 | 
				
			||||||
ZSBEYXRlbiBPZXN0ZXJyZWljaGlzY2hlIEdlc2VsbHNjaGFmdCBmdWVyIERhdGVu
 | 
					 | 
				
			||||||
c2NodXR6MSIwIAYJKoZIhvcNAQkBFhNhLWNlcnRAYXJnZWRhdGVuLmF0MB4XDTAx
 | 
					 | 
				
			||||||
MDIxMjExMzAzMFoXDTA5MDIxMjExMzAzMFowgZgxCzAJBgNVBAYTAkFUMRAwDgYD
 | 
					 | 
				
			||||||
VQQIEwdBdXN0cmlhMQ8wDQYDVQQHEwZWaWVubmExQjBABgNVBAoTOUFyZ2UgRGF0
 | 
					 | 
				
			||||||
ZW4gT2VzdGVycmVpY2hpc2NoZSBHZXNlbGxzY2hhZnQgZnVlciBEYXRlbnNjaHV0
 | 
					 | 
				
			||||||
ejEiMCAGCSqGSIb3DQEJARYTYS1jZXJ0QGFyZ2VkYXRlbi5hdDCBnzANBgkqhkiG
 | 
					 | 
				
			||||||
9w0BAQEFAAOBjQAwgYkCgYEAwgsHqoNtmmrJ86+e1I4hOVBaL4kokqKN2IPOIL+1
 | 
					 | 
				
			||||||
XwY8vfOOUfPEdhWpaC0ldt7VYrksgDiUccgH0FROANWK2GkfKMDzjjXHysR04uEb
 | 
					 | 
				
			||||||
Om7Kqjqn0nproOGkFG+QvBZgs+Ws+HXNFJA6V76fU4+JXq4452LSK4Lr5YcBquu3
 | 
					 | 
				
			||||||
NJECAwEAAaOCARkwggEVMB0GA1UdDgQWBBQ0j59zH/G31zRjgK1y2P//tSAWZjCB
 | 
					 | 
				
			||||||
xQYDVR0jBIG9MIG6gBQ0j59zH/G31zRjgK1y2P//tSAWZqGBnqSBmzCBmDELMAkG
 | 
					 | 
				
			||||||
A1UEBhMCQVQxEDAOBgNVBAgTB0F1c3RyaWExDzANBgNVBAcTBlZpZW5uYTFCMEAG
 | 
					 | 
				
			||||||
A1UEChM5QXJnZSBEYXRlbiBPZXN0ZXJyZWljaGlzY2hlIEdlc2VsbHNjaGFmdCBm
 | 
					 | 
				
			||||||
dWVyIERhdGVuc2NodXR6MSIwIAYJKoZIhvcNAQkBFhNhLWNlcnRAYXJnZWRhdGVu
 | 
					 | 
				
			||||||
LmF0ggEAMAwGA1UdEwQFMAMBAf8wCwYDVR0PBAQDAgEGMBEGCWCGSAGG+EIBAQQE
 | 
					 | 
				
			||||||
AwICBDANBgkqhkiG9w0BAQQFAAOBgQBFuJYncqMYB6gXQS3eDOI90BEHfFTKy/dV
 | 
					 | 
				
			||||||
AV+K7QdAYikWmqgBheRdPKddJdccPy/Zl/p3ZT7GhDyC5f3wZjcuu8AJ27BNwbCA
 | 
					 | 
				
			||||||
x54dgxgCNcyPm79nY8MRtEdEpoRGdSsFKJemz6hpXM++MWFciyrRWIIA44XB0Gv3
 | 
					 | 
				
			||||||
US0spjsDPQ==
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,18 +0,0 @@
 | 
				
			|||||||
Microsoft (R) C/C++ Optimizing Compiler Version 8.00c
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
Compile with /O2 chokes the compiler on these files
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
crypto\md\md5_dgst.c		warning '@(#)reg86.c:1.26', line 1110
 | 
					 | 
				
			||||||
crypto\des\ofb64ede.c		warning '@(#)grammar.c:1.147', line 168
 | 
					 | 
				
			||||||
crypto\des\ofb64enc.c		warning '@(#)grammar.c:1.147', line 168
 | 
					 | 
				
			||||||
crypto\des\qud_cksm.c		warning '@(#)grammar.c:1.147', line 168
 | 
					 | 
				
			||||||
crypto\rc2\rc2ofb64.c		warning '@(#)grammar.c:1.147', line 168
 | 
					 | 
				
			||||||
crypto\objects\obj_dat.c	warning	'@(#)grammar.c:1.147', line 168
 | 
					 | 
				
			||||||
				fatal	'@(#)grammar.c:1.147', line 168
 | 
					 | 
				
			||||||
crypto\objects\obj_lib.c	warning	'@(#)grammar.c:1.147', line 168
 | 
					 | 
				
			||||||
				fatal	'@(#)grammar.c:1.147', line 168
 | 
					 | 
				
			||||||
ssl\ssl_auth.c			warning	'@(#)grammar.c:1.147', line 168
 | 
					 | 
				
			||||||
				fatal	'@(#)grammar.c:1.147', line 168
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
Turning on /G3 with build flags that worked fine for /G2 came up with
 | 
					 | 
				
			||||||
divide by zero errors in 'normal' code in speed.c :-(
 | 
					 | 
				
			||||||
							
								
								
									
										4
									
								
								certs/README.RootCerts
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										4
									
								
								certs/README.RootCerts
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,4 @@
 | 
				
			|||||||
 | 
					The OpenSSL project does not (any longer) include root CA certificates.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Please check out the FAQ:
 | 
				
			||||||
 | 
					  * How can I set up a bundle of commercial root CA certificates?
 | 
				
			||||||
@@ -1,19 +0,0 @@
 | 
				
			|||||||
issuer= CN=5R-CA 1:PN+0.2.262.1.10.7.20=#130131,O=Regulierungsbeh\C3\88orde f\C3\88ur Telekommunikation und Post,C=DE
 | 
					 | 
				
			||||||
notBefore=Mar 22 08:55:51 2000 GMT
 | 
					 | 
				
			||||||
notAfter=Mar 22 08:55:51 2005 GMT
 | 
					 | 
				
			||||||
subject= CN=5R-CA 1:PN+0.2.262.1.10.7.20=#130131,O=Regulierungsbeh\C3\88orde f\C3\88ur Telekommunikation und Post,C=DE
 | 
					 | 
				
			||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIICaDCCAdSgAwIBAgIDDIOqMAoGBiskAwMBAgUAMG8xCzAJBgNVBAYTAkRFMT0w
 | 
					 | 
				
			||||||
OwYDVQQKFDRSZWd1bGllcnVuZ3NiZWjIb3JkZSBmyHVyIFRlbGVrb21tdW5pa2F0
 | 
					 | 
				
			||||||
aW9uIHVuZCBQb3N0MSEwDAYHAoIGAQoHFBMBMTARBgNVBAMUCjVSLUNBIDE6UE4w
 | 
					 | 
				
			||||||
IhgPMjAwMDAzMjIwODU1NTFaGA8yMDA1MDMyMjA4NTU1MVowbzELMAkGA1UEBhMC
 | 
					 | 
				
			||||||
REUxPTA7BgNVBAoUNFJlZ3VsaWVydW5nc2JlaMhvcmRlIGbIdXIgVGVsZWtvbW11
 | 
					 | 
				
			||||||
bmlrYXRpb24gdW5kIFBvc3QxITAMBgcCggYBCgcUEwExMBEGA1UEAxQKNVItQ0Eg
 | 
					 | 
				
			||||||
MTpQTjCBoTANBgkqhkiG9w0BAQEFAAOBjwAwgYsCgYEAih5BUycfBpqKhU8RDsaS
 | 
					 | 
				
			||||||
vV5AtzWeXQRColL9CH3t0DKnhjKAlJ8iccFtJNv+d3bh8bb9sh0maRSo647xP7hs
 | 
					 | 
				
			||||||
HTjKgTE4zM5BYNfXvST79OtcMgAzrnDiGjQIIWv8xbfV1MqxxdtZJygrwzRMb9jG
 | 
					 | 
				
			||||||
CAGoJEymoyzAMNG7tSdBWnUCBQDAAAABoxIwEDAOBgNVHQ8BAf8EBAMCAQYwCgYG
 | 
					 | 
				
			||||||
KyQDAwECBQADgYEAOaK8ihVSBUcL2IdVBxZYYUKwMz5m7H3zqhN8W9w+iafWudH6
 | 
					 | 
				
			||||||
b+aahkbENEwzg3C3v5g8nze7v7ssacQze657LHjP+e7ksUDIgcS4R1pU2eN16bjS
 | 
					 | 
				
			||||||
P/qGPF3rhrIEHoK5nJULkjkZYTtNiOvmQ/+G70TXDi3Os/TwLlWRvu+7YLM=
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,19 +0,0 @@
 | 
				
			|||||||
issuer= CN=6R-Ca 1:PN+0.2.262.1.10.7.20=#130131,O=Regulierungsbeh\C3\88orde f\C3\88ur Telekommunikation und Post,C=DE
 | 
					 | 
				
			||||||
notBefore=Feb  1 09:52:17 2001 GMT
 | 
					 | 
				
			||||||
notAfter=Jun  1 09:52:17 2005 GMT
 | 
					 | 
				
			||||||
subject= CN=6R-Ca 1:PN+0.2.262.1.10.7.20=#130131,O=Regulierungsbeh\C3\88orde f\C3\88ur Telekommunikation und Post,C=DE
 | 
					 | 
				
			||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIICaDCCAdSgAwIBAgIDMtGNMAoGBiskAwMBAgUAMG8xCzAJBgNVBAYTAkRFMT0w
 | 
					 | 
				
			||||||
OwYDVQQKFDRSZWd1bGllcnVuZ3NiZWjIb3JkZSBmyHVyIFRlbGVrb21tdW5pa2F0
 | 
					 | 
				
			||||||
aW9uIHVuZCBQb3N0MSEwDAYHAoIGAQoHFBMBMTARBgNVBAMUCjZSLUNhIDE6UE4w
 | 
					 | 
				
			||||||
IhgPMjAwMTAyMDEwOTUyMTdaGA8yMDA1MDYwMTA5NTIxN1owbzELMAkGA1UEBhMC
 | 
					 | 
				
			||||||
REUxPTA7BgNVBAoUNFJlZ3VsaWVydW5nc2JlaMhvcmRlIGbIdXIgVGVsZWtvbW11
 | 
					 | 
				
			||||||
bmlrYXRpb24gdW5kIFBvc3QxITAMBgcCggYBCgcUEwExMBEGA1UEAxQKNlItQ2Eg
 | 
					 | 
				
			||||||
MTpQTjCBoTANBgkqhkiG9w0BAQEFAAOBjwAwgYsCgYEAg6KrFSTNXKqe+2GKGeW2
 | 
					 | 
				
			||||||
wTmbVeflNkp5H/YxA9K1zmEn5XjKm0S0jH4Wfms6ipPlURVaFwTfnB1s++AnJAWf
 | 
					 | 
				
			||||||
mayaE9BP/pdIY6WtZGgW6aZc32VDMCMKPWyBNyagsJVDmzlakIA5cXBVa7Xqqd3P
 | 
					 | 
				
			||||||
ew8i2feMnQXcqHfDv02CW88CBQDAAAABoxIwEDAOBgNVHQ8BAf8EBAMCAQYwCgYG
 | 
					 | 
				
			||||||
KyQDAwECBQADgYEAOkqkUwdaTCt8wcJLA2zLuOwL5ADHMWLhv6gr5zEF+VckA6qe
 | 
					 | 
				
			||||||
IVLVf8e7fYlRmzQd+5OJcGglCQJLGT+ZplI3Mjnrd4plkoTNKV4iOzBcvJD7K4tn
 | 
					 | 
				
			||||||
XPvs9wCFcC7QU7PLvc1FDsAlr7e4wyefZRDL+wbqNfI7QZTSF1ubLd9AzeQ=
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,16 +0,0 @@
 | 
				
			|||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIICajCCAdMCBDGA0QUwDQYJKoZIhvcNAQEEBQAwfTELMAkGA1UEBhMCQ2ExDzAN
 | 
					 | 
				
			||||||
BgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmlsaXR5IEFjY2VwdGVkMR8w
 | 
					 | 
				
			||||||
HQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRwwGgYDVQQDExNFbnRydXN0
 | 
					 | 
				
			||||||
IERlbW8gV2ViIENBMB4XDTk2MDQyNjEzMzUwMVoXDTA2MDQyNjEzMzUwMVowfTEL
 | 
					 | 
				
			||||||
MAkGA1UEBhMCQ2ExDzANBgNVBAcTBk5lcGVhbjEeMBwGA1UECxMVTm8gTGlhYmls
 | 
					 | 
				
			||||||
aXR5IEFjY2VwdGVkMR8wHQYDVQQKExZGb3IgRGVtbyBQdXJwb3NlcyBPbmx5MRww
 | 
					 | 
				
			||||||
GgYDVQQDExNFbnRydXN0IERlbW8gV2ViIENBMIGdMA0GCSqGSIb3DQEBAQUAA4GL
 | 
					 | 
				
			||||||
ADCBhwKBgQCaroS7O1DA0hm4IefNYU1cx/nqOmzEnk291d1XqznDeF4wEgakbkCc
 | 
					 | 
				
			||||||
zTKxK791yNpXG5RmngqH7cygDRTHZJ6mfCRn0wGC+AI00F2vYTGqPGRQL1N3lZT0
 | 
					 | 
				
			||||||
YDKFC0SQeMMjFIZ1aeQigroFQnHo0VB3zWIMpNkka8PY9lxHZAmWwQIBAzANBgkq
 | 
					 | 
				
			||||||
hkiG9w0BAQQFAAOBgQBAx0UMVA1s54lMQyXjMX5kj99FJN5itb8bK1Rk+cegPQPF
 | 
					 | 
				
			||||||
cWO9SEWyEjjBjIkjjzAwBkaEszFsNGxemxtXvwjIm1xEUMTVlPEWTs2qnDvAUA9W
 | 
					 | 
				
			||||||
YqhWbhH0toGT36236QAsqCZ76rbTRVSSX2BHyJwJMG2tCRv7kRJ//NIgxj3H4w==
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
@@ -1,16 +0,0 @@
 | 
				
			|||||||
Tims test GCI CA
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIIB8DCCAZoCAQAwDQYJKoZIhvcNAQEEBQAwgYIxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
					 | 
				
			||||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
					 | 
				
			||||||
cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2RldmVsb3BtZW50MRkwFwYDVQQDExBD
 | 
					 | 
				
			||||||
cnlwdFNvZnQgRGV2IENBMB4XDTk3MDMyMjEzMzQwNFoXDTk4MDMyMjEzMzQwNFow
 | 
					 | 
				
			||||||
gYIxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhC
 | 
					 | 
				
			||||||
cmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxFDASBgNVBAsTC2Rl
 | 
					 | 
				
			||||||
dmVsb3BtZW50MRkwFwYDVQQDExBDcnlwdFNvZnQgRGV2IENBMFwwDQYJKoZIhvcN
 | 
					 | 
				
			||||||
AQEBBQADSwAwSAJBAOAOAqogG5QwAmLhzyO4CoRnx/wVy4NZP4dxJy83O1EnL0rw
 | 
					 | 
				
			||||||
OdsamJKvPOLHgSXo3gDu9uVyvCf/QJmZAmC5ml8CAwEAATANBgkqhkiG9w0BAQQF
 | 
					 | 
				
			||||||
AANBADRRS/GVdd7rAqRW6SdmgLJduOU2yq3avBu99kRqbp9A/dLu6r6jU+eP4oOA
 | 
					 | 
				
			||||||
TfdbFZtAAD2Hx9jUtY3tfdrJOb8= 
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
@@ -1,15 +0,0 @@
 | 
				
			|||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIICVjCCAgACAQAwDQYJKoZIhvcNAQEEBQAwgbUxCzAJBgNVBAYTAkFVMRMwEQYD
 | 
					 | 
				
			||||||
VQQIEwpRdWVlbnNsYW5kMREwDwYDVQQHEwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5
 | 
					 | 
				
			||||||
cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsTI1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9O
 | 
					 | 
				
			||||||
IEFVVEhPUklUSUVTMTQwMgYDVQQDEytaRVJPIFZBTFVFIENBIC0gREVNT05TVFJB
 | 
					 | 
				
			||||||
VElPTiBQVVJQT1NFUyBPTkxZMB4XDTk3MDQwMzEzMjI1NFoXDTk4MDQwMzEzMjI1
 | 
					 | 
				
			||||||
NFowgbUxCzAJBgNVBAYTAkFVMRMwEQYDVQQIEwpRdWVlbnNsYW5kMREwDwYDVQQH
 | 
					 | 
				
			||||||
EwhCcmlzYmFuZTEaMBgGA1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxLDAqBgNVBAsT
 | 
					 | 
				
			||||||
I1dPUlRITEVTUyBDRVJUSUZJQ0FUSU9OIEFVVEhPUklUSUVTMTQwMgYDVQQDEyta
 | 
					 | 
				
			||||||
RVJPIFZBTFVFIENBIC0gREVNT05TVFJBVElPTiBQVVJQT1NFUyBPTkxZMFwwDQYJ
 | 
					 | 
				
			||||||
KoZIhvcNAQEBBQADSwAwSAJBAOZ7T7yqP/tyspcko3yPY1y0Cm2EmwNvzW4QgVXR
 | 
					 | 
				
			||||||
Fjs3HmJ4xtSpXdo6mwcGezL3Abt/aQXaxv9PU8xt+Jr0OFUCAwEAATANBgkqhkiG
 | 
					 | 
				
			||||||
9w0BAQQFAANBAOQpYmGgyCqCy1OljgJhCqQOu627oVlHzK1L+t9vBaMfn40AVUR4
 | 
					 | 
				
			||||||
WzQVWO31KTgi5vTK1U+3h46fgUWqQ0h+6rU=
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,18 +0,0 @@
 | 
				
			|||||||
subject=/O=VeriSign, Inc/OU=www.verisign.com/repository/TestCPS Incorp. By Ref. Liab. LTD./OU=For VeriSign authorized testing only. No assurances (C)VS1997
 | 
					 | 
				
			||||||
notBefore=Mar  4 00:00:00 1997 GMT
 | 
					 | 
				
			||||||
notAfter=Mar  4 23:59:59 2025 GMT
 | 
					 | 
				
			||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIICTTCCAfcCEEdoCqpuXxnoK27q7d58Qc4wDQYJKoZIhvcNAQEEBQAwgakxFjAU
 | 
					 | 
				
			||||||
BgNVBAoTDVZlcmlTaWduLCBJbmMxRzBFBgNVBAsTPnd3dy52ZXJpc2lnbi5jb20v
 | 
					 | 
				
			||||||
cmVwb3NpdG9yeS9UZXN0Q1BTIEluY29ycC4gQnkgUmVmLiBMaWFiLiBMVEQuMUYw
 | 
					 | 
				
			||||||
RAYDVQQLEz1Gb3IgVmVyaVNpZ24gYXV0aG9yaXplZCB0ZXN0aW5nIG9ubHkuIE5v
 | 
					 | 
				
			||||||
IGFzc3VyYW5jZXMgKEMpVlMxOTk3MB4XDTk3MDMwNDAwMDAwMFoXDTI1MDMwNDIz
 | 
					 | 
				
			||||||
NTk1OVowgakxFjAUBgNVBAoTDVZlcmlTaWduLCBJbmMxRzBFBgNVBAsTPnd3dy52
 | 
					 | 
				
			||||||
ZXJpc2lnbi5jb20vcmVwb3NpdG9yeS9UZXN0Q1BTIEluY29ycC4gQnkgUmVmLiBM
 | 
					 | 
				
			||||||
aWFiLiBMVEQuMUYwRAYDVQQLEz1Gb3IgVmVyaVNpZ24gYXV0aG9yaXplZCB0ZXN0
 | 
					 | 
				
			||||||
aW5nIG9ubHkuIE5vIGFzc3VyYW5jZXMgKEMpVlMxOTk3MFwwDQYJKoZIhvcNAQEB
 | 
					 | 
				
			||||||
BQADSwAwSAJBAMak6xImJx44jMKcbkACy5/CyMA2fqXK4PlzTtCxRq5tFkDzne7s
 | 
					 | 
				
			||||||
cI8oFK/J+gFZNE3bjidDxf07O3JOYG9RGx8CAwEAATANBgkqhkiG9w0BAQQFAANB
 | 
					 | 
				
			||||||
ADT523tENOKrEheZFpsJx1UUjPrG7TwYc/C4NBHrZI4gZJcKVFIfNulftVS6UMYW
 | 
					 | 
				
			||||||
ToLEMaUojc3DuNXHG21PDG8=
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,23 +0,0 @@
 | 
				
			|||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCQ0Ex
 | 
					 | 
				
			||||||
CzAJBgNVBAgTAk9OMRAwDgYDVQQHEwdUb3JvbnRvMRgwFgYDVQQKEw9CYW5rRW5n
 | 
					 | 
				
			||||||
aW5lIEluYy4xKTAnBgNVBAsTIENlcnRpZmljYXRpb24gQXV0aG9yaXR5IERpdmlz
 | 
					 | 
				
			||||||
aW9uMRMwEQYDVQQDEwpiYW5rZW5naW5lMSAwHgYJKoZIhvcNAQkBFhFjYUBiYW5r
 | 
					 | 
				
			||||||
ZW5naW5lLmNvbTAeFw05ODAxMDEwMDAwMDBaFw0zODAxMTcwMDAwMDBaMIGoMQsw
 | 
					 | 
				
			||||||
CQYDVQQGEwJDQTELMAkGA1UECBMCT04xEDAOBgNVBAcTB1Rvcm9udG8xGDAWBgNV
 | 
					 | 
				
			||||||
BAoTD0JhbmtFbmdpbmUgSW5jLjEpMCcGA1UECxMgQ2VydGlmaWNhdGlvbiBBdXRo
 | 
					 | 
				
			||||||
b3JpdHkgRGl2aXNpb24xEzARBgNVBAMTCmJhbmtlbmdpbmUxIDAeBgkqhkiG9w0B
 | 
					 | 
				
			||||||
CQEWEWNhQGJhbmtlbmdpbmUuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
 | 
					 | 
				
			||||||
CgKCAQEA14LoTUAl1/hEy+Kh1kLHiBdW2zD3V4IhM7xxTVKsYsIH56nr69ATTIxU
 | 
					 | 
				
			||||||
P36eRzeZ137qt1AxHFjDCidk3m1Ul6l59ProPexdslLLM2npM3f2cteg+toyiYiS
 | 
					 | 
				
			||||||
EJKjyzIu1xF1j9qzGkymSY/4DsXLZNk9FaczxMk/Ooc6Os1M3AverL4VG4rYIb6f
 | 
					 | 
				
			||||||
eR32cIKJ9Q1fGuyKk7ipq1XQfPW8a8TgZdbHbe7U9Gk3iasGMHHvpR9Ep3mGbgdT
 | 
					 | 
				
			||||||
uQ98SBEuIwe1BUCGg/MXpVy48MNXfAMotBgGw4pl9yqSjMni2FB+E9Q9DHFs2RgX
 | 
					 | 
				
			||||||
MqzKuo8zcPxKx2kZ6Arj8+27dw2clQIDAQABoxAwDjAMBgNVHRMEBTADAQH/MA0G
 | 
					 | 
				
			||||||
CSqGSIb3DQEBBQUAA4IBAQBauupHX9EhpC/r57d6b5kkeWvognxIP9//TO4iw3qb
 | 
					 | 
				
			||||||
zIXEkPXmJmwVzlzoKJWqiya+aw19SP0+G6CzsFOBo/9ehmz+hZ8bhYX4MjlWzX5u
 | 
					 | 
				
			||||||
Tnkhz172j9fOBUmrTVPkcRIs6zjCD5PQAGoBPP1/Zdy2N36lZ0U7lg07Opirj/yJ
 | 
					 | 
				
			||||||
PSJeM2j0fwIFAroiVckvdT0BVwB6S/cPaAQGPghbbr1YGSmYrMriSv825ILJUfxz
 | 
					 | 
				
			||||||
rJYunGR9FiY9Ob7+jwJwiZMS4CxSPktutxr/3hOvr1+ALS7IcVakhhA3PuZAJbdH
 | 
					 | 
				
			||||||
FRclR9qMM8aBnBZmf+Uv3K3uhT+UBzzY654U9Yi1JYnA
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,23 +0,0 @@
 | 
				
			|||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCQ0Ex
 | 
					 | 
				
			||||||
CzAJBgNVBAgTAk9OMRAwDgYDVQQHEwdUb3JvbnRvMRgwFgYDVQQKEw9DZXJ0RW5n
 | 
					 | 
				
			||||||
aW5lIEluYy4xKTAnBgNVBAsTIENlcnRpZmljYXRpb24gQXV0aG9yaXR5IERpdmlz
 | 
					 | 
				
			||||||
aW9uMRMwEQYDVQQDEwpjZXJ0ZW5naW5lMSAwHgYJKoZIhvcNAQkBFhFjYUBjZXJ0
 | 
					 | 
				
			||||||
ZW5naW5lLmNvbTAeFw05ODAxMDEwMDAwMDBaFw0zODAxMTcwMDAwMDBaMIGoMQsw
 | 
					 | 
				
			||||||
CQYDVQQGEwJDQTELMAkGA1UECBMCT04xEDAOBgNVBAcTB1Rvcm9udG8xGDAWBgNV
 | 
					 | 
				
			||||||
BAoTD0NlcnRFbmdpbmUgSW5jLjEpMCcGA1UECxMgQ2VydGlmaWNhdGlvbiBBdXRo
 | 
					 | 
				
			||||||
b3JpdHkgRGl2aXNpb24xEzARBgNVBAMTCmNlcnRlbmdpbmUxIDAeBgkqhkiG9w0B
 | 
					 | 
				
			||||||
CQEWEWNhQGNlcnRlbmdpbmUuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
 | 
					 | 
				
			||||||
CgKCAQEA7aTXURShaeVt9u/dP3Q2dVib3jTCZvEyc6yfpGgaYWewXWuP4HOSfI4h
 | 
					 | 
				
			||||||
GZblbpl+dzJc6RjhR+pguIRtbT5FJB8SJGjRqoujBEOQOxtVtc2fjM9Dqh0iOvMW
 | 
					 | 
				
			||||||
WS6buxHG55GVrHAQaO5HXEScKQBa9ZyNmpSXPTEBrDMej1OAGOkc524/TZrgFPF4
 | 
					 | 
				
			||||||
AiJLLkxCcP8NuzUKlW3WzNMSSoCtjkUKy4wjSLlAWCFM0T9Df6/+Z8ZUQTzHoKCD
 | 
					 | 
				
			||||||
ncH5Qnynd7DlOwKQ2JwwxRhYGiGVTUN0GUq7qA11kW3+vnbFesKQXoF6o2PVx9s2
 | 
					 | 
				
			||||||
YXviI2NXXUjZ0pVnsnFCc45Pm8XojwIDAQABoxAwDjAMBgNVHRMEBTADAQH/MA0G
 | 
					 | 
				
			||||||
CSqGSIb3DQEBBQUAA4IBAQBP/aHOKJ00Akzc9HWM1X30hlWZFBaQi4pqD4Uhk8+p
 | 
					 | 
				
			||||||
KzzwFP5DRLBOz8TYBbtdXrS6hxVMr2sqWmhVkuyepWhHZazKGyHY/y0FbOXsewAV
 | 
					 | 
				
			||||||
1QxxSyx7ve89pCKv4/w0rQcP916iHc8Y/TCpmz7eITa3GId+8H/XTaBi8GBp9X9O
 | 
					 | 
				
			||||||
w8m25FmEB1NT+eJwefvfdKowjy4tSorKdW/eJspxNuTSRGmUy8G71W5dYvgpAlx6
 | 
					 | 
				
			||||||
mdnHyzxEGvRYNNI2bS0ifXgbEFNWqSas9q34ea5KOpkJu8T/KyXfSb6rPOsBSb0t
 | 
					 | 
				
			||||||
wMowwGtCVH2C4Lw/8zo0EjhMpTOsPaub408PrZ+NQ2bl
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,34 +0,0 @@
 | 
				
			|||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIIF3TCCA8WgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCQ0Ex
 | 
					 | 
				
			||||||
CzAJBgNVBAgTAk9OMRAwDgYDVQQHEwdUb3JvbnRvMRgwFgYDVQQKEw9Gb3J0RW5n
 | 
					 | 
				
			||||||
aW5lIEluYy4xKTAnBgNVBAsTIENlcnRpZmljYXRpb24gQXV0aG9yaXR5IERpdmlz
 | 
					 | 
				
			||||||
aW9uMRMwEQYDVQQDEwpmb3J0ZW5naW5lMSAwHgYJKoZIhvcNAQkBFhFjYUBmb3J0
 | 
					 | 
				
			||||||
ZW5naW5lLmNvbTAeFw05ODAxMDEwMDAwMDBaFw0zODAxMTcwMDAwMDBaMIGoMQsw
 | 
					 | 
				
			||||||
CQYDVQQGEwJDQTELMAkGA1UECBMCT04xEDAOBgNVBAcTB1Rvcm9udG8xGDAWBgNV
 | 
					 | 
				
			||||||
BAoTD0ZvcnRFbmdpbmUgSW5jLjEpMCcGA1UECxMgQ2VydGlmaWNhdGlvbiBBdXRo
 | 
					 | 
				
			||||||
b3JpdHkgRGl2aXNpb24xEzARBgNVBAMTCmZvcnRlbmdpbmUxIDAeBgkqhkiG9w0B
 | 
					 | 
				
			||||||
CQEWEWNhQGZvcnRlbmdpbmUuY29tMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
 | 
					 | 
				
			||||||
CgKCAgEAyr7GbpwDxx1v3EYbo0gcO+ligEhlDqG2e7u/AbWGoVAqc8+q6auUJUtz
 | 
					 | 
				
			||||||
4i7oh0yNadu1o9kpXW+znkgO0zlrgjGskqqMO1ooppzTJdFy/P8gR6x1Iuv3kWtX
 | 
					 | 
				
			||||||
OuzwPPEjv09LWlhyJsN+oU4ztTVf07I0Q9zYupcoDQ58XKRheI9KdDB2DYSmxywA
 | 
					 | 
				
			||||||
WSLQwIeG0Qa7gvokeQlpkgkEC7viEecJ3752KXBJHnh7As51mxnlpmG6sDy67Eli
 | 
					 | 
				
			||||||
HDw5tHETRqbtnscGBjskGQBqR5xt7+QnnthZrN8HJHDoa9zgGephwizhkL44lXLF
 | 
					 | 
				
			||||||
YK9W5XhFbblw2c+mAcHkokRiwD7CPeIoyD2a/Jcw3n5hegKTlNhd4BFGVF6JR7gF
 | 
					 | 
				
			||||||
OFk2QfHXit5uthsij9Xhl7WAgQUqLgggD9MphqPf4nY66OZUJV9ZsmB+Qfp8UizB
 | 
					 | 
				
			||||||
0WAOegactKVyRqHtRa+KIEXQXNtZgjcmMk9CYkP0nIbKtgKXaH6+9VMHNOryCnFE
 | 
					 | 
				
			||||||
7pSsuPUkypncFWCHGSeiFO3w4w4J4csltxBADQzxfRu5KZnlToQN7bVpI/Q31tVX
 | 
					 | 
				
			||||||
E5bjrJcq6Oj/OTqZ3ID+OqbkUdAg0ggjRKcTgxnLHd/AbMzJ6PsclDDf7cLs0WSl
 | 
					 | 
				
			||||||
xMxQR/z5bNST1rNtT9rsiv2TOhfvCBxO9AOjBioO8PLO032HTNECAwEAAaMQMA4w
 | 
					 | 
				
			||||||
DAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAgEAVyBpPWfT2VOyvVpslGKx
 | 
					 | 
				
			||||||
8h0+CWP8cilygGRtZJ5dAJzc//1REAHdvK+TgZ4Foz3dqHhXI+RNN0FpzuWaYMjW
 | 
					 | 
				
			||||||
ZTS0kAmcOQuGY1Oo4PGlPHI21pNz29oFDTJr0ZmLBJ4JKVsE2soJg55jdk9MZHA7
 | 
					 | 
				
			||||||
K//7HH9RsmrWZOE5DZDlrxp6+naixhMwnlPKKisIy9GNZUPqGdUWABMdB/BUVVNl
 | 
					 | 
				
			||||||
NU5TtWpIXUClMd8a+eoKcItBeYXowkHOBpinPkDX3clFDIUfWiw0Ro08s8SrrFqR
 | 
					 | 
				
			||||||
8Szwbrj52Xv1RM56oGqCjnkvJctxihODV7NcpxoAFjIZokDom0q6zPrrTUsLFQov
 | 
					 | 
				
			||||||
Plovc3w5hmALiDMshaTvE1nm3Psn4yQ+FlRE8epTZrQiIGypZkZC6lcz0mYawueW
 | 
					 | 
				
			||||||
cThYWGFhVG4ktQzOjjNRsNxopW+W7cF1zQTxiWUDnxIKSj7gtdQ2jiubxEEhfVag
 | 
					 | 
				
			||||||
r8DMtAccNVTZVURpGi56TptOOuotrTqqC+2GviW4hlxvdvmuQN0OlXlUwzz2Trxc
 | 
					 | 
				
			||||||
FamNnuA54lZw/8arLtxsFmHrcnPw53+1spumLD0S5UkxHNu40h6LIVpZz3H+0rLz
 | 
					 | 
				
			||||||
uFofTfiyMjcfK2AyHQTgUCbsrvgNuLDQUbyFGVchdFUkhztX3DhEVnxnnrpY4BVj
 | 
					 | 
				
			||||||
QdTqWIvw7lGlSuDCjxEQAOc=
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,23 +0,0 @@
 | 
				
			|||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQUFADCBqDELMAkGA1UEBhMCQ0Ex
 | 
					 | 
				
			||||||
CzAJBgNVBAgTAk9OMRAwDgYDVQQHEwdUb3JvbnRvMRgwFgYDVQQKEw9NYWlsRW5n
 | 
					 | 
				
			||||||
aW5lIEluYy4xKTAnBgNVBAsTIENlcnRpZmljYXRpb24gQXV0aG9yaXR5IERpdmlz
 | 
					 | 
				
			||||||
aW9uMRMwEQYDVQQDEwptYWlsZW5naW5lMSAwHgYJKoZIhvcNAQkBFhFjYUBtYWls
 | 
					 | 
				
			||||||
ZW5naW5lLmNvbTAeFw05ODAxMDEwMDAwMDBaFw0zODAxMTcwMDAwMDBaMIGoMQsw
 | 
					 | 
				
			||||||
CQYDVQQGEwJDQTELMAkGA1UECBMCT04xEDAOBgNVBAcTB1Rvcm9udG8xGDAWBgNV
 | 
					 | 
				
			||||||
BAoTD01haWxFbmdpbmUgSW5jLjEpMCcGA1UECxMgQ2VydGlmaWNhdGlvbiBBdXRo
 | 
					 | 
				
			||||||
b3JpdHkgRGl2aXNpb24xEzARBgNVBAMTCm1haWxlbmdpbmUxIDAeBgkqhkiG9w0B
 | 
					 | 
				
			||||||
CQEWEWNhQG1haWxlbmdpbmUuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB
 | 
					 | 
				
			||||||
CgKCAQEAqXmfsU+lx+NFmn6tN17RTOyaddHqLnr/3rzEDIyT9TN+tF9TG7jmK7lJ
 | 
					 | 
				
			||||||
Jrj5arQ3nTFaLF8JuND2U1z/cLPw6/TX+1tE3v3CNUDSjaisyUDiUyp3TE8hMMMz
 | 
					 | 
				
			||||||
zfZQn0JsGgNhhWxqyzjhRQGtKL4+xtn8VsF/8zGgZYke7nlmVKz/FslDFTnNoodL
 | 
					 | 
				
			||||||
BAEGiu9JQS9qqpbSs20NdZ6LXPL2A4iTjnsNFBW3jIMVIn/JVVyaycU7ue2oFviD
 | 
					 | 
				
			||||||
vLNpkVZcR7A+jjIdIumOc5VSF0y7y74cQC5YwkR2mLK7UBYDK6NCY3ta/C4M8NsM
 | 
					 | 
				
			||||||
0FpmvRl0+A1ivZtVwqI98dxDtp7HeQIDAQABoxAwDjAMBgNVHRMEBTADAQH/MA0G
 | 
					 | 
				
			||||||
CSqGSIb3DQEBBQUAA4IBAQAjfNn5BCzxylBDakFQGWKE/P43PRibMOEzfd7+DzbY
 | 
					 | 
				
			||||||
WIekoz3i00DwoH3b6j4gwlDJRAOq4dF6/Pt/uBOHDo/op+ef+9ErmKPd+ehXN9h3
 | 
					 | 
				
			||||||
7QbccTgz7DtVwA4iRlDRLru+JuXzT+OsCHuFZMOLJ+KD2JAGh3W68JjdcLkrlcpt
 | 
					 | 
				
			||||||
AU0wc5aOHPPfEBdIah8y8QtNzXRVzoBt8zzvgCARkXxTS2u/9QaXR1hML0JtDgQS
 | 
					 | 
				
			||||||
SdZ6Kd8SN6yzqxD+buYD5sOfJmjBF/n3lqFHNMHnnGXy2TAXZtIAWzffU3A0cGPB
 | 
					 | 
				
			||||||
N6FZ026a86HbF1X4k+xszhbJu/ikczyuWnCJIg3fTYSD
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user