Compare commits
2302 Commits
OpenSSL-fi
...
OpenSSL_1_
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
65fc4c55be | ||
|
|
5135d6b985 | ||
|
|
2202edeff0 | ||
|
|
c8f759ec74 | ||
|
|
5fda10c6f1 | ||
|
|
11ba084e1b | ||
|
|
cddd00166c | ||
|
|
0190aa7353 | ||
|
|
1546de87f0 | ||
|
|
affffaed3d | ||
|
|
0c644f1462 | ||
|
|
a2da5c7daa | ||
|
|
c155d83f5b | ||
|
|
5a03e3ac3f | ||
|
|
08b2097967 | ||
|
|
15401859b5 | ||
|
|
6f24165170 | ||
|
|
a8afd9382c | ||
|
|
caddf00d78 | ||
|
|
e105098b3f | ||
|
|
9852e7e4d7 | ||
|
|
b855560192 | ||
|
|
f2f50efea3 | ||
|
|
2b3cd246e5 | ||
|
|
7171ade2c2 | ||
|
|
76ec9151d1 | ||
|
|
6c24dd9005 | ||
|
|
e323afb0ce | ||
|
|
1fd43fd86e | ||
|
|
3e70c81ed9 | ||
|
|
6e07229564 | ||
|
|
859d5eb2d7 | ||
|
|
29b0c4a01c | ||
|
|
b824f0f458 | ||
|
|
43ea53a04a | ||
|
|
fa07f00aaf | ||
|
|
dbb834ffeb | ||
|
|
8549a8a5dc | ||
|
|
887c250852 | ||
|
|
710c1c34d1 | ||
|
|
e16818108f | ||
|
|
0cb76e79df | ||
|
|
6cb419673e | ||
|
|
72d668c332 | ||
|
|
5ce4799a38 | ||
|
|
6178da0142 | ||
|
|
27713e3fc2 | ||
|
|
3492c47b18 | ||
|
|
43dc001b62 | ||
|
|
8280b43a62 | ||
|
|
85d9b02d16 | ||
|
|
bfd502f027 | ||
|
|
f1ed5fa827 | ||
|
|
5bb9e1b4d4 | ||
|
|
7de819237d | ||
|
|
6cfab29b71 | ||
|
|
55708796af | ||
|
|
7074f1df07 | ||
|
|
67d8ab07e6 | ||
|
|
4e63da0669 | ||
|
|
15b0a5651c | ||
|
|
4e66723517 | ||
|
|
3e53c86001 | ||
|
|
524e5b844b | ||
|
|
e1f09dfd84 | ||
|
|
f16411ccfd | ||
|
|
2bbcd45b05 | ||
|
|
fdc6c6ef08 | ||
|
|
6e87cc8da6 | ||
|
|
2d0b6c72b8 | ||
|
|
3e84046f90 | ||
|
|
cc1cb996f1 | ||
|
|
32fbeacdfb | ||
|
|
431aad3c15 | ||
|
|
0454f2c490 | ||
|
|
5f911774bf | ||
|
|
66b7e42790 | ||
|
|
6a419388fc | ||
|
|
abda7c1147 | ||
|
|
88b48dc680 | ||
|
|
661d35dfb2 | ||
|
|
f99c9daa39 | ||
|
|
019b3f3e5a | ||
|
|
d6584eba8c | ||
|
|
a379c433a3 | ||
|
|
006c7c6bb1 | ||
|
|
bd4a902a15 | ||
|
|
17ae5e9f13 | ||
|
|
baa5f52422 | ||
|
|
b3620451b2 | ||
|
|
d2f17d9615 | ||
|
|
561cbe5678 | ||
|
|
756d2074b8 | ||
|
|
c65db618bb | ||
|
|
8355647403 | ||
|
|
b839d73411 | ||
|
|
4563c1e043 | ||
|
|
11f35a036d | ||
|
|
d8646dab14 | ||
|
|
47b3cd98f2 | ||
|
|
27c7e53882 | ||
|
|
b2b28803fb | ||
|
|
8e92b1b9ce | ||
|
|
0f41ccf370 | ||
|
|
c44544a1d7 | ||
|
|
4e50f02638 | ||
|
|
174ea15647 | ||
|
|
18f8258a87 | ||
|
|
376bbb5887 | ||
|
|
2c8275409e | ||
|
|
892582b541 | ||
|
|
57b53c1b0a | ||
|
|
004c3ca521 | ||
|
|
f0f00f9272 | ||
|
|
a243c68736 | ||
|
|
467d9f2a34 | ||
|
|
226a94963a | ||
|
|
d7f0d147b1 | ||
|
|
26902b9aad | ||
|
|
3c69d6bec4 | ||
|
|
4f44677a41 | ||
|
|
88d9f669c5 | ||
|
|
22e1421672 | ||
|
|
5409414eff | ||
|
|
7134507de0 | ||
|
|
fe41d9853c | ||
|
|
d07692cd96 | ||
|
|
82ae57136b | ||
|
|
30baeaaeab | ||
|
|
87a0f4b92e | ||
|
|
1b08bcbfe3 | ||
|
|
346b1001eb | ||
|
|
b61a84c8e6 | ||
|
|
a543ea44bc | ||
|
|
b0dd3d1b94 | ||
|
|
461be68b75 | ||
|
|
21fb688d26 | ||
|
|
d8faad27b7 | ||
|
|
dab7075946 | ||
|
|
dfc8e96daa | ||
|
|
71d3eaf358 | ||
|
|
ef6b25be63 | ||
|
|
b452f43322 | ||
|
|
52891f832f | ||
|
|
9990cb75c1 | ||
|
|
a5cc69c7ae | ||
|
|
0b4b8ba64e | ||
|
|
268e78c305 | ||
|
|
c900a78c99 | ||
|
|
46ffb2dc97 | ||
|
|
10acacb3bf | ||
|
|
aab790a656 | ||
|
|
1319aad994 | ||
|
|
3c0ce01cea | ||
|
|
9fcbefebdb | ||
|
|
017d2a887f | ||
|
|
0416482605 | ||
|
|
0f17424918 | ||
|
|
55ed10db21 | ||
|
|
3877b6bfe9 | ||
|
|
a0f32454b6 | ||
|
|
6fda4d7e5d | ||
|
|
36a252ea46 | ||
|
|
a31a195246 | ||
|
|
5f590d2218 | ||
|
|
791b7bc715 | ||
|
|
19ae090787 | ||
|
|
db3076621b | ||
|
|
9ae5743515 | ||
|
|
c184b140df | ||
|
|
9d80aa7e3f | ||
|
|
15671a90a9 | ||
|
|
0048464449 | ||
|
|
b422166ce0 | ||
|
|
81be661ae2 | ||
|
|
8681c66eec | ||
|
|
69a0034e50 | ||
|
|
c9a1778134 | ||
|
|
326794e9c6 | ||
|
|
2dd5ca1fbc | ||
|
|
3042945ac8 | ||
|
|
da29b0d335 | ||
|
|
6abbc68188 | ||
|
|
25f6c7fd8b | ||
|
|
1cf3571ea4 | ||
|
|
d769e7a58c | ||
|
|
fa3619f233 | ||
|
|
a414cbcad3 | ||
|
|
c6196da587 | ||
|
|
5d48762647 | ||
|
|
77e749405d | ||
|
|
9ccd4e224f | ||
|
|
1dad4f3672 | ||
|
|
59745556b4 | ||
|
|
fab4447179 | ||
|
|
417b8d4705 | ||
|
|
e614ec4769 | ||
|
|
a6b03f4138 | ||
|
|
809fa4cc59 | ||
|
|
463f448595 | ||
|
|
5cd0cf8cce | ||
|
|
49cb959494 | ||
|
|
783a73c47f | ||
|
|
99bf516908 | ||
|
|
a26c372cfc | ||
|
|
ed5ac22e5b | ||
|
|
3d11b8f896 | ||
|
|
70b2186e24 | ||
|
|
64ecdaeca9 | ||
|
|
4e74239df1 | ||
|
|
aaf35f11d7 | ||
|
|
093f5d2c15 | ||
|
|
7f1c086b21 | ||
|
|
77ea8c3002 | ||
|
|
ddcfc25a6d | ||
|
|
4d7b7c62c3 | ||
|
|
dd009fe655 | ||
|
|
73ba116e96 | ||
|
|
80b2ff978d | ||
|
|
7ce8c95d58 | ||
|
|
38b6e6c07b | ||
|
|
e4e949192b | ||
|
|
4e52b9845e | ||
|
|
e22b864846 | ||
|
|
b6af2c7e3e | ||
|
|
57db09906b | ||
|
|
4c78bc05c4 | ||
|
|
ef8e772805 | ||
|
|
54571ba004 | ||
|
|
237d7b6cae | ||
|
|
854a225a27 | ||
|
|
e39acc1c90 | ||
|
|
a0b76569b2 | ||
|
|
78625cac82 | ||
|
|
c28a9165f2 | ||
|
|
617298dca3 | ||
|
|
33ab2e31f3 | ||
|
|
bb7ccdfbe2 | ||
|
|
c836f8ef73 | ||
|
|
4df100935f | ||
|
|
2a0ff7ad20 | ||
|
|
c2a548a884 | ||
|
|
77202a85a0 | ||
|
|
73bfcf2226 | ||
|
|
2121f15daf | ||
|
|
b2cf7c6452 | ||
|
|
7587347bc4 | ||
|
|
ae3b4f2336 | ||
|
|
605b04f661 | ||
|
|
97132a0f8e | ||
|
|
30e5e39a3d | ||
|
|
2c618ab993 | ||
|
|
b5d5c0a21f | ||
|
|
f8ea4757cc | ||
|
|
0ed6b52687 | ||
|
|
a63bf2c53c | ||
|
|
b3f3407850 | ||
|
|
477fd4596f | ||
|
|
30b1b28aff | ||
|
|
46400c97a9 | ||
|
|
c558c99fd8 | ||
|
|
13c3a1defa | ||
|
|
aaa29f9e83 | ||
|
|
ede6ef5e08 | ||
|
|
0f529cbdc3 | ||
|
|
eb55b9fc19 | ||
|
|
7012d2a8fa | ||
|
|
8626230a02 | ||
|
|
c23632d3f1 | ||
|
|
3859d7ee78 | ||
|
|
d615bceb2d | ||
|
|
7ca1cfbac3 | ||
|
|
d8e8fc4803 | ||
|
|
57f39cc826 | ||
|
|
6489573224 | ||
|
|
079e00e646 | ||
|
|
5871ddb016 | ||
|
|
c7ba21493a | ||
|
|
8bf5001612 | ||
|
|
6ed9dfb23a | ||
|
|
7f62532030 | ||
|
|
c2c99e2860 | ||
|
|
8125d9f99c | ||
|
|
8e6925b0cd | ||
|
|
d7ecd42255 | ||
|
|
41b7619596 | ||
|
|
211655fcdd | ||
|
|
363bd0b48e | ||
|
|
60aee6ce15 | ||
|
|
bab534057b | ||
|
|
cec2af7510 | ||
|
|
6de3683908 | ||
|
|
fceac0bc74 | ||
|
|
792bbc2374 | ||
|
|
4a94003a51 | ||
|
|
ab4d689832 | ||
|
|
23b973e600 | ||
|
|
b3b201b6f7 | ||
|
|
d41c785d69 | ||
|
|
a370537bde | ||
|
|
2bd45dc94c | ||
|
|
121f9e743c | ||
|
|
0eab41fb78 | ||
|
|
8aa02e97a7 | ||
|
|
a68c7b9171 | ||
|
|
5cabcf96e7 | ||
|
|
85e878f224 | ||
|
|
fe1c7fecf1 | ||
|
|
0e941da6fa | ||
|
|
2d1cbc85c8 | ||
|
|
d195d60a5f | ||
|
|
e81695205e | ||
|
|
fe150ac25d | ||
|
|
bec45a35bb | ||
|
|
3b0ee0d2bf | ||
|
|
dde5b979d2 | ||
|
|
57a6ac7c4f | ||
|
|
9b9cb004f7 | ||
|
|
6ba71a7173 | ||
|
|
4ded7b44a8 | ||
|
|
1457619e13 | ||
|
|
ccf529928f | ||
|
|
5ceb595dfa | ||
|
|
44390fadc0 | ||
|
|
974d05a323 | ||
|
|
0f76640fba | ||
|
|
a11974180f | ||
|
|
5d48a66a6a | ||
|
|
63fc7f848d | ||
|
|
830457ce4f | ||
|
|
ea4d5005d9 | ||
|
|
9f03d0fc04 | ||
|
|
2140659b00 | ||
|
|
e527201f6b | ||
|
|
70531c147c | ||
|
|
75bbf6e14c | ||
|
|
702e742515 | ||
|
|
be01f79d3d | ||
|
|
bf785c9849 | ||
|
|
4db4882402 | ||
|
|
6786f52ada | ||
|
|
2e6a7b3efc | ||
|
|
63461b8db1 | ||
|
|
e77228ba11 | ||
|
|
5c60b1637a | ||
|
|
26397d2e8c | ||
|
|
85b2c0ce7f | ||
|
|
f826bf7798 | ||
|
|
3ebbe8853f | ||
|
|
ac71d81e84 | ||
|
|
a9dbe71ee0 | ||
|
|
ecd3370ba0 | ||
|
|
19d300d07c | ||
|
|
071920d9f6 | ||
|
|
1f6e9bce21 | ||
|
|
434ba03ca9 | ||
|
|
d88d941c87 | ||
|
|
9d44cd1642 | ||
|
|
1d4e879106 | ||
|
|
ae381fef5c | ||
|
|
48114ec952 | ||
|
|
7a76219774 | ||
|
|
2900fc8ae1 | ||
|
|
e9afa08cd1 | ||
|
|
bcaa36fd11 | ||
|
|
71702f7ed0 | ||
|
|
fd252de312 | ||
|
|
349e78e2e8 | ||
|
|
79bd20fd17 | ||
|
|
d0c3628834 | ||
|
|
31636a3ed1 | ||
|
|
f3b7bdadbc | ||
|
|
ad7159ea84 | ||
|
|
0b0dbb2cac | ||
|
|
12bf56c017 | ||
|
|
93c4ba07d7 | ||
|
|
36d46234c7 | ||
|
|
774b2fe700 | ||
|
|
6c901ae8c1 | ||
|
|
90c65a9838 | ||
|
|
5eba1ab346 | ||
|
|
4e50072d56 | ||
|
|
dd9557a8ba | ||
|
|
ed551cddf7 | ||
|
|
5aca224ecd | ||
|
|
dab6293482 | ||
|
|
1416aec60d | ||
|
|
aa8f38e49b | ||
|
|
8525377265 | ||
|
|
2fbc8a2aad | ||
|
|
6343829a39 | ||
|
|
2401debe83 | ||
|
|
5c61111bff | ||
|
|
bc645199c0 | ||
|
|
0a8c9f7de1 | ||
|
|
7b808412c9 | ||
|
|
706c5a4d35 | ||
|
|
0afc9f5bc0 | ||
|
|
2e5975285e | ||
|
|
5947ca0409 | ||
|
|
d40a1b865f | ||
|
|
f80921b6a6 | ||
|
|
9be5481297 | ||
|
|
8fe8bae15a | ||
|
|
f2c0230518 | ||
|
|
e6e0c9018c | ||
|
|
9619b730b4 | ||
|
|
2766515fca | ||
|
|
87d52468aa | ||
|
|
70d71f6185 | ||
|
|
5ee92a5ec1 | ||
|
|
c76fd290be | ||
|
|
d0a20cafa1 | ||
|
|
8da07655ee | ||
|
|
befe1fbc29 | ||
|
|
5e4430e70d | ||
|
|
4d6e1e4f29 | ||
|
|
122396f2db | ||
|
|
09a60c9833 | ||
|
|
b444ac3e6f | ||
|
|
f768be81d8 | ||
|
|
91173829db | ||
|
|
bfaead2b12 | ||
|
|
e6b4578540 | ||
|
|
0dd4850ee0 | ||
|
|
c650168a4f | ||
|
|
ea71ec1b11 | ||
|
|
f1455b3063 | ||
|
|
b764f82c64 | ||
|
|
436bdcff4e | ||
|
|
27f864e8ac | ||
|
|
80aa9cc985 | ||
|
|
ab7e09f59b | ||
|
|
e9eda23ae6 | ||
|
|
6caa4edd3e | ||
|
|
ac786241a2 | ||
|
|
df0681e554 | ||
|
|
e19106f5fb | ||
|
|
ae7ec4c71d | ||
|
|
020d67fb89 | ||
|
|
3fdc6c11aa | ||
|
|
dcf6b3e9b6 | ||
|
|
606f6c477a | ||
|
|
1581f82243 | ||
|
|
0d6f9c7181 | ||
|
|
640b86cb24 | ||
|
|
111a6e2a23 | ||
|
|
d764e7edb8 | ||
|
|
aff8259510 | ||
|
|
256b3e9c5f | ||
|
|
762a2e3cab | ||
|
|
28b6d5020e | ||
|
|
d5bbead449 | ||
|
|
0f7efbc859 | ||
|
|
a7ae4abfd9 | ||
|
|
30661b1b01 | ||
|
|
1ea6472e60 | ||
|
|
b8dfde2a36 | ||
|
|
570006f3a2 | ||
|
|
babb379849 | ||
|
|
6665ef303e | ||
|
|
7e7af0bc51 | ||
|
|
87d3a0cd90 | ||
|
|
1e369b375e | ||
|
|
6bf24568bc | ||
|
|
837f2fc7a4 | ||
|
|
1a489c9af1 | ||
|
|
8c864e5466 | ||
|
|
be5707c820 | ||
|
|
4a4f3071ec | ||
|
|
d7235a9d68 | ||
|
|
fa0f834c20 | ||
|
|
96562f2fb3 | ||
|
|
b9790c1cd4 | ||
|
|
fcbdde0dfe | ||
|
|
51ec776b7d | ||
|
|
e65bcbcef0 | ||
|
|
e710de12ce | ||
|
|
db99c52509 | ||
|
|
f8d6be3f81 | ||
|
|
d493899579 | ||
|
|
492279f6f3 | ||
|
|
3ad74edce8 | ||
|
|
2b7b1cad10 | ||
|
|
43048d13c8 | ||
|
|
e8da6a1d0f | ||
|
|
305514000c | ||
|
|
0702150f53 | ||
|
|
a0ee081515 | ||
|
|
d43c4497ce | ||
|
|
4b96839f06 | ||
|
|
249a77f5fb | ||
|
|
d0fff69dc9 | ||
|
|
8c9bd89338 | ||
|
|
2e415778f2 | ||
|
|
1cbf663a6c | ||
|
|
9be8035b11 | ||
|
|
2ecd2edede | ||
|
|
9d84d4ed5e | ||
|
|
2e0c7db950 | ||
|
|
002e66c0e8 | ||
|
|
e9746e03ee | ||
|
|
ab9c689ad3 | ||
|
|
4c3296960d | ||
|
|
96826bfc84 | ||
|
|
eb1aa135d8 | ||
|
|
99649b5990 | ||
|
|
6d6c47980e | ||
|
|
474b3b1cc8 | ||
|
|
3e727a3b37 | ||
|
|
a9ff742e42 | ||
|
|
787287af40 | ||
|
|
5cbd203302 | ||
|
|
592a207b94 | ||
|
|
6bcbac0abb | ||
|
|
4c048211f1 | ||
|
|
b94551e823 | ||
|
|
9b634c9b37 | ||
|
|
5b331ab77a | ||
|
|
dd6f479ea8 | ||
|
|
87facba376 | ||
|
|
e4662fdb62 | ||
|
|
efa73a77e4 | ||
|
|
89778b7f3f | ||
|
|
c79c5a256b | ||
|
|
9960bdc6fa | ||
|
|
23dcb447ff | ||
|
|
39c63e162c | ||
|
|
34d05a4023 | ||
|
|
dcc0c29876 | ||
|
|
db50661fce | ||
|
|
f9afd9f861 | ||
|
|
d4cdbab99b | ||
|
|
5f834ab123 | ||
|
|
8528128b2a | ||
|
|
a0f3679b52 | ||
|
|
8228fd89fc | ||
|
|
869eb9e767 | ||
|
|
6c2878344f | ||
|
|
2836cb3816 | ||
|
|
46d4782888 | ||
|
|
a01a351cc2 | ||
|
|
adb92d56eb | ||
|
|
ce04f91951 | ||
|
|
6cb9fca70d | ||
|
|
ec0bfca7e7 | ||
|
|
1cd504e7be | ||
|
|
11f3cee93b | ||
|
|
6bf79e30ea | ||
|
|
7555c9337f | ||
|
|
ffc2b3e927 | ||
|
|
9ab89286a2 | ||
|
|
5329130333 | ||
|
|
e1451bb51d | ||
|
|
0b44c26d78 | ||
|
|
4db9677bac | ||
|
|
1381bf90f4 | ||
|
|
e0f7b87227 | ||
|
|
985de86340 | ||
|
|
b814c01a76 | ||
|
|
c07a126fb2 | ||
|
|
09a6e19431 | ||
|
|
863d447e0b | ||
|
|
5ce278a77b | ||
|
|
37cf49a3df | ||
|
|
f79262e94b | ||
|
|
7d537d4fc7 | ||
|
|
ca89fc1fb4 | ||
|
|
59d2d48f64 | ||
|
|
b3c8dd4eab | ||
|
|
45d3767d28 | ||
|
|
8671b89860 | ||
|
|
4f7f411719 | ||
|
|
eac442ddd3 | ||
|
|
55bef26d8a | ||
|
|
2aa2a5775f | ||
|
|
c451bd828f | ||
|
|
8ecfbedd85 | ||
|
|
c173fce4e2 | ||
|
|
953174f46e | ||
|
|
c621c7e432 | ||
|
|
2bbe8f9129 | ||
|
|
4be0a5d429 | ||
|
|
bdfe932dca | ||
|
|
3fc59c8406 | ||
|
|
c61915c659 | ||
|
|
368888bcb6 | ||
|
|
eafd6e5110 | ||
|
|
05935c47b2 | ||
|
|
d8bd55a364 | ||
|
|
841c91d6e4 | ||
|
|
a4792168ec | ||
|
|
90b96776cd | ||
|
|
408f906592 | ||
|
|
7a18ecb2df | ||
|
|
174c86a216 | ||
|
|
c6ddacf7f8 | ||
|
|
ab3eafd5b5 | ||
|
|
dd043cd501 | ||
|
|
a75c662fd1 | ||
|
|
83574cf808 | ||
|
|
2cd81830ef | ||
|
|
e194fe8f47 | ||
|
|
40a706286f | ||
|
|
c6f6c380c7 | ||
|
|
8f395e0f4d | ||
|
|
595852f3b5 | ||
|
|
0a56761f19 | ||
|
|
220903f92e | ||
|
|
3c1d6bbc92 | ||
|
|
cab14b9803 | ||
|
|
17a4a4dff8 | ||
|
|
c2c2e7a438 | ||
|
|
d18ef847f4 | ||
|
|
5c0d90a699 | ||
|
|
f434730524 | ||
|
|
65fd877515 | ||
|
|
64ddafc6b6 | ||
|
|
781f0a9bb5 | ||
|
|
3de5a7745f | ||
|
|
94fd382f8b | ||
|
|
4bd4afa34e | ||
|
|
148bb9515c | ||
|
|
51e00db226 | ||
|
|
a92ebf2290 | ||
|
|
f49c687507 | ||
|
|
8b99c79fae | ||
|
|
718f8f7a9e | ||
|
|
e718520cc5 | ||
|
|
4f46934269 | ||
|
|
fabe640f5e | ||
|
|
19048b5c8d | ||
|
|
156ee88285 | ||
|
|
c386f8ac38 | ||
|
|
4a954b56c9 | ||
|
|
d05a474556 | ||
|
|
8a2062fefe | ||
|
|
2f63ad5b35 | ||
|
|
c78bba2343 | ||
|
|
d26c905c67 | ||
|
|
8fcc9caecc | ||
|
|
e7b097f558 | ||
|
|
5ee6f96cea | ||
|
|
dc634aff25 | ||
|
|
8e3b2dbb31 | ||
|
|
ba6f95e81b | ||
|
|
281066cb03 | ||
|
|
830b8877ba | ||
|
|
9912ab6770 | ||
|
|
299ab428ce | ||
|
|
e6ef05d5f3 | ||
|
|
0f401ff08b | ||
|
|
5558128541 | ||
|
|
e33c72dfc6 | ||
|
|
44a877aa88 | ||
|
|
6b6fe3d8e4 | ||
|
|
4c1a6e004a | ||
|
|
6e6ada18c6 | ||
|
|
b35a131069 | ||
|
|
1728756255 | ||
|
|
a12a6b9962 | ||
|
|
852bd35065 | ||
|
|
a5db50d005 | ||
|
|
f3eba36c4c | ||
|
|
529d329ce1 | ||
|
|
47a6d388c7 | ||
|
|
c02b6b6b21 | ||
|
|
3b28bc9910 | ||
|
|
fc003bcecb | ||
|
|
38d3a73808 | ||
|
|
73b3c2d861 | ||
|
|
4670e00ff5 | ||
|
|
287df2fe49 | ||
|
|
e0fbd07309 | ||
|
|
eaee098e1f | ||
|
|
43d9e9d07f | ||
|
|
c420fab52b | ||
|
|
6469a1fda3 | ||
|
|
7f50d9a4b0 | ||
|
|
da6ea110b5 | ||
|
|
fb777e1f79 | ||
|
|
360bb61d86 | ||
|
|
847e551f39 | ||
|
|
d4122504a2 | ||
|
|
2c4226c42b | ||
|
|
86173db853 | ||
|
|
9034c56c6c | ||
|
|
e33ffaca12 | ||
|
|
853eae51e0 | ||
|
|
b4be380889 | ||
|
|
ff80280b01 | ||
|
|
e45641bd17 | ||
|
|
d5a37b0293 | ||
|
|
6819050722 | ||
|
|
88db4e6b9e | ||
|
|
be86dd85e4 | ||
|
|
3df9357103 | ||
|
|
992e92a46e | ||
|
|
3247812e34 | ||
|
|
a5cdb7d5bd | ||
|
|
4a6bb116c4 | ||
|
|
2819ffb520 | ||
|
|
964c7e8f6d | ||
|
|
f6a45ac5ac | ||
|
|
2e86f0d8d7 | ||
|
|
e2a29d49ca | ||
|
|
b99674103d | ||
|
|
41f81a0143 | ||
|
|
36309aa2be | ||
|
|
eb9d8d8cd4 | ||
|
|
f7ccba3edf | ||
|
|
eb77ebe26c | ||
|
|
f5e2354c9d | ||
|
|
f4cc56f494 | ||
|
|
be86c7fc87 | ||
|
|
6205171362 | ||
|
|
ab568a17cf | ||
|
|
fe591284be | ||
|
|
7122aafce5 | ||
|
|
5ffba305c8 | ||
|
|
ceee538af5 | ||
|
|
054307e7ed | ||
|
|
8cd358bef8 | ||
|
|
eeb9cdfc94 | ||
|
|
16fe5f8b50 | ||
|
|
041e7f2eee | ||
|
|
ab12438030 | ||
|
|
c220e58f9e | ||
|
|
6bd05ad472 | ||
|
|
90ec4c0af0 | ||
|
|
52e9196d7e | ||
|
|
f7e85c371e | ||
|
|
f5cbf8fbe1 | ||
|
|
7d7e640e0b | ||
|
|
e4f0e40eac | ||
|
|
6e3bc4f073 | ||
|
|
c36e936b60 | ||
|
|
761ffa729f | ||
|
|
1e26a8baed | ||
|
|
7c337e00d2 | ||
|
|
7e8481afd1 | ||
|
|
1266cec2fe | ||
|
|
3667a6f5b3 | ||
|
|
deb21fbae9 | ||
|
|
057039f782 | ||
|
|
d7c738a09a | ||
|
|
a981e2adbc | ||
|
|
88fce8539f | ||
|
|
4f1aa191b3 | ||
|
|
e540d1cd77 | ||
|
|
fd47c36136 | ||
|
|
d9f5f07e28 | ||
|
|
b31db9ee96 | ||
|
|
1021f9aa5e | ||
|
|
320bfc1be7 | ||
|
|
b820455c6e | ||
|
|
5c4436c977 | ||
|
|
a78a03744d | ||
|
|
a329fdde51 | ||
|
|
31d3c84422 | ||
|
|
afff52a3ba | ||
|
|
8931b30d84 | ||
|
|
27dc105f51 | ||
|
|
3964038fe6 | ||
|
|
b510d77535 | ||
|
|
56c7754cab | ||
|
|
92e2c81aff | ||
|
|
a70a49a018 | ||
|
|
61b05a0025 | ||
|
|
7c9882eb24 | ||
|
|
0d7f6fc76a | ||
|
|
a9e96d724d | ||
|
|
d9e427f09c | ||
|
|
a23e3dbee1 | ||
|
|
400ca0e467 | ||
|
|
9536b85c07 | ||
|
|
4d318c79b2 | ||
|
|
1ad90a916b | ||
|
|
8ab9025e31 | ||
|
|
9e5df8e448 | ||
|
|
96d13fe62b | ||
|
|
089458b096 | ||
|
|
7c1722c60d | ||
|
|
c020c3213e | ||
|
|
930875ef77 | ||
|
|
3b979c5450 | ||
|
|
339ad7ce73 | ||
|
|
676517e08e | ||
|
|
52108cecc0 | ||
|
|
addd641f3a | ||
|
|
f63e4be392 | ||
|
|
ca55d11f84 | ||
|
|
abe7f8b457 | ||
|
|
a078befcbe | ||
|
|
f12797a447 | ||
|
|
fa8e921f66 | ||
|
|
4287ade5b4 | ||
|
|
7398053149 | ||
|
|
4d1f3f7a6c | ||
|
|
aff686df91 | ||
|
|
637f90621d | ||
|
|
6d0624aca3 | ||
|
|
085ea80371 | ||
|
|
ab0ff06205 | ||
|
|
79eeb47031 | ||
|
|
9911b7496f | ||
|
|
3dbd453f41 | ||
|
|
731339627f | ||
|
|
26e71a1850 | ||
|
|
db01bad30f | ||
|
|
6ff28e017d | ||
|
|
4664eb5230 | ||
|
|
744ecaa5b6 | ||
|
|
76d761ccd3 | ||
|
|
eef0c1f34c | ||
|
|
82a2431327 | ||
|
|
96fc37f145 | ||
|
|
3a87756fed | ||
|
|
c8ec4a1b0b | ||
|
|
699e1a3a82 | ||
|
|
64214a2183 | ||
|
|
0fcb905b0d | ||
|
|
4be63cfb55 | ||
|
|
ca64056836 | ||
|
|
df77428443 | ||
|
|
3e583572b3 | ||
|
|
43d8f27dca | ||
|
|
b045299113 | ||
|
|
13baedc55b | ||
|
|
9400d9ac83 | ||
|
|
341e18b497 | ||
|
|
339a1820fd | ||
|
|
cec2538ca9 | ||
|
|
28f7e60d47 | ||
|
|
544b82e493 | ||
|
|
8789af8db8 | ||
|
|
1ad6a1b5e9 | ||
|
|
6e150083bb | ||
|
|
98d8baabbd | ||
|
|
c1d2e00ec5 | ||
|
|
ad8bd4ece8 | ||
|
|
2f0550c4c1 | ||
|
|
98057eba77 | ||
|
|
097f9d8c52 | ||
|
|
60447e59ef | ||
|
|
94e6ae7a69 | ||
|
|
f670738987 | ||
|
|
b6a338cb29 | ||
|
|
4726fcfc25 | ||
|
|
15bd07e923 | ||
|
|
fdf355878c | ||
|
|
da989402f2 | ||
|
|
10f0c85cfc | ||
|
|
70ba4ee5d5 | ||
|
|
31f528b15d | ||
|
|
86140095b5 | ||
|
|
8e1d3ba50e | ||
|
|
37210fe7e2 | ||
|
|
0e1dba934f | ||
|
|
11d01d371f | ||
|
|
76c3ef7446 | ||
|
|
659f7f3168 | ||
|
|
3d3bf9c730 | ||
|
|
4017e8706c | ||
|
|
3ce54f35b3 | ||
|
|
ebc06fba67 | ||
|
|
e979c039f9 | ||
|
|
90acf770b5 | ||
|
|
0d89e45690 | ||
|
|
1948c7e6dd | ||
|
|
a6db6a0070 | ||
|
|
fdb2fe6dc2 | ||
|
|
a2115c5d17 | ||
|
|
4fe55663df | ||
|
|
ae1552ee99 | ||
|
|
debf380122 | ||
|
|
ddb038d349 | ||
|
|
b7cc9dffac | ||
|
|
e1b81fed33 | ||
|
|
5d58f1bbfe | ||
|
|
fcd1cb666c | ||
|
|
4f19a9cb9f | ||
|
|
0023adb47a | ||
|
|
81fe8dcfe1 | ||
|
|
d527834a1d | ||
|
|
89c333e3e5 | ||
|
|
0d97d00b6c | ||
|
|
e7adda52b3 | ||
|
|
7432d073af | ||
|
|
04e2ab2c02 | ||
|
|
b7fcc08976 | ||
|
|
7722e53f12 | ||
|
|
2c3ee16272 | ||
|
|
19112771d6 | ||
|
|
4c7c5ff667 | ||
|
|
d7e915616d | ||
|
|
67c8e7f414 | ||
|
|
74eb3e0914 | ||
|
|
79fe664f19 | ||
|
|
5f0477f47b | ||
|
|
7bbce69721 | ||
|
|
870d6541f2 | ||
|
|
02c27b113c | ||
|
|
86d4bc3aea | ||
|
|
761772d7e1 | ||
|
|
54ef01b54b | ||
|
|
9311c4421a | ||
|
|
aaa4f448cf | ||
|
|
5f8b524619 | ||
|
|
08111768a2 | ||
|
|
1b827d7b6f | ||
|
|
a005fb019f | ||
|
|
b5e5760d01 | ||
|
|
cf2bc94e5c | ||
|
|
26f0cf69d3 | ||
|
|
61836c1b70 | ||
|
|
2a1b0c8d65 | ||
|
|
75a8e30f4f | ||
|
|
716b87a026 | ||
|
|
08b229e13f | ||
|
|
a529a80108 | ||
|
|
c81898cbc4 | ||
|
|
330591fdfc | ||
|
|
c7503f5240 | ||
|
|
eff371c866 | ||
|
|
8dc899dee4 | ||
|
|
cc3d7bd0fc | ||
|
|
7df4c86bdd | ||
|
|
c313e32a8b | ||
|
|
77519b51db | ||
|
|
1a01868e35 | ||
|
|
563d3e5948 | ||
|
|
1187ee7dad | ||
|
|
7c5921e736 | ||
|
|
399f94bfb4 | ||
|
|
1fa29843fa | ||
|
|
ee0449b17c | ||
|
|
e28eddc51f | ||
|
|
d82a612a90 | ||
|
|
e7e8f4b333 | ||
|
|
a6fbcb4220 | ||
|
|
8164032a2e | ||
|
|
a5804a750b | ||
|
|
81025661a9 | ||
|
|
4ece7eb6f4 | ||
|
|
0bb01b7df0 | ||
|
|
1c56e95e28 | ||
|
|
446124a258 | ||
|
|
583b0b67ab | ||
|
|
584502d4a0 | ||
|
|
d8803d5ae6 | ||
|
|
acfb4b5b9f | ||
|
|
0ddd3ea217 | ||
|
|
6a8517f274 | ||
|
|
94d511cdbd | ||
|
|
ec5d747328 | ||
|
|
c6880b2533 | ||
|
|
eb6eb3e630 | ||
|
|
ae4eb3c9ac | ||
|
|
ba0e826d83 | ||
|
|
f3fef74b09 | ||
|
|
014f62b649 | ||
|
|
55eab3b74b | ||
|
|
dc0fcb98df | ||
|
|
d24a9c8f5a | ||
|
|
42fe218b9f | ||
|
|
956006b741 | ||
|
|
167066fed4 | ||
|
|
525de5d335 | ||
|
|
367eb1f125 | ||
|
|
3444961787 | ||
|
|
710069c19e | ||
|
|
ddd3a617ca | ||
|
|
6434abbfc6 | ||
|
|
e45c100762 | ||
|
|
5a22a8e7f9 | ||
|
|
d6c764573c | ||
|
|
9d35d08ab6 | ||
|
|
f7b61702a0 | ||
|
|
983180bb8b | ||
|
|
cdb0392159 | ||
|
|
1891f5b395 | ||
|
|
a3963619f6 | ||
|
|
34994068a4 | ||
|
|
afaad0ada6 | ||
|
|
05f9cb3b77 | ||
|
|
1988a456a7 | ||
|
|
69216cc5a5 | ||
|
|
2cf6fa4c8b | ||
|
|
a61710b868 | ||
|
|
20f7563f3d | ||
|
|
3df2eff4bd | ||
|
|
a415ebd026 | ||
|
|
52ee3d01ae | ||
|
|
e59f992be6 | ||
|
|
8bae7722a2 | ||
|
|
0d7dba92c8 | ||
|
|
ce1390aedc | ||
|
|
287a9ee76e | ||
|
|
96b0f6c16d | ||
|
|
e1612ea59d | ||
|
|
71f4ea44eb | ||
|
|
35295bdbee | ||
|
|
aa8d6f3e86 | ||
|
|
62aa5dd415 | ||
|
|
673c55a2fe | ||
|
|
949ce10e88 | ||
|
|
8dee823e61 | ||
|
|
5d86336746 | ||
|
|
5b89f78a89 | ||
|
|
85a5668dba | ||
|
|
c943ca5404 | ||
|
|
1c7f8707fd | ||
|
|
a21c46e70b | ||
|
|
f3c26535ad | ||
|
|
2329694222 | ||
|
|
206a975752 | ||
|
|
9677bf0f30 | ||
|
|
6d6496ed52 | ||
|
|
7d9cf7c0bb | ||
|
|
55525742f4 | ||
|
|
c693b5a55c | ||
|
|
6b6443dead | ||
|
|
54b5fd537f | ||
|
|
0b99d4f1d1 | ||
|
|
3c07d3a3d3 | ||
|
|
1d1a64653c | ||
|
|
297e6f1917 | ||
|
|
b948e2c59e | ||
|
|
18096abb29 | ||
|
|
0aa08a2e34 | ||
|
|
f20af72312 | ||
|
|
7ef643360d | ||
|
|
76c828c627 | ||
|
|
281cfff026 | ||
|
|
64a5c5d1be | ||
|
|
7b8b797375 | ||
|
|
a1a382dbc9 | ||
|
|
19f6c524bf | ||
|
|
8dbdf6314c | ||
|
|
9c54e18bf0 | ||
|
|
9aba74e55a | ||
|
|
e4317d2031 | ||
|
|
61775daf00 | ||
|
|
86d8f3ee19 | ||
|
|
cb1fbf9f63 | ||
|
|
3005764c18 | ||
|
|
b1e8b4e65d | ||
|
|
c6149e2f02 | ||
|
|
aa5c99fa01 | ||
|
|
9c200f5471 | ||
|
|
ec06417d52 | ||
|
|
a4346646f1 | ||
|
|
a70c09e2a2 | ||
|
|
0f9e0abbee | ||
|
|
e77dbf325f | ||
|
|
f03620ea15 | ||
|
|
47b2e238e5 | ||
|
|
ad35cdac74 | ||
|
|
4eba5d8c86 | ||
|
|
e69adea539 | ||
|
|
9660cbcd6b | ||
|
|
9c9c83ccb9 | ||
|
|
1d42fb5f4a | ||
|
|
e119769480 | ||
|
|
b2dba9bf1f | ||
|
|
932cc129ee | ||
|
|
1a42839ba7 | ||
|
|
232a938c75 | ||
|
|
69ab085290 | ||
|
|
5f09d0ecc2 | ||
|
|
76b46e7707 | ||
|
|
6217896145 | ||
|
|
ee7ca0941a | ||
|
|
f8492ffeaa | ||
|
|
308595638a | ||
|
|
0bd8d6e2e1 | ||
|
|
160065c5bb | ||
|
|
ae0d6e3e36 | ||
|
|
6fa8a01c72 | ||
|
|
3f6916cf29 | ||
|
|
a4470ae7b2 | ||
|
|
251718e4c1 | ||
|
|
c504a5e783 | ||
|
|
f6fb2c95ef | ||
|
|
708311267a | ||
|
|
cdd1d7a618 | ||
|
|
2f324768b2 | ||
|
|
6ef18c21c9 | ||
|
|
b38c0add30 | ||
|
|
b900df5258 | ||
|
|
a2a54ffc5f | ||
|
|
20c04a13e6 | ||
|
|
a291745eeb | ||
|
|
0862caf27e | ||
|
|
cb1bab1a04 | ||
|
|
96afc1cfd5 | ||
|
|
24a8c25ab5 | ||
|
|
d1e7d1d96c | ||
|
|
18f547734e | ||
|
|
be3b365a34 | ||
|
|
b2b2dafc28 | ||
|
|
14ab6cdd69 | ||
|
|
eeec060df0 | ||
|
|
0efb7b1eea | ||
|
|
f000f705ea | ||
|
|
2749cc1ede | ||
|
|
a44e4f2cf8 | ||
|
|
30b10f947a | ||
|
|
731c6802d7 | ||
|
|
4cfb986f27 | ||
|
|
9cfc8a9d5c | ||
|
|
18327cd0e4 | ||
|
|
2022cfe07e | ||
|
|
47b71e6ee9 | ||
|
|
74633553a9 | ||
|
|
376bf1d4aa | ||
|
|
d318fb79d2 | ||
|
|
0cc361f3e7 | ||
|
|
baecb96e8a | ||
|
|
6181f5e404 | ||
|
|
d952c79a7b | ||
|
|
3dfb6b3353 | ||
|
|
48bd505c0b | ||
|
|
ab2d91bd6b | ||
|
|
3b2eead381 | ||
|
|
f3d2a9db09 | ||
|
|
8bbf6ac010 | ||
|
|
38e952e8ae | ||
|
|
fa9fed1c3a | ||
|
|
f6301f6888 | ||
|
|
44907e6064 | ||
|
|
907e99623c | ||
|
|
231671b9ff | ||
|
|
4f1a0b2c21 | ||
|
|
260c497cdd | ||
|
|
313fce7b61 | ||
|
|
2f877235a3 | ||
|
|
309fa55bbb | ||
|
|
4b8747e440 | ||
|
|
2ff7a0edef | ||
|
|
442cbb062d | ||
|
|
c971ca4c86 | ||
|
|
9babf3929b | ||
|
|
2ec0be9e77 | ||
|
|
c2d1c2d319 | ||
|
|
162f677def | ||
|
|
2875462425 | ||
|
|
a1d915990b | ||
|
|
b002265ee3 | ||
|
|
bd31fb2145 | ||
|
|
b506821d43 | ||
|
|
4bfb49b3cf | ||
|
|
9981a51e42 | ||
|
|
ebb326afe6 | ||
|
|
0d1aa74d6f | ||
|
|
0f32c841a6 | ||
|
|
41a8d5167f | ||
|
|
8f41e4fa4d | ||
|
|
de50494505 | ||
|
|
3d1def0132 | ||
|
|
0a29f5110d | ||
|
|
8b71d35458 | ||
|
|
760e353528 | ||
|
|
3627fedbea | ||
|
|
bbb5cf05db | ||
|
|
ebb01b84b8 | ||
|
|
a0d48e7e7e | ||
|
|
1fcfa22222 | ||
|
|
c9fb4e2c8d | ||
|
|
6e7ca5e1eb | ||
|
|
954b274789 | ||
|
|
0d5ac5a738 | ||
|
|
c209a35820 | ||
|
|
dd2b6750db | ||
|
|
4bb89bca9e | ||
|
|
ac63b8370e | ||
|
|
882d29dd87 | ||
|
|
ee373e7f19 | ||
|
|
8d72476e2b | ||
|
|
02756aa8ba | ||
|
|
072dfb9e4e | ||
|
|
0636c39bb1 | ||
|
|
a2e623c011 | ||
|
|
aa79dd6895 | ||
|
|
60cad2caed | ||
|
|
114c9c36b1 | ||
|
|
fd5bc65cc8 | ||
|
|
e041863905 | ||
|
|
0a05123a6c | ||
|
|
2afe316721 | ||
|
|
7e69565fe6 | ||
|
|
ccae144d62 | ||
|
|
5d5ca32fa1 | ||
|
|
52b8dad8ec | ||
|
|
cc684e330b | ||
|
|
85c6749216 | ||
|
|
30e5e8aca5 | ||
|
|
b900a6b42f | ||
|
|
15780a1ea0 | ||
|
|
92ada7cc52 | ||
|
|
53ca4761cc | ||
|
|
52cfa39716 | ||
|
|
b3bad17d1a | ||
|
|
feaaf1dbea | ||
|
|
82bf227e91 | ||
|
|
8807a2dfc4 | ||
|
|
bcb38217c4 | ||
|
|
af32f9fdda | ||
|
|
357d5de5b9 | ||
|
|
0501f02b06 | ||
|
|
689f9faba4 | ||
|
|
82686bdcaa | ||
|
|
14b1d089b6 | ||
|
|
a296239bdd | ||
|
|
0b0896cdd2 | ||
|
|
2d3e956ae0 | ||
|
|
36b7c06975 | ||
|
|
42182852f5 | ||
|
|
560b79cbff | ||
|
|
a6d799d705 | ||
|
|
64aecc6720 | ||
|
|
8ac40b4dea | ||
|
|
43b8fe1cd0 | ||
|
|
39d764ed58 | ||
|
|
a6ebe229e3 | ||
|
|
5c914f204a | ||
|
|
8876e58f34 | ||
|
|
7321a84d4c | ||
|
|
bb11c28246 | ||
|
|
8d9f136d06 | ||
|
|
00b4e083fd | ||
|
|
4cfe3df1f5 | ||
|
|
8f2d60ec26 | ||
|
|
123b23fa95 | ||
|
|
423a5d54a1 | ||
|
|
8bbf6bcf17 | ||
|
|
ea46f5e0e5 | ||
|
|
7f6c848242 | ||
|
|
559d50138f | ||
|
|
11d8cdc6ad | ||
|
|
e49978dafe | ||
|
|
e1d9e533b5 | ||
|
|
f946dd7198 | ||
|
|
1702c8c4bf | ||
|
|
afda1385bd | ||
|
|
fec38ca4ed | ||
|
|
ec1edeb5fa | ||
|
|
b0ec114685 | ||
|
|
c92da5a605 | ||
|
|
06e2dd037e | ||
|
|
34f0a19309 | ||
|
|
772e3c07b4 | ||
|
|
360ff3cf58 | ||
|
|
5dfe910023 | ||
|
|
91b73acb19 | ||
|
|
87d3af6475 | ||
|
|
98c1509f34 | ||
|
|
98939a05b6 | ||
|
|
d28134b8f3 | ||
|
|
8583eba015 | ||
|
|
5894b98f99 | ||
|
|
5de3a0ff3d | ||
|
|
10ca15f3fa | ||
|
|
da736b31b2 | ||
|
|
fa9ac569b8 | ||
|
|
10a10fb834 | ||
|
|
0f997d0dc3 | ||
|
|
b0eedd77f6 | ||
|
|
502aef5aaf | ||
|
|
9f8cfb1c62 | ||
|
|
c163b5f7a0 | ||
|
|
20da8b8f90 | ||
|
|
ae93dc13ab | ||
|
|
77e87e6148 | ||
|
|
a6e700e665 | ||
|
|
4d7aff707e | ||
|
|
d137b56a5b | ||
|
|
7806f3dd4b | ||
|
|
1e24b3a09e | ||
|
|
73b979e601 | ||
|
|
ebae8092cb | ||
|
|
2e21922eb6 | ||
|
|
1c3d2b94be | ||
|
|
48d2335d73 | ||
|
|
96ea4ae91c | ||
|
|
7af5726108 | ||
|
|
69d4646f4e | ||
|
|
8bd11f3ec2 | ||
|
|
47a9d527ab | ||
|
|
d9907c972b | ||
|
|
1444bfb2c8 | ||
|
|
14975faa60 | ||
|
|
3f12464861 | ||
|
|
de12116417 | ||
|
|
28b987aec9 | ||
|
|
fb596f3bb7 | ||
|
|
84948b39df | ||
|
|
cf32ad7fe3 | ||
|
|
ad0e439604 | ||
|
|
5456583294 | ||
|
|
f1845cbee8 | ||
|
|
51cc37b69d | ||
|
|
ff1b10dca1 | ||
|
|
ebeb17e2e0 | ||
|
|
137de5b157 | ||
|
|
224328e404 | ||
|
|
1611b9ed80 | ||
|
|
8a4af56fc6 | ||
|
|
05cfe06607 | ||
|
|
b37a68cc8f | ||
|
|
a2688c872d | ||
|
|
5b50f99e1e | ||
|
|
b8994b6130 | ||
|
|
d7917c584a | ||
|
|
544d845585 | ||
|
|
a6efc2d1b8 | ||
|
|
3189772e07 | ||
|
|
08a638237d | ||
|
|
d8cdd1567f | ||
|
|
cbfb39d1be | ||
|
|
a4d64c7f49 | ||
|
|
1e7b6c029c | ||
|
|
3634d7e97a | ||
|
|
53d7efea76 | ||
|
|
002684d693 | ||
|
|
c038b8aa56 | ||
|
|
c5f17d45c1 | ||
|
|
31439046e0 | ||
|
|
11d0ebc841 | ||
|
|
cecfdbf72d | ||
|
|
f0f61f6d0d | ||
|
|
d68ff71004 | ||
|
|
591e85e928 | ||
|
|
c69ed6ea39 | ||
|
|
55a08fac68 | ||
|
|
2fc281d01f | ||
|
|
d326582cab | ||
|
|
f4c630abb3 | ||
|
|
c2cccfc585 | ||
|
|
3c5406b35c | ||
|
|
5e3225cc44 | ||
|
|
61118caa86 | ||
|
|
348be7ec60 | ||
|
|
3ff55e9680 | ||
|
|
cbb92dfaf0 | ||
|
|
019bfef899 | ||
|
|
0709249f4c | ||
|
|
89c9c66736 | ||
|
|
347ed3b93c | ||
|
|
5b73c3609b | ||
|
|
eebeb52b29 | ||
|
|
6ec6cfc767 | ||
|
|
44181ea836 | ||
|
|
c80c7bf999 | ||
|
|
ffa5ebf3f4 | ||
|
|
926c41bd29 | ||
|
|
1182301ca7 | ||
|
|
010fa0b331 | ||
|
|
4ca7d975af | ||
|
|
b774111020 | ||
|
|
78260d890b | ||
|
|
4b67fefe5a | ||
|
|
3a8012cbf2 | ||
|
|
a53cdc5b08 | ||
|
|
5d20c4fb35 | ||
|
|
a04549cc75 | ||
|
|
bc7535bc7f | ||
|
|
83357f047d | ||
|
|
b6699c3f07 | ||
|
|
016bc5ceb3 | ||
|
|
ed65f7dc34 | ||
|
|
4d50a2b4d6 | ||
|
|
7f4301668f | ||
|
|
29a1bb07e5 | ||
|
|
99e9a90081 | ||
|
|
715020e334 | ||
|
|
2952886010 | ||
|
|
613e7d2a65 | ||
|
|
6a2c471077 | ||
|
|
b79aa05e3b | ||
|
|
500b5a181d | ||
|
|
2b8a5406f9 | ||
|
|
2f35ae90fe | ||
|
|
0fca32a7aa | ||
|
|
02c9b66a6c | ||
|
|
539d4c1030 | ||
|
|
aa6d1a0c19 | ||
|
|
777c47acbe | ||
|
|
5776c3c4c6 | ||
|
|
0c3d346cb7 | ||
|
|
1c23bc5670 | ||
|
|
8ea975d070 | ||
|
|
6c69aa532e | ||
|
|
6264c9b2a9 | ||
|
|
fc92414273 | ||
|
|
53154d71c3 | ||
|
|
8cebec9802 | ||
|
|
0209d1605d | ||
|
|
c8a0d0aaf9 | ||
|
|
0cc46efa09 | ||
|
|
22c268e6c9 | ||
|
|
dd0514e2cc | ||
|
|
f6e7d01450 | ||
|
|
edc540211c | ||
|
|
2eed3a3cc8 | ||
|
|
1aa44cc797 | ||
|
|
37c8fd0eba | ||
|
|
786aa98da1 | ||
|
|
413e0853d7 | ||
|
|
8e4560c42f | ||
|
|
450ea83495 | ||
|
|
af8c1d81a3 | ||
|
|
b589427941 | ||
|
|
f0fa285f75 | ||
|
|
a0b5b07010 | ||
|
|
5c95c2ac23 | ||
|
|
454dbbc593 | ||
|
|
c1c6c0bf45 | ||
|
|
dff2922aa7 | ||
|
|
f253a058d3 | ||
|
|
b3c6a33185 | ||
|
|
31780d0e26 | ||
|
|
f489ab3147 | ||
|
|
29cf84c692 | ||
|
|
e454929558 | ||
|
|
105f6a6323 | ||
|
|
8845701719 | ||
|
|
b7683e3a5d | ||
|
|
0ee2166cc5 | ||
|
|
067707e367 | ||
|
|
8211a33c7f | ||
|
|
7441052be6 | ||
|
|
90ccf05f82 | ||
|
|
112161bd33 | ||
|
|
5ba4bf35c5 | ||
|
|
aa93b18c2c | ||
|
|
ba702545fc | ||
|
|
436369100d | ||
|
|
6535bd42e6 | ||
|
|
64cee65ebc | ||
|
|
ba544377fb | ||
|
|
5165148f72 | ||
|
|
8d970ca70b | ||
|
|
383b8b8ca9 | ||
|
|
5ce60a20f2 | ||
|
|
49131a7d94 | ||
|
|
d884c5bad1 | ||
|
|
86bdc0a3ee | ||
|
|
1a4e245f3e | ||
|
|
975efcbaee | ||
|
|
90e1b1fd7d | ||
|
|
86207c1960 | ||
|
|
9c62bca11a | ||
|
|
75d61b33bc | ||
|
|
3df760b83a | ||
|
|
e34aa5a3b3 | ||
|
|
985e4c4154 | ||
|
|
9598fa8759 | ||
|
|
ac8173515a | ||
|
|
944f858021 | ||
|
|
27a3d9f9aa | ||
|
|
48fc582f66 | ||
|
|
81de1028bc | ||
|
|
850815cb6e | ||
|
|
c4e7870ac1 | ||
|
|
4584eccea0 | ||
|
|
ed3ecd801e | ||
|
|
b166f13eb5 | ||
|
|
076944d920 | ||
|
|
09e20e0bd8 | ||
|
|
a717831da4 | ||
|
|
4dfc8f1f0b | ||
|
|
5b57fe0a1e | ||
|
|
89bbe14c50 | ||
|
|
6635b48cd1 | ||
|
|
675f605d44 | ||
|
|
6a983d4287 | ||
|
|
1a159e08af | ||
|
|
dd030860c4 | ||
|
|
2d09372434 | ||
|
|
67912e0032 | ||
|
|
f3dea9a595 | ||
|
|
fb7b393278 | ||
|
|
61e5ec4b1e | ||
|
|
6f344eab03 | ||
|
|
41eacc84a0 | ||
|
|
01b8b3c7d2 | ||
|
|
8fecd4b4f1 | ||
|
|
41fc5f2dbe | ||
|
|
bcfd3d68f5 | ||
|
|
d3a6461d71 | ||
|
|
17478fdede | ||
|
|
4dca00cec8 | ||
|
|
061d774b99 | ||
|
|
20469da285 | ||
|
|
e18e3eba76 | ||
|
|
de9fcfe348 | ||
|
|
7e5b06813d | ||
|
|
1892c8bf97 | ||
|
|
5e428e7d0d | ||
|
|
c9777d2659 | ||
|
|
3aedd213a9 | ||
|
|
e0c1ea9038 | ||
|
|
6f88c6a634 | ||
|
|
58aa573ac2 | ||
|
|
0ed110b969 | ||
|
|
b28dea4e10 | ||
|
|
21f0db692d | ||
|
|
4d4e08ec1c | ||
|
|
25074d6c22 | ||
|
|
0cfc80c4c3 | ||
|
|
b8bb15fb51 | ||
|
|
994df5a248 | ||
|
|
6657b9c73a | ||
|
|
ba0d04a986 | ||
|
|
3cb9eb30d3 | ||
|
|
e0b624e20e | ||
|
|
c27309edcb | ||
|
|
3207e61222 | ||
|
|
3671233089 | ||
|
|
3a828611e9 | ||
|
|
8bdcef40e4 | ||
|
|
91c9e62123 | ||
|
|
0e3453536e | ||
|
|
eaff5a1412 | ||
|
|
216e0d5b91 | ||
|
|
0965991600 | ||
|
|
74aa1a4378 | ||
|
|
5531192151 | ||
|
|
a620626a33 | ||
|
|
f13a71c66b | ||
|
|
3ef3e07a49 | ||
|
|
76fa8f1838 | ||
|
|
f2b139ed1f | ||
|
|
a6e7fcd140 | ||
|
|
76cf3fcb43 | ||
|
|
121dd39f9f | ||
|
|
a263253545 | ||
|
|
76d6ac4b06 | ||
|
|
60f20632e2 | ||
|
|
ae519a247f | ||
|
|
8de916bcee | ||
|
|
1631d5f9b9 | ||
|
|
98c82b899e | ||
|
|
6d3a1eac3b | ||
|
|
b8f702a0af | ||
|
|
43c9825c2a | ||
|
|
fbf6643607 | ||
|
|
3f36baa9f4 | ||
|
|
b0e69a0500 | ||
|
|
856640b54f | ||
|
|
76240b3a39 | ||
|
|
34b3c72e4e | ||
|
|
c264592d69 | ||
|
|
1bd06bd0c4 | ||
|
|
9540ccdf1f | ||
|
|
98bf13c36b | ||
|
|
7e76e56387 | ||
|
|
759d8ac6ee | ||
|
|
959e8dfe06 | ||
|
|
7f57b076a6 | ||
|
|
7144c4212a | ||
|
|
399a6f0bd1 | ||
|
|
3d47929968 | ||
|
|
03919683f9 | ||
|
|
5cda6c4582 | ||
|
|
83ed49149c | ||
|
|
67d990904e | ||
|
|
f3df90b2bb | ||
|
|
11e46bd7ae | ||
|
|
c09a0318b7 | ||
|
|
fe716ba686 | ||
|
|
9a97800813 | ||
|
|
e881f6175a | ||
|
|
36e77b1059 | ||
|
|
a9c32ace06 | ||
|
|
2c5d4daac5 | ||
|
|
b46343583c | ||
|
|
816c2b5a79 | ||
|
|
a78568b7e9 | ||
|
|
ee5b2a1e51 | ||
|
|
e4b21c74fc | ||
|
|
4edcb93dca | ||
|
|
15f80eea31 | ||
|
|
81cebb8b79 | ||
|
|
a4e75b3dfd | ||
|
|
cddaba8ede | ||
|
|
49c5f38d3d | ||
|
|
f8296228f1 | ||
|
|
930b0c4b8a | ||
|
|
3d153f7985 | ||
|
|
ee1d9ec019 | ||
|
|
614b448a67 | ||
|
|
a19c9f179d | ||
|
|
a784b943c1 | ||
|
|
d202709808 | ||
|
|
51ff0abb05 | ||
|
|
492a9e2415 | ||
|
|
7bf7333d68 | ||
|
|
c20276e4ae | ||
|
|
9ca7047d71 | ||
|
|
ba3b2f1538 | ||
|
|
b010b7c434 | ||
|
|
9dc17a2536 | ||
|
|
5950bf7943 | ||
|
|
4141c803d8 | ||
|
|
ba1ba5f0fb | ||
|
|
51aa7bd321 | ||
|
|
09b88a4a55 | ||
|
|
f3481ca28f | ||
|
|
ba30bad57b | ||
|
|
ffb1ac674c | ||
|
|
3be34589e8 | ||
|
|
d87e615209 | ||
|
|
92511cff48 | ||
|
|
7b82159865 | ||
|
|
52c11dce31 | ||
|
|
3ba0885a3e | ||
|
|
023c9d8dd5 | ||
|
|
4c97a04e2e | ||
|
|
fb05e1cdf6 | ||
|
|
ceb4678956 | ||
|
|
0cb8499b73 | ||
|
|
4d62ec32e0 | ||
|
|
75ef718820 | ||
|
|
c927df3fa1 | ||
|
|
4700aea951 | ||
|
|
60cdb821db | ||
|
|
0ef888cd3e | ||
|
|
26c777d516 | ||
|
|
9555339007 | ||
|
|
2fbe371f53 | ||
|
|
15181d7811 | ||
|
|
1edba2110f | ||
|
|
54d853ebc3 | ||
|
|
f5cda4cbb1 | ||
|
|
f9a6348a53 | ||
|
|
a7ffd9d19c | ||
|
|
29db322e8f | ||
|
|
25dc89eb9b | ||
|
|
716630c0eb | ||
|
|
4f59b6587f | ||
|
|
9befdf1d20 | ||
|
|
75d44c0452 | ||
|
|
a58a636838 | ||
|
|
9fdab72dd7 | ||
|
|
b2a97be7f4 | ||
|
|
6471c9f478 | ||
|
|
4a3dc3c0e3 | ||
|
|
a2318e86bd | ||
|
|
a9164153d1 | ||
|
|
8795d38906 | ||
|
|
8cd44e3630 | ||
|
|
07e970c7e6 | ||
|
|
d1aa0d38c5 | ||
|
|
9e4d0f0be2 | ||
|
|
cd7638980a | ||
|
|
f733a5ef0e | ||
|
|
5da98aa687 | ||
|
|
0b6f3c66cd | ||
|
|
a01d9ac558 | ||
|
|
e46691a0bc | ||
|
|
732a40e107 | ||
|
|
29da3ade3c | ||
|
|
de908d6319 | ||
|
|
9c9c98ad2e | ||
|
|
5e0e9fce5d | ||
|
|
53ec8809cf | ||
|
|
863779065e | ||
|
|
0b33dac310 | ||
|
|
e2bce37720 | ||
|
|
228b4e426b | ||
|
|
a4974de937 | ||
|
|
22f41c9b99 | ||
|
|
a123c552cd | ||
|
|
b2172f4f8e | ||
|
|
dc1d1b6934 | ||
|
|
67475a7ed7 | ||
|
|
362ab3e4f9 | ||
|
|
2aed84d16b | ||
|
|
5deea1c015 | ||
|
|
99516f81b1 | ||
|
|
d6091d5a39 | ||
|
|
5a47825ece | ||
|
|
16f66ae794 | ||
|
|
7ce1d9e9a6 | ||
|
|
a70183bc80 | ||
|
|
332737217a | ||
|
|
bcbe37b716 | ||
|
|
f393b7449d | ||
|
|
531308d929 | ||
|
|
74e564cd46 | ||
|
|
42eae426df | ||
|
|
246e09319c | ||
|
|
f7a3296d8c | ||
|
|
3e4585c8fd | ||
|
|
3e84b6e15f | ||
|
|
d505d1ef4a | ||
|
|
70b2ae3edf | ||
|
|
9e5dba197c | ||
|
|
a61114c38b | ||
|
|
db98bbc114 | ||
|
|
e42633140e | ||
|
|
bd50e31325 | ||
|
|
b2c0518e6a | ||
|
|
d82e2718e2 | ||
|
|
18e377b4ff | ||
|
|
043b2e9c2e | ||
|
|
1b593194be | ||
|
|
35208f368c | ||
|
|
c788e59365 | ||
|
|
cb08f4a6a3 | ||
|
|
adbc603d24 | ||
|
|
6f81892e6b | ||
|
|
448be74335 | ||
|
|
1a5a1a93f6 | ||
|
|
d917188a46 | ||
|
|
b4e88ccb28 | ||
|
|
d916ba1ba1 | ||
|
|
33af4421f2 | ||
|
|
95e362c6da | ||
|
|
c58d983e3b | ||
|
|
a84c9d1ed9 | ||
|
|
c6a27f0178 | ||
|
|
67b6f1ca88 | ||
|
|
a4ff392503 | ||
|
|
40f51f506c | ||
|
|
eeb821f707 | ||
|
|
47d5566646 | ||
|
|
90bdfd97a6 | ||
|
|
b9865f110e | ||
|
|
07ef612968 | ||
|
|
019fdc7850 | ||
|
|
7c382796be | ||
|
|
b6acb8d0de | ||
|
|
6adbcb9755 | ||
|
|
e968089485 | ||
|
|
c2cd422ac6 | ||
|
|
36ca4ba63d | ||
|
|
ed4a1d12b9 | ||
|
|
a0aa8b4b61 | ||
|
|
2c059d58d9 | ||
|
|
cd346d3e22 | ||
|
|
561d93aa00 | ||
|
|
ddac197404 | ||
|
|
0e8e6f19b2 | ||
|
|
c03e4f9bf0 | ||
|
|
c3bb1f8166 | ||
|
|
959a7201b8 | ||
|
|
6c73d01142 | ||
|
|
2932ad5677 | ||
|
|
036bbcc53f | ||
|
|
6384e46da3 | ||
|
|
6e2fcc44bd | ||
|
|
8721fc2d0b | ||
|
|
c1facbb681 | ||
|
|
f2c33fa6fd | ||
|
|
5aae935038 | ||
|
|
11503177d1 | ||
|
|
9ab899a660 | ||
|
|
8937a13e0c | ||
|
|
19017d4061 | ||
|
|
f53ac639c6 | ||
|
|
f71165b556 | ||
|
|
350a404cb8 | ||
|
|
827c55741b | ||
|
|
e0c8c08936 | ||
|
|
4e397d07ea | ||
|
|
9eb8794149 | ||
|
|
dc24110311 | ||
|
|
b3e72fc37f | ||
|
|
90076b96df | ||
|
|
9c339a7227 | ||
|
|
e7a8b47f1a | ||
|
|
7ac7a4bc37 | ||
|
|
a628901dda | ||
|
|
2ab75dee27 | ||
|
|
a3f586cdab | ||
|
|
fcfd87168a | ||
|
|
95a0e8ab31 | ||
|
|
0c9caf04de | ||
|
|
21e8bbf290 | ||
|
|
3b408d83fe | ||
|
|
8573552e8c | ||
|
|
c7235be6e3 | ||
|
|
1c17d91c53 | ||
|
|
a070f0dac5 | ||
|
|
b480283c56 | ||
|
|
f5ce5e1465 | ||
|
|
d7db77a0cb | ||
|
|
346ac30120 | ||
|
|
07bb51b6b4 | ||
|
|
bbab9b61dd | ||
|
|
82e8372f17 | ||
|
|
e67ed82877 | ||
|
|
15ac971681 | ||
|
|
0c21e13012 | ||
|
|
d5fd72fd0d | ||
|
|
c7474d077b | ||
|
|
826b52d26f | ||
|
|
8c5a2bd6bb | ||
|
|
25a58453ff | ||
|
|
00fe865dbe | ||
|
|
9e9bececa9 | ||
|
|
90890074b0 | ||
|
|
31676a3540 | ||
|
|
6b9e941ee3 | ||
|
|
802d7fa6d5 | ||
|
|
3798cb8182 | ||
|
|
2c5fadbce3 | ||
|
|
58ece83395 | ||
|
|
c75c096aa8 | ||
|
|
ab961dc8b0 | ||
|
|
6ad47e83b4 | ||
|
|
241520e66d | ||
|
|
a13c20f603 | ||
|
|
db6251ad54 | ||
|
|
51eb1b81f6 | ||
|
|
2adc42e43e | ||
|
|
52cc46a237 | ||
|
|
a07b4dc038 | ||
|
|
739a543ea8 | ||
|
|
01c76c6606 | ||
|
|
d32f888db1 | ||
|
|
f7914dbf9a | ||
|
|
3ff94a009b | ||
|
|
1aeb3da83f | ||
|
|
e8e5b46e2b | ||
|
|
c9d67d4ddf | ||
|
|
8de5b7f548 | ||
|
|
9ee0f7b7e0 | ||
|
|
f1fd4544a3 | ||
|
|
349eb12fd5 | ||
|
|
6a8f17de1e | ||
|
|
b1277b9902 | ||
|
|
ed3883d21b | ||
|
|
ea558241e0 | ||
|
|
61aa2134a4 | ||
|
|
4eb76e2397 | ||
|
|
68e575362f | ||
|
|
aab3bb04cf | ||
|
|
481d81cb76 | ||
|
|
c6cb42e4fb | ||
|
|
2d43a89488 | ||
|
|
302ea8c260 | ||
|
|
a1f3462bc0 | ||
|
|
7476f3ac3b | ||
|
|
68b64fb610 | ||
|
|
34b537ee66 | ||
|
|
7a5dbeb782 | ||
|
|
6c06918ede | ||
|
|
ee8f293701 | ||
|
|
3b4a0225e2 | ||
|
|
c8e1edaae5 | ||
|
|
63d3fc9106 | ||
|
|
5d7324e42d | ||
|
|
be7b4458f2 | ||
|
|
7304956e39 | ||
|
|
c510eec090 | ||
|
|
1b167a4343 | ||
|
|
9ab5170197 | ||
|
|
a00e414faf | ||
|
|
4c5e19b6c6 | ||
|
|
ed26604a71 | ||
|
|
0fbd4bf044 | ||
|
|
d719e60cb4 | ||
|
|
0cb9d93d0c | ||
|
|
f5826b8014 | ||
|
|
4a47f55639 | ||
|
|
b884556ed8 | ||
|
|
c06b0f3d5e | ||
|
|
68ea60683a | ||
|
|
6df8c74d5b | ||
|
|
877e8e970c | ||
|
|
d56349a2aa | ||
|
|
67c03ff185 | ||
|
|
35e00cc2d8 | ||
|
|
064f6cb6f2 | ||
|
|
20ab8b4b41 | ||
|
|
7395d852c3 | ||
|
|
3ebf898e88 | ||
|
|
a4c886e4c8 | ||
|
|
1291dfdead | ||
|
|
df278aff3e | ||
|
|
7c510d6f43 | ||
|
|
7bbcb2f690 | ||
|
|
ad2695b1b7 | ||
|
|
9cbf062a70 | ||
|
|
ec645d9017 | ||
|
|
0d894c9dbe | ||
|
|
c6709b89c4 | ||
|
|
061bebc0d8 | ||
|
|
802e1d692b | ||
|
|
dbf33b344c | ||
|
|
b40228a61d | ||
|
|
da5a0e8722 | ||
|
|
200fc02848 | ||
|
|
7096217d39 | ||
|
|
f1eb83a013 | ||
|
|
fec82dbc86 | ||
|
|
7b1b47a8e6 | ||
|
|
8b9afce53a | ||
|
|
137db78b46 | ||
|
|
a3344c8e5e | ||
|
|
c173d09c56 | ||
|
|
cb49a3cfa1 | ||
|
|
adab80053d | ||
|
|
f106fb85d4 | ||
|
|
5fa6d850a2 | ||
|
|
4adfe93cc5 | ||
|
|
d1593e6b15 | ||
|
|
a53cb070e3 | ||
|
|
452ae49db5 | ||
|
|
8c5c5b6517 | ||
|
|
6f44d4d247 | ||
|
|
d804f86b88 | ||
|
|
8dee9f844f | ||
|
|
963ba10012 | ||
|
|
07645deeb8 | ||
|
|
c52c82ffc1 | ||
|
|
d6a03a23a8 | ||
|
|
e347b0da2b | ||
|
|
52b1fbbd99 | ||
|
|
65613f23ba | ||
|
|
4f92a764f1 | ||
|
|
6a3a7f3076 | ||
|
|
63d3a9c5ea | ||
|
|
2c730f6fc2 | ||
|
|
df8dae1df4 | ||
|
|
2e9f1bf0e1 | ||
|
|
b1e0ccbaa8 | ||
|
|
bd2abcae37 | ||
|
|
f1fbd4c7d1 | ||
|
|
eed22ac4ac | ||
|
|
176a614899 | ||
|
|
f858d222f2 | ||
|
|
16094305bc | ||
|
|
fbf002bb88 | ||
|
|
9135fddb0e | ||
|
|
d88fcf73f1 | ||
|
|
a950f28762 | ||
|
|
c629204688 | ||
|
|
e22f63f231 | ||
|
|
d256b95768 | ||
|
|
f530138876 | ||
|
|
0a39d8f207 | ||
|
|
6852d1d8c3 | ||
|
|
a1ad253f17 | ||
|
|
ffa101872f | ||
|
|
4d24b4c466 | ||
|
|
474b8a9716 | ||
|
|
53261831f1 | ||
|
|
49e3c9d8e6 | ||
|
|
1715e4885a | ||
|
|
eff7cb41d1 | ||
|
|
7a6f825f0f | ||
|
|
29afd31dd1 | ||
|
|
d86b0f1f5f | ||
|
|
998ac55e19 | ||
|
|
d6f25d70f1 | ||
|
|
b02da8eb50 | ||
|
|
2f52a41054 | ||
|
|
99c675b2f7 | ||
|
|
72dce7685e | ||
|
|
ee8836c442 | ||
|
|
a1006c373d | ||
|
|
755c5b3330 | ||
|
|
ce6aa1e496 | ||
|
|
6c1fc273f3 | ||
|
|
aa8b03b415 | ||
|
|
96ec4abd07 | ||
|
|
70532b7d6b | ||
|
|
a4d729f31d | ||
|
|
fcbc5a3fdd | ||
|
|
8c0ceb17a2 | ||
|
|
c2012f9b82 | ||
|
|
aa2be094ae | ||
|
|
4d524040bc | ||
|
|
0fe120ba25 | ||
|
|
2e7aa150f7 | ||
|
|
04fac37311 | ||
|
|
bcb43bb358 | ||
|
|
89ec4332ec | ||
|
|
34736de4c0 | ||
|
|
5f50d597f2 | ||
|
|
df94f187b9 | ||
|
|
b92c0df834 | ||
|
|
d357be38b9 | ||
|
|
912e296070 | ||
|
|
35593b33f4 | ||
|
|
54f3d200d3 | ||
|
|
3f67e11fab | ||
|
|
c1de1a190d | ||
|
|
566dda07ba | ||
|
|
7a2f4cbfe8 | ||
|
|
5ac7bde7c9 | ||
|
|
9b4eab501a | ||
|
|
ca04d7a208 | ||
|
|
40a3c12305 | ||
|
|
3001a770ed | ||
|
|
2608383c5e | ||
|
|
3d6312e807 | ||
|
|
22cd982566 | ||
|
|
682b112abc | ||
|
|
e738280547 | ||
|
|
8265328def | ||
|
|
231b98a5e1 | ||
|
|
13e4670c29 | ||
|
|
d08b6b44ba | ||
|
|
09b6c2ef15 | ||
|
|
cc29c1204b | ||
|
|
94c00f3d4d | ||
|
|
3c2b73672e | ||
|
|
23acb0eeb2 | ||
|
|
bfa4b8c5ab | ||
|
|
ce75ca04b1 | ||
|
|
9dba0554a5 | ||
|
|
59947880f4 | ||
|
|
61094cf3dc | ||
|
|
6d00101e9d | ||
|
|
7a06050cd3 | ||
|
|
6f9afa68cd | ||
|
|
c038b90619 | ||
|
|
9c4fe78260 | ||
|
|
60dd08573d | ||
|
|
f5204c61fb | ||
|
|
9ddeefe39d | ||
|
|
0293371a1b | ||
|
|
dd31c6fcb0 | ||
|
|
6708df7bf0 | ||
|
|
6d9c46b811 | ||
|
|
af2c2823a7 | ||
|
|
b17ecb642b | ||
|
|
ba12070f7e | ||
|
|
29b9763d9f | ||
|
|
270da80bfa | ||
|
|
701d35d12f | ||
|
|
2238e8e477 | ||
|
|
4b08da5538 | ||
|
|
8a616a5a5f | ||
|
|
9455d430cb | ||
|
|
137023dd0c | ||
|
|
2a45408c4a | ||
|
|
9e201014f8 | ||
|
|
0c072a0b46 | ||
|
|
c11c64fbe0 | ||
|
|
f022c177db | ||
|
|
5f10073c95 | ||
|
|
33ac8b3139 | ||
|
|
244847591f | ||
|
|
5abe32d861 | ||
|
|
9194296de8 | ||
|
|
6273a91cb7 | ||
|
|
1ef7acfe92 | ||
|
|
a0156a926f | ||
|
|
96998822b5 | ||
|
|
8215e7a938 | ||
|
|
f7622f86d9 | ||
|
|
337e368239 | ||
|
|
64b6840d8d | ||
|
|
6e119bb02e | ||
|
|
2c2e46dbf5 | ||
|
|
770bc596e1 | ||
|
|
7534d131d6 | ||
|
|
7f3c9036ea | ||
|
|
725111f7cb | ||
|
|
bf3d6c0c9b | ||
|
|
b8e8ccdc79 | ||
|
|
6b80c20bdb | ||
|
|
eea374fd19 | ||
|
|
2e8879fa6e | ||
|
|
f5a07779dd | ||
|
|
c51f2d4238 | ||
|
|
45e2738585 | ||
|
|
b173acfc96 | ||
|
|
4ebb342fcd | ||
|
|
8e5ef8538a | ||
|
|
ff82bf3b07 | ||
|
|
5147c3c914 | ||
|
|
fbbbffc5a8 | ||
|
|
7cfe2a5e65 | ||
|
|
df2a346b30 | ||
|
|
270512ab12 | ||
|
|
eba63ef58b | ||
|
|
01a9792f05 | ||
|
|
0491e05833 | ||
|
|
9a1a5b8785 | ||
|
|
f3b656b246 | ||
|
|
53b38d37a9 | ||
|
|
8f2e4fdf86 | ||
|
|
11de71b04c | ||
|
|
19bd66fe74 | ||
|
|
45771abbd6 | ||
|
|
573969cd53 | ||
|
|
34be0bb1a5 | ||
|
|
2031eca588 | ||
|
|
6321c3a034 | ||
|
|
1fda6c4f8c | ||
|
|
11a4e58fc1 | ||
|
|
8a35fb3bea | ||
|
|
e85d67af9f | ||
|
|
b37fb16dcb | ||
|
|
1e1c5047f2 | ||
|
|
b2be099d16 | ||
|
|
28d8362934 | ||
|
|
01039d0bff | ||
|
|
c755c5fd8b | ||
|
|
5c8e9139d1 | ||
|
|
56defd9a98 | ||
|
|
8eb7217580 | ||
|
|
b2a9d36a7f | ||
|
|
04f15edb91 | ||
|
|
4e98a44593 | ||
|
|
1385ddbb14 | ||
|
|
7f0c65703a | ||
|
|
3a6dec8a05 | ||
|
|
209b12814f | ||
|
|
f920c5b590 | ||
|
|
05fc7018f8 | ||
|
|
a384002724 | ||
|
|
0260405c68 | ||
|
|
0537f9689c | ||
|
|
0c010a1517 | ||
|
|
0745d0892d | ||
|
|
5e64f8c44c | ||
|
|
4a5b8a5bee | ||
|
|
b3836ed3cb | ||
|
|
47738cbad7 | ||
|
|
0a882b6394 | ||
|
|
612a91110f | ||
|
|
2337eb5823 | ||
|
|
9aa9d70ddb | ||
|
|
231493c93c | ||
|
|
20a90e3a76 | ||
|
|
17a2994dbd | ||
|
|
b554eef43b | ||
|
|
0066590f98 | ||
|
|
165a28abae | ||
|
|
63999e5299 | ||
|
|
2802ec65c2 | ||
|
|
b3f56e8b38 | ||
|
|
5826e4f481 | ||
|
|
66ee67be03 | ||
|
|
a7ad2afa5e | ||
|
|
0f04379d9c | ||
|
|
7e4d335943 | ||
|
|
26c07054a1 | ||
|
|
843d9d0b39 | ||
|
|
4ac210c16a | ||
|
|
02703c74a4 | ||
|
|
ef428d5681 | ||
|
|
afbe674edb | ||
|
|
f42e6d24f2 | ||
|
|
449bd384ed | ||
|
|
3eeaab4bed | ||
|
|
57eb1d3250 | ||
|
|
b4f5e5c959 | ||
|
|
0d2848b3ba | ||
|
|
e84b663a93 | ||
|
|
d85185217b | ||
|
|
8f3bdc72d0 | ||
|
|
7d368fcbd8 | ||
|
|
2bd2cd9b78 | ||
|
|
c83101248a | ||
|
|
8d3509b937 | ||
|
|
1875e6db29 | ||
|
|
0962fbbf98 | ||
|
|
cbdac46d58 | ||
|
|
d2e0c81720 | ||
|
|
109080ae48 | ||
|
|
31efffbdba | ||
|
|
aaa5dc614f | ||
|
|
8be97c01d1 | ||
|
|
9e1a112336 | ||
|
|
4e28f13209 | ||
|
|
53a20bfd94 | ||
|
|
a28062338c | ||
|
|
1c2f1fe505 | ||
|
|
14365bd820 | ||
|
|
a51a97262d | ||
|
|
45d8574b93 | ||
|
|
417f8973ff | ||
|
|
b3b72cd92c | ||
|
|
bb00084863 | ||
|
|
db22e5faa6 | ||
|
|
55d03c3179 | ||
|
|
7e0a494f13 | ||
|
|
83e68987b3 | ||
|
|
53bb3bee34 | ||
|
|
c9edf6fe98 | ||
|
|
14cc0aaf7b | ||
|
|
2f3c39bc62 | ||
|
|
c5de8b2a27 | ||
|
|
a4022932ee | ||
|
|
0e3b6b70df | ||
|
|
c49a0aa08d | ||
|
|
5503b6a352 | ||
|
|
60021d9165 | ||
|
|
97b708910a | ||
|
|
2f6ebed1dc | ||
|
|
156f657209 | ||
|
|
816f74d1c7 | ||
|
|
ec14c80c7c | ||
|
|
543b4ecc13 | ||
|
|
1110cea007 | ||
|
|
0ed64ce310 | ||
|
|
0e441bc2be | ||
|
|
d996a9af2b | ||
|
|
ab6cf1b8a2 | ||
|
|
c25f2f1cbf | ||
|
|
62526671e9 | ||
|
|
88ebf53577 | ||
|
|
a41b0aade2 | ||
|
|
02c31fa461 | ||
|
|
5df70a9e21 | ||
|
|
cbe52c3166 | ||
|
|
7858cc03da | ||
|
|
bbada33271 | ||
|
|
f5d51a9362 | ||
|
|
0fc6b2c9e2 | ||
|
|
7a5ad5d5a1 | ||
|
|
44eff497e8 | ||
|
|
8b452002e8 | ||
|
|
e442c36252 | ||
|
|
50ec3951dc | ||
|
|
11cd239707 | ||
|
|
f6098f2dda | ||
|
|
857c6092b6 | ||
|
|
eef468e330 | ||
|
|
4bd46774bb | ||
|
|
283c3e2437 | ||
|
|
306aae6cee | ||
|
|
edb0600583 | ||
|
|
ac86d923fc | ||
|
|
fbd63d0784 | ||
|
|
78ebeee2c4 | ||
|
|
55805fd2d0 | ||
|
|
7ebd220a8f | ||
|
|
e8a1f6d190 | ||
|
|
034bae10fc | ||
|
|
a7c924c041 | ||
|
|
27b762af60 | ||
|
|
b764ab9537 | ||
|
|
a761b89d2f | ||
|
|
a136862afe | ||
|
|
f0747cd950 | ||
|
|
21ac2b964b | ||
|
|
79e1dd65ab | ||
|
|
13e393607b | ||
|
|
052ec89927 | ||
|
|
2073d95fb4 | ||
|
|
cbed917fee | ||
|
|
dffdb56b7f | ||
|
|
a78c0632ed | ||
|
|
8fa6a40be2 | ||
|
|
4b5598682a | ||
|
|
e9f5428d3a | ||
|
|
34f0b26424 | ||
|
|
cd27b13b1d | ||
|
|
3ecbd099eb | ||
|
|
e43d03e30e | ||
|
|
d1acb9b44f | ||
|
|
acd1c4b5af | ||
|
|
40808cedc1 | ||
|
|
51054a1b39 | ||
|
|
e774a3299e | ||
|
|
99febc8b9a | ||
|
|
1ce8efbdda | ||
|
|
0b0a60d861 | ||
|
|
9e5b378081 | ||
|
|
7ed876533a | ||
|
|
b2d91a6913 | ||
|
|
ce074604c4 | ||
|
|
19ac190252 | ||
|
|
02c5ddf91e | ||
|
|
1aaeaf8a3d | ||
|
|
5d6c4985d1 | ||
|
|
b615ad90c8 | ||
|
|
c7aaf3918d | ||
|
|
d51204f1b1 | ||
|
|
b3f6325988 | ||
|
|
3129acbd83 | ||
|
|
12f89d32b5 | ||
|
|
1d42741a19 | ||
|
|
88737991d2 | ||
|
|
75c00536ba | ||
|
|
63d740752f | ||
|
|
6e04afb8c5 | ||
|
|
165fca51e0 | ||
|
|
db6b4e3791 | ||
|
|
20a85e9f69 | ||
|
|
2a6144a1b6 | ||
|
|
f8bc3e1bd8 | ||
|
|
5b737a0731 | ||
|
|
6e0ef10915 | ||
|
|
7017605dce | ||
|
|
b29228836a | ||
|
|
188b05792f | ||
|
|
575901e537 | ||
|
|
2333d65880 | ||
|
|
ffd1df0579 |
@@ -1,4 +1,6 @@
|
|||||||
openssl.pc
|
openssl.pc
|
||||||
|
libcrypto.pc
|
||||||
|
libssl.pc
|
||||||
MINFO
|
MINFO
|
||||||
makefile.one
|
makefile.one
|
||||||
tmp
|
tmp
|
||||||
@@ -11,8 +13,10 @@ maketest.log
|
|||||||
cctest
|
cctest
|
||||||
cctest.c
|
cctest.c
|
||||||
cctest.a
|
cctest.a
|
||||||
libcrypto.so.*
|
|
||||||
libssl.so.*
|
|
||||||
*.flc
|
*.flc
|
||||||
semantic.cache
|
semantic.cache
|
||||||
Makefile
|
Makefile
|
||||||
|
*.dll*
|
||||||
|
*.so*
|
||||||
|
*.sl*
|
||||||
|
*.dylib*
|
||||||
|
|||||||
@@ -148,7 +148,7 @@ eric (about to go bushwalking for the 4 day easter break :-)
|
|||||||
This would tend to cause memory overwrites since SSLv3 has
|
This would tend to cause memory overwrites since SSLv3 has
|
||||||
a maximum packet size of 16k. If your program uses
|
a maximum packet size of 16k. If your program uses
|
||||||
buffers <= 16k, you would probably never see this problem.
|
buffers <= 16k, you would probably never see this problem.
|
||||||
- Fixed a new errors that were cause by malloc() not returning
|
- Fixed a few errors that were cause by malloc() not returning
|
||||||
0 initialised memory..
|
0 initialised memory..
|
||||||
- SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using
|
- SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using
|
||||||
SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing
|
SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing
|
||||||
|
|||||||
@@ -1,163 +0,0 @@
|
|||||||
This file, together with ChangeLog.0_9_7-stable_not-in-head_FIPS,
|
|
||||||
provides a collection of those CVS change log entries for the
|
|
||||||
0.9.7 branch (OpenSSL_0_9_7-stable) that do not appear similarly in
|
|
||||||
0.9.8-dev (CVS head).
|
|
||||||
|
|
||||||
ChangeLog.0_9_7-stable_not-in-head_FIPS - "FIPS" related changes
|
|
||||||
ChangeLog.0_9_7-stable_not-in-head - everything else
|
|
||||||
|
|
||||||
Some obvious false positives have been eliminated: e.g., we do not
|
|
||||||
care about a simple "make update"; and we don't care about changes
|
|
||||||
identified to the 0.9.7 branch that were explicitly identified as
|
|
||||||
backports from head.
|
|
||||||
|
|
||||||
Eliminating all other entries (and finally this file and its
|
|
||||||
compantion), either as false positives or as things that should go
|
|
||||||
into 0.9.8, remains to be done. Any additional changes to 0.9.7 that
|
|
||||||
are not immediately put into 0.9.8, but belong there as well, should
|
|
||||||
be added to the end of this file.
|
|
||||||
|
|
||||||
|
|
||||||
2002-11-04 17:33 levitte
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
Configure (1.314.2.38), "Exp", lines: +4 -2
|
|
||||||
|
|
||||||
Return my normal debug targets to something not so extreme, and
|
|
||||||
make the extreme ones special (or 'extreme', if you will :-)).
|
|
||||||
|
|
||||||
2002-12-16 19:17 appro
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/bn/bn_lcl.h (1.23.2.3), "Exp", lines: +3 -0
|
|
||||||
crypto/bn/bn_mul.c (1.28.2.4), "Exp", lines: +84 -445
|
|
||||||
|
|
||||||
This is rollback to 0.9.6h bn_mul.c to address problem reported in
|
|
||||||
RT#272.
|
|
||||||
|
|
||||||
2003-07-27 15:46 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/aes/aes.h (1.1.2.5), "Exp", lines: +3 -0
|
|
||||||
crypto/aes/aes_cfb.c (1.1.2.4), "Exp", lines: +57 -0
|
|
||||||
|
|
||||||
Add untested CFB-r mode. Will be tested soon.
|
|
||||||
|
|
||||||
2003-07-28 17:07 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
Makefile.org (1.154.2.69), "Exp", lines: +5 -1
|
|
||||||
crypto/aes/aes.h (1.1.2.6), "Exp", lines: +3 -0
|
|
||||||
crypto/aes/aes_cfb.c (1.1.2.5), "Exp", lines: +19 -0
|
|
||||||
crypto/dsa/Makefile.ssl (1.49.2.6), "Exp", lines: +3 -2
|
|
||||||
crypto/err/Makefile.ssl (1.48.2.4), "Exp", lines: +17 -16
|
|
||||||
crypto/evp/e_aes.c (1.6.2.5), "Exp", lines: +8 -0
|
|
||||||
crypto/evp/e_des.c (1.5.2.2), "Exp", lines: +1 -1
|
|
||||||
crypto/evp/e_des3.c (1.8.2.3), "Exp", lines: +2 -2
|
|
||||||
crypto/evp/evp.h (1.86.2.11), "Exp", lines: +28 -11
|
|
||||||
crypto/evp/evp_locl.h (1.7.2.3), "Exp", lines: +2 -2
|
|
||||||
crypto/objects/obj_dat.h (1.49.2.13), "Exp", lines: +10 -5
|
|
||||||
crypto/objects/obj_mac.h (1.19.2.13), "Exp", lines: +5 -0
|
|
||||||
crypto/objects/obj_mac.num (1.15.2.9), "Exp", lines: +1 -0
|
|
||||||
crypto/objects/objects.txt (1.20.2.14), "Exp", lines: +4 -0
|
|
||||||
fips/Makefile.ssl (1.1.2.3), "Exp", lines: +7 -0
|
|
||||||
fips/aes/Makefile.ssl (1.1.2.2), "Exp", lines: +23 -1
|
|
||||||
fips/aes/fips_aesavs.c (1.1.2.3), "Exp", lines: +9 -1
|
|
||||||
test/Makefile.ssl (1.84.2.30), "Exp", lines: +101 -43
|
|
||||||
|
|
||||||
Add support for partial CFB modes, make tests work, update
|
|
||||||
dependencies.
|
|
||||||
|
|
||||||
2003-07-29 12:56 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/aes/aes_cfb.c (1.1.2.6), "Exp", lines: +9 -6
|
|
||||||
crypto/evp/c_allc.c (1.8.2.3), "Exp", lines: +1 -0
|
|
||||||
crypto/evp/evp_test.c (1.14.2.11), "Exp", lines: +17 -8
|
|
||||||
crypto/evp/evptests.txt (1.9.2.2), "Exp", lines: +48 -1
|
|
||||||
|
|
||||||
Working CFB1 and test vectors.
|
|
||||||
|
|
||||||
2003-07-29 15:24 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/evp/e_aes.c (1.6.2.6), "Exp", lines: +14 -0
|
|
||||||
crypto/objects/obj_dat.h (1.49.2.14), "Exp", lines: +15 -5
|
|
||||||
crypto/objects/obj_mac.h (1.19.2.14), "Exp", lines: +10 -0
|
|
||||||
crypto/objects/obj_mac.num (1.15.2.10), "Exp", lines: +2 -0
|
|
||||||
crypto/objects/objects.txt (1.20.2.15), "Exp", lines: +2 -0
|
|
||||||
fips/aes/Makefile.ssl (1.1.2.3), "Exp", lines: +1 -1
|
|
||||||
fips/aes/fips_aesavs.c (1.1.2.4), "Exp", lines: +34 -19
|
|
||||||
|
|
||||||
The rest of the keysizes for CFB1, working AES AVS test for CFB1.
|
|
||||||
|
|
||||||
2003-07-29 19:05 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/aes/aes.h (1.1.2.7), "Exp", lines: +3 -0
|
|
||||||
crypto/aes/aes_cfb.c (1.1.2.7), "Exp", lines: +14 -0
|
|
||||||
crypto/evp/c_allc.c (1.8.2.4), "Exp", lines: +1 -0
|
|
||||||
crypto/evp/e_aes.c (1.6.2.7), "Exp", lines: +4 -9
|
|
||||||
crypto/evp/evptests.txt (1.9.2.3), "Exp", lines: +48 -0
|
|
||||||
crypto/objects/obj_dat.h (1.49.2.15), "Exp", lines: +20 -5
|
|
||||||
crypto/objects/obj_mac.h (1.19.2.15), "Exp", lines: +15 -0
|
|
||||||
crypto/objects/obj_mac.num (1.15.2.11), "Exp", lines: +3 -0
|
|
||||||
crypto/objects/objects.txt (1.20.2.16), "Exp", lines: +3 -0
|
|
||||||
fips/aes/fips_aesavs.c (1.1.2.7), "Exp", lines: +11 -0
|
|
||||||
|
|
||||||
AES CFB8.
|
|
||||||
|
|
||||||
2003-07-30 20:30 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
Makefile.org (1.154.2.70), "Exp", lines: +16 -5
|
|
||||||
crypto/des/cfb_enc.c (1.7.2.1), "Exp", lines: +2 -1
|
|
||||||
crypto/des/des_enc.c (1.11.2.2), "Exp", lines: +4 -0
|
|
||||||
crypto/evp/e_aes.c (1.6.2.8), "Exp", lines: +7 -14
|
|
||||||
crypto/evp/e_des.c (1.5.2.3), "Exp", lines: +37 -1
|
|
||||||
crypto/evp/evp.h (1.86.2.12), "Exp", lines: +6 -0
|
|
||||||
crypto/evp/evp_locl.h (1.7.2.4), "Exp", lines: +9 -0
|
|
||||||
crypto/objects/obj_dat.h (1.49.2.16), "Exp", lines: +48 -23
|
|
||||||
crypto/objects/obj_mac.h (1.19.2.16), "Exp", lines: +31 -6
|
|
||||||
crypto/objects/obj_mac.num (1.15.2.12), "Exp", lines: +5 -0
|
|
||||||
crypto/objects/objects.txt (1.20.2.17), "Exp", lines: +12 -6
|
|
||||||
fips/Makefile.ssl (1.1.2.4), "Exp", lines: +8 -1
|
|
||||||
fips/fips_make_sha1 (1.1.2.3), "Exp", lines: +3 -0
|
|
||||||
fips/aes/Makefile.ssl (1.1.2.4), "Exp", lines: +1 -1
|
|
||||||
fips/des/.cvsignore (1.1.2.1), "Exp", lines: +3 -0
|
|
||||||
fips/des/Makefile.ssl (1.1.2.1), "Exp", lines: +96 -0
|
|
||||||
fips/des/fingerprint.sha1 (1.1.2.1), "Exp", lines: +2 -0
|
|
||||||
fips/des/fips_des_enc.c (1.1.2.1), "Exp", lines: +288 -0
|
|
||||||
fips/des/fips_des_locl.h (1.1.2.1), "Exp", lines: +428 -0
|
|
||||||
fips/des/fips_desmovs.c (1.1.2.1), "Exp", lines: +659 -0
|
|
||||||
|
|
||||||
Whoops, forgot FIPS DES, also add EVPs for DES CFB1 and 8.
|
|
||||||
|
|
||||||
2003-08-01 12:25 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/des/cfb_enc.c (1.7.2.2), "Exp", lines: +45 -36
|
|
||||||
crypto/evp/c_allc.c (1.8.2.5), "Exp", lines: +2 -0
|
|
||||||
crypto/evp/e_des.c (1.5.2.4), "Exp", lines: +8 -3
|
|
||||||
crypto/evp/evptests.txt (1.9.2.4), "Exp", lines: +6 -0
|
|
||||||
|
|
||||||
Fix DES CFB-r.
|
|
||||||
|
|
||||||
2003-08-01 12:31 ben
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
crypto/evp/evptests.txt (1.9.2.5), "Exp", lines: +4 -0
|
|
||||||
|
|
||||||
DES CFB8 test.
|
|
||||||
|
|
||||||
2005-04-19 16:21 appro
|
|
||||||
|
|
||||||
Changed:
|
|
||||||
Configure (1.314.2.117), "Exp", lines: +24 -21
|
|
||||||
Makefile.org (1.154.2.100), "Exp", lines: +1 -11
|
|
||||||
TABLE (1.99.2.52), "Exp", lines: +20 -20
|
|
||||||
apps/Makefile (1.1.4.15), "Exp", lines: +1 -1
|
|
||||||
test/Makefile (1.1.4.12), "Exp", lines: +1 -1
|
|
||||||
|
|
||||||
Enable shared link on HP-UX.
|
|
||||||
|
|
||||||
File diff suppressed because it is too large
Load Diff
91
FAQ
91
FAQ
@@ -32,6 +32,8 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* How do I install a CA certificate into a browser?
|
* How do I install a CA certificate into a browser?
|
||||||
* Why is OpenSSL x509 DN output not conformant to RFC2253?
|
* Why is OpenSSL x509 DN output not conformant to RFC2253?
|
||||||
* What is a "128 bit certificate"? Can I create one with OpenSSL?
|
* What is a "128 bit certificate"? Can I create one with OpenSSL?
|
||||||
|
* Why does OpenSSL set the authority key identifier extension incorrectly?
|
||||||
|
* How can I set up a bundle of commercial root CA certificates?
|
||||||
|
|
||||||
[BUILD] Questions about building and testing OpenSSL
|
[BUILD] Questions about building and testing OpenSSL
|
||||||
|
|
||||||
@@ -66,6 +68,8 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Why doesn't my server application receive a client certificate?
|
* Why doesn't my server application receive a client certificate?
|
||||||
* Why does compilation fail due to an undefined symbol NID_uniqueIdentifier?
|
* Why does compilation fail due to an undefined symbol NID_uniqueIdentifier?
|
||||||
* I think I've detected a memory leak, is this a bug?
|
* I think I've detected a memory leak, is this a bug?
|
||||||
|
* Why does Valgrind complain about the use of uninitialized data?
|
||||||
|
* Why doesn't a memory BIO work when a file does?
|
||||||
|
|
||||||
===============================================================================
|
===============================================================================
|
||||||
|
|
||||||
@@ -74,7 +78,7 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Which is the current version of OpenSSL?
|
* Which is the current version of OpenSSL?
|
||||||
|
|
||||||
The current version is available from <URL: http://www.openssl.org>.
|
The current version is available from <URL: http://www.openssl.org>.
|
||||||
OpenSSL 0.9.8e was released on February 23rd, 2007.
|
OpenSSL 0.9.8k was released on Mar 25th, 2009.
|
||||||
|
|
||||||
In addition to the current stable release, you can also access daily
|
In addition to the current stable release, you can also access daily
|
||||||
snapshots of the OpenSSL development version at <URL:
|
snapshots of the OpenSSL development version at <URL:
|
||||||
@@ -401,10 +405,10 @@ You can't generally create such a certificate using OpenSSL but there is no
|
|||||||
need to any more. Nowadays web browsers using unrestricted strong encryption
|
need to any more. Nowadays web browsers using unrestricted strong encryption
|
||||||
are generally available.
|
are generally available.
|
||||||
|
|
||||||
When there were tight export restrictions on the export of strong encryption
|
When there were tight restrictions on the export of strong encryption
|
||||||
software from the US only weak encryption algorithms could be freely exported
|
software from the US only weak encryption algorithms could be freely exported
|
||||||
(initially 40 bit and then 56 bit). It was widely recognised that this was
|
(initially 40 bit and then 56 bit). It was widely recognised that this was
|
||||||
inadequate. A relaxation the rules allowed the use of strong encryption but
|
inadequate. A relaxation of the rules allowed the use of strong encryption but
|
||||||
only to an authorised server.
|
only to an authorised server.
|
||||||
|
|
||||||
Two slighly different techniques were developed to support this, one used by
|
Two slighly different techniques were developed to support this, one used by
|
||||||
@@ -425,6 +429,39 @@ The export laws were later changed to allow almost unrestricted use of strong
|
|||||||
encryption so these certificates are now obsolete.
|
encryption so these certificates are now obsolete.
|
||||||
|
|
||||||
|
|
||||||
|
* Why does OpenSSL set the authority key identifier (AKID) extension incorrectly?
|
||||||
|
|
||||||
|
It doesn't: this extension is often the cause of confusion.
|
||||||
|
|
||||||
|
Consider a certificate chain A->B->C so that A signs B and B signs C. Suppose
|
||||||
|
certificate C contains AKID.
|
||||||
|
|
||||||
|
The purpose of this extension is to identify the authority certificate B. This
|
||||||
|
can be done either by including the subject key identifier of B or its issuer
|
||||||
|
name and serial number.
|
||||||
|
|
||||||
|
In this latter case because it is identifying certifcate B it must contain the
|
||||||
|
issuer name and serial number of B.
|
||||||
|
|
||||||
|
It is often wrongly assumed that it should contain the subject name of B. If it
|
||||||
|
did this would be redundant information because it would duplicate the issuer
|
||||||
|
name of C.
|
||||||
|
|
||||||
|
|
||||||
|
* How can I set up a bundle of commercial root CA certificates?
|
||||||
|
|
||||||
|
The OpenSSL software is shipped without any root CA certificate as the
|
||||||
|
OpenSSL project does not have any policy on including or excluding
|
||||||
|
any specific CA and does not intend to set up such a policy. Deciding
|
||||||
|
about which CAs to support is up to application developers or
|
||||||
|
administrators.
|
||||||
|
|
||||||
|
Other projects do have other policies so you can for example extract the CA
|
||||||
|
bundle used by Mozilla and/or modssl as described in this article:
|
||||||
|
|
||||||
|
http://www.mail-archive.com/modssl-users@modssl.org/msg16980.html
|
||||||
|
|
||||||
|
|
||||||
[BUILD] =======================================================================
|
[BUILD] =======================================================================
|
||||||
|
|
||||||
* Why does the linker complain about undefined symbols?
|
* Why does the linker complain about undefined symbols?
|
||||||
@@ -680,8 +717,10 @@ file.
|
|||||||
|
|
||||||
Multi-threaded applications must provide two callback functions to
|
Multi-threaded applications must provide two callback functions to
|
||||||
OpenSSL by calling CRYPTO_set_locking_callback() and
|
OpenSSL by calling CRYPTO_set_locking_callback() and
|
||||||
CRYPTO_set_id_callback(). This is described in the threads(3)
|
CRYPTO_set_id_callback(), for all versions of OpenSSL up to and
|
||||||
manpage.
|
including 0.9.8[abc...]. As of version 0.9.9, CRYPTO_set_id_callback()
|
||||||
|
and associated APIs are deprecated by CRYPTO_THREADID_set_callback()
|
||||||
|
and friends. This is described in the threads(3) manpage.
|
||||||
|
|
||||||
* I've compiled a program under Windows and it crashes: why?
|
* I've compiled a program under Windows and it crashes: why?
|
||||||
|
|
||||||
@@ -822,11 +861,11 @@ code itself (the hex digits after the second colon).
|
|||||||
|
|
||||||
* Why do I get errors about unknown algorithms?
|
* Why do I get errors about unknown algorithms?
|
||||||
|
|
||||||
This can happen under several circumstances such as reading in an
|
The cause is forgetting to load OpenSSL's table of algorithms with
|
||||||
encrypted private key or attempting to decrypt a PKCS#12 file. The cause
|
OpenSSL_add_all_algorithms(). See the manual page for more information. This
|
||||||
is forgetting to load OpenSSL's table of algorithms with
|
can cause several problems such as being unable to read in an encrypted
|
||||||
OpenSSL_add_all_algorithms(). See the manual page for more information.
|
PEM file, unable to decrypt a PKCS#12 file or signature failure when
|
||||||
|
verifying certificates.
|
||||||
|
|
||||||
* Why can't the OpenSSH configure script detect OpenSSL?
|
* Why can't the OpenSSH configure script detect OpenSSL?
|
||||||
|
|
||||||
@@ -894,5 +933,35 @@ thread-safe):
|
|||||||
ERR_free_strings(), EVP_cleanup() and CRYPTO_cleanup_all_ex_data().
|
ERR_free_strings(), EVP_cleanup() and CRYPTO_cleanup_all_ex_data().
|
||||||
|
|
||||||
|
|
||||||
===============================================================================
|
* Why does Valgrind complain about the use of uninitialized data?
|
||||||
|
|
||||||
|
When OpenSSL's PRNG routines are called to generate random numbers the supplied
|
||||||
|
buffer contents are mixed into the entropy pool: so it technically does not
|
||||||
|
matter whether the buffer is initialized at this point or not. Valgrind (and
|
||||||
|
other test tools) will complain about this. When using Valgrind, make sure the
|
||||||
|
OpenSSL library has been compiled with the PURIFY macro defined (-DPURIFY)
|
||||||
|
to get rid of these warnings.
|
||||||
|
|
||||||
|
|
||||||
|
* Why doesn't a memory BIO work when a file does?
|
||||||
|
|
||||||
|
This can occur in several cases for example reading an S/MIME email message.
|
||||||
|
The reason is that a memory BIO can do one of two things when all the data
|
||||||
|
has been read from it.
|
||||||
|
|
||||||
|
The default behaviour is to indicate that no more data is available and that
|
||||||
|
the call should be retried, this is to allow the application to fill up the BIO
|
||||||
|
again if necessary.
|
||||||
|
|
||||||
|
Alternatively it can indicate that no more data is available and that EOF has
|
||||||
|
been reached.
|
||||||
|
|
||||||
|
If a memory BIO is to behave in the same way as a file this second behaviour
|
||||||
|
is needed. This must be done by calling:
|
||||||
|
|
||||||
|
BIO_set_mem_eof_return(bio, 0);
|
||||||
|
|
||||||
|
See the manual pages for more details.
|
||||||
|
|
||||||
|
|
||||||
|
===============================================================================
|
||||||
|
|||||||
16
INSTALL
16
INSTALL
@@ -98,11 +98,17 @@
|
|||||||
The crypto/<cipher> directory can be removed after running
|
The crypto/<cipher> directory can be removed after running
|
||||||
"make depend".
|
"make depend".
|
||||||
|
|
||||||
-Dxxx, -lxxx, -Lxxx, -fxxx, -mxxx, -Kxxx These system specific options will
|
-Dxxx, -lxxx, -Lxxx, -fxxx, -mXXX, -Kxxx These system specific options will
|
||||||
be passed through to the compiler to allow you to
|
be passed through to the compiler to allow you to
|
||||||
define preprocessor symbols, specify additional libraries,
|
define preprocessor symbols, specify additional libraries,
|
||||||
library directories or other compiler options.
|
library directories or other compiler options.
|
||||||
|
|
||||||
|
-DHAVE_CRYPTODEV Enable the BSD cryptodev engine even if we are not using
|
||||||
|
BSD. Useful if you are running ocf-linux or something
|
||||||
|
similar. Once enabled you can also enable the use of
|
||||||
|
cryptodev digests, which is usually slower unless you have
|
||||||
|
large amounts data. Use -DUSE_CRYPTODEV_DIGESTS to force
|
||||||
|
it.
|
||||||
|
|
||||||
Installation in Detail
|
Installation in Detail
|
||||||
----------------------
|
----------------------
|
||||||
@@ -158,7 +164,7 @@
|
|||||||
standard headers). If it is a problem with OpenSSL itself, please
|
standard headers). If it is a problem with OpenSSL itself, please
|
||||||
report the problem to <openssl-bugs@openssl.org> (note that your
|
report the problem to <openssl-bugs@openssl.org> (note that your
|
||||||
message will be recorded in the request tracker publicly readable
|
message will be recorded in the request tracker publicly readable
|
||||||
via http://www.openssl.org/support/rt2.html and will be forwarded to a
|
via http://www.openssl.org/support/rt.html and will be forwarded to a
|
||||||
public mailing list). Include the output of "make report" in your message.
|
public mailing list). Include the output of "make report" in your message.
|
||||||
Please check out the request tracker. Maybe the bug was already
|
Please check out the request tracker. Maybe the bug was already
|
||||||
reported or has already been fixed.
|
reported or has already been fixed.
|
||||||
@@ -180,7 +186,7 @@
|
|||||||
in Makefile.ssl and run "make clean; make". Please send a bug
|
in Makefile.ssl and run "make clean; make". Please send a bug
|
||||||
report to <openssl-bugs@openssl.org>, including the output of
|
report to <openssl-bugs@openssl.org>, including the output of
|
||||||
"make report" in order to be added to the request tracker at
|
"make report" in order to be added to the request tracker at
|
||||||
http://www.openssl.org/support/rt2.html.
|
http://www.openssl.org/support/rt.html.
|
||||||
|
|
||||||
4. If everything tests ok, install OpenSSL with
|
4. If everything tests ok, install OpenSSL with
|
||||||
|
|
||||||
@@ -206,6 +212,10 @@
|
|||||||
compile programs with libcrypto or libssl.
|
compile programs with libcrypto or libssl.
|
||||||
lib Contains the OpenSSL library files themselves.
|
lib Contains the OpenSSL library files themselves.
|
||||||
|
|
||||||
|
Use "make install_sw" to install the software without documentation,
|
||||||
|
and "install_docs_html" to install HTML renditions of the manual
|
||||||
|
pages.
|
||||||
|
|
||||||
Package builders who want to configure the library for standard
|
Package builders who want to configure the library for standard
|
||||||
locations, but have the package installed somewhere else so that
|
locations, but have the package installed somewhere else so that
|
||||||
it can easily be packaged, can use
|
it can easily be packaged, can use
|
||||||
|
|||||||
120
INSTALL.NW
120
INSTALL.NW
@@ -8,58 +8,62 @@ Notes about building OpenSSL for NetWare.
|
|||||||
BUILD PLATFORM:
|
BUILD PLATFORM:
|
||||||
---------------
|
---------------
|
||||||
The build scripts (batch files, perl scripts, etc) have been developed and
|
The build scripts (batch files, perl scripts, etc) have been developed and
|
||||||
tested on W2K. The scripts should run fine on other Windows
|
tested on W2K. The scripts should run fine on other Windows platforms
|
||||||
platforms (NT, Win9x, WinXP) but they haven't been tested. They may require
|
(NT, Win9x, WinXP) but they have not been tested. They may require some
|
||||||
some modifications.
|
modifications.
|
||||||
|
|
||||||
|
|
||||||
Supported NetWare Platforms - NetWare 5.x, NetWare 6.x:
|
Supported NetWare Platforms - NetWare 5.x, NetWare 6.x:
|
||||||
------------------------------------------
|
-------------------------------------------------------
|
||||||
OpenSSL uses the WinSock interfaces introduced in NetWare 5. Therefore,
|
OpenSSL can either use the WinSock interfaces introduced in NetWare 5,
|
||||||
previous versions of NetWare, 4.x and 3.x, are not supported.
|
or the BSD socket interface. Previous versions of NetWare, 4.x and 3.x,
|
||||||
|
are only supported if OpenSSL is build for CLIB and BSD sockets;
|
||||||
|
WinSock builds only support NetWare 5 and up.
|
||||||
|
|
||||||
On NetWare there are two c-runtime libraries. There is the legacy CLIB
|
On NetWare there are two c-runtime libraries. There is the legacy CLIB
|
||||||
interfaces and the newer LibC interfaces. Being ANSI-C libraries, the
|
interfaces and the newer LIBC interfaces. Being ANSI-C libraries, the
|
||||||
functionality in CLIB and LibC is similar but the LibC interfaces are built
|
functionality in CLIB and LIBC is similar but the LIBC interfaces are built
|
||||||
using Novell Kernal Services (NKS) which is designed to leverage
|
using Novell Kernal Services (NKS) which is designed to leverage
|
||||||
multi-processor environments.
|
multi-processor environments.
|
||||||
|
|
||||||
The NetWare port of OpenSSL can configured to build using CLIB or LibC. The
|
The NetWare port of OpenSSL can be configured to build using CLIB or LIBC.
|
||||||
CLIB build was developed and tested using NetWare 5.0 sp6.0a. The LibC
|
The CLIB build was developed and tested using NetWare 5.0 sp6.0a. The LIBC
|
||||||
build was developed and tested using the NetWare 6.0 FCS.
|
build was developed and tested using the NetWare 6.0 FCS.
|
||||||
|
|
||||||
The necessary LibC functionality ships with NetWare 6. However, earlier
|
The necessary LIBC functionality ships with NetWare 6. However, earlier
|
||||||
NetWare 5.x versions will require updates in order to run the OpenSSL LibC
|
NetWare 5.x versions will require updates in order to run the OpenSSL LIBC
|
||||||
build.
|
build (NetWare 5.1 SP8 is known to work).
|
||||||
|
|
||||||
As of June 2005, the LibC build can be configured to use BSD sockets instead
|
As of June 2005, the LIBC build can be configured to use BSD sockets instead
|
||||||
of WinSock sockets. Call Configure (usually through netware\build.bat) using
|
of WinSock sockets. Call Configure (usually through netware\build.bat) using
|
||||||
a target of "netware-libc-bsdsock" instead of "netware-libc".
|
a target of "netware-libc-bsdsock" instead of "netware-libc".
|
||||||
|
|
||||||
|
As of June 2007, support for CLIB and BSD sockets is also now available
|
||||||
|
using a target of "netware-clib-bsdsock" instead of "netware-clib";
|
||||||
|
also gcc builds are now supported on both Linux and Win32 (post 0.9.8e).
|
||||||
|
|
||||||
REQUIRED TOOLS:
|
REQUIRED TOOLS:
|
||||||
---------------
|
---------------
|
||||||
Based upon the configuration and build options used, some or all of the
|
Based upon the configuration and build options used, some or all of the
|
||||||
following tools may be required:
|
following tools may be required:
|
||||||
|
|
||||||
|
|
||||||
* Perl for Win32 - required (http://www.activestate.com/ActivePerl)
|
* Perl for Win32 - required (http://www.activestate.com/ActivePerl)
|
||||||
Used to run the various perl scripts on the build platform.
|
Used to run the various perl scripts on the build platform.
|
||||||
|
|
||||||
|
|
||||||
* Perl 5.8.0 for NetWare v3.20 (or later) - required
|
* Perl 5.8.0 for NetWare v3.20 (or later) - required
|
||||||
(http://developer.novell.com) Used to run the test script on NetWare
|
(http://developer.novell.com) Used to run the test script on NetWare
|
||||||
after building.
|
after building.
|
||||||
|
|
||||||
|
* Compiler / Linker - required:
|
||||||
* Metrowerks CodeWarrior PDK 2.1 (or later) for NetWare - required:
|
Metrowerks CodeWarrior PDK 2.1 (or later) for NetWare (commercial):
|
||||||
Provides command line tools used for building.
|
Provides command line tools used for building.
|
||||||
|
|
||||||
Tools:
|
Tools:
|
||||||
mwccnlm.exe - C/C++ Compiler for NetWare
|
mwccnlm.exe - C/C++ Compiler for NetWare
|
||||||
mwldnlm.exe - Linker for NetWare
|
mwldnlm.exe - Linker for NetWare
|
||||||
mwasmnlm.exe - x86 assembler for NetWare (if using assembly option)
|
mwasmnlm.exe - x86 assembler for NetWare (if using assembly option)
|
||||||
|
|
||||||
|
gcc / nlmconv Cross-Compiler, available from Novell Forge (free):
|
||||||
|
http://forge.novell.com/modules/xfmod/project/?aunixnw
|
||||||
|
|
||||||
* Assemblers - optional:
|
* Assemblers - optional:
|
||||||
If you intend to build using the assembly options you will need an
|
If you intend to build using the assembly options you will need an
|
||||||
@@ -79,11 +83,11 @@ following tools may be required:
|
|||||||
In order to build you will need a make tool. Two make tools are
|
In order to build you will need a make tool. Two make tools are
|
||||||
supported, GNU make (gmake.exe) or Microsoft nmake.exe.
|
supported, GNU make (gmake.exe) or Microsoft nmake.exe.
|
||||||
|
|
||||||
gmake.exe - GNU make for Windows (version 3.75 used for development)
|
make.exe - GNU make for Windows (version 3.75 used for development)
|
||||||
http://www.gnu.org/software/make/make.html
|
http://gnuwin32.sourceforge.net/packages/make.htm
|
||||||
|
|
||||||
nmake.exe - Microsoft make (Version 6.00.8168.0 used for development)
|
nmake.exe - Microsoft make (Version 6.00.8168.0 used for development)
|
||||||
|
http://support.microsoft.com/kb/132084/EN-US/
|
||||||
|
|
||||||
* Novell Developer Kit (NDK) - required: (http://developer.novell.com)
|
* Novell Developer Kit (NDK) - required: (http://developer.novell.com)
|
||||||
|
|
||||||
@@ -123,14 +127,14 @@ following tools may be required:
|
|||||||
|
|
||||||
LIBC - BUILDS:
|
LIBC - BUILDS:
|
||||||
|
|
||||||
Libraries for C (LibC) - LibC headers and import files
|
Libraries for C (LIBC) - LIBC headers and import files
|
||||||
If you are going to build a LibC version of OpenSSL, you will
|
If you are going to build a LIBC version of OpenSSL, you will
|
||||||
need the LibC headers and imports. The March 14, 2002 NDK release or
|
need the LIBC headers and imports. The March 14, 2002 NDK release or
|
||||||
later is required.
|
later is required.
|
||||||
|
|
||||||
NOTE: The LibC SDK includes the necessary WinSock2 support. It
|
NOTE: The LIBC SDK includes the necessary WinSock2 support.
|
||||||
It is not necessary to download the WinSock2 Developer when building
|
It is not necessary to download the WinSock2 NDK when building for
|
||||||
for LibC. The LibC SDK also includes the appropriate BSD socket support
|
LIBC. The LIBC SDK also includes the appropriate BSD socket support
|
||||||
if configuring to use BSD sockets.
|
if configuring to use BSD sockets.
|
||||||
|
|
||||||
|
|
||||||
@@ -143,33 +147,36 @@ The set_env.bat file is a template you can use to set up the path
|
|||||||
and environment variables you will need to build. Modify the
|
and environment variables you will need to build. Modify the
|
||||||
various lines to point to YOUR tools and run set_env.bat.
|
various lines to point to YOUR tools and run set_env.bat.
|
||||||
|
|
||||||
netware\set_env.bat [target]
|
netware\set_env.bat <target> [compiler]
|
||||||
|
|
||||||
target - "netware-clib" - CLib NetWare build
|
target - "netware-clib" - CLIB NetWare build
|
||||||
- "netware-libc" - LibC NetWare build
|
- "netware-libc" - LIBC NetWare build
|
||||||
|
|
||||||
|
compiler - "gnuc" - GNU GCC Compiler
|
||||||
|
- "codewarrior" - MetroWerks CodeWarrior (default)
|
||||||
|
|
||||||
If you don't use set_env.bat, you will need to set up the following
|
If you don't use set_env.bat, you will need to set up the following
|
||||||
environment variables:
|
environment variables:
|
||||||
|
|
||||||
path - Set path to point to the tools you will use.
|
PATH - Set PATH to point to the tools you will use.
|
||||||
|
|
||||||
MWCIncludes - The location of the NDK include files.
|
INCLUDE - The location of the NDK include files.
|
||||||
|
|
||||||
CLIB ex: set MWCIncludes=c:\ndk\nwsdk\include\nlm
|
CLIB ex: set INCLUDE=c:\ndk\nwsdk\include\nlm
|
||||||
LibC ex: set MWCIncludes=c:\ndk\libc\include
|
LIBC ex: set INCLUDE=c:\ndk\libc\include
|
||||||
|
|
||||||
PRELUDE - The absolute path of the prelude object to link with. For
|
PRELUDE - The absolute path of the prelude object to link with. For
|
||||||
a CLIB build it is recommended you use the "clibpre.o" files shipped
|
a CLIB build it is recommended you use the "clibpre.o" files shipped
|
||||||
with the Metrowerks PDK for NetWare. For a LibC build you should
|
with the Metrowerks PDK for NetWare. For a LIBC build you should
|
||||||
use the "libcpre.o" file delivered with the LibC NDK components.
|
use the "libcpre.o" file delivered with the LIBC NDK components.
|
||||||
|
|
||||||
CLIB ex: set PRELUDE=c:\ndk\nwsdk\imports\clibpre.o
|
CLIB ex: set PRELUDE=c:\ndk\nwsdk\imports\clibpre.o
|
||||||
LibC ex: set PRELUDE=c:\ndk\libc\imports\libcpre.o
|
LIBC ex: set PRELUDE=c:\ndk\libc\imports\libcpre.o
|
||||||
|
|
||||||
IMPORTS - The locaton of the NDK import files.
|
IMPORTS - The locaton of the NDK import files.
|
||||||
|
|
||||||
CLIB ex: set IMPORTS=c:\ndk\nwsdk\imports
|
CLIB ex: set IMPORTS=c:\ndk\nwsdk\imports
|
||||||
LibC ex: set IMPORTS=c:\ndk\libc\imports
|
LIBC ex: set IMPORTS=c:\ndk\libc\imports
|
||||||
|
|
||||||
|
|
||||||
In order to build, you need to run the Perl scripts to configure the build
|
In order to build, you need to run the Perl scripts to configure the build
|
||||||
@@ -182,9 +189,10 @@ the assembly code. Always run build.bat from the "openssl" directory.
|
|||||||
|
|
||||||
netware\build [target] [debug opts] [assembly opts] [configure opts]
|
netware\build [target] [debug opts] [assembly opts] [configure opts]
|
||||||
|
|
||||||
target - "netware-clib" - CLib NetWare build (WinSock Sockets)
|
target - "netware-clib" - CLIB NetWare build (WinSock Sockets)
|
||||||
- "netware-libc" - LibC NetWare build (WinSock Sockets)
|
- "netware-clib-bsdsock" - CLIB NetWare build (BSD Sockets)
|
||||||
- "netware-libc-bsdsock" - LibC NetWare build (BSD Sockets)
|
- "netware-libc" - LIBC NetWare build (WinSock Sockets)
|
||||||
|
- "netware-libc-bsdsock" - LIBC NetWare build (BSD Sockets)
|
||||||
|
|
||||||
debug opts - "debug" - build debug
|
debug opts - "debug" - build debug
|
||||||
|
|
||||||
@@ -193,25 +201,27 @@ the assembly code. Always run build.bat from the "openssl" directory.
|
|||||||
"no-asm" - don't use assembly
|
"no-asm" - don't use assembly
|
||||||
|
|
||||||
configure opts- all unrecognized arguments are passed to the
|
configure opts- all unrecognized arguments are passed to the
|
||||||
perl configure script
|
perl 'configure' script. See that script for
|
||||||
|
internal documentation regarding options that
|
||||||
|
are available.
|
||||||
|
|
||||||
examples:
|
examples:
|
||||||
|
|
||||||
CLIB build, debug, without assembly:
|
CLIB build, debug, without assembly:
|
||||||
netware\build.bat netware-clib debug no-asm
|
netware\build.bat netware-clib debug no-asm
|
||||||
|
|
||||||
LibC build, non-debug, using NASM assembly:
|
LIBC build, non-debug, using NASM assembly, add mdc2 support:
|
||||||
netware\build.bat netware-libc nw-nasm
|
netware\build.bat netware-libc nw-nasm enable-mdc2
|
||||||
|
|
||||||
LibC build, BSD sockets, non-debug, without assembly:
|
LIBC build, BSD sockets, non-debug, without assembly:
|
||||||
netware\build.bat netware-libc-bsdsock no-asm
|
netware\build.bat netware-libc-bsdsock no-asm
|
||||||
|
|
||||||
Running build.bat generates a make file to be processed by your make
|
Running build.bat generates a make file to be processed by your make
|
||||||
tool (gmake or nmake):
|
tool (gmake or nmake):
|
||||||
|
|
||||||
CLIB ex: gmake -f netware\nlm_clib_dbg.mak
|
CLIB ex: gmake -f netware\nlm_clib_dbg.mak
|
||||||
LibC ex: gmake -f netware\nlm_libc.mak
|
LIBC ex: gmake -f netware\nlm_libc.mak
|
||||||
LibC ex: gmake -f netware\nlm_libc_bsdsock.mak
|
LIBC ex: gmake -f netware\nlm_libc_bsdsock.mak
|
||||||
|
|
||||||
|
|
||||||
You can also run the build scripts manually if you do not want to use the
|
You can also run the build scripts manually if you do not want to use the
|
||||||
@@ -220,7 +230,7 @@ subdirectory (in the order listed below):
|
|||||||
|
|
||||||
perl configure no-asm [other config opts] [netware-clib|netware-libc|netware-libc-bsdsock]
|
perl configure no-asm [other config opts] [netware-clib|netware-libc|netware-libc-bsdsock]
|
||||||
configures no assembly build for specified netware environment
|
configures no assembly build for specified netware environment
|
||||||
(CLIB or LibC).
|
(CLIB or LIBC).
|
||||||
|
|
||||||
perl util\mkfiles.pl >MINFO
|
perl util\mkfiles.pl >MINFO
|
||||||
generates a listing of source files (used by mk1mf)
|
generates a listing of source files (used by mk1mf)
|
||||||
@@ -250,12 +260,12 @@ The output from the build is placed in the following directories:
|
|||||||
tmp_nw_clib - temporary build files
|
tmp_nw_clib - temporary build files
|
||||||
outinc_nw_clib - necesary include files
|
outinc_nw_clib - necesary include files
|
||||||
|
|
||||||
LibC Debug build:
|
LIBC Debug build:
|
||||||
out_nw_libc.dbg - static libs & test nlm(s)
|
out_nw_libc.dbg - static libs & test nlm(s)
|
||||||
tmp_nw_libc.dbg - temporary build files
|
tmp_nw_libc.dbg - temporary build files
|
||||||
outinc_nw_libc - necessary include files
|
outinc_nw_libc - necessary include files
|
||||||
|
|
||||||
LibC Non-debug build:
|
LIBC Non-debug build:
|
||||||
out_nw_libc - static libs & test nlm(s)
|
out_nw_libc - static libs & test nlm(s)
|
||||||
tmp_nw_libc - temporary build files
|
tmp_nw_libc - temporary build files
|
||||||
outinc_nw_libc - necesary include files
|
outinc_nw_libc - necesary include files
|
||||||
@@ -281,7 +291,7 @@ To run cpy_tests.bat:
|
|||||||
NetWare drive - drive letter of mapped drive
|
NetWare drive - drive letter of mapped drive
|
||||||
|
|
||||||
CLIB ex: netware\cpy_tests out_nw_clib m:
|
CLIB ex: netware\cpy_tests out_nw_clib m:
|
||||||
LibC ex: netware\cpy_tests out_nw_libc m:
|
LIBC ex: netware\cpy_tests out_nw_libc m:
|
||||||
|
|
||||||
|
|
||||||
The Perl script, "do_tests.pl", in the "OpenSSL" directory on the server
|
The Perl script, "do_tests.pl", in the "OpenSSL" directory on the server
|
||||||
@@ -356,9 +366,9 @@ clean up the resources!
|
|||||||
|
|
||||||
Multi-threaded Development
|
Multi-threaded Development
|
||||||
---------------------------
|
---------------------------
|
||||||
The NetWare version of OpenSSL is thread-safe however, multi-threaded
|
The NetWare version of OpenSSL is thread-safe, however multi-threaded
|
||||||
applications must provide the necessary locking function callbacks. This
|
applications must provide the necessary locking function callbacks. This
|
||||||
is described in doc\threads.doc. The file "openssl\crypto\threads\mttest.c"
|
is described in doc\threads.doc. The file "openssl-x.x.x\crypto\threads\mttest.c"
|
||||||
is a multi-threaded test program and demonstrates the locking functions.
|
is a multi-threaded test program and demonstrates the locking functions.
|
||||||
|
|
||||||
|
|
||||||
@@ -428,7 +438,7 @@ Makefile "vclean"
|
|||||||
------------------
|
------------------
|
||||||
The generated makefile has a "vclean" target which cleans up the build
|
The generated makefile has a "vclean" target which cleans up the build
|
||||||
directories. If you have been building successfully and suddenly
|
directories. If you have been building successfully and suddenly
|
||||||
experience problems, use "vclean" (gmake -f netware\nlm.mak vclean) and retry.
|
experience problems, use "vclean" (gmake -f netware\nlm_xxxx.mak vclean) and retry.
|
||||||
|
|
||||||
|
|
||||||
"Undefined Symbol" Linker errors
|
"Undefined Symbol" Linker errors
|
||||||
|
|||||||
152
INSTALL.W32
152
INSTALL.W32
@@ -5,19 +5,30 @@
|
|||||||
[Instructions for building for Windows CE can be found in INSTALL.WCE]
|
[Instructions for building for Windows CE can be found in INSTALL.WCE]
|
||||||
[Instructions for building for Win64 can be found in INSTALL.W64]
|
[Instructions for building for Win64 can be found in INSTALL.W64]
|
||||||
|
|
||||||
Heres a few comments about building OpenSSL in Windows environments. Most
|
Here are a few comments about building OpenSSL for Win32 environments,
|
||||||
of this is tested on Win32 but it may also work in Win 3.1 with some
|
such as Windows NT and Windows 9x. It should be noted though that
|
||||||
modification.
|
Windows 9x are not ordinarily tested. Its mention merely means that we
|
||||||
|
attempt to maintain certain programming discipline and pay attention
|
||||||
|
to backward compatibility issues, in other words it's kind of expected
|
||||||
|
to work on Windows 9x, but no regression tests are actually performed.
|
||||||
|
|
||||||
You need Perl for Win32. Unless you will build on Cygwin, you will need
|
On additional note newer OpenSSL versions are compiled and linked with
|
||||||
|
Winsock 2. This means that minimum OS requirement was elevated to NT 4
|
||||||
|
and Windows 98 [there is Winsock 2 update for Windows 95 though].
|
||||||
|
|
||||||
|
- you need Perl for Win32. Unless you will build on Cygwin, you will need
|
||||||
ActiveState Perl, available from http://www.activestate.com/ActivePerl.
|
ActiveState Perl, available from http://www.activestate.com/ActivePerl.
|
||||||
|
|
||||||
and one of the following C compilers:
|
- one of the following C compilers:
|
||||||
|
|
||||||
* Visual C++
|
* Visual C++
|
||||||
* Borland C
|
* Borland C
|
||||||
* GNU C (Cygwin or MinGW)
|
* GNU C (Cygwin or MinGW)
|
||||||
|
|
||||||
|
- Netwide Assembler, a.k.a. NASM, available from http://nasm.sourceforge.net/
|
||||||
|
is required if you intend to utilize assembler modules. Note that NASM
|
||||||
|
is now the only supported assembler.
|
||||||
|
|
||||||
If you are compiling from a tarball or a CVS snapshot then the Win32 files
|
If you are compiling from a tarball or a CVS snapshot then the Win32 files
|
||||||
may well be not up to date. This may mean that some "tweaking" is required to
|
may well be not up to date. This may mean that some "tweaking" is required to
|
||||||
get it all to work. See the trouble shooting section later on for if (when?)
|
get it all to work. See the trouble shooting section later on for if (when?)
|
||||||
@@ -26,39 +37,18 @@
|
|||||||
Visual C++
|
Visual C++
|
||||||
----------
|
----------
|
||||||
|
|
||||||
If you want to compile in the assembly language routines with Visual C++ then
|
If you want to compile in the assembly language routines with Visual
|
||||||
you will need an assembler. This is worth doing because it will result in
|
C++, then you will need already mentioned Netwide Assembler binary,
|
||||||
faster code: for example it will typically result in a 2 times speedup in the
|
nasmw.exe or nasm.exe, to be available on your %PATH%.
|
||||||
RSA routines. Currently the following assemblers are supported:
|
|
||||||
|
|
||||||
* Microsoft MASM (aka "ml")
|
Firstly you should run Configure with platform VC-WIN32:
|
||||||
* Free Netwide Assembler NASM.
|
|
||||||
|
|
||||||
MASM is distributed with most versions of VC++. For the versions where it is
|
> perl Configure VC-WIN32 --prefix=c:\some\openssl\dir
|
||||||
not included in VC++, it is also distributed with some Microsoft DDKs, for
|
|
||||||
example the Windows NT 4.0 DDK and the Windows 98 DDK. If you do not have
|
|
||||||
either of these DDKs then you can just download the binaries for the Windows
|
|
||||||
98 DDK and extract and rename the two files XXXXXml.exe and XXXXXml.err, to
|
|
||||||
ml.exe and ml.err and install somewhere on your PATH. Both DDKs can be
|
|
||||||
downloaded from the Microsoft developers site www.msdn.com.
|
|
||||||
|
|
||||||
NASM is freely available. Version 0.98 was used during testing: other versions
|
|
||||||
may also work. It is available from many places, see for example:
|
|
||||||
http://www.kernel.org/pub/software/devel/nasm/binaries/win32/
|
|
||||||
The NASM binary nasmw.exe needs to be installed anywhere on your PATH.
|
|
||||||
|
|
||||||
Firstly you should run Configure:
|
|
||||||
|
|
||||||
> perl Configure VC-WIN32 --prefix=c:/some/openssl/dir
|
|
||||||
|
|
||||||
Where the prefix argument specifies where OpenSSL will be installed to.
|
Where the prefix argument specifies where OpenSSL will be installed to.
|
||||||
|
|
||||||
Next you need to build the Makefiles and optionally the assembly language
|
Next you need to build the Makefiles and optionally the assembly
|
||||||
files:
|
language files:
|
||||||
|
|
||||||
- If you are using MASM then run:
|
|
||||||
|
|
||||||
> ms\do_masm
|
|
||||||
|
|
||||||
- If you are using NASM then run:
|
- If you are using NASM then run:
|
||||||
|
|
||||||
@@ -66,6 +56,7 @@ Where the prefix argument specifies where OpenSSL will be installed to.
|
|||||||
|
|
||||||
- If you don't want to use the assembly language files at all then run:
|
- If you don't want to use the assembly language files at all then run:
|
||||||
|
|
||||||
|
> perl Configure VC-WIN32 no-asm --prefix=c:/some/openssl/dir
|
||||||
> ms\do_ms
|
> ms\do_ms
|
||||||
|
|
||||||
If you get errors about things not having numbers assigned then check the
|
If you get errors about things not having numbers assigned then check the
|
||||||
@@ -76,8 +67,8 @@ Where the prefix argument specifies where OpenSSL will be installed to.
|
|||||||
|
|
||||||
> nmake -f ms\ntdll.mak
|
> nmake -f ms\ntdll.mak
|
||||||
|
|
||||||
If all is well it should compile and you will have some DLLs and executables
|
If all is well it should compile and you will have some DLLs and
|
||||||
in out32dll. If you want to try the tests then do:
|
executables in out32dll. If you want to try the tests then do:
|
||||||
|
|
||||||
> nmake -f ms\ntdll.mak test
|
> nmake -f ms\ntdll.mak test
|
||||||
|
|
||||||
@@ -88,30 +79,27 @@ To install OpenSSL to the specified location do:
|
|||||||
|
|
||||||
Tweaks:
|
Tweaks:
|
||||||
|
|
||||||
There are various changes you can make to the Win32 compile environment. By
|
There are various changes you can make to the Win32 compile
|
||||||
default the library is not compiled with debugging symbols. If you add 'debug'
|
environment. By default the library is not compiled with debugging
|
||||||
to the mk1mf.pl lines in the do_* batch file then debugging symbols will be
|
symbols. If you use the platform debug-VC-WIN32 instead of VC-WIN32
|
||||||
compiled in. Note that mk1mf.pl expects the platform to be the last argument
|
then debugging symbols will be compiled in.
|
||||||
on the command line, so 'debug' must appear before that, as all other options.
|
|
||||||
|
|
||||||
|
By default in 1.0.0 OpenSSL will compile builtin ENGINES into the
|
||||||
By default in 0.9.8 OpenSSL will compile builtin ENGINES into the libeay32.dll
|
separate shared librariesy. If you specify the "enable-static-engine"
|
||||||
shared library. If you specify the "no-static-engine" option on the command
|
option on the command line to Configure the shared library build
|
||||||
line to Configure the shared library build (ms\ntdll.mak) will compile the
|
(ms\ntdll.mak) will compile the engines into libeay32.dll instead.
|
||||||
engines as separate DLLs.
|
|
||||||
|
|
||||||
The default Win32 environment is to leave out any Windows NT specific
|
The default Win32 environment is to leave out any Windows NT specific
|
||||||
features.
|
features.
|
||||||
|
|
||||||
If you want to enable the NT specific features of OpenSSL (currently only the
|
If you want to enable the NT specific features of OpenSSL (currently
|
||||||
logging BIO) follow the instructions above but call the batch file do_nt.bat
|
only the logging BIO) follow the instructions above but call the batch
|
||||||
instead of do_ms.bat.
|
file do_nt.bat instead of do_ms.bat.
|
||||||
|
|
||||||
You can also build a static version of the library using the Makefile
|
You can also build a static version of the library using the Makefile
|
||||||
ms\nt.mak
|
ms\nt.mak
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Borland C++ builder 5
|
Borland C++ builder 5
|
||||||
---------------------
|
---------------------
|
||||||
|
|
||||||
@@ -137,17 +125,13 @@ To install OpenSSL to the specified location do:
|
|||||||
GNU C (Cygwin)
|
GNU C (Cygwin)
|
||||||
--------------
|
--------------
|
||||||
|
|
||||||
Cygwin provides a bash shell and GNU tools environment running
|
Cygwin implements a Posix/Unix runtime system (cygwin1.dll) on top of
|
||||||
on NT 4.0, Windows 9x, Windows ME, Windows 2000, and Windows XP.
|
Win32 subsystem and provides a bash shell and GNU tools environment.
|
||||||
Consequently, a make of OpenSSL with Cygwin is closer to a GNU
|
Consequently, a make of OpenSSL with Cygwin is virtually identical to
|
||||||
bash environment such as Linux than to other the other Win32
|
Unix procedure. It is also possible to create Win32 binaries that only
|
||||||
makes.
|
use the Microsoft C runtime system (msvcrt.dll or crtdll.dll) using
|
||||||
|
MinGW. MinGW can be used in the Cygwin development environment or in a
|
||||||
Cygwin implements a Posix/Unix runtime system (cygwin1.dll).
|
standalone setup as described in the following section.
|
||||||
It is also possible to create Win32 binaries that only use the
|
|
||||||
Microsoft C runtime system (msvcrt.dll or crtdll.dll) using
|
|
||||||
MinGW. MinGW can be used in the Cygwin development environment
|
|
||||||
or in a standalone setup as described in the following section.
|
|
||||||
|
|
||||||
To build OpenSSL using Cygwin:
|
To build OpenSSL using Cygwin:
|
||||||
|
|
||||||
@@ -192,35 +176,35 @@ To install OpenSSL to the specified location do:
|
|||||||
non-fatal error in "make test" but is otherwise harmless. If
|
non-fatal error in "make test" but is otherwise harmless. If
|
||||||
desired and needed, GNU bc can be built with Cygwin without change.
|
desired and needed, GNU bc can be built with Cygwin without change.
|
||||||
|
|
||||||
GNU C (MinGW)
|
GNU C (MinGW/MSYS)
|
||||||
-------------
|
-------------
|
||||||
|
|
||||||
* Compiler installation:
|
* Compiler and shell environment installation:
|
||||||
|
|
||||||
MinGW is available from http://www.mingw.org. Run the installer and
|
MinGW and MSYS are available from http://www.mingw.org/, both are
|
||||||
set the MinGW bin directory to the PATH in "System Properties" or
|
required. Run the installers and do whatever magic they say it takes
|
||||||
autoexec.bat.
|
to start MSYS bash shell with GNU tools on its PATH.
|
||||||
|
|
||||||
* Compile OpenSSL:
|
* Compile OpenSSL:
|
||||||
|
|
||||||
> ms\mingw32
|
$ ./config
|
||||||
|
[...]
|
||||||
|
$ make
|
||||||
|
[...]
|
||||||
|
$ make test
|
||||||
|
|
||||||
This will create the library and binaries in out. In case any problems
|
This will create the library and binaries in root source directory
|
||||||
occur, try
|
and openssl.exe application in apps directory.
|
||||||
> ms\mingw32 no-asm
|
|
||||||
instead.
|
It is also possible to cross-compile it on Linux by configuring
|
||||||
|
with './Configure --cross-compile-prefix=i386-mingw32- mingw ...'.
|
||||||
|
'make test' is naturally not applicable then.
|
||||||
|
|
||||||
libcrypto.a and libssl.a are the static libraries. To use the DLLs,
|
libcrypto.a and libssl.a are the static libraries. To use the DLLs,
|
||||||
link with libeay32.a and libssl32.a instead.
|
link with libeay32.a and libssl32.a instead.
|
||||||
|
|
||||||
See troubleshooting if you get error messages about functions not having
|
See troubleshooting if you get error messages about functions not
|
||||||
a number assigned.
|
having a number assigned.
|
||||||
|
|
||||||
* You can now try the tests:
|
|
||||||
|
|
||||||
> cd out
|
|
||||||
> ..\ms\test
|
|
||||||
|
|
||||||
|
|
||||||
Installation
|
Installation
|
||||||
------------
|
------------
|
||||||
@@ -307,13 +291,13 @@ To install OpenSSL to the specified location do:
|
|||||||
|
|
||||||
If you link with static OpenSSL libraries [those built with ms/nt.mak],
|
If you link with static OpenSSL libraries [those built with ms/nt.mak],
|
||||||
then you're expected to additionally link your application with
|
then you're expected to additionally link your application with
|
||||||
WSOCK32.LIB, ADVAPI32.LIB, GDI32.LIB and USER32.LIB. Those developing
|
WS2_32.LIB, ADVAPI32.LIB, GDI32.LIB and USER32.LIB. Those developing
|
||||||
non-interactive service applications might feel concerned about linking
|
non-interactive service applications might feel concerned about linking
|
||||||
with latter two, as they are justly associated with interactive desktop,
|
with the latter two, as they are justly associated with interactive
|
||||||
which is not available to service processes. The toolkit is designed
|
desktop, which is not available to service processes. The toolkit is
|
||||||
to detect in which context it's currently executed, GUI, console app
|
designed to detect in which context it's currently executed, GUI,
|
||||||
or service, and act accordingly, namely whether or not to actually make
|
console app or service, and act accordingly, namely whether or not to
|
||||||
GUI calls.
|
actually make GUI calls.
|
||||||
|
|
||||||
If you link with OpenSSL .DLLs, then you're expected to include into
|
If you link with OpenSSL .DLLs, then you're expected to include into
|
||||||
your application code small "shim" snippet, which provides glue between
|
your application code small "shim" snippet, which provides glue between
|
||||||
|
|||||||
75
INSTALL.WCE
75
INSTALL.WCE
@@ -4,27 +4,36 @@
|
|||||||
|
|
||||||
Building OpenSSL for Windows CE requires the following external tools:
|
Building OpenSSL for Windows CE requires the following external tools:
|
||||||
|
|
||||||
* Microsoft eMbedded Visual C++ 3.0
|
* Microsoft eMbedded Visual C++ 3.0 or later
|
||||||
* wcecompat compatibility library (www.essemer.com.au)
|
* Appropriate SDK might be required
|
||||||
* Optionally ceutils for running automated tests (www.essemer.com.au)
|
* Perl for Win32 [commonly recommended ActiveState Perl is available
|
||||||
|
from http://www.activestate.com/Products/ActivePerl/]
|
||||||
|
|
||||||
You also need Perl for Win32. You will need ActiveState Perl, available
|
* wcecompat compatibility library available at
|
||||||
from http://www.activestate.com/ActivePerl.
|
http://www.essemer.com.au/windowsce/
|
||||||
|
* Optionally ceutils for running automated tests (same location)
|
||||||
|
|
||||||
Windows CE support in OpenSSL relies on wcecompat and therefore it's
|
_or_
|
||||||
appropriate to check http://www.essemer.com.au/windowsce/ for updates in
|
|
||||||
case of compilation problems. As for the moment of this writing version
|
|
||||||
1.1 is available and actually required for WCE 4.2 and newer platforms.
|
|
||||||
All Windows CE specific issues should be directed to www.essemer.com.au.
|
|
||||||
|
|
||||||
The C Runtime Library implementation for Windows CE that is included with
|
* PocketConsole driver and PortSDK available at
|
||||||
Microsoft eMbedded Visual C++ 3.0 is incomplete and in some places
|
http://www.symbolictools.de/public/pocketconsole/
|
||||||
incorrect. wcecompat plugs the holes and tries to bring the Windows CE
|
* CMD command interpreter (same location)
|
||||||
CRT to a level that is more compatible with ANSI C. wcecompat goes further
|
|
||||||
and provides low-level IO and stream IO support for stdin/stdout/stderr
|
As Windows CE support in OpenSSL relies on 3rd party compatibility
|
||||||
(which Windows CE does not provide). This IO functionality is not needed
|
library, it's appropriate to check corresponding URL for updates. For
|
||||||
by the OpenSSL library itself but is used for the tests and openssl.exe.
|
example if you choose wcecompat, note that as for the moment of this
|
||||||
More information is available at www.essemer.com.au.
|
writing version 1.2 is available and actually required for WCE 4.2
|
||||||
|
and newer platforms. All wcecompat issues should be directed to
|
||||||
|
www.essemer.com.au.
|
||||||
|
|
||||||
|
Why compatibility library at all? The C Runtime Library implementation
|
||||||
|
for Windows CE that is included with Microsoft eMbedded Visual C++ is
|
||||||
|
incomplete and in some places incorrect. Compatibility library plugs
|
||||||
|
the holes and tries to bring the Windows CE CRT to [more] usable level.
|
||||||
|
Most gaping hole in CRT is support for stdin/stdout/stderr IO, which
|
||||||
|
proposed compatibility libraries solve in two different ways: wcecompat
|
||||||
|
redirects IO to active sync link, while PortSDK - to NT-like console
|
||||||
|
driver on the handheld itself.
|
||||||
|
|
||||||
Building
|
Building
|
||||||
--------
|
--------
|
||||||
@@ -34,9 +43,21 @@
|
|||||||
|
|
||||||
> "C:\Program Files\Microsoft eMbedded Tools\EVC\WCE300\BIN\WCEARM.BAT"
|
> "C:\Program Files\Microsoft eMbedded Tools\EVC\WCE300\BIN\WCEARM.BAT"
|
||||||
|
|
||||||
Next indicate where wcecompat is located:
|
Next pick compatibility library according to your preferences.
|
||||||
|
|
||||||
|
1. To choose wcecompat set up WCECOMPAT environment variable pointing
|
||||||
|
at the location of wcecompat tree "root":
|
||||||
|
|
||||||
> set WCECOMPAT=C:\wcecompat
|
> set WCECOMPAT=C:\wcecompat
|
||||||
|
> set PORTSDK_LIBPATH=
|
||||||
|
|
||||||
|
2. To choose PortSDK set up PORTSDK_LIBPATH to point at hardware-
|
||||||
|
specific location where your portlib.lib is installed:
|
||||||
|
|
||||||
|
> set PORTSDK_LIBPATH=C:\PortSDK\lib\ARM
|
||||||
|
> set WCECOMPAT=
|
||||||
|
|
||||||
|
Note that you may not set both variables.
|
||||||
|
|
||||||
Next you should run Configure:
|
Next you should run Configure:
|
||||||
|
|
||||||
@@ -52,16 +73,16 @@
|
|||||||
|
|
||||||
Then from the VC++ environment at a prompt do:
|
Then from the VC++ environment at a prompt do:
|
||||||
|
|
||||||
- to build static libraries:
|
|
||||||
|
|
||||||
> nmake -f ms\ce.mak
|
|
||||||
|
|
||||||
- or to build DLLs:
|
|
||||||
|
|
||||||
> nmake -f ms\cedll.mak
|
> nmake -f ms\cedll.mak
|
||||||
|
|
||||||
If all is well it should compile and you will have some static libraries and
|
[note that static builds are not supported under CE]
|
||||||
executables in out32, or some DLLs and executables in out32dll. If you want
|
|
||||||
|
If all is well it should compile and you will have some DLLs and executables
|
||||||
|
in out32dll*.
|
||||||
|
|
||||||
|
<<< everyting below needs revision in respect to wcecompat vs. PortSDK >>>
|
||||||
|
|
||||||
|
If you want
|
||||||
to try the tests then make sure the ceutils are in the path and do:
|
to try the tests then make sure the ceutils are in the path and do:
|
||||||
|
|
||||||
> cd out32
|
> cd out32
|
||||||
|
|||||||
2
LICENSE
2
LICENSE
@@ -12,7 +12,7 @@
|
|||||||
---------------
|
---------------
|
||||||
|
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2007 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
|
|||||||
@@ -29,7 +29,7 @@ OSErr AppendErrorMessageToHandle(Handle inoutHandle);
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
// A bunch of evil macros that would be uneccessary if I were always using C++ !
|
// A bunch of evil macros that would be unnecessary if I were always using C++ !
|
||||||
|
|
||||||
#define SetErrorMessageAndBailIfNil(theArg,theMessage) \
|
#define SetErrorMessageAndBailIfNil(theArg,theMessage) \
|
||||||
{ \
|
{ \
|
||||||
|
|||||||
297
Makefile.org
297
Makefile.org
@@ -65,8 +65,8 @@ EX_LIBS=
|
|||||||
EXE_EXT=
|
EXE_EXT=
|
||||||
ARFLAGS=
|
ARFLAGS=
|
||||||
AR=ar $(ARFLAGS) r
|
AR=ar $(ARFLAGS) r
|
||||||
ARD=ar $(ARFLAGS) d
|
|
||||||
RANLIB= ranlib
|
RANLIB= ranlib
|
||||||
|
NM= nm
|
||||||
PERL= perl
|
PERL= perl
|
||||||
TAR= tar
|
TAR= tar
|
||||||
TARFLAGS= --no-recursion
|
TARFLAGS= --no-recursion
|
||||||
@@ -88,7 +88,7 @@ PROCESSOR=
|
|||||||
CPUID_OBJ=
|
CPUID_OBJ=
|
||||||
BN_ASM= bn_asm.o
|
BN_ASM= bn_asm.o
|
||||||
DES_ENC= des_enc.o fcrypt_b.o
|
DES_ENC= des_enc.o fcrypt_b.o
|
||||||
AES_ASM_OBJ=aes_core.o aes_cbc.o
|
AES_ENC= aes_core.o aes_cbc.o
|
||||||
BF_ENC= bf_enc.o
|
BF_ENC= bf_enc.o
|
||||||
CAST_ENC= c_enc.o
|
CAST_ENC= c_enc.o
|
||||||
RC4_ENC= rc4_enc.o
|
RC4_ENC= rc4_enc.o
|
||||||
@@ -96,6 +96,9 @@ RC5_ENC= rc5_enc.o
|
|||||||
MD5_ASM_OBJ=
|
MD5_ASM_OBJ=
|
||||||
SHA1_ASM_OBJ=
|
SHA1_ASM_OBJ=
|
||||||
RMD160_ASM_OBJ=
|
RMD160_ASM_OBJ=
|
||||||
|
WP_ASM_OBJ=
|
||||||
|
CMLL_ENC=
|
||||||
|
PERLASM_SCHEME=
|
||||||
|
|
||||||
# KRB5 stuff
|
# KRB5 stuff
|
||||||
KRB5_INCLUDES=
|
KRB5_INCLUDES=
|
||||||
@@ -105,44 +108,19 @@ LIBKRB5=
|
|||||||
ZLIB_INCLUDE=
|
ZLIB_INCLUDE=
|
||||||
LIBZLIB=
|
LIBZLIB=
|
||||||
|
|
||||||
# This is the location of fipscanister.o and friends.
|
DIRS= crypto ssl engines apps test tools
|
||||||
# The FIPS module build will place it $(INSTALLTOP)/lib
|
ENGDIRS= ccgost
|
||||||
# but since $(INSTALLTOP) can only take the default value
|
SHLIBDIRS= crypto ssl
|
||||||
# when the module is built it will be in /usr/local/ssl/lib
|
|
||||||
# $(INSTALLTOP) for this build make be different so hard
|
|
||||||
# code the path.
|
|
||||||
|
|
||||||
FIPSLIBDIR=/usr/local/ssl/lib/
|
|
||||||
|
|
||||||
# This is set to "y" if fipscanister.o is compiled internally as
|
|
||||||
# opposed to coming from an external validated location.
|
|
||||||
|
|
||||||
FIPSCANISTERINTERNAL=n
|
|
||||||
|
|
||||||
# The location of the library which contains fipscanister.o
|
|
||||||
# normally it will be libcrypto unless fipsdso is set in which
|
|
||||||
# case it will be libfips. If not compiling in FIPS mode at all
|
|
||||||
# this is empty making it a useful test for a FIPS compile.
|
|
||||||
|
|
||||||
FIPSCANLIB=
|
|
||||||
|
|
||||||
# Shared library base address. Currently only used on Windows.
|
|
||||||
#
|
|
||||||
|
|
||||||
BASEADDR=
|
|
||||||
|
|
||||||
DIRS= crypto fips ssl engines apps test tools
|
|
||||||
SHLIBDIRS= crypto ssl fips
|
|
||||||
|
|
||||||
# dirs in crypto to build
|
# dirs in crypto to build
|
||||||
SDIRS= \
|
SDIRS= \
|
||||||
objects \
|
objects \
|
||||||
md2 md4 md5 sha mdc2 hmac ripemd \
|
md2 md4 md5 sha mdc2 hmac ripemd whrlpool \
|
||||||
des aes rc2 rc4 rc5 idea bf cast camellia seed \
|
des aes rc2 rc4 rc5 idea bf cast camellia seed modes \
|
||||||
bn ec rsa dsa ecdsa dh ecdh dso engine \
|
bn ec rsa dsa ecdsa dh ecdh dso engine \
|
||||||
buffer bio stack lhash rand err \
|
buffer bio stack lhash rand err \
|
||||||
evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5 \
|
evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5 \
|
||||||
store cms pqueue
|
cms pqueue ts jpake store
|
||||||
# keep in mind that the above list is adjusted by ./Configure
|
# keep in mind that the above list is adjusted by ./Configure
|
||||||
# according to no-xxx arguments...
|
# according to no-xxx arguments...
|
||||||
|
|
||||||
@@ -156,6 +134,8 @@ MANDIR=$(OPENSSLDIR)/man
|
|||||||
MAN1=1
|
MAN1=1
|
||||||
MAN3=3
|
MAN3=3
|
||||||
MANSUFFIX=
|
MANSUFFIX=
|
||||||
|
HTMLSUFFIX=html
|
||||||
|
HTMLDIR=$(OPENSSLDIR)/html
|
||||||
SHELL=/bin/sh
|
SHELL=/bin/sh
|
||||||
|
|
||||||
TOP= .
|
TOP= .
|
||||||
@@ -165,14 +145,13 @@ WDIRS= windows
|
|||||||
LIBS= libcrypto.a libssl.a
|
LIBS= libcrypto.a libssl.a
|
||||||
SHARED_CRYPTO=libcrypto$(SHLIB_EXT)
|
SHARED_CRYPTO=libcrypto$(SHLIB_EXT)
|
||||||
SHARED_SSL=libssl$(SHLIB_EXT)
|
SHARED_SSL=libssl$(SHLIB_EXT)
|
||||||
SHARED_FIPS=
|
|
||||||
SHARED_LIBS=
|
SHARED_LIBS=
|
||||||
SHARED_LIBS_LINK_EXTS=
|
SHARED_LIBS_LINK_EXTS=
|
||||||
SHARED_LDFLAGS=
|
SHARED_LDFLAGS=
|
||||||
|
|
||||||
GENERAL= Makefile
|
GENERAL= Makefile
|
||||||
BASENAME= openssl
|
BASENAME= openssl
|
||||||
NAME= $(BASENAME)-fips-$(VERSION)
|
NAME= $(BASENAME)-$(VERSION)
|
||||||
TARFILE= $(NAME).tar
|
TARFILE= $(NAME).tar
|
||||||
WTARFILE= $(NAME)-win.tar
|
WTARFILE= $(NAME)-win.tar
|
||||||
EXHEADER= e_os2.h
|
EXHEADER= e_os2.h
|
||||||
@@ -196,32 +175,34 @@ CLEARENV= TOP= && unset TOP $${LIB+LIB} $${LIBS+LIBS} \
|
|||||||
$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS} \
|
$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS} \
|
||||||
$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
|
$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
|
||||||
|
|
||||||
BUILDENV= PLATFORM='${PLATFORM}' PROCESSOR='${PROCESSOR}' \
|
BUILDENV= PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)' \
|
||||||
CC='${CC}' CFLAG='${CFLAG}' \
|
CC='$(CC)' CFLAG='$(CFLAG)' \
|
||||||
AS='${CC}' ASFLAG='${CFLAG} -c' \
|
AS='$(CC)' ASFLAG='$(CFLAG) -c' \
|
||||||
AR='${AR}' PERL='${PERL}' RANLIB='${RANLIB}' \
|
AR='$(AR)' NM='$(NM)' RANLIB='$(RANLIB)' \
|
||||||
SDIRS='${SDIRS}' LIBRPATH='${INSTALLTOP}/lib' \
|
CROSS_COMPILE_PREFIX='$(CROSS_COMPILE_PREFIX)' \
|
||||||
INSTALL_PREFIX='${INSTALL_PREFIX}' \
|
PERL='$(PERL)' ENGDIRS='$(ENGDIRS)' \
|
||||||
INSTALLTOP='${INSTALLTOP}' OPENSSLDIR='${OPENSSLDIR}' \
|
SDIRS='$(SDIRS)' LIBRPATH='$(INSTALLTOP)/lib' \
|
||||||
MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD ${MAKEDEPPROG}' \
|
INSTALL_PREFIX='$(INSTALL_PREFIX)' \
|
||||||
DEPFLAG='-DOPENSSL_NO_DEPRECATED ${DEPFLAG}' \
|
INSTALLTOP='$(INSTALLTOP)' OPENSSLDIR='$(OPENSSLDIR)' \
|
||||||
MAKEDEPPROG='${MAKEDEPPROG}' \
|
MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD $(MAKEDEPPROG)' \
|
||||||
SHARED_LDFLAGS='${SHARED_LDFLAGS}' \
|
DEPFLAG='-DOPENSSL_NO_DEPRECATED $(DEPFLAG)' \
|
||||||
KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' \
|
MAKEDEPPROG='$(MAKEDEPPROG)' \
|
||||||
EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' \
|
SHARED_LDFLAGS='$(SHARED_LDFLAGS)' \
|
||||||
SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' \
|
KRB5_INCLUDES='$(KRB5_INCLUDES)' LIBKRB5='$(LIBKRB5)' \
|
||||||
PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' \
|
ZLIB_INCLUDE='$(ZLIB_INCLUDE)' LIBZLIB='$(LIBZLIB)' \
|
||||||
CPUID_OBJ='${CPUID_OBJ}' \
|
EXE_EXT='$(EXE_EXT)' SHARED_LIBS='$(SHARED_LIBS)' \
|
||||||
BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' \
|
SHLIB_EXT='$(SHLIB_EXT)' SHLIB_TARGET='$(SHLIB_TARGET)' \
|
||||||
AES_ASM_OBJ='${AES_ASM_OBJ}' \
|
PEX_LIBS='$(PEX_LIBS)' EX_LIBS='$(EX_LIBS)' \
|
||||||
BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' \
|
CPUID_OBJ='$(CPUID_OBJ)' \
|
||||||
RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' \
|
BN_ASM='$(BN_ASM)' DES_ENC='$(DES_ENC)' \
|
||||||
SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' \
|
AES_ENC='$(AES_ENC)' CMLL_ENC='$(CMLL_ENC)' \
|
||||||
MD5_ASM_OBJ='${MD5_ASM_OBJ}' \
|
BF_ENC='$(BF_ENC)' CAST_ENC='$(CAST_ENC)' \
|
||||||
RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' \
|
RC4_ENC='$(RC4_ENC)' RC5_ENC='$(RC5_ENC)' \
|
||||||
FIPSLIBDIR='${FIPSLIBDIR}' FIPSCANLIB='${FIPSCANLIB}' \
|
SHA1_ASM_OBJ='$(SHA1_ASM_OBJ)' \
|
||||||
FIPSCANISTERINTERNAL='${FIPSCANISTERINTERNAL}' \
|
MD5_ASM_OBJ='$(MD5_ASM_OBJ)' \
|
||||||
FIPS_EX_OBJ='${FIPS_EX_OBJ}' \
|
RMD160_ASM_OBJ='$(RMD160_ASM_OBJ)' \
|
||||||
|
WP_ASM_OBJ='$(WP_ASM_OBJ)' \
|
||||||
|
PERLASM_SCHEME='$(PERLASM_SCHEME)' \
|
||||||
THIS=$${THIS:-$@} MAKEFILE=Makefile MAKEOVERRIDES=
|
THIS=$${THIS:-$@} MAKEFILE=Makefile MAKEOVERRIDES=
|
||||||
# MAKEOVERRIDES= effectively "equalizes" GNU-ish and SysV-ish make flavors,
|
# MAKEOVERRIDES= effectively "equalizes" GNU-ish and SysV-ish make flavors,
|
||||||
# which in turn eliminates ambiguities in variable treatment with -e.
|
# which in turn eliminates ambiguities in variable treatment with -e.
|
||||||
@@ -246,91 +227,20 @@ BUILD_CMD= if [ -d "$$dir" ]; then \
|
|||||||
fi
|
fi
|
||||||
RECURSIVE_BUILD_CMD=for dir in $(DIRS); do $(BUILD_CMD); done
|
RECURSIVE_BUILD_CMD=for dir in $(DIRS); do $(BUILD_CMD); done
|
||||||
BUILD_ONE_CMD=\
|
BUILD_ONE_CMD=\
|
||||||
if echo " $(DIRS) " | grep " $$dir " >/dev/null 2>/dev/null; then \
|
if expr " $(DIRS) " : ".* $$dir " >/dev/null 2>&1; then \
|
||||||
$(BUILD_CMD); \
|
$(BUILD_CMD); \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
reflect:
|
reflect:
|
||||||
@[ -n "$(THIS)" ] && $(CLEARENV) && $(MAKE) $(THIS) -e $(BUILDENV)
|
@[ -n "$(THIS)" ] && $(CLEARENV) && $(MAKE) $(THIS) -e $(BUILDENV)
|
||||||
|
|
||||||
FIPS_EX_OBJ= ../crypto/aes/aes_cfb.o \
|
|
||||||
../crypto/aes/aes_ecb.o \
|
|
||||||
../crypto/aes/aes_ofb.o \
|
|
||||||
../crypto/bn/bn_add.o \
|
|
||||||
../crypto/bn/bn_blind.o \
|
|
||||||
../crypto/bn/bn_ctx.o \
|
|
||||||
../crypto/bn/bn_div.o \
|
|
||||||
../crypto/bn/bn_exp2.o \
|
|
||||||
../crypto/bn/bn_exp.o \
|
|
||||||
../crypto/bn/bn_gcd.o \
|
|
||||||
../crypto/bn/bn_lib.o \
|
|
||||||
../crypto/bn/bn_mod.o \
|
|
||||||
../crypto/bn/bn_mont.o \
|
|
||||||
../crypto/bn/bn_mul.o \
|
|
||||||
../crypto/bn/bn_prime.o \
|
|
||||||
../crypto/bn/bn_rand.o \
|
|
||||||
../crypto/bn/bn_recp.o \
|
|
||||||
../crypto/bn/bn_shift.o \
|
|
||||||
../crypto/bn/bn_sqr.o \
|
|
||||||
../crypto/bn/bn_word.o \
|
|
||||||
../crypto/bn/bn_x931p.o \
|
|
||||||
../crypto/buffer/buf_str.o \
|
|
||||||
../crypto/cryptlib.o \
|
|
||||||
../crypto/des/cfb64ede.o \
|
|
||||||
../crypto/des/cfb64enc.o \
|
|
||||||
../crypto/des/cfb_enc.o \
|
|
||||||
../crypto/des/ecb3_enc.o \
|
|
||||||
../crypto/des/ecb_enc.o \
|
|
||||||
../crypto/des/ofb64ede.o \
|
|
||||||
../crypto/des/ofb64enc.o \
|
|
||||||
../crypto/des/fcrypt.o \
|
|
||||||
../crypto/des/set_key.o \
|
|
||||||
../crypto/dsa/dsa_utl.o \
|
|
||||||
../crypto/dsa/dsa_sign.o \
|
|
||||||
../crypto/dsa/dsa_vrf.o \
|
|
||||||
../crypto/err/err.o \
|
|
||||||
../crypto/evp/digest.o \
|
|
||||||
../crypto/evp/enc_min.o \
|
|
||||||
../crypto/evp/e_aes.o \
|
|
||||||
../crypto/evp/e_des3.o \
|
|
||||||
../crypto/evp/p_sign.o \
|
|
||||||
../crypto/evp/p_verify.o \
|
|
||||||
../crypto/mem_clr.o \
|
|
||||||
../crypto/mem.o \
|
|
||||||
../crypto/rand/md_rand.o \
|
|
||||||
../crypto/rand/rand_egd.o \
|
|
||||||
../crypto/rand/randfile.o \
|
|
||||||
../crypto/rand/rand_lib.o \
|
|
||||||
../crypto/rand/rand_os2.o \
|
|
||||||
../crypto/rand/rand_unix.o \
|
|
||||||
../crypto/rand/rand_win.o \
|
|
||||||
../crypto/rsa/rsa_lib.o \
|
|
||||||
../crypto/rsa/rsa_none.o \
|
|
||||||
../crypto/rsa/rsa_oaep.o \
|
|
||||||
../crypto/rsa/rsa_pk1.o \
|
|
||||||
../crypto/rsa/rsa_pss.o \
|
|
||||||
../crypto/rsa/rsa_ssl.o \
|
|
||||||
../crypto/rsa/rsa_x931.o \
|
|
||||||
../crypto/sha/sha1dgst.o \
|
|
||||||
../crypto/sha/sha256.o \
|
|
||||||
../crypto/sha/sha512.o \
|
|
||||||
../crypto/uid.o
|
|
||||||
|
|
||||||
sub_all: build_all
|
sub_all: build_all
|
||||||
build_all: build_libs build_apps build_tests build_tools
|
build_all: build_libs build_apps build_tests build_tools
|
||||||
|
|
||||||
build_libs: build_crypto build_fips build_ssl build_shared build_engines
|
build_libs: build_crypto build_ssl build_engines
|
||||||
|
|
||||||
build_crypto:
|
build_crypto:
|
||||||
if [ -n "$(FIPSCANLIB)" ]; then \
|
@dir=crypto; target=all; $(BUILD_ONE_CMD)
|
||||||
EXCL_OBJ='$(AES_ASM_OBJ) $(BN_ASM) $(DES_ENC) $(CPUID_OBJ) $(SHA1_ASM_OBJ) $(FIPS_EX_OBJ)' ; export EXCL_OBJ ; \
|
|
||||||
ARX='$(PERL) $${TOP}/util/arx.pl $(AR)' ; \
|
|
||||||
else \
|
|
||||||
ARX='${AR}' ; \
|
|
||||||
fi ; export ARX ; \
|
|
||||||
dir=crypto; target=all; $(BUILD_ONE_CMD)
|
|
||||||
build_fips:
|
|
||||||
@dir=fips; target=all; [ -z "$(FIPSCANLIB)" ] || $(BUILD_ONE_CMD)
|
|
||||||
build_ssl:
|
build_ssl:
|
||||||
@dir=ssl; target=all; $(BUILD_ONE_CMD)
|
@dir=ssl; target=all; $(BUILD_ONE_CMD)
|
||||||
build_engines:
|
build_engines:
|
||||||
@@ -346,20 +256,9 @@ all_testapps: build_libs build_testapps
|
|||||||
build_testapps:
|
build_testapps:
|
||||||
@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
|
@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
build_shared: $(SHARED_LIBS)
|
libcrypto$(SHLIB_EXT): libcrypto.a
|
||||||
libcrypto$(SHLIB_EXT): libcrypto.a $(SHARED_FIPS)
|
|
||||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||||
if [ "$(FIPSCANLIB)" = "libfips" ]; then \
|
$(MAKE) SHLIBDIRS=crypto build-shared; \
|
||||||
$(ARD) libcrypto.a fipscanister.o ; \
|
|
||||||
$(MAKE) SHLIBDIRS='crypto' SHLIBDEPS='-lfips' build-shared; \
|
|
||||||
$(AR) libcrypto.a fips/fipscanister.o ; \
|
|
||||||
else \
|
|
||||||
if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
|
|
||||||
FIPSLD_CC=$(CC); CC=fips/fipsld; \
|
|
||||||
export CC FIPSLD_CC; \
|
|
||||||
fi; \
|
|
||||||
$(MAKE) -e SHLIBDIRS='crypto' build-shared; \
|
|
||||||
fi \
|
|
||||||
else \
|
else \
|
||||||
echo "There's no support for shared libraries on this platform" >&2; \
|
echo "There's no support for shared libraries on this platform" >&2; \
|
||||||
exit 1; \
|
exit 1; \
|
||||||
@@ -367,32 +266,12 @@ libcrypto$(SHLIB_EXT): libcrypto.a $(SHARED_FIPS)
|
|||||||
|
|
||||||
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
|
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
|
||||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||||
shlibdeps=-lcrypto; \
|
$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \
|
||||||
[ "$(FIPSCANLIB)" = "libfips" ] && shlibdeps="$$shlibdeps -lfips"; \
|
|
||||||
$(MAKE) SHLIBDIRS=ssl SHLIBDEPS="$$shlibdeps" build-shared; \
|
|
||||||
else \
|
else \
|
||||||
echo "There's no support for shared libraries on this platform" >&2; \
|
echo "There's no support for shared libraries on this platform" >&2; \
|
||||||
exit 1; \
|
exit 1; \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
fips/fipscanister.o: build_fips
|
|
||||||
libfips$(SHLIB_EXT): fips/fipscanister.o
|
|
||||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
|
||||||
FIPSLD_CC=$(CC); CC=fips/fipsld; export CC FIPSLD_CC; \
|
|
||||||
$(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
|
||||||
CC=$${CC} LIBNAME=fips THIS=$@ \
|
|
||||||
LIBEXTRAS=fips/fipscanister.o \
|
|
||||||
LIBDEPS="$(EX_LIBS)" \
|
|
||||||
LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
|
||||||
link_o.$(SHLIB_TARGET) || { rm -f $@; exit 1; } \
|
|
||||||
else \
|
|
||||||
echo "There's no support for shared libraries on this platform" >&2; \
|
|
||||||
exit 1; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
libfips.a:
|
|
||||||
dir=fips; target=all; $(BUILD_ONE_CMD)
|
|
||||||
|
|
||||||
clean-shared:
|
clean-shared:
|
||||||
@set -e; for i in $(SHLIBDIRS); do \
|
@set -e; for i in $(SHLIBDIRS); do \
|
||||||
if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
|
if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
|
||||||
@@ -408,10 +287,10 @@ clean-shared:
|
|||||||
done
|
done
|
||||||
|
|
||||||
link-shared:
|
link-shared:
|
||||||
@ set -e; for i in ${SHLIBDIRS}; do \
|
@ set -e; for i in $(SHLIBDIRS); do \
|
||||||
$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
|
$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
|
||||||
LIBNAME=$$i LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
||||||
LIBCOMPATVERSIONS=";${SHLIB_VERSION_HISTORY}" \
|
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
||||||
symlink.$(SHLIB_TARGET); \
|
symlink.$(SHLIB_TARGET); \
|
||||||
libs="$$libs -l$$i"; \
|
libs="$$libs -l$$i"; \
|
||||||
done
|
done
|
||||||
@@ -419,13 +298,13 @@ link-shared:
|
|||||||
build-shared: do_$(SHLIB_TARGET) link-shared
|
build-shared: do_$(SHLIB_TARGET) link-shared
|
||||||
|
|
||||||
do_$(SHLIB_TARGET):
|
do_$(SHLIB_TARGET):
|
||||||
@ set -e; libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
@ set -e; libs='-L. $(SHLIBDEPS)'; for i in $(SHLIBDIRS); do \
|
||||||
if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
|
if [ "$(SHLIBDIRS)" = "ssl" -a -n "$(LIBKRB5)" ]; then \
|
||||||
libs="$(LIBKRB5) $$libs"; \
|
libs="$(LIBKRB5) $$libs"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
||||||
LIBNAME=$$i LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
||||||
LIBCOMPATVERSIONS=";${SHLIB_VERSION_HISTORY}" \
|
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
||||||
LIBDEPS="$$libs $(EX_LIBS)" \
|
LIBDEPS="$$libs $(EX_LIBS)" \
|
||||||
link_a.$(SHLIB_TARGET); \
|
link_a.$(SHLIB_TARGET); \
|
||||||
libs="-l$$i $$libs"; \
|
libs="-l$$i $$libs"; \
|
||||||
@@ -505,26 +384,29 @@ links:
|
|||||||
|
|
||||||
gentests:
|
gentests:
|
||||||
@(cd test && echo "generating dummy tests (if needed)..." && \
|
@(cd test && echo "generating dummy tests (if needed)..." && \
|
||||||
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on generate );
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on generate );
|
||||||
|
|
||||||
dclean:
|
dclean:
|
||||||
rm -f *.bak
|
rm -rf *.bak include/openssl certs/.0
|
||||||
@set -e; target=dclean; $(RECURSIVE_BUILD_CMD)
|
@set -e; target=dclean; $(RECURSIVE_BUILD_CMD)
|
||||||
|
|
||||||
rehash: rehash.time
|
rehash: rehash.time
|
||||||
rehash.time: certs
|
rehash.time: certs apps
|
||||||
@(OPENSSL="`pwd`/util/opensslwrap.sh"; \
|
@if [ -z "$(CROSS_COMPILE_PREFIX)" ]; then \
|
||||||
|
(OPENSSL="`pwd`/util/opensslwrap.sh"; \
|
||||||
|
[ -x "apps/openssl.exe" ] && OPENSSL="apps/openssl.exe" || :; \
|
||||||
OPENSSL_DEBUG_MEMORY=on; \
|
OPENSSL_DEBUG_MEMORY=on; \
|
||||||
export OPENSSL OPENSSL_DEBUG_MEMORY; \
|
export OPENSSL OPENSSL_DEBUG_MEMORY; \
|
||||||
$(PERL) tools/c_rehash certs)
|
$(PERL) tools/c_rehash certs) && \
|
||||||
touch rehash.time
|
touch rehash.time; \
|
||||||
|
else :; fi
|
||||||
|
|
||||||
test: tests
|
test: tests
|
||||||
|
|
||||||
tests: rehash
|
tests: rehash
|
||||||
@(cd test && echo "testing..." && \
|
@(cd test && echo "testing..." && \
|
||||||
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on tests );
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on OPENSSL_CONF=../apps/openssl.cnf tests );
|
||||||
util/opensslwrap.sh version -a
|
OPENSSL_CONF=apps/openssl.cnf util/opensslwrap.sh version -a
|
||||||
|
|
||||||
report:
|
report:
|
||||||
@$(PERL) util/selftest.pl
|
@$(PERL) util/selftest.pl
|
||||||
@@ -557,6 +439,8 @@ crypto/objects/obj_dat.h: crypto/objects/obj_dat.pl crypto/objects/obj_mac.h
|
|||||||
$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
||||||
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
|
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
|
||||||
$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
||||||
|
crypto/objects/obj_xref.h: crypto/objects/objxref.pl crypto/objects/obj_xref.txt crypto/objects/obj_mac.num
|
||||||
|
$(PERL) crypto/objects/objxref.pl crypto/objects/obj_mac.num crypto/objects/obj_xref.txt >crypto/objects/obj_xref.h
|
||||||
|
|
||||||
apps/openssl-vms.cnf: apps/openssl.cnf
|
apps/openssl-vms.cnf: apps/openssl.cnf
|
||||||
$(PERL) VMS/VMSify-conf.pl < apps/openssl.cnf > apps/openssl-vms.cnf
|
$(PERL) VMS/VMSify-conf.pl < apps/openssl.cnf > apps/openssl-vms.cnf
|
||||||
@@ -569,7 +453,7 @@ TABLE: Configure
|
|||||||
(echo 'Output of `Configure TABLE'"':"; \
|
(echo 'Output of `Configure TABLE'"':"; \
|
||||||
$(PERL) Configure TABLE) > TABLE
|
$(PERL) Configure TABLE) > TABLE
|
||||||
|
|
||||||
update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h apps/openssl-vms.cnf crypto/bn/bn_prime.h TABLE depend
|
update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h crypto/objects/obj_xref.h apps/openssl-vms.cnf crypto/bn/bn_prime.h TABLE depend
|
||||||
|
|
||||||
# Build distribution tar-file. As the list of files returned by "find" is
|
# Build distribution tar-file. As the list of files returned by "find" is
|
||||||
# pretty long, on several platforms a "too many arguments" error or similar
|
# pretty long, on several platforms a "too many arguments" error or similar
|
||||||
@@ -584,7 +468,7 @@ tar:
|
|||||||
$(TAR) $(TARFLAGS) --files-from ../$(TARFILE).list -cvf - | \
|
$(TAR) $(TARFLAGS) --files-from ../$(TARFILE).list -cvf - | \
|
||||||
tardy --user_number=0 --user_name=openssl \
|
tardy --user_number=0 --user_name=openssl \
|
||||||
--group_number=0 --group_name=openssl \
|
--group_number=0 --group_name=openssl \
|
||||||
--prefix=openssl-fips-$(VERSION) - |\
|
--prefix=openssl-$(VERSION) - |\
|
||||||
gzip --best >../$(TARFILE).gz; \
|
gzip --best >../$(TARFILE).gz; \
|
||||||
rm -f ../$(TARFILE).list; \
|
rm -f ../$(TARFILE).list; \
|
||||||
ls -l ../$(TARFILE).gz
|
ls -l ../$(TARFILE).gz
|
||||||
@@ -600,13 +484,13 @@ tar-snap:
|
|||||||
dist:
|
dist:
|
||||||
$(PERL) Configure dist
|
$(PERL) Configure dist
|
||||||
@$(MAKE) dist_pem_h
|
@$(MAKE) dist_pem_h
|
||||||
@$(MAKE) SDIRS='${SDIRS}' clean
|
@$(MAKE) SDIRS='$(SDIRS)' clean
|
||||||
@$(MAKE) TAR='${TAR}' TARFLAGS='${TARFLAGS}' tar
|
@$(MAKE) TAR='$(TAR)' TARFLAGS='$(TARFLAGS)' tar
|
||||||
|
|
||||||
dist_pem_h:
|
dist_pem_h:
|
||||||
(cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean)
|
(cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean)
|
||||||
|
|
||||||
install: all install_sw
|
install: all install_docs install_sw
|
||||||
|
|
||||||
install_sw:
|
install_sw:
|
||||||
@$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \
|
@$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \
|
||||||
@@ -652,6 +536,16 @@ install_sw:
|
|||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
|
||||||
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
|
||||||
fi ); \
|
fi ); \
|
||||||
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
|
( case $$i in \
|
||||||
|
*crypto*) i=libeay32.dll;; \
|
||||||
|
*ssl*) i=ssleay32.dll;; \
|
||||||
|
esac; \
|
||||||
|
echo installing $$i; \
|
||||||
|
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new; \
|
||||||
|
chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new; \
|
||||||
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i ); \
|
||||||
|
fi; \
|
||||||
fi; \
|
fi; \
|
||||||
done; \
|
done; \
|
||||||
( here="`pwd`"; \
|
( here="`pwd`"; \
|
||||||
@@ -671,6 +565,27 @@ install_sw:
|
|||||||
cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig
|
cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig/openssl.pc
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig/openssl.pc
|
||||||
|
|
||||||
|
install_html_docs:
|
||||||
|
here="`pwd`"; \
|
||||||
|
for subdir in apps crypto ssl; do \
|
||||||
|
mkdir -p $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir; \
|
||||||
|
for i in doc/$$subdir/*.pod; do \
|
||||||
|
fn=`basename $$i .pod`; \
|
||||||
|
echo "installing html/$$fn.$(HTMLSUFFIX)"; \
|
||||||
|
cat $$i \
|
||||||
|
| sed -r 's/L<([^)]*)(\([0-9]\))?\|([^)]*)(\([0-9]\))?>/L<\1|\3>/g' \
|
||||||
|
| pod2html --podroot=doc --htmlroot=.. --podpath=apps:crypto:ssl \
|
||||||
|
| sed -r 's/<!DOCTYPE.*//g' \
|
||||||
|
> $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir/$$fn.$(HTMLSUFFIX); \
|
||||||
|
$(PERL) util/extract-names.pl < $$i | \
|
||||||
|
grep -v $$filecase "^$$fn\$$" | \
|
||||||
|
(cd $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir; \
|
||||||
|
while read n; do \
|
||||||
|
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$(HTMLSUFFIX) "$$n".$(HTMLSUFFIX); \
|
||||||
|
done); \
|
||||||
|
done; \
|
||||||
|
done
|
||||||
|
|
||||||
install_docs:
|
install_docs:
|
||||||
@$(PERL) $(TOP)/util/mkdir-p.pl \
|
@$(PERL) $(TOP)/util/mkdir-p.pl \
|
||||||
$(INSTALL_PREFIX)$(MANDIR)/man1 \
|
$(INSTALL_PREFIX)$(MANDIR)/man1 \
|
||||||
@@ -697,7 +612,7 @@ install_docs:
|
|||||||
(grep -v "[ ]"; true) | \
|
(grep -v "[ ]"; true) | \
|
||||||
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
||||||
while read n; do \
|
while read n; do \
|
||||||
$$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
||||||
done); \
|
done); \
|
||||||
done; \
|
done; \
|
||||||
set -e; for i in doc/crypto/*.pod doc/ssl/*.pod; do \
|
set -e; for i in doc/crypto/*.pod doc/ssl/*.pod; do \
|
||||||
@@ -714,7 +629,7 @@ install_docs:
|
|||||||
(grep -v "[ ]"; true) | \
|
(grep -v "[ ]"; true) | \
|
||||||
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
||||||
while read n; do \
|
while read n; do \
|
||||||
$$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
||||||
done); \
|
done); \
|
||||||
done
|
done
|
||||||
|
|
||||||
|
|||||||
124
Makefile.shared
124
Makefile.shared
@@ -14,6 +14,8 @@ CFLAGS=$(CFLAG)
|
|||||||
LDFLAGS=
|
LDFLAGS=
|
||||||
SHARED_LDFLAGS=
|
SHARED_LDFLAGS=
|
||||||
|
|
||||||
|
NM=nm
|
||||||
|
|
||||||
# LIBNAME contains just the name of the library, without prefix ("lib"
|
# LIBNAME contains just the name of the library, without prefix ("lib"
|
||||||
# on Unix, "cyg" for certain forms under Cygwin...) or suffix (.a, .so,
|
# on Unix, "cyg" for certain forms under Cygwin...) or suffix (.a, .so,
|
||||||
# .dll, ...). This one MUST have a value when using this makefile to
|
# .dll, ...). This one MUST have a value when using this makefile to
|
||||||
@@ -91,7 +93,7 @@ LINK_APP= \
|
|||||||
( $(SET_X); \
|
( $(SET_X); \
|
||||||
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
LDCMD="$${LDCMD:-$(CC)}"; LDFLAGS="$${LDFLAGS:-$(CFLAGS)}"; \
|
LDCMD="$${LDCMD:-$(CC)}"; LDFLAGS="$${LDFLAGS:-$(CFLAGS)}"; \
|
||||||
LIBPATH=`for x in $$LIBDEPS; do if echo $$x | grep '^ *-L' > /dev/null 2>&1; then echo $$x | sed -e 's/^ *-L//'; fi; done | uniq`; \
|
LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \
|
||||||
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
||||||
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
||||||
$${LDCMD} $${LDFLAGS} -o $${APPNAME:=$(APPNAME)} $(OBJECTS) $${LIBDEPS} )
|
$${LDCMD} $${LDFLAGS} -o $${APPNAME:=$(APPNAME)} $(OBJECTS) $${LIBDEPS} )
|
||||||
@@ -101,7 +103,7 @@ LINK_SO= \
|
|||||||
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
SHAREDCMD="$${SHAREDCMD:-$(CC)}"; \
|
SHAREDCMD="$${SHAREDCMD:-$(CC)}"; \
|
||||||
SHAREDFLAGS="$${SHAREDFLAGS:-$(CFLAGS) $(SHARED_LDFLAGS)}"; \
|
SHAREDFLAGS="$${SHAREDFLAGS:-$(CFLAGS) $(SHARED_LDFLAGS)}"; \
|
||||||
LIBPATH=`for x in $$LIBDEPS; do if echo $$x | grep '^ *-L' > /dev/null 2>&1; then echo $$x | sed -e 's/^ *-L//'; fi; done | uniq`; \
|
LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \
|
||||||
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
||||||
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
||||||
$${SHAREDCMD} $${SHAREDFLAGS} \
|
$${SHAREDCMD} $${SHAREDFLAGS} \
|
||||||
@@ -142,7 +144,7 @@ LINK_SO_A_UNPACKED= \
|
|||||||
SHOBJECTS=$$UNPACKDIR/*.o; \
|
SHOBJECTS=$$UNPACKDIR/*.o; \
|
||||||
$(LINK_SO) && rm -rf $$UNPACKDIR
|
$(LINK_SO) && rm -rf $$UNPACKDIR
|
||||||
|
|
||||||
DETECT_GNU_LD=(${CC} -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
|
DETECT_GNU_LD=($(CC) -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
|
||||||
|
|
||||||
DO_GNU_SO=$(CALC_VERSIONS); \
|
DO_GNU_SO=$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -168,8 +170,19 @@ link_a.gnu:
|
|||||||
link_app.gnu:
|
link_app.gnu:
|
||||||
@ $(DO_GNU_APP); $(LINK_APP)
|
@ $(DO_GNU_APP); $(LINK_APP)
|
||||||
|
|
||||||
|
DO_BEOS_SO= SHLIB=lib$(LIBNAME).so; \
|
||||||
|
SHLIB_SUFFIX=; \
|
||||||
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SUFFIX"
|
||||||
|
|
||||||
|
link_o.beos:
|
||||||
|
@ $(DO_BEOS_SO); $(LINK_SO_O)
|
||||||
|
link_a.beos:
|
||||||
|
@ $(DO_BEOS_SO); $(LINK_SO_A)
|
||||||
|
|
||||||
link_o.bsd:
|
link_o.bsd:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
@@ -179,7 +192,7 @@ link_o.bsd:
|
|||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
||||||
fi; $(LINK_SO_O)
|
fi; $(LINK_SO_O)
|
||||||
link_a.bsd:
|
link_a.bsd:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
@@ -189,7 +202,7 @@ link_a.bsd:
|
|||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
||||||
fi; $(LINK_SO_A)
|
fi; $(LINK_SO_A)
|
||||||
link_app.bsd:
|
link_app.bsd:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_APP); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_APP); else \
|
||||||
LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBPATH)"; \
|
LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBPATH)"; \
|
||||||
fi; $(LINK_APP)
|
fi; $(LINK_APP)
|
||||||
|
|
||||||
@@ -200,10 +213,8 @@ link_app.bsd:
|
|||||||
# to use native NSModule(3) API and refers to dlfcn as termporary hack.
|
# to use native NSModule(3) API and refers to dlfcn as termporary hack.
|
||||||
link_o.darwin:
|
link_o.darwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=`expr "$$THIS" : '.*/\([^/\.]*\)\.'`; \
|
SHLIB=lib$(LIBNAME); \
|
||||||
SHLIB=$${SHLIB:-lib$(LIBNAME)}; \
|
SHLIB_SUFFIX=.so; \
|
||||||
SHLIB_SUFFIX=`expr "$$THIS" : '.*\(\.[^\.]*\)$$'`; \
|
|
||||||
SHLIB_SUFFIX=$${SHLIB_SUFFIX:-.so}; \
|
|
||||||
ALLSYMSFLAGS='-all_load'; \
|
ALLSYMSFLAGS='-all_load'; \
|
||||||
NOALLSYMSFLAGS=''; \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS)"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS)"; \
|
||||||
@@ -227,7 +238,7 @@ link_a.darwin:
|
|||||||
if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
|
if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
|
||||||
SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
|
||||||
fi; \
|
fi; \
|
||||||
SHAREDFLAGS="$$SHAREDFLAGS -install_name ${INSTALLTOP}/lib/$$SHLIB${SHLIB_EXT}"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -install_name $(INSTALLTOP)/lib/$$SHLIB$(SHLIB_EXT)"; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
link_app.darwin: # is there run-path on darwin?
|
link_app.darwin: # is there run-path on darwin?
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
@@ -237,40 +248,59 @@ link_o.cygwin:
|
|||||||
INHIBIT_SYMLINKS=yes; \
|
INHIBIT_SYMLINKS=yes; \
|
||||||
SHLIB=cyg$(LIBNAME); \
|
SHLIB=cyg$(LIBNAME); \
|
||||||
base=-Wl,--enable-auto-image-base; \
|
base=-Wl,--enable-auto-image-base; \
|
||||||
|
deffile=; \
|
||||||
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
SHLIB=$(LIBNAME)eay32; base=; \
|
SHLIB=$(LIBNAME)eay32; base=; \
|
||||||
|
if test -f $(LIBNAME)eay32.def; then \
|
||||||
|
deffile=$(LIBNAME)eay32.def; \
|
||||||
|
fi; \
|
||||||
fi; \
|
fi; \
|
||||||
SHLIB_SUFFIX=.dll; \
|
SHLIB_SUFFIX=.dll; \
|
||||||
LIBVERSION="$(LIBVERSION)"; \
|
LIBVERSION="$(LIBVERSION)"; \
|
||||||
SHLIB_SOVER=${LIBVERSION:+"-$(LIBVERSION)"}; \
|
SHLIB_SOVER=${LIBVERSION:+"-$(LIBVERSION)"}; \
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base $$deffile -Wl,-s,-Bsymbolic"; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
|
#for mingw target if def-file is in use dll-name should match library-name
|
||||||
link_a.cygwin:
|
link_a.cygwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
INHIBIT_SYMLINKS=yes; \
|
INHIBIT_SYMLINKS=yes; \
|
||||||
SHLIB=cyg$(LIBNAME); \
|
SHLIB=cyg$(LIBNAME); SHLIB_SOVER=-$(LIBVERSION); SHLIB_SUFFIX=.dll; \
|
||||||
|
dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; extras=; \
|
||||||
base=-Wl,--enable-auto-image-base; \
|
base=-Wl,--enable-auto-image-base; \
|
||||||
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
SHLIB=$(LIBNAME)eay32; \
|
case $(LIBNAME) in \
|
||||||
|
crypto) SHLIB=libeay;; \
|
||||||
|
ssl) SHLIB=ssleay;; \
|
||||||
|
esac; \
|
||||||
|
SHLIB_SOVER=32; \
|
||||||
|
extras="$(LIBNAME).def"; \
|
||||||
|
$(PERL) util/mkdef.pl 32 $$SHLIB > $$extras; \
|
||||||
base=; [ $(LIBNAME) = "crypto" ] && base=-Wl,--image-base,0x63000000; \
|
base=; [ $(LIBNAME) = "crypto" ] && base=-Wl,--image-base,0x63000000; \
|
||||||
fi; \
|
fi; \
|
||||||
SHLIB_SUFFIX=.dll; \
|
dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; \
|
||||||
SHLIB_SOVER=-$(LIBVERSION); \
|
$(PERL) util/mkrc.pl $$dll_name | \
|
||||||
|
$(CROSS_COMPILE_PREFIX)windres -o rc.o; \
|
||||||
|
extras="$$extras rc.o"; \
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-s,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a $$extras"; \
|
||||||
[ -f apps/$$SHLIB$$SHLIB_SUFFIX ] && rm apps/$$SHLIB$$SHLIB_SUFFIX; \
|
[ -f apps/$$dll_name ] && rm apps/$$dll_name; \
|
||||||
[ -f test/$$SHLIB$$SHLIB_SUFFIX ] && rm test/$$SHLIB$$SHLIB_SUFFIX; \
|
[ -f test/$$dll_name ] && rm test/$$dll_name; \
|
||||||
$(LINK_SO_A) || exit 1; \
|
$(LINK_SO_A) || exit 1; \
|
||||||
cp -p $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX apps/; \
|
rm $$extras; \
|
||||||
cp -p $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX test/
|
cp -p $$dll_name apps/; \
|
||||||
|
cp -p $$dll_name test/
|
||||||
link_app.cygwin:
|
link_app.cygwin:
|
||||||
|
@if expr "$(CFLAGS)" : '.*OPENSSL_USE_APPLINK' > /dev/null; then \
|
||||||
|
LIBDEPS="$(TOP)/crypto/applink.o $${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
|
export LIBDEPS; \
|
||||||
|
fi; \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.alpha-osf1:
|
link_o.alpha-osf1:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -291,7 +321,7 @@ link_o.alpha-osf1:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.alpha-osf1:
|
link_a.alpha-osf1:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -312,7 +342,7 @@ link_a.alpha-osf1:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
link_app.alpha-osf1:
|
link_app.alpha-osf1:
|
||||||
@if ${DETECT_GNU_LD}; then \
|
@if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_APP); \
|
$(DO_GNU_APP); \
|
||||||
else \
|
else \
|
||||||
LDFLAGS="$(CFLAGS) -rpath $(LIBRPATH)"; \
|
LDFLAGS="$(CFLAGS) -rpath $(LIBRPATH)"; \
|
||||||
@@ -320,7 +350,7 @@ link_app.alpha-osf1:
|
|||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.solaris:
|
link_o.solaris:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -334,12 +364,12 @@ link_o.solaris:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.solaris:
|
link_a.solaris:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
MINUSZ='-z '; \
|
MINUSZ='-z '; \
|
||||||
(${CC} -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
|
($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=;\
|
SHLIB_SUFFIX=;\
|
||||||
ALLSYMSFLAGS="$${MINUSZ}allextract"; \
|
ALLSYMSFLAGS="$${MINUSZ}allextract"; \
|
||||||
@@ -348,7 +378,7 @@ link_a.solaris:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
link_app.solaris:
|
link_app.solaris:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_APP); \
|
$(DO_GNU_APP); \
|
||||||
else \
|
else \
|
||||||
LDFLAGS="$(CFLAGS) -R $(LIBRPATH)"; \
|
LDFLAGS="$(CFLAGS) -R $(LIBRPATH)"; \
|
||||||
@@ -357,7 +387,7 @@ link_app.solaris:
|
|||||||
|
|
||||||
# OpenServer 5 native compilers used
|
# OpenServer 5 native compilers used
|
||||||
link_o.svr3:
|
link_o.svr3:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -369,7 +399,7 @@ link_o.svr3:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.svr3:
|
link_a.svr3:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -381,12 +411,12 @@ link_a.svr3:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A_UNPACKED)
|
$(LINK_SO_A_UNPACKED)
|
||||||
link_app.svr3:
|
link_app.svr3:
|
||||||
@${DETECT_GNU_LD} && $(DO_GNU_APP); \
|
@$(DETECT_GNU_LD) && $(DO_GNU_APP); \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
# UnixWare 7 and OpenUNIX 8 native compilers used
|
# UnixWare 7 and OpenUNIX 8 native compilers used
|
||||||
link_o.svr5:
|
link_o.svr5:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -400,12 +430,12 @@ link_o.svr5:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.svr5:
|
link_a.svr5:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHARE_FLAG='-G'; \
|
SHARE_FLAG='-G'; \
|
||||||
(${CC} -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
|
($(CC) -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
ALLSYMSFLAGS=''; \
|
ALLSYMSFLAGS=''; \
|
||||||
@@ -414,11 +444,11 @@ link_a.svr5:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A_UNPACKED)
|
$(LINK_SO_A_UNPACKED)
|
||||||
link_app.svr5:
|
link_app.svr5:
|
||||||
@${DETECT_GNU_LD} && $(DO_GNU_APP); \
|
@$(DETECT_GNU_LD) && $(DO_GNU_APP); \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.irix:
|
link_o.irix:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -432,7 +462,7 @@ link_o.irix:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.irix:
|
link_a.irix:
|
||||||
@ if ${DETECT_GNU_LD}; then \
|
@ if $(DETECT_GNU_LD); then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -458,7 +488,7 @@ link_app.irix:
|
|||||||
# ELFs by the way].
|
# ELFs by the way].
|
||||||
#
|
#
|
||||||
link_o.hpux:
|
link_o.hpux:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).sl; \
|
SHLIB=lib$(LIBNAME).sl; \
|
||||||
expr "$(CFLAGS)" : '.*DSO_DLFCN' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
expr "$(CFLAGS)" : '.*DSO_DLFCN' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -471,7 +501,7 @@ link_o.hpux:
|
|||||||
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
||||||
$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
||||||
link_a.hpux:
|
link_a.hpux:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).sl; \
|
SHLIB=lib$(LIBNAME).sl; \
|
||||||
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -484,30 +514,30 @@ link_a.hpux:
|
|||||||
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
||||||
$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
||||||
link_app.hpux:
|
link_app.hpux:
|
||||||
@if ${DETECT_GNU_LD}; then $(DO_GNU_APP); else \
|
@if $(DETECT_GNU_LD); then $(DO_GNU_APP); else \
|
||||||
LDFLAGS="$(CFLAGS) -Wl,+s,+cdp,../:,+cdp,./:,+b,$(LIBRPATH)"; \
|
LDFLAGS="$(CFLAGS) -Wl,+s,+cdp,../:,+cdp,./:,+b,$(LIBRPATH)"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.aix:
|
link_o.aix:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
OBJECT_MODE=`expr x$(SHARED_LDFLAGS) : 'x\-[a-z]*\(64\)'` || :; \
|
OBJECT_MODE=`expr "x$(SHARED_LDFLAGS)" : 'x\-[a-z]*\(64\)'` || :; \
|
||||||
OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
|
OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
ALLSYMSFLAGS=''; \
|
ALLSYMSFLAGS=''; \
|
||||||
NOALLSYMSFLAGS=''; \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-G,-bexpall,-bnolibpath,-bM:SRE'; \
|
SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-bexpall,-bnolibpath,-bM:SRE'; \
|
||||||
$(LINK_SO_O);
|
$(LINK_SO_O);
|
||||||
link_a.aix:
|
link_a.aix:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
OBJECT_MODE=`expr x$(SHARED_LDFLAGS) : 'x\-[a-z]*\(64\)'` || : ; \
|
OBJECT_MODE=`expr "x$(SHARED_LDFLAGS)" : 'x\-[a-z]*\(64\)'` || : ; \
|
||||||
OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
|
OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
ALLSYMSFLAGS='-bnogc'; \
|
ALLSYMSFLAGS='-bnogc'; \
|
||||||
NOALLSYMSFLAGS=''; \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-G,-bexpall,-bnolibpath,-bM:SRE'; \
|
SHAREDFLAGS='$(CFLAGS) $(SHARED_LDFLAGS) -Wl,-bexpall,-bnolibpath,-bM:SRE'; \
|
||||||
$(LINK_SO_A_VIA_O)
|
$(LINK_SO_A_VIA_O)
|
||||||
link_app.aix:
|
link_app.aix:
|
||||||
LDFLAGS="$(CFLAGS) -Wl,-brtl,-blibpath:$(LIBRPATH):$${LIBPATH:-/usr/lib:/lib}"; \
|
LDFLAGS="$(CFLAGS) -Wl,-brtl,-blibpath:$(LIBRPATH):$${LIBPATH:-/usr/lib:/lib}"; \
|
||||||
@@ -549,7 +579,7 @@ symlink.hpux:
|
|||||||
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
$(SYMLINK_SO)
|
$(SYMLINK_SO)
|
||||||
# The following lines means those specific architectures do no symlinks
|
# The following lines means those specific architectures do no symlinks
|
||||||
symlink.cygwin symlink.alpha-osf1 symlink.tru64 symlink.tru64-rpath:
|
symlink.cygwin symlink.alpha-osf1 symlink.tru64 symlink.tru64-rpath symlink.beos:
|
||||||
|
|
||||||
# Compatibility targets
|
# Compatibility targets
|
||||||
link_o.bsd-gcc-shared link_o.linux-shared link_o.gnu-shared: link_o.gnu
|
link_o.bsd-gcc-shared link_o.linux-shared link_o.gnu-shared: link_o.gnu
|
||||||
@@ -607,3 +637,7 @@ link_o.reliantunix-shared: link_o.reliantunix
|
|||||||
link_a.reliantunix-shared: link_a.reliantunix
|
link_a.reliantunix-shared: link_a.reliantunix
|
||||||
link_app.reliantunix-shared: link_app.reliantunix
|
link_app.reliantunix-shared: link_app.reliantunix
|
||||||
symlink.reliantunix-shared: symlink.reliantunix
|
symlink.reliantunix-shared: symlink.reliantunix
|
||||||
|
link_o.beos-shared: link_o.beos
|
||||||
|
link_a.beos-shared: link_a.beos
|
||||||
|
link_app.beos-shared: link_app.gnu
|
||||||
|
symlink.beos-shared: symlink.beos
|
||||||
|
|||||||
62
NEWS
62
NEWS
@@ -5,6 +5,63 @@
|
|||||||
This file gives a brief overview of the major changes between each OpenSSL
|
This file gives a brief overview of the major changes between each OpenSSL
|
||||||
release. For more details please read the CHANGES file.
|
release. For more details please read the CHANGES file.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8k and OpenSSL 1.0:
|
||||||
|
|
||||||
|
|
||||||
|
o RFC3280 path validation: sufficient to process PKITS tests.
|
||||||
|
o Integrated support for PVK files and keyblobs.
|
||||||
|
o Change default private key format to PKCS#8.
|
||||||
|
o CMS support: able to process all examples in RFC4134
|
||||||
|
o Streaming ASN1 encode support for PKCS#7 and CMS.
|
||||||
|
o Multiple signer and signer add support for PKCS#7 and CMS.
|
||||||
|
o ASN1 printing support.
|
||||||
|
o Whirlpool hash algorithm added.
|
||||||
|
o RFC3161 time stamp support.
|
||||||
|
o New generalised public key API supporting ENGINE based algorithms.
|
||||||
|
o New generalised public key API utilities.
|
||||||
|
o New ENGINE supporting GOST algorithms.
|
||||||
|
o SSL/TLS GOST ciphersuite support.
|
||||||
|
o PKCS#7 and CMS GOST support.
|
||||||
|
o RFC4279 PSK ciphersuite support.
|
||||||
|
o Supported points format extension for ECC ciphersuites.
|
||||||
|
o ecdsa-with-SHA224/256/384/512 signature types.
|
||||||
|
o dsa-with-SHA224 and dsa-with-SHA256 signature types.
|
||||||
|
o Opaque PRF Input TLS extension support.
|
||||||
|
o Updated time routines to avoid OS limitations.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k:
|
||||||
|
|
||||||
|
o Fix various build issues.
|
||||||
|
o Fix security issues (CVE-2009-0590, CVE-2009-0591, CVE-2009-0789)
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j:
|
||||||
|
|
||||||
|
o Fix security issue (CVE-2008-5077)
|
||||||
|
o Merge FIPS 140-2 branch code.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h:
|
||||||
|
|
||||||
|
o CryptoAPI ENGINE support.
|
||||||
|
o Various precautionary measures.
|
||||||
|
o Fix for bugs affecting certificate request creation.
|
||||||
|
o Support for local machine keyset attribute in PKCS#12 files.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g:
|
||||||
|
|
||||||
|
o Backport of CMS functionality to 0.9.8.
|
||||||
|
o Fixes for bugs introduced with 0.9.8f.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f:
|
||||||
|
|
||||||
|
o Add gcc 4.2 support.
|
||||||
|
o Add support for AES and SSE2 assembly lanugauge optimization
|
||||||
|
for VC++ build.
|
||||||
|
o Support for RFC4507bis and server name extensions if explicitly
|
||||||
|
selected at compile time.
|
||||||
|
o DTLS improvements.
|
||||||
|
o RFC4507bis support.
|
||||||
|
o TLS Extensions support.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e:
|
Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e:
|
||||||
|
|
||||||
o Various ciphersuite selection fixes.
|
o Various ciphersuite selection fixes.
|
||||||
@@ -110,6 +167,11 @@
|
|||||||
o Added initial support for Win64.
|
o Added initial support for Win64.
|
||||||
o Added alternate pkg-config files.
|
o Added alternate pkg-config files.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m:
|
||||||
|
|
||||||
|
o FIPS 1.1.1 module linking.
|
||||||
|
o Various ciphersuite selection fixes.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l:
|
Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l:
|
||||||
|
|
||||||
o Introduce limits to prevent malicious key DoS (CVE-2006-2940)
|
o Introduce limits to prevent malicious key DoS (CVE-2006-2940)
|
||||||
|
|||||||
@@ -159,6 +159,8 @@ cd ..\..\..
|
|||||||
echo SHA1
|
echo SHA1
|
||||||
cd crypto\sha\asm
|
cd crypto\sha\asm
|
||||||
perl sha1-586.pl %ASM_MODE% > s1-nw.asm
|
perl sha1-586.pl %ASM_MODE% > s1-nw.asm
|
||||||
|
perl sha256-586.pl %ASM_MODE% > sha256-nw.asm
|
||||||
|
perl sha512-586.pl %ASM_MODE% > sha512-nw.asm
|
||||||
cd ..\..\..
|
cd ..\..\..
|
||||||
|
|
||||||
echo RIPEMD160
|
echo RIPEMD160
|
||||||
@@ -171,6 +173,11 @@ cd crypto\rc5\asm
|
|||||||
perl rc5-586.pl %ASM_MODE% > r5-nw.asm
|
perl rc5-586.pl %ASM_MODE% > r5-nw.asm
|
||||||
cd ..\..\..
|
cd ..\..\..
|
||||||
|
|
||||||
|
echo WHIRLPOOL
|
||||||
|
cd crypto\whrlpool\asm
|
||||||
|
perl wp-mmx.pl %ASM_MODE% > wp-nw.asm
|
||||||
|
cd ..\..\..
|
||||||
|
|
||||||
echo CPUID
|
echo CPUID
|
||||||
cd crypto
|
cd crypto
|
||||||
perl x86cpuid.pl %ASM_MODE% > x86cpuid-nw.asm
|
perl x86cpuid.pl %ASM_MODE% > x86cpuid-nw.asm
|
||||||
|
|||||||
12
README
12
README
@@ -1,16 +1,10 @@
|
|||||||
|
|
||||||
OpenSSL 0.9.8h-fips-dev test version
|
OpenSSL 1.0.0-beta3 15 Jul 2009
|
||||||
|
|
||||||
Copyright (c) 1998-2007 The OpenSSL Project
|
Copyright (c) 1998-2008 The OpenSSL Project
|
||||||
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
||||||
All rights reserved.
|
All rights reserved.
|
||||||
|
|
||||||
WARNING
|
|
||||||
-------
|
|
||||||
|
|
||||||
This version of OpenSSL is a port of the FIPS 140-2 code to OpenSSL
|
|
||||||
0.9.8. See the file README.FIPS for brief usage details.
|
|
||||||
|
|
||||||
DESCRIPTION
|
DESCRIPTION
|
||||||
-----------
|
-----------
|
||||||
|
|
||||||
@@ -167,7 +161,7 @@
|
|||||||
- Stack Traceback (if the application dumps core)
|
- Stack Traceback (if the application dumps core)
|
||||||
|
|
||||||
Report the bug to the OpenSSL project via the Request Tracker
|
Report the bug to the OpenSSL project via the Request Tracker
|
||||||
(http://www.openssl.org/support/rt2.html) by mail to:
|
(http://www.openssl.org/support/rt.html) by mail to:
|
||||||
|
|
||||||
openssl-bugs@openssl.org
|
openssl-bugs@openssl.org
|
||||||
|
|
||||||
|
|||||||
84
README.FIPS
84
README.FIPS
@@ -1,84 +0,0 @@
|
|||||||
Brief instructions on using OpenSSL 0.9.8 FIPS 140-2 test branch.
|
|
||||||
|
|
||||||
NOTE: this distribution is NOT FIPS140-2 validated. These instructions are
|
|
||||||
intended for people who wish to test the OpenSSL FIPS 140-2 1.2 module. More
|
|
||||||
complete instructions will be made available after validation.
|
|
||||||
|
|
||||||
1. Build from test tarball.
|
|
||||||
|
|
||||||
Download the OpenSSL test 1.2 source tree. The current version has the CVS tag
|
|
||||||
FIPS_098_TEST_8 or can be downloaded from:
|
|
||||||
|
|
||||||
ftp://ftp.openssl.org/snapshot/openssl-fips-test-1.2.0.tar.gz
|
|
||||||
|
|
||||||
Ignore any instructions in that tree: they are likely to be out of date.
|
|
||||||
|
|
||||||
If you are using a Unix like environment run the following commands. You may
|
|
||||||
NOT specify ANY other options at this stage.
|
|
||||||
|
|
||||||
./config fipscanisterbuild
|
|
||||||
make
|
|
||||||
make install
|
|
||||||
|
|
||||||
This will build and install the test 1.2 module and binaries under
|
|
||||||
/usr/local/fips-1.0
|
|
||||||
|
|
||||||
For Windows you need VC++, perl and NASM installed. This is now a pure VC++
|
|
||||||
build: no alternative compilers or tools are required. From a VC++ environment
|
|
||||||
do:
|
|
||||||
|
|
||||||
ms\do_fips
|
|
||||||
|
|
||||||
It should report that the compile was successful.
|
|
||||||
|
|
||||||
This will compile binaries into the out32dll directory. They can be copied to
|
|
||||||
a more convenient location.
|
|
||||||
|
|
||||||
2. Link test module to a more recent version of OpenSSL.
|
|
||||||
|
|
||||||
Once the test module has been installed it can be linked against a more recent
|
|
||||||
version of OpenSSL. Currently only versions from the 0.9.8-fips stable branch
|
|
||||||
can be used. It has the CVS tag OpenSSL-fips-0_9_8-stable daily snaphots can
|
|
||||||
also be downloaded as:
|
|
||||||
|
|
||||||
ftp://ftp.openssl.org/snapshot/openssl-0.9.8-fips-test-SNAP-YYMMDD.tar.gz
|
|
||||||
|
|
||||||
For a Unix build the standrd build procedure is followed and the option "fips"
|
|
||||||
is passed to either the config or Configure scripts. The fipscanisterbuild
|
|
||||||
option MUST NOT be used. Any other options may be included. Static libraries
|
|
||||||
can be built using the no-shared option.
|
|
||||||
|
|
||||||
For example:
|
|
||||||
|
|
||||||
./config fips
|
|
||||||
|
|
||||||
./config fips no-shared
|
|
||||||
|
|
||||||
For Windows builds the options "fips" and --with-fipslibdir=<path> are passed
|
|
||||||
to the Configure script where <path> is wherever the module was installed
|
|
||||||
For example:
|
|
||||||
|
|
||||||
perl Configure fips --with-fipslibdir=C:\some\path\fips
|
|
||||||
|
|
||||||
Then the build process continues in the normal way for example:
|
|
||||||
|
|
||||||
ms\do_nasm
|
|
||||||
nmake -f ms\ntdll.mak
|
|
||||||
|
|
||||||
for DLLs or
|
|
||||||
|
|
||||||
ms\do_nasm
|
|
||||||
nmake -f ms\nt.mak
|
|
||||||
|
|
||||||
for static builds.
|
|
||||||
|
|
||||||
3. Test new version of OpenSSL.
|
|
||||||
|
|
||||||
The new test FIPS enabled OpenSSL can now be tested in the usual way.
|
|
||||||
|
|
||||||
Additionally binary compatibility tests against OpenSSL 0.9.8x would be
|
|
||||||
MOST welcomed. This will help avoid any major issues when the 0.9.8-fips
|
|
||||||
branch is merged into 0.9.8 branch.
|
|
||||||
|
|
||||||
Any problems should be reported to the openssl-dev mailing list.
|
|
||||||
|
|
||||||
11
STATUS
11
STATUS
@@ -1,10 +1,15 @@
|
|||||||
|
|
||||||
OpenSSL STATUS Last modified at
|
OpenSSL STATUS Last modified at
|
||||||
______________ $Date: 2007/02/23 12:12:27 $
|
______________ $Date: 2009/07/15 11:37:45 $
|
||||||
|
|
||||||
DEVELOPMENT STATE
|
DEVELOPMENT STATE
|
||||||
|
|
||||||
o OpenSSL 0.9.9: Under development...
|
o OpenSSL 1.0.0-beta3: Released on July 15th, 2009
|
||||||
|
o OpenSSL 1.0.0-beta2: Released on April 21st, 2009
|
||||||
|
o OpenSSL 1.0.0-beta1: Released on April 1st, 2009
|
||||||
|
o OpenSSL 0.9.8h: Released on May 28th, 2008
|
||||||
|
o OpenSSL 0.9.8g: Released on October 19th, 2007
|
||||||
|
o OpenSSL 0.9.8f: Released on October 11th, 2007
|
||||||
o OpenSSL 0.9.8e: Released on February 23rd, 2007
|
o OpenSSL 0.9.8e: Released on February 23rd, 2007
|
||||||
o OpenSSL 0.9.8d: Released on September 28th, 2006
|
o OpenSSL 0.9.8d: Released on September 28th, 2006
|
||||||
o OpenSSL 0.9.8c: Released on September 5th, 2006
|
o OpenSSL 0.9.8c: Released on September 5th, 2006
|
||||||
@@ -47,7 +52,7 @@
|
|||||||
o OpenSSL 0.9.2b: Released on March 22th, 1999
|
o OpenSSL 0.9.2b: Released on March 22th, 1999
|
||||||
o OpenSSL 0.9.1c: Released on December 23th, 1998
|
o OpenSSL 0.9.1c: Released on December 23th, 1998
|
||||||
|
|
||||||
[See also http://www.openssl.org/support/rt2.html]
|
[See also http://www.openssl.org/support/rt.html]
|
||||||
|
|
||||||
RELEASE SHOWSTOPPERS
|
RELEASE SHOWSTOPPERS
|
||||||
|
|
||||||
|
|||||||
@@ -12,6 +12,14 @@ $ WRITE SYS$OUTPUT "Should be the directory where you want things installed.
|
|||||||
$ EXIT
|
$ EXIT
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$
|
$
|
||||||
|
$ IF (F$GETSYI("CPU").LT.128)
|
||||||
|
$ THEN
|
||||||
|
$ ARCH := VAX
|
||||||
|
$ ELSE
|
||||||
|
$ ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ IF (ARCH .EQS. "") THEN ARCH = "UNK"
|
||||||
|
$ ENDIF
|
||||||
|
$
|
||||||
$ ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
|
$ ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
|
||||||
$ ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
|
$ ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
|
||||||
$ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
$ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
||||||
@@ -19,13 +27,7 @@ $ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
|||||||
$ ROOT = ROOT_DEV + "[" + ROOT_DIR
|
$ ROOT = ROOT_DEV + "[" + ROOT_DIR
|
||||||
$
|
$
|
||||||
$ DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
|
$ DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
|
||||||
$ DEFINE/NOLOG WRK_SSLVLIB WRK_SSLROOT:[VAX_LIB]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLALIB WRK_SSLROOT:[ALPHA_LIB]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLINCLUDE WRK_SSLROOT:[INCLUDE]
|
$ DEFINE/NOLOG WRK_SSLINCLUDE WRK_SSLROOT:[INCLUDE]
|
||||||
$ DEFINE/NOLOG WRK_SSLVEXE WRK_SSLROOT:[VAX_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLAEXE WRK_SSLROOT:[ALPHA_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLCERTS WRK_SSLROOT:[CERTS]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLPRIVATE WRK_SSLROOT:[PRIVATE]
|
|
||||||
$
|
$
|
||||||
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
||||||
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
||||||
@@ -39,7 +41,7 @@ $ IF F$SEARCH("WRK_SSLINCLUDE:vms_idhacks.h") .NES. "" THEN -
|
|||||||
$
|
$
|
||||||
$ OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
|
$ OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
|
||||||
$ WRITE SYS$OUTPUT "%OPEN-I-CREATED, ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
|
$ WRITE SYS$OUTPUT "%OPEN-I-CREATED, ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
|
||||||
$ WRITE SF "$! Startup file for Openssl 0.9.2-RL 15-Mar-1999"
|
$ WRITE SF "$! Startup file for Openssl"
|
||||||
$ WRITE SF "$!"
|
$ WRITE SF "$!"
|
||||||
$ WRITE SF "$! Do not edit this file, as it will be regenerated during next installation."
|
$ WRITE SF "$! Do not edit this file, as it will be regenerated during next installation."
|
||||||
$ WRITE SF "$! Instead, add or change SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
|
$ WRITE SF "$! Instead, add or change SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
|
||||||
@@ -47,8 +49,13 @@ $ WRITE SF "$!"
|
|||||||
$ WRITE SF "$! P1 a qualifier to DEFINE. For example ""/SYSTEM"" to get the logical names"
|
$ WRITE SF "$! P1 a qualifier to DEFINE. For example ""/SYSTEM"" to get the logical names"
|
||||||
$ WRITE SF "$! defined in the system logical name table."
|
$ WRITE SF "$! defined in the system logical name table."
|
||||||
$ WRITE SF "$!"
|
$ WRITE SF "$!"
|
||||||
$ WRITE SF "$ ARCH = ""VAX"""
|
$ WRITE SF "$ IF (F$GETSYI(""CPU"").LT.128)"
|
||||||
$ WRITE SF "$ IF F$GETSYI(""CPU"") .GE. 128 THEN ARCH = ""ALPHA"""
|
$ WRITE SF "$ THEN"
|
||||||
|
$ WRITE SF "$ ARCH := VAX"
|
||||||
|
$ WRITE SF "$ ELSE"
|
||||||
|
$ WRITE SF "$ ARCH = F$EDIT( F$GETSYI( ""ARCH_NAME""), ""UPCASE"")"
|
||||||
|
$ WRITE SF "$ IF (ARCH .EQS. """") THEN ARCH = ""UNK"""
|
||||||
|
$ WRITE SF "$ ENDIF"
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLROOT ",ROOT,".] /TRANS=CONC"
|
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLROOT ",ROOT,".] /TRANS=CONC"
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLLIB SSLROOT:['ARCH'_LIB]"
|
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLLIB SSLROOT:['ARCH'_LIB]"
|
||||||
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLINCLUDE SSLROOT:[INCLUDE]"
|
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLINCLUDE SSLROOT:[INCLUDE]"
|
||||||
|
|||||||
@@ -3,10 +3,10 @@ $!
|
|||||||
$! No command line parameters. This should be run at the start of the source
|
$! No command line parameters. This should be run at the start of the source
|
||||||
$! tree (the same directory where one finds INSTALL.VMS).
|
$! tree (the same directory where one finds INSTALL.VMS).
|
||||||
$!
|
$!
|
||||||
$! Input: [.UTIL]LIBEAY.NUM,[.AXP.EXE.CRYPTO]LIBCRYPTO.OLB
|
$! Input: [.UTIL]LIBEAY.NUM,[.xxx.EXE.CRYPTO]LIBCRYPTO.OLB
|
||||||
$! [.UTIL]SSLEAY.NUM,[.AXP.EXE.SSL]LIBSSL.OLB
|
$! [.UTIL]SSLEAY.NUM,[.xxx.EXE.SSL]LIBSSL.OLB
|
||||||
$! Output: [.AXP.EXE.CRYPTO]LIBCRYPTO.OPT,.MAP,.EXE
|
$! Output: [.xxx.EXE.CRYPTO]LIBCRYPTO.OPT,.MAP,.EXE
|
||||||
$! [.AXP.EXE.SSL]LIBSSL.OPT,.MAP,.EXE
|
$! [.xxx.EXE.SSL]LIBSSL.OPT,.MAP,.EXE
|
||||||
$!
|
$!
|
||||||
$! So far, tests have only been made on VMS for Alpha. VAX will come in time.
|
$! So far, tests have only been made on VMS for Alpha. VAX will come in time.
|
||||||
$! ===========================================================================
|
$! ===========================================================================
|
||||||
@@ -19,31 +19,41 @@ $ write sys$error "ERROR: Couldn't find any library version info..."
|
|||||||
$ exit
|
$ exit
|
||||||
$ endif
|
$ endif
|
||||||
$
|
$
|
||||||
$ if f$getsyi("CPU") .ge. 128
|
$ if (f$getsyi("cpu").lt.128)
|
||||||
$ then
|
$ then
|
||||||
|
$ arch := VAX
|
||||||
|
$ else
|
||||||
|
$ arch = f$edit( f$getsyi( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ if (arch .eqs. "") then arch = "UNK"
|
||||||
|
$ endif
|
||||||
|
$
|
||||||
|
$ if arch .nes. "VAX"
|
||||||
|
$ then
|
||||||
|
$ arch_vax = 0
|
||||||
$ libid = "Crypto"
|
$ libid = "Crypto"
|
||||||
$ libnum = "[.UTIL]LIBEAY.NUM"
|
$ libnum = "[.UTIL]LIBEAY.NUM"
|
||||||
$ libdir = "[.AXP.EXE.CRYPTO]"
|
$ libdir = "[.''ARCH'.EXE.CRYPTO]"
|
||||||
$ libolb = "''libdir'LIBCRYPTO.OLB"
|
$ libolb = "''libdir'LIBCRYPTO.OLB"
|
||||||
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
||||||
$ libmap = "''libdir'LIBCRYPTO.MAP"
|
$ libmap = "''libdir'LIBCRYPTO.MAP"
|
||||||
$ libgoal= "''libdir'LIBCRYPTO.EXE"
|
$ libgoal= "''libdir'LIBCRYPTO.EXE"
|
||||||
$ libref = ""
|
$ libref = ""
|
||||||
$ gosub create_axp_shr
|
$ gosub create_nonvax_shr
|
||||||
$ libid = "SSL"
|
$ libid = "SSL"
|
||||||
$ libnum = "[.UTIL]SSLEAY.NUM"
|
$ libnum = "[.UTIL]SSLEAY.NUM"
|
||||||
$ libdir = "[.AXP.EXE.SSL]"
|
$ libdir = "[.''ARCH'.EXE.SSL]"
|
||||||
$ libolb = "''libdir'LIBSSL.OLB"
|
$ libolb = "''libdir'LIBSSL.OLB"
|
||||||
$ libopt = "''libdir'LIBSSL.OPT"
|
$ libopt = "''libdir'LIBSSL.OPT"
|
||||||
$ libmap = "''libdir'LIBSSL.MAP"
|
$ libmap = "''libdir'LIBSSL.MAP"
|
||||||
$ libgoal= "''libdir'LIBSSL.EXE"
|
$ libgoal= "''libdir'LIBSSL.EXE"
|
||||||
$ libref = "[.AXP.EXE.CRYPTO]LIBCRYPTO.EXE"
|
$ libref = "[.''ARCH'.EXE.CRYPTO]LIBCRYPTO.EXE"
|
||||||
$ gosub create_axp_shr
|
$ gosub create_nonvax_shr
|
||||||
$ else
|
$ else
|
||||||
|
$ arch_vax = 1
|
||||||
$ libtit = "CRYPTO_TRANSFER_VECTOR"
|
$ libtit = "CRYPTO_TRANSFER_VECTOR"
|
||||||
$ libid = "Crypto"
|
$ libid = "Crypto"
|
||||||
$ libnum = "[.UTIL]LIBEAY.NUM"
|
$ libnum = "[.UTIL]LIBEAY.NUM"
|
||||||
$ libdir = "[.VAX.EXE.CRYPTO]"
|
$ libdir = "[.''ARCH'.EXE.CRYPTO]"
|
||||||
$ libmar = "''libdir'LIBCRYPTO.MAR"
|
$ libmar = "''libdir'LIBCRYPTO.MAR"
|
||||||
$ libolb = "''libdir'LIBCRYPTO.OLB"
|
$ libolb = "''libdir'LIBCRYPTO.OLB"
|
||||||
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
||||||
@@ -56,22 +66,22 @@ $ gosub create_vax_shr
|
|||||||
$ libtit = "SSL_TRANSFER_VECTOR"
|
$ libtit = "SSL_TRANSFER_VECTOR"
|
||||||
$ libid = "SSL"
|
$ libid = "SSL"
|
||||||
$ libnum = "[.UTIL]SSLEAY.NUM"
|
$ libnum = "[.UTIL]SSLEAY.NUM"
|
||||||
$ libdir = "[.VAX.EXE.SSL]"
|
$ libdir = "[.''ARCH'.EXE.SSL]"
|
||||||
$ libmar = "''libdir'LIBSSL.MAR"
|
$ libmar = "''libdir'LIBSSL.MAR"
|
||||||
$ libolb = "''libdir'LIBSSL.OLB"
|
$ libolb = "''libdir'LIBSSL.OLB"
|
||||||
$ libopt = "''libdir'LIBSSL.OPT"
|
$ libopt = "''libdir'LIBSSL.OPT"
|
||||||
$ libobj = "''libdir'LIBSSL.OBJ"
|
$ libobj = "''libdir'LIBSSL.OBJ"
|
||||||
$ libmap = "''libdir'LIBSSL.MAP"
|
$ libmap = "''libdir'LIBSSL.MAP"
|
||||||
$ libgoal= "''libdir'LIBSSL.EXE"
|
$ libgoal= "''libdir'LIBSSL.EXE"
|
||||||
$ libref = "[.VAX.EXE.CRYPTO]LIBCRYPTO.EXE"
|
$ libref = "[.''ARCH'.EXE.CRYPTO]LIBCRYPTO.EXE"
|
||||||
$ libvec = "LIBSSL"
|
$ libvec = "LIBSSL"
|
||||||
$ gosub create_vax_shr
|
$ gosub create_vax_shr
|
||||||
$ endif
|
$ endif
|
||||||
$ exit
|
$ exit
|
||||||
$
|
$
|
||||||
$! ----- Soubroutines to actually build the shareable libraries
|
$! ----- Soubroutines to build the shareable libraries
|
||||||
$! The way things work, there's a main shareable library creator for each
|
$! For each supported architecture, there's a main shareable library
|
||||||
$! supported architecture, which is called from the main code above.
|
$! creator, which is called from the main code above.
|
||||||
$! The creator will define a number of variables to tell the next levels of
|
$! The creator will define a number of variables to tell the next levels of
|
||||||
$! subroutines what routines to use to write to the option files, call the
|
$! subroutines what routines to use to write to the option files, call the
|
||||||
$! main processor, read_func_num, and when that is done, it will write version
|
$! main processor, read_func_num, and when that is done, it will write version
|
||||||
@@ -97,10 +107,10 @@ $! read_func_num depends on the following variables from the creator:
|
|||||||
$! libwriter The name of the writer routine to call for each .num file line
|
$! libwriter The name of the writer routine to call for each .num file line
|
||||||
$! -----
|
$! -----
|
||||||
$
|
$
|
||||||
$! ----- Subroutines for AXP
|
$! ----- Subroutines for non-VAX
|
||||||
$! -----
|
$! -----
|
||||||
$! The creator routine
|
$! The creator routine
|
||||||
$ create_axp_shr:
|
$ create_nonvax_shr:
|
||||||
$ open/write opt 'libopt'
|
$ open/write opt 'libopt'
|
||||||
$ write opt "identification=""",libid," ",libverstr,""""
|
$ write opt "identification=""",libid," ",libverstr,""""
|
||||||
$ write opt libolb,"/lib"
|
$ write opt libolb,"/lib"
|
||||||
@@ -108,7 +118,7 @@ $ if libref .nes. "" then write opt libref,"/SHARE"
|
|||||||
$ write opt "SYMBOL_VECTOR=(-"
|
$ write opt "SYMBOL_VECTOR=(-"
|
||||||
$ libfirstentry := true
|
$ libfirstentry := true
|
||||||
$ libwrch := opt
|
$ libwrch := opt
|
||||||
$ libwriter := write_axp_transfer_entry
|
$ libwriter := write_nonvax_transfer_entry
|
||||||
$ textcount = 0
|
$ textcount = 0
|
||||||
$ gosub read_func_num
|
$ gosub read_func_num
|
||||||
$ write opt ")"
|
$ write opt ")"
|
||||||
@@ -118,7 +128,7 @@ $ link/map='libmap'/full/share='libgoal' 'libopt'/option
|
|||||||
$ return
|
$ return
|
||||||
$
|
$
|
||||||
$! The record writer routine
|
$! The record writer routine
|
||||||
$ write_axp_transfer_entry:
|
$ write_nonvax_transfer_entry:
|
||||||
$ if libentry .eqs. ".dummy" then return
|
$ if libentry .eqs. ".dummy" then return
|
||||||
$ if info_kind .eqs. "VARIABLE"
|
$ if info_kind .eqs. "VARIABLE"
|
||||||
$ then
|
$ then
|
||||||
@@ -144,7 +154,7 @@ $ libfirstentry := false
|
|||||||
$ textcount = textcount + textcount_this
|
$ textcount = textcount + textcount_this
|
||||||
$ return
|
$ return
|
||||||
$
|
$
|
||||||
$! ----- Subroutines for AXP
|
$! ----- Subroutines for VAX
|
||||||
$! -----
|
$! -----
|
||||||
$! The creator routine
|
$! The creator routine
|
||||||
$ create_vax_shr:
|
$ create_vax_shr:
|
||||||
@@ -264,8 +274,15 @@ $ truesum = truesum + 1
|
|||||||
$ if plat_entry .eqs. "!EXPORT_VAR_AS_FUNCTION" then -
|
$ if plat_entry .eqs. "!EXPORT_VAR_AS_FUNCTION" then -
|
||||||
$ falsesum = falsesum + 1
|
$ falsesum = falsesum + 1
|
||||||
$ endif
|
$ endif
|
||||||
$ if plat_entry .eqs. "VMS" then truesum = truesum + 1
|
$!
|
||||||
$ if plat_entry .eqs. "!VMS" then falsesum = falsesum + 1
|
$ if ((plat_entry .eqs. "VMS") .or. -
|
||||||
|
(arch_vax .and. (plat_entry .eqs. "VMSVAX"))) then -
|
||||||
|
truesum = truesum + 1
|
||||||
|
$!
|
||||||
|
$ if ((plat_entry .eqs. "!VMS") .or. -
|
||||||
|
(arch_vax .and. (plat_entry .eqs. "!VMSVAX"))) then -
|
||||||
|
falsesum = falsesum + 1
|
||||||
|
$!
|
||||||
$ goto loop1
|
$ goto loop1
|
||||||
$ endif
|
$ endif
|
||||||
$ endloop1:
|
$ endloop1:
|
||||||
|
|||||||
@@ -8,10 +8,17 @@ $!
|
|||||||
$!
|
$!
|
||||||
$! Slightly modified by Richard Levitte <richard@levitte.org>
|
$! Slightly modified by Richard Levitte <richard@levitte.org>
|
||||||
$!
|
$!
|
||||||
|
$!
|
||||||
|
$! Always define OPENSSL. Others are optional (non-null P1).
|
||||||
|
$!
|
||||||
$ OPENSSL :== $SSLEXE:OPENSSL
|
$ OPENSSL :== $SSLEXE:OPENSSL
|
||||||
|
$
|
||||||
|
$ IF (P1 .NES. "")
|
||||||
|
$ THEN
|
||||||
$ VERIFY :== $SSLEXE:OPENSSL VERIFY
|
$ VERIFY :== $SSLEXE:OPENSSL VERIFY
|
||||||
$ ASN1PARSE:== $SSLEXE:OPENSSL ASN1PARS
|
$ ASN1PARSE:== $SSLEXE:OPENSSL ASN1PARS
|
||||||
$ REQ :== $SSLEXE:OPENSSL REQ
|
$! REQ could conflict with REQUEST.
|
||||||
|
$ OREQ :== $SSLEXE:OPENSSL REQ
|
||||||
$ DGST :== $SSLEXE:OPENSSL DGST
|
$ DGST :== $SSLEXE:OPENSSL DGST
|
||||||
$ DH :== $SSLEXE:OPENSSL DH
|
$ DH :== $SSLEXE:OPENSSL DH
|
||||||
$ ENC :== $SSLEXE:OPENSSL ENC
|
$ ENC :== $SSLEXE:OPENSSL ENC
|
||||||
@@ -36,3 +43,4 @@ $ SESS_ID :== $SSLEXE:OPENSSL SESS_ID
|
|||||||
$ CIPHERS :== $SSLEXE:OPENSSL CIPHERS
|
$ CIPHERS :== $SSLEXE:OPENSSL CIPHERS
|
||||||
$ NSEQ :== $SSLEXE:OPENSSL NSEQ
|
$ NSEQ :== $SSLEXE:OPENSSL NSEQ
|
||||||
$ PKCS12 :== $SSLEXE:OPENSSL PKCS12
|
$ PKCS12 :== $SSLEXE:OPENSSL PKCS12
|
||||||
|
$ ENDIF
|
||||||
|
|||||||
@@ -5,3 +5,4 @@ der_chop.bak
|
|||||||
CA.pl
|
CA.pl
|
||||||
*.flc
|
*.flc
|
||||||
semantic.cache
|
semantic.cache
|
||||||
|
*.dll
|
||||||
|
|||||||
749
apps/Makefile
749
apps/Makefile
File diff suppressed because it is too large
Load Diff
918
apps/apps.c
918
apps/apps.c
File diff suppressed because it is too large
Load Diff
80
apps/apps.h
80
apps/apps.h
@@ -137,11 +137,6 @@ long app_RAND_load_files(char *file); /* `file' is a list of files to read,
|
|||||||
* (see e_os.h). The string is
|
* (see e_os.h). The string is
|
||||||
* destroyed! */
|
* destroyed! */
|
||||||
|
|
||||||
#ifdef OPENSSL_SYS_WIN32
|
|
||||||
#define rename(from,to) WIN32_rename((from),(to))
|
|
||||||
int WIN32_rename(const char *oldname,const char *newname);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef MONOLITH
|
#ifndef MONOLITH
|
||||||
|
|
||||||
#define MAIN(a,v) main(a,v)
|
#define MAIN(a,v) main(a,v)
|
||||||
@@ -149,11 +144,9 @@ int WIN32_rename(const char *oldname,const char *newname);
|
|||||||
#ifndef NON_MAIN
|
#ifndef NON_MAIN
|
||||||
CONF *config=NULL;
|
CONF *config=NULL;
|
||||||
BIO *bio_err=NULL;
|
BIO *bio_err=NULL;
|
||||||
int in_FIPS_mode=0;
|
|
||||||
#else
|
#else
|
||||||
extern CONF *config;
|
extern CONF *config;
|
||||||
extern BIO *bio_err;
|
extern BIO *bio_err;
|
||||||
extern int in_FIPS_mode;
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#else
|
#else
|
||||||
@@ -162,7 +155,6 @@ extern int in_FIPS_mode;
|
|||||||
extern CONF *config;
|
extern CONF *config;
|
||||||
extern char *default_config_file;
|
extern char *default_config_file;
|
||||||
extern BIO *bio_err;
|
extern BIO *bio_err;
|
||||||
extern int in_FIPS_mode;
|
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -182,54 +174,24 @@ extern int in_FIPS_mode;
|
|||||||
# define apps_shutdown()
|
# define apps_shutdown()
|
||||||
#else
|
#else
|
||||||
# ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
# if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
|
|
||||||
defined(OPENSSL_SYS_WIN32)
|
|
||||||
# ifdef _O_BINARY
|
|
||||||
# define apps_startup() \
|
# define apps_startup() \
|
||||||
do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
do { do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||||
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
||||||
# else
|
|
||||||
# define apps_startup() \
|
|
||||||
do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
|
||||||
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
|
||||||
# endif
|
|
||||||
# else
|
|
||||||
# define apps_startup() \
|
|
||||||
do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
|
|
||||||
ERR_load_crypto_strings(); ENGINE_load_builtin_engines(); \
|
|
||||||
setup_ui_method(); } while(0)
|
|
||||||
# endif
|
|
||||||
# define apps_shutdown() \
|
# define apps_shutdown() \
|
||||||
do { CONF_modules_unload(1); destroy_ui_method(); \
|
do { CONF_modules_unload(1); destroy_ui_method(); \
|
||||||
EVP_cleanup(); ENGINE_cleanup(); \
|
OBJ_cleanup(); EVP_cleanup(); ENGINE_cleanup(); \
|
||||||
CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
|
CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
|
||||||
ERR_free_strings(); } while(0)
|
ERR_free_strings(); COMP_zlib_cleanup();} while(0)
|
||||||
# else
|
# else
|
||||||
# if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
|
|
||||||
defined(OPENSSL_SYS_WIN32)
|
|
||||||
# ifdef _O_BINARY
|
|
||||||
# define apps_startup() \
|
# define apps_startup() \
|
||||||
do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
do { do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||||
setup_ui_method(); } while(0)
|
setup_ui_method(); } while(0)
|
||||||
# else
|
|
||||||
# define apps_startup() \
|
|
||||||
do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
|
||||||
setup_ui_method(); } while(0)
|
|
||||||
# endif
|
|
||||||
# else
|
|
||||||
# define apps_startup() \
|
|
||||||
do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
|
|
||||||
ERR_load_crypto_strings(); \
|
|
||||||
setup_ui_method(); } while(0)
|
|
||||||
# endif
|
|
||||||
# define apps_shutdown() \
|
# define apps_shutdown() \
|
||||||
do { CONF_modules_unload(1); destroy_ui_method(); \
|
do { CONF_modules_unload(1); destroy_ui_method(); \
|
||||||
EVP_cleanup(); \
|
OBJ_cleanup(); EVP_cleanup(); \
|
||||||
CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
|
CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
|
||||||
ERR_free_strings(); } while(0)
|
ERR_free_strings(); } while(0)
|
||||||
# endif
|
# endif
|
||||||
#endif
|
#endif
|
||||||
@@ -240,6 +202,7 @@ extern int in_FIPS_mode;
|
|||||||
# define openssl_fdset(a,b) FD_SET(a, b)
|
# define openssl_fdset(a,b) FD_SET(a, b)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
typedef struct args_st
|
typedef struct args_st
|
||||||
{
|
{
|
||||||
char **data;
|
char **data;
|
||||||
@@ -331,13 +294,27 @@ int index_index(CA_DB *db);
|
|||||||
int save_index(const char *dbfile, const char *suffix, CA_DB *db);
|
int save_index(const char *dbfile, const char *suffix, CA_DB *db);
|
||||||
int rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix);
|
int rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix);
|
||||||
void free_index(CA_DB *db);
|
void free_index(CA_DB *db);
|
||||||
int index_name_cmp(const char **a, const char **b);
|
#define index_name_cmp_noconst(a, b) \
|
||||||
|
index_name_cmp((const CSTRING *)CHECKED_PTR_OF(STRING, a), \
|
||||||
|
(const CSTRING *)CHECKED_PTR_OF(STRING, b))
|
||||||
|
int index_name_cmp(const CSTRING *a, const CSTRING *b);
|
||||||
int parse_yesno(const char *str, int def);
|
int parse_yesno(const char *str, int def);
|
||||||
|
|
||||||
X509_NAME *parse_name(char *str, long chtype, int multirdn);
|
X509_NAME *parse_name(char *str, long chtype, int multirdn);
|
||||||
int args_verify(char ***pargs, int *pargc,
|
int args_verify(char ***pargs, int *pargc,
|
||||||
int *badarg, BIO *err, X509_VERIFY_PARAM **pm);
|
int *badarg, BIO *err, X509_VERIFY_PARAM **pm);
|
||||||
void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
||||||
|
int bio_to_mem(unsigned char **out, int maxlen, BIO *in);
|
||||||
|
int pkey_ctrl_string(EVP_PKEY_CTX *ctx, char *value);
|
||||||
|
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *algname, ENGINE *e, int do_param);
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
extern char *psk_key;
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_JPAKE
|
||||||
|
void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
|
||||||
|
void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
|
||||||
|
#endif
|
||||||
|
|
||||||
#define FORMAT_UNDEF 0
|
#define FORMAT_UNDEF 0
|
||||||
#define FORMAT_ASN1 1
|
#define FORMAT_ASN1 1
|
||||||
@@ -349,6 +326,10 @@ void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
|||||||
#define FORMAT_ENGINE 7
|
#define FORMAT_ENGINE 7
|
||||||
#define FORMAT_IISSGC 8 /* XXX this stupid macro helps us to avoid
|
#define FORMAT_IISSGC 8 /* XXX this stupid macro helps us to avoid
|
||||||
* adding yet another param to load_*key() */
|
* adding yet another param to load_*key() */
|
||||||
|
#define FORMAT_PEMRSA 9 /* PEM RSAPubicKey format */
|
||||||
|
#define FORMAT_ASN1RSA 10 /* DER RSAPubicKey format */
|
||||||
|
#define FORMAT_MSBLOB 11 /* MS Key blob format */
|
||||||
|
#define FORMAT_PVK 12 /* MS PVK file format */
|
||||||
|
|
||||||
#define EXT_COPY_NONE 0
|
#define EXT_COPY_NONE 0
|
||||||
#define EXT_COPY_ADD 1
|
#define EXT_COPY_ADD 1
|
||||||
@@ -360,4 +341,11 @@ void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
|||||||
|
|
||||||
#define SERIAL_RAND_BITS 64
|
#define SERIAL_RAND_BITS 64
|
||||||
|
|
||||||
|
int app_isdir(const char *);
|
||||||
|
int raw_read_stdin(void *,int);
|
||||||
|
int raw_write_stdout(const void *,int);
|
||||||
|
|
||||||
|
#define TM_START 0
|
||||||
|
#define TM_STOP 1
|
||||||
|
double app_tminterval (int stop,int usertime);
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -56,7 +56,7 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* A nice addition from Dr Stephen Henson <shenson@bigfoot.com> to
|
/* A nice addition from Dr Stephen Henson <steve@openssl.org> to
|
||||||
* add the -strparse option which parses nested binary structures
|
* add the -strparse option which parses nested binary structures
|
||||||
*/
|
*/
|
||||||
|
|
||||||
@@ -96,7 +96,7 @@ int MAIN(int argc, char **argv)
|
|||||||
unsigned char *tmpbuf;
|
unsigned char *tmpbuf;
|
||||||
const unsigned char *ctmpbuf;
|
const unsigned char *ctmpbuf;
|
||||||
BUF_MEM *buf=NULL;
|
BUF_MEM *buf=NULL;
|
||||||
STACK *osk=NULL;
|
STACK_OF(STRING) *osk=NULL;
|
||||||
ASN1_TYPE *at=NULL;
|
ASN1_TYPE *at=NULL;
|
||||||
|
|
||||||
informat=FORMAT_PEM;
|
informat=FORMAT_PEM;
|
||||||
@@ -113,7 +113,7 @@ int MAIN(int argc, char **argv)
|
|||||||
prog=argv[0];
|
prog=argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
if ((osk=sk_new_null()) == NULL)
|
if ((osk=sk_STRING_new_null()) == NULL)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"Memory allocation failure\n");
|
BIO_printf(bio_err,"Memory allocation failure\n");
|
||||||
goto end;
|
goto end;
|
||||||
@@ -169,7 +169,7 @@ int MAIN(int argc, char **argv)
|
|||||||
else if (strcmp(*argv,"-strparse") == 0)
|
else if (strcmp(*argv,"-strparse") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
sk_push(osk,*(++argv));
|
sk_STRING_push(osk,*(++argv));
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-genstr") == 0)
|
else if (strcmp(*argv,"-genstr") == 0)
|
||||||
{
|
{
|
||||||
@@ -302,18 +302,18 @@ bad:
|
|||||||
|
|
||||||
/* If any structs to parse go through in sequence */
|
/* If any structs to parse go through in sequence */
|
||||||
|
|
||||||
if (sk_num(osk))
|
if (sk_STRING_num(osk))
|
||||||
{
|
{
|
||||||
tmpbuf=(unsigned char *)str;
|
tmpbuf=(unsigned char *)str;
|
||||||
tmplen=num;
|
tmplen=num;
|
||||||
for (i=0; i<sk_num(osk); i++)
|
for (i=0; i<sk_STRING_num(osk); i++)
|
||||||
{
|
{
|
||||||
ASN1_TYPE *atmp;
|
ASN1_TYPE *atmp;
|
||||||
int typ;
|
int typ;
|
||||||
j=atoi(sk_value(osk,i));
|
j=atoi(sk_STRING_value(osk,i));
|
||||||
if (j == 0)
|
if (j == 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"'%s' is an invalid number\n",sk_value(osk,i));
|
BIO_printf(bio_err,"'%s' is an invalid number\n",sk_STRING_value(osk,i));
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
tmpbuf+=j;
|
tmpbuf+=j;
|
||||||
@@ -378,7 +378,7 @@ end:
|
|||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
if (buf != NULL) BUF_MEM_free(buf);
|
if (buf != NULL) BUF_MEM_free(buf);
|
||||||
if (at != NULL) ASN1_TYPE_free(at);
|
if (at != NULL) ASN1_TYPE_free(at);
|
||||||
if (osk != NULL) sk_free(osk);
|
if (osk != NULL) sk_STRING_free(osk);
|
||||||
OBJ_cleanup();
|
OBJ_cleanup();
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
|
|||||||
142
apps/ca.c
142
apps/ca.c
@@ -63,7 +63,6 @@
|
|||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <ctype.h>
|
#include <ctype.h>
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
|
||||||
#include <openssl/conf.h>
|
#include <openssl/conf.h>
|
||||||
#include <openssl/bio.h>
|
#include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
@@ -227,7 +226,7 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
|
|||||||
static int do_revoke(X509 *x509, CA_DB *db, int ext, char *extval);
|
static int do_revoke(X509 *x509, CA_DB *db, int ext, char *extval);
|
||||||
static int get_certificate_status(const char *ser_status, CA_DB *db);
|
static int get_certificate_status(const char *ser_status, CA_DB *db);
|
||||||
static int do_updatedb(CA_DB *db);
|
static int do_updatedb(CA_DB *db);
|
||||||
static int check_time_format(char *str);
|
static int check_time_format(const char *str);
|
||||||
char *make_revocation_str(int rev_type, char *rev_arg);
|
char *make_revocation_str(int rev_type, char *rev_arg);
|
||||||
int make_revoked(X509_REVOKED *rev, const char *str);
|
int make_revoked(X509_REVOKED *rev, const char *str);
|
||||||
int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str);
|
int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str);
|
||||||
@@ -259,6 +258,7 @@ int MAIN(int argc, char **argv)
|
|||||||
int doupdatedb=0;
|
int doupdatedb=0;
|
||||||
long crldays=0;
|
long crldays=0;
|
||||||
long crlhours=0;
|
long crlhours=0;
|
||||||
|
long crlsec=0;
|
||||||
long errorline= -1;
|
long errorline= -1;
|
||||||
char *configfile=NULL;
|
char *configfile=NULL;
|
||||||
char *md=NULL;
|
char *md=NULL;
|
||||||
@@ -306,7 +306,8 @@ int MAIN(int argc, char **argv)
|
|||||||
ASN1_TIME *tmptm;
|
ASN1_TIME *tmptm;
|
||||||
ASN1_INTEGER *tmpser;
|
ASN1_INTEGER *tmpser;
|
||||||
char *f;
|
char *f;
|
||||||
const char *p, **pp;
|
const char *p;
|
||||||
|
char * const *pp;
|
||||||
int i,j;
|
int i,j;
|
||||||
const EVP_MD *dgst=NULL;
|
const EVP_MD *dgst=NULL;
|
||||||
STACK_OF(CONF_VALUE) *attribs=NULL;
|
STACK_OF(CONF_VALUE) *attribs=NULL;
|
||||||
@@ -457,6 +458,11 @@ EF_ALIGNMENT=0;
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
crlhours= atol(*(++argv));
|
crlhours= atol(*(++argv));
|
||||||
}
|
}
|
||||||
|
else if (strcmp(*argv,"-crlsec") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) goto bad;
|
||||||
|
crlsec = atol(*(++argv));
|
||||||
|
}
|
||||||
else if (strcmp(*argv,"-infiles") == 0)
|
else if (strcmp(*argv,"-infiles") == 0)
|
||||||
{
|
{
|
||||||
argc--;
|
argc--;
|
||||||
@@ -550,8 +556,10 @@ bad:
|
|||||||
|
|
||||||
if (badops)
|
if (badops)
|
||||||
{
|
{
|
||||||
for (pp=ca_usage; (*pp != NULL); pp++)
|
const char **pp2;
|
||||||
BIO_printf(bio_err,"%s",*pp);
|
|
||||||
|
for (pp2=ca_usage; (*pp2 != NULL); pp2++)
|
||||||
|
BIO_printf(bio_err,"%s",*pp2);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -826,7 +834,6 @@ bad:
|
|||||||
/* lookup where to write new certificates */
|
/* lookup where to write new certificates */
|
||||||
if ((outdir == NULL) && (req))
|
if ((outdir == NULL) && (req))
|
||||||
{
|
{
|
||||||
struct stat sb;
|
|
||||||
|
|
||||||
if ((outdir=NCONF_get_string(conf,section,ENV_NEW_CERTS_DIR))
|
if ((outdir=NCONF_get_string(conf,section,ENV_NEW_CERTS_DIR))
|
||||||
== NULL)
|
== NULL)
|
||||||
@@ -845,27 +852,23 @@ bad:
|
|||||||
that to access(). However, time's too short to do that just
|
that to access(). However, time's too short to do that just
|
||||||
now.
|
now.
|
||||||
*/
|
*/
|
||||||
|
#ifndef _WIN32
|
||||||
if (access(outdir,R_OK|W_OK|X_OK) != 0)
|
if (access(outdir,R_OK|W_OK|X_OK) != 0)
|
||||||
|
#else
|
||||||
|
if (_access(outdir,R_OK|W_OK|X_OK) != 0)
|
||||||
|
#endif
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"I am unable to access the %s directory\n",outdir);
|
BIO_printf(bio_err,"I am unable to access the %s directory\n",outdir);
|
||||||
perror(outdir);
|
perror(outdir);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (stat(outdir,&sb) != 0)
|
if (app_isdir(outdir)<=0)
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to stat(%s)\n",outdir);
|
|
||||||
perror(outdir);
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
#ifdef S_IFDIR
|
|
||||||
if (!(sb.st_mode & S_IFDIR))
|
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"%s need to be a directory\n",outdir);
|
BIO_printf(bio_err,"%s need to be a directory\n",outdir);
|
||||||
perror(outdir);
|
perror(outdir);
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -880,9 +883,9 @@ bad:
|
|||||||
if (db == NULL) goto err;
|
if (db == NULL) goto err;
|
||||||
|
|
||||||
/* Lets check some fields */
|
/* Lets check some fields */
|
||||||
for (i=0; i<sk_num(db->db->data); i++)
|
for (i=0; i<sk_PSTRING_num(db->db->data); i++)
|
||||||
{
|
{
|
||||||
pp=(const char **)sk_value(db->db->data,i);
|
pp=sk_PSTRING_value(db->db->data,i);
|
||||||
if ((pp[DB_type][0] != DB_TYPE_REV) &&
|
if ((pp[DB_type][0] != DB_TYPE_REV) &&
|
||||||
(pp[DB_rev_date][0] != '\0'))
|
(pp[DB_rev_date][0] != '\0'))
|
||||||
{
|
{
|
||||||
@@ -935,7 +938,7 @@ bad:
|
|||||||
#endif
|
#endif
|
||||||
TXT_DB_write(out,db->db);
|
TXT_DB_write(out,db->db);
|
||||||
BIO_printf(bio_err,"%d entries loaded from the database\n",
|
BIO_printf(bio_err,"%d entries loaded from the database\n",
|
||||||
db->db->data->num);
|
sk_PSTRING_num(db->db->data));
|
||||||
BIO_printf(bio_err,"generating index\n");
|
BIO_printf(bio_err,"generating index\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1026,6 +1029,17 @@ bad:
|
|||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!strcmp(md, "default"))
|
||||||
|
{
|
||||||
|
int def_nid;
|
||||||
|
if (EVP_PKEY_get_default_digest_nid(pkey, &def_nid) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err,"no default digest\n");
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
md = (char *)OBJ_nid2sn(def_nid);
|
||||||
|
}
|
||||||
|
|
||||||
if ((dgst=EVP_get_digestbyname(md)) == NULL)
|
if ((dgst=EVP_get_digestbyname(md)) == NULL)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"%s is an unsupported message digest type\n",md);
|
BIO_printf(bio_err,"%s is an unsupported message digest type\n",md);
|
||||||
@@ -1095,9 +1109,9 @@ bad:
|
|||||||
if (startdate == NULL)
|
if (startdate == NULL)
|
||||||
ERR_clear_error();
|
ERR_clear_error();
|
||||||
}
|
}
|
||||||
if (startdate && !ASN1_UTCTIME_set_string(NULL,startdate))
|
if (startdate && !ASN1_TIME_set_string(NULL, startdate))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"start date is invalid, it should be YYMMDDHHMMSSZ\n");
|
BIO_printf(bio_err,"start date is invalid, it should be YYMMDDHHMMSSZ or YYYYMMDDHHMMSSZ\n");
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
if (startdate == NULL) startdate="today";
|
if (startdate == NULL) startdate="today";
|
||||||
@@ -1109,9 +1123,9 @@ bad:
|
|||||||
if (enddate == NULL)
|
if (enddate == NULL)
|
||||||
ERR_clear_error();
|
ERR_clear_error();
|
||||||
}
|
}
|
||||||
if (enddate && !ASN1_UTCTIME_set_string(NULL,enddate))
|
if (enddate && !ASN1_TIME_set_string(NULL, enddate))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"end date is invalid, it should be YYMMDDHHMMSSZ\n");
|
BIO_printf(bio_err,"end date is invalid, it should be YYMMDDHHMMSSZ or YYYYMMDDHHMMSSZ\n");
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1366,7 +1380,7 @@ bad:
|
|||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!crldays && !crlhours)
|
if (!crldays && !crlhours && !crlsec)
|
||||||
{
|
{
|
||||||
if (!NCONF_get_number(conf,section,
|
if (!NCONF_get_number(conf,section,
|
||||||
ENV_DEFAULT_CRL_DAYS, &crldays))
|
ENV_DEFAULT_CRL_DAYS, &crldays))
|
||||||
@@ -1375,7 +1389,7 @@ bad:
|
|||||||
ENV_DEFAULT_CRL_HOURS, &crlhours))
|
ENV_DEFAULT_CRL_HOURS, &crlhours))
|
||||||
crlhours = 0;
|
crlhours = 0;
|
||||||
}
|
}
|
||||||
if ((crldays == 0) && (crlhours == 0))
|
if ((crldays == 0) && (crlhours == 0) && (crlsec == 0))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"cannot lookup how long until the next CRL is issued\n");
|
BIO_printf(bio_err,"cannot lookup how long until the next CRL is issued\n");
|
||||||
goto err;
|
goto err;
|
||||||
@@ -1389,14 +1403,14 @@ bad:
|
|||||||
if (!tmptm) goto err;
|
if (!tmptm) goto err;
|
||||||
X509_gmtime_adj(tmptm,0);
|
X509_gmtime_adj(tmptm,0);
|
||||||
X509_CRL_set_lastUpdate(crl, tmptm);
|
X509_CRL_set_lastUpdate(crl, tmptm);
|
||||||
X509_gmtime_adj(tmptm,(crldays*24+crlhours)*60*60);
|
X509_time_adj_ex(tmptm, crldays, crlhours*60*60 + crlsec, NULL);
|
||||||
X509_CRL_set_nextUpdate(crl, tmptm);
|
X509_CRL_set_nextUpdate(crl, tmptm);
|
||||||
|
|
||||||
ASN1_TIME_free(tmptm);
|
ASN1_TIME_free(tmptm);
|
||||||
|
|
||||||
for (i=0; i<sk_num(db->db->data); i++)
|
for (i=0; i<sk_PSTRING_num(db->db->data); i++)
|
||||||
{
|
{
|
||||||
pp=(const char **)sk_value(db->db->data,i);
|
pp=sk_PSTRING_value(db->db->data,i);
|
||||||
if (pp[DB_type][0] == DB_TYPE_REV)
|
if (pp[DB_type][0] == DB_TYPE_REV)
|
||||||
{
|
{
|
||||||
if ((r=X509_REVOKED_new()) == NULL) goto err;
|
if ((r=X509_REVOKED_new()) == NULL) goto err;
|
||||||
@@ -1422,15 +1436,6 @@ bad:
|
|||||||
|
|
||||||
/* we now have a CRL */
|
/* we now have a CRL */
|
||||||
if (verbose) BIO_printf(bio_err,"signing CRL\n");
|
if (verbose) BIO_printf(bio_err,"signing CRL\n");
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (pkey->type == EVP_PKEY_DSA)
|
|
||||||
dgst=EVP_dss1();
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (pkey->type == EVP_PKEY_EC)
|
|
||||||
dgst=EVP_ecdsa();
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Add any extensions asked for */
|
/* Add any extensions asked for */
|
||||||
|
|
||||||
@@ -1463,6 +1468,12 @@ bad:
|
|||||||
if (crlnumberfile != NULL) /* we have a CRL number that need updating */
|
if (crlnumberfile != NULL) /* we have a CRL number that need updating */
|
||||||
if (!save_serial(crlnumberfile,"new",crlnumber,NULL)) goto err;
|
if (!save_serial(crlnumberfile,"new",crlnumber,NULL)) goto err;
|
||||||
|
|
||||||
|
if (crlnumber)
|
||||||
|
{
|
||||||
|
BN_free(crlnumber);
|
||||||
|
crlnumber = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
if (!X509_CRL_sign(crl,pkey,dgst)) goto err;
|
if (!X509_CRL_sign(crl,pkey,dgst)) goto err;
|
||||||
|
|
||||||
PEM_write_bio_X509_CRL(Sout,crl);
|
PEM_write_bio_X509_CRL(Sout,crl);
|
||||||
@@ -1515,6 +1526,7 @@ err:
|
|||||||
if (free_key && key)
|
if (free_key && key)
|
||||||
OPENSSL_free(key);
|
OPENSSL_free(key);
|
||||||
BN_free(serial);
|
BN_free(serial);
|
||||||
|
BN_free(crlnumber);
|
||||||
free_index(db);
|
free_index(db);
|
||||||
EVP_PKEY_free(pkey);
|
EVP_PKEY_free(pkey);
|
||||||
if (x509) X509_free(x509);
|
if (x509) X509_free(x509);
|
||||||
@@ -1673,7 +1685,9 @@ static int do_body(X509 **xret, EVP_PKEY *pkey, X509 *x509, const EVP_MD *dgst,
|
|||||||
int ok= -1,i,j,last,nid;
|
int ok= -1,i,j,last,nid;
|
||||||
const char *p;
|
const char *p;
|
||||||
CONF_VALUE *cv;
|
CONF_VALUE *cv;
|
||||||
char *row[DB_NUMBER],**rrow=NULL,**irow=NULL;
|
STRING row[DB_NUMBER];
|
||||||
|
STRING *irow=NULL;
|
||||||
|
STRING *rrow=NULL;
|
||||||
char buf[25];
|
char buf[25];
|
||||||
|
|
||||||
tmptm=ASN1_UTCTIME_new();
|
tmptm=ASN1_UTCTIME_new();
|
||||||
@@ -1915,7 +1929,9 @@ again2:
|
|||||||
|
|
||||||
if (db->attributes.unique_subject)
|
if (db->attributes.unique_subject)
|
||||||
{
|
{
|
||||||
rrow=TXT_DB_get_by_index(db->db,DB_name,row);
|
STRING *crow=row;
|
||||||
|
|
||||||
|
rrow=TXT_DB_get_by_index(db->db,DB_name,crow);
|
||||||
if (rrow != NULL)
|
if (rrow != NULL)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,
|
BIO_printf(bio_err,
|
||||||
@@ -1991,11 +2007,11 @@ again2:
|
|||||||
|
|
||||||
if (strcmp(startdate,"today") == 0)
|
if (strcmp(startdate,"today") == 0)
|
||||||
X509_gmtime_adj(X509_get_notBefore(ret),0);
|
X509_gmtime_adj(X509_get_notBefore(ret),0);
|
||||||
else ASN1_UTCTIME_set_string(X509_get_notBefore(ret),startdate);
|
else ASN1_TIME_set_string(X509_get_notBefore(ret),startdate);
|
||||||
|
|
||||||
if (enddate == NULL)
|
if (enddate == NULL)
|
||||||
X509_gmtime_adj(X509_get_notAfter(ret),(long)60*60*24*days);
|
X509_time_adj_ex(X509_get_notAfter(ret),days, 0, NULL);
|
||||||
else ASN1_UTCTIME_set_string(X509_get_notAfter(ret),enddate);
|
else ASN1_TIME_set_string(X509_get_notAfter(ret),enddate);
|
||||||
|
|
||||||
if (!X509_set_subject_name(ret,subject)) goto err;
|
if (!X509_set_subject_name(ret,subject)) goto err;
|
||||||
|
|
||||||
@@ -2091,7 +2107,7 @@ again2:
|
|||||||
}
|
}
|
||||||
|
|
||||||
BIO_printf(bio_err,"Certificate is to be certified until ");
|
BIO_printf(bio_err,"Certificate is to be certified until ");
|
||||||
ASN1_UTCTIME_print(bio_err,X509_get_notAfter(ret));
|
ASN1_TIME_print(bio_err,X509_get_notAfter(ret));
|
||||||
if (days) BIO_printf(bio_err," (%ld days)",days);
|
if (days) BIO_printf(bio_err," (%ld days)",days);
|
||||||
BIO_printf(bio_err, "\n");
|
BIO_printf(bio_err, "\n");
|
||||||
|
|
||||||
@@ -2110,25 +2126,11 @@ again2:
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (pkey->type == EVP_PKEY_DSA) dgst=EVP_dss1();
|
|
||||||
pktmp=X509_get_pubkey(ret);
|
pktmp=X509_get_pubkey(ret);
|
||||||
if (EVP_PKEY_missing_parameters(pktmp) &&
|
if (EVP_PKEY_missing_parameters(pktmp) &&
|
||||||
!EVP_PKEY_missing_parameters(pkey))
|
!EVP_PKEY_missing_parameters(pkey))
|
||||||
EVP_PKEY_copy_parameters(pktmp,pkey);
|
EVP_PKEY_copy_parameters(pktmp,pkey);
|
||||||
EVP_PKEY_free(pktmp);
|
EVP_PKEY_free(pktmp);
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (pkey->type == EVP_PKEY_EC)
|
|
||||||
dgst = EVP_ecdsa();
|
|
||||||
pktmp = X509_get_pubkey(ret);
|
|
||||||
if (EVP_PKEY_missing_parameters(pktmp) &&
|
|
||||||
!EVP_PKEY_missing_parameters(pkey))
|
|
||||||
EVP_PKEY_copy_parameters(pktmp, pkey);
|
|
||||||
EVP_PKEY_free(pktmp);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
|
|
||||||
if (!X509_sign(ret,pkey,dgst))
|
if (!X509_sign(ret,pkey,dgst))
|
||||||
goto err;
|
goto err;
|
||||||
@@ -2230,7 +2232,7 @@ static int certify_spkac(X509 **xret, char *infile, EVP_PKEY *pkey, X509 *x509,
|
|||||||
unsigned long nameopt, int default_op, int ext_copy)
|
unsigned long nameopt, int default_op, int ext_copy)
|
||||||
{
|
{
|
||||||
STACK_OF(CONF_VALUE) *sk=NULL;
|
STACK_OF(CONF_VALUE) *sk=NULL;
|
||||||
LHASH *parms=NULL;
|
LHASH_OF(CONF_VALUE) *parms=NULL;
|
||||||
X509_REQ *req=NULL;
|
X509_REQ *req=NULL;
|
||||||
CONF_VALUE *cv=NULL;
|
CONF_VALUE *cv=NULL;
|
||||||
NETSCAPE_SPKI *spki = NULL;
|
NETSCAPE_SPKI *spki = NULL;
|
||||||
@@ -2393,14 +2395,9 @@ static int fix_data(int nid, int *type)
|
|||||||
return(1);
|
return(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int check_time_format(char *str)
|
static int check_time_format(const char *str)
|
||||||
{
|
{
|
||||||
ASN1_UTCTIME tm;
|
return ASN1_TIME_set_string(NULL, str);
|
||||||
|
|
||||||
tm.data=(unsigned char *)str;
|
|
||||||
tm.length=strlen(str);
|
|
||||||
tm.type=V_ASN1_UTCTIME;
|
|
||||||
return(ASN1_UTCTIME_check(&tm));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
|
static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
|
||||||
@@ -2415,6 +2412,8 @@ static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
|
|||||||
row[i]=NULL;
|
row[i]=NULL;
|
||||||
row[DB_name]=X509_NAME_oneline(X509_get_subject_name(x509),NULL,0);
|
row[DB_name]=X509_NAME_oneline(X509_get_subject_name(x509),NULL,0);
|
||||||
bn = ASN1_INTEGER_to_BN(X509_get_serialNumber(x509),NULL);
|
bn = ASN1_INTEGER_to_BN(X509_get_serialNumber(x509),NULL);
|
||||||
|
if (!bn)
|
||||||
|
goto err;
|
||||||
if (BN_is_zero(bn))
|
if (BN_is_zero(bn))
|
||||||
row[DB_serial]=BUF_strdup("00");
|
row[DB_serial]=BUF_strdup("00");
|
||||||
else
|
else
|
||||||
@@ -2484,7 +2483,7 @@ static int do_revoke(X509 *x509, CA_DB *db, int type, char *value)
|
|||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
}
|
}
|
||||||
else if (index_name_cmp((const char **)row,(const char **)rrow))
|
else if (index_name_cmp_noconst(row, rrow))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"ERROR:name does not match %s\n",
|
BIO_printf(bio_err,"ERROR:name does not match %s\n",
|
||||||
row[DB_name]);
|
row[DB_name]);
|
||||||
@@ -2633,9 +2632,9 @@ static int do_updatedb (CA_DB *db)
|
|||||||
else
|
else
|
||||||
a_y2k = 0;
|
a_y2k = 0;
|
||||||
|
|
||||||
for (i = 0; i < sk_num(db->db->data); i++)
|
for (i = 0; i < sk_PSTRING_num(db->db->data); i++)
|
||||||
{
|
{
|
||||||
rrow = (char **) sk_value(db->db->data, i);
|
rrow = sk_PSTRING_value(db->db->data, i);
|
||||||
|
|
||||||
if (rrow[DB_type][0] == 'V')
|
if (rrow[DB_type][0] == 'V')
|
||||||
{
|
{
|
||||||
@@ -2882,22 +2881,13 @@ int old_entry_print(BIO *bp, ASN1_OBJECT *obj, ASN1_STRING *str)
|
|||||||
p=(char *)str->data;
|
p=(char *)str->data;
|
||||||
for (j=str->length; j>0; j--)
|
for (j=str->length; j>0; j--)
|
||||||
{
|
{
|
||||||
#ifdef CHARSET_EBCDIC
|
|
||||||
if ((*p >= 0x20) && (*p <= 0x7e))
|
|
||||||
BIO_printf(bp,"%c",os_toebcdic[*p]);
|
|
||||||
#else
|
|
||||||
if ((*p >= ' ') && (*p <= '~'))
|
if ((*p >= ' ') && (*p <= '~'))
|
||||||
BIO_printf(bp,"%c",*p);
|
BIO_printf(bp,"%c",*p);
|
||||||
#endif
|
|
||||||
else if (*p & 0x80)
|
else if (*p & 0x80)
|
||||||
BIO_printf(bp,"\\0x%02X",*p);
|
BIO_printf(bp,"\\0x%02X",*p);
|
||||||
else if ((unsigned char)*p == 0xf7)
|
else if ((unsigned char)*p == 0xf7)
|
||||||
BIO_printf(bp,"^?");
|
BIO_printf(bp,"^?");
|
||||||
#ifdef CHARSET_EBCDIC
|
|
||||||
else BIO_printf(bp,"^%c",os_toebcdic[*p+0x40]);
|
|
||||||
#else
|
|
||||||
else BIO_printf(bp,"^%c",*p+'@');
|
else BIO_printf(bp,"^%c",*p+'@');
|
||||||
#endif
|
|
||||||
p++;
|
p++;
|
||||||
}
|
}
|
||||||
BIO_printf(bp,"'\n");
|
BIO_printf(bp,"'\n");
|
||||||
|
|||||||
@@ -71,7 +71,8 @@
|
|||||||
|
|
||||||
static const char *ciphers_usage[]={
|
static const char *ciphers_usage[]={
|
||||||
"usage: ciphers args\n",
|
"usage: ciphers args\n",
|
||||||
" -v - verbose mode, a textual listing of the ciphers in SSLeay\n",
|
" -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
|
||||||
|
" -V - even more verbose\n",
|
||||||
" -ssl2 - SSL2 mode\n",
|
" -ssl2 - SSL2 mode\n",
|
||||||
" -ssl3 - SSL3 mode\n",
|
" -ssl3 - SSL3 mode\n",
|
||||||
" -tls1 - TLS1 mode\n",
|
" -tls1 - TLS1 mode\n",
|
||||||
@@ -83,14 +84,14 @@ int MAIN(int, char **);
|
|||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int ret=1,i;
|
int ret=1,i;
|
||||||
int verbose=0;
|
int verbose=0,Verbose=0;
|
||||||
const char **pp;
|
const char **pp;
|
||||||
const char *p;
|
const char *p;
|
||||||
int badops=0;
|
int badops=0;
|
||||||
SSL_CTX *ctx=NULL;
|
SSL_CTX *ctx=NULL;
|
||||||
SSL *ssl=NULL;
|
SSL *ssl=NULL;
|
||||||
char *ciphers=NULL;
|
char *ciphers=NULL;
|
||||||
SSL_METHOD *meth=NULL;
|
const SSL_METHOD *meth=NULL;
|
||||||
STACK_OF(SSL_CIPHER) *sk;
|
STACK_OF(SSL_CIPHER) *sk;
|
||||||
char buf[512];
|
char buf[512];
|
||||||
BIO *STDout=NULL;
|
BIO *STDout=NULL;
|
||||||
@@ -114,6 +115,8 @@ int MAIN(int argc, char **argv)
|
|||||||
STDout = BIO_push(tmpbio, STDout);
|
STDout = BIO_push(tmpbio, STDout);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
@@ -121,6 +124,8 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
if (strcmp(*argv,"-v") == 0)
|
if (strcmp(*argv,"-v") == 0)
|
||||||
verbose=1;
|
verbose=1;
|
||||||
|
else if (strcmp(*argv,"-V") == 0)
|
||||||
|
verbose=Verbose=1;
|
||||||
#ifndef OPENSSL_NO_SSL2
|
#ifndef OPENSSL_NO_SSL2
|
||||||
else if (strcmp(*argv,"-ssl2") == 0)
|
else if (strcmp(*argv,"-ssl2") == 0)
|
||||||
meth=SSLv2_client_method();
|
meth=SSLv2_client_method();
|
||||||
@@ -179,15 +184,33 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
BIO_printf(STDout,"\n");
|
BIO_printf(STDout,"\n");
|
||||||
}
|
}
|
||||||
else
|
else /* verbose */
|
||||||
{
|
{
|
||||||
sk=SSL_get_ciphers(ssl);
|
sk=SSL_get_ciphers(ssl);
|
||||||
|
|
||||||
for (i=0; i<sk_SSL_CIPHER_num(sk); i++)
|
for (i=0; i<sk_SSL_CIPHER_num(sk); i++)
|
||||||
{
|
{
|
||||||
BIO_puts(STDout,SSL_CIPHER_description(
|
SSL_CIPHER *c;
|
||||||
sk_SSL_CIPHER_value(sk,i),
|
|
||||||
buf,sizeof buf));
|
c = sk_SSL_CIPHER_value(sk,i);
|
||||||
|
|
||||||
|
if (Verbose)
|
||||||
|
{
|
||||||
|
unsigned long id = c->id;
|
||||||
|
int id0 = (int)(id >> 24);
|
||||||
|
int id1 = (int)((id >> 16) & 0xffL);
|
||||||
|
int id2 = (int)((id >> 8) & 0xffL);
|
||||||
|
int id3 = (int)(id & 0xffL);
|
||||||
|
|
||||||
|
if ((id & 0xff000000L) == 0x02000000L)
|
||||||
|
BIO_printf(STDout, " 0x%02X,0x%02X,0x%02X - ", id1, id2, id3); /* SSL2 cipher */
|
||||||
|
else if ((id & 0xff000000L) == 0x03000000L)
|
||||||
|
BIO_printf(STDout, " 0x%02X,0x%02X - ", id2, id3); /* SSL3 cipher */
|
||||||
|
else
|
||||||
|
BIO_printf(STDout, "0x%02X,0x%02X,0x%02X,0x%02X - ", id0, id1, id2, id3); /* whatever */
|
||||||
|
}
|
||||||
|
|
||||||
|
BIO_puts(STDout,SSL_CIPHER_description(c,buf,sizeof buf));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
111
apps/cms.c
111
apps/cms.c
@@ -71,8 +71,9 @@
|
|||||||
static int save_certs(char *signerfile, STACK_OF(X509) *signers);
|
static int save_certs(char *signerfile, STACK_OF(X509) *signers);
|
||||||
static int cms_cb(int ok, X509_STORE_CTX *ctx);
|
static int cms_cb(int ok, X509_STORE_CTX *ctx);
|
||||||
static void receipt_request_print(BIO *out, CMS_ContentInfo *cms);
|
static void receipt_request_print(BIO *out, CMS_ContentInfo *cms);
|
||||||
static CMS_ReceiptRequest *make_receipt_request(STACK *rr_to, int rr_allorfirst,
|
static CMS_ReceiptRequest *make_receipt_request(STACK_OF(STRING) *rr_to,
|
||||||
STACK *rr_from);
|
int rr_allorfirst,
|
||||||
|
STACK_OF(STRING) *rr_from);
|
||||||
|
|
||||||
#define SMIME_OP 0x10
|
#define SMIME_OP 0x10
|
||||||
#define SMIME_IP 0x20
|
#define SMIME_IP 0x20
|
||||||
@@ -94,6 +95,8 @@ static CMS_ReceiptRequest *make_receipt_request(STACK *rr_to, int rr_allorfirst,
|
|||||||
#define SMIME_SIGN_RECEIPT (15 | SMIME_IP | SMIME_OP)
|
#define SMIME_SIGN_RECEIPT (15 | SMIME_IP | SMIME_OP)
|
||||||
#define SMIME_VERIFY_RECEIPT (16 | SMIME_IP)
|
#define SMIME_VERIFY_RECEIPT (16 | SMIME_IP)
|
||||||
|
|
||||||
|
int verify_err = 0;
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
@@ -105,7 +108,7 @@ int MAIN(int argc, char **argv)
|
|||||||
const char *inmode = "r", *outmode = "w";
|
const char *inmode = "r", *outmode = "w";
|
||||||
char *infile = NULL, *outfile = NULL, *rctfile = NULL;
|
char *infile = NULL, *outfile = NULL, *rctfile = NULL;
|
||||||
char *signerfile = NULL, *recipfile = NULL;
|
char *signerfile = NULL, *recipfile = NULL;
|
||||||
STACK *sksigners = NULL, *skkeys = NULL;
|
STACK_OF(STRING) *sksigners = NULL, *skkeys = NULL;
|
||||||
char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
|
char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
|
||||||
char *certsoutfile = NULL;
|
char *certsoutfile = NULL;
|
||||||
const EVP_CIPHER *cipher = NULL;
|
const EVP_CIPHER *cipher = NULL;
|
||||||
@@ -116,9 +119,10 @@ int MAIN(int argc, char **argv)
|
|||||||
STACK_OF(X509) *encerts = NULL, *other = NULL;
|
STACK_OF(X509) *encerts = NULL, *other = NULL;
|
||||||
BIO *in = NULL, *out = NULL, *indata = NULL, *rctin = NULL;
|
BIO *in = NULL, *out = NULL, *indata = NULL, *rctin = NULL;
|
||||||
int badarg = 0;
|
int badarg = 0;
|
||||||
int flags = CMS_DETACHED;
|
int flags = CMS_DETACHED, noout = 0, print = 0;
|
||||||
|
int verify_retcode = 0;
|
||||||
int rr_print = 0, rr_allorfirst = -1;
|
int rr_print = 0, rr_allorfirst = -1;
|
||||||
STACK *rr_to = NULL, *rr_from = NULL;
|
STACK_OF(STRING) *rr_to = NULL, *rr_from = NULL;
|
||||||
CMS_ReceiptRequest *rr = NULL;
|
CMS_ReceiptRequest *rr = NULL;
|
||||||
char *to = NULL, *from = NULL, *subject = NULL;
|
char *to = NULL, *from = NULL, *subject = NULL;
|
||||||
char *CAfile = NULL, *CApath = NULL;
|
char *CAfile = NULL, *CApath = NULL;
|
||||||
@@ -166,6 +170,8 @@ int MAIN(int argc, char **argv)
|
|||||||
operation = SMIME_RESIGN;
|
operation = SMIME_RESIGN;
|
||||||
else if (!strcmp (*args, "-verify"))
|
else if (!strcmp (*args, "-verify"))
|
||||||
operation = SMIME_VERIFY;
|
operation = SMIME_VERIFY;
|
||||||
|
else if (!strcmp (*args, "-verify_retcode"))
|
||||||
|
verify_retcode = 1;
|
||||||
else if (!strcmp(*args,"-verify_receipt"))
|
else if (!strcmp(*args,"-verify_receipt"))
|
||||||
{
|
{
|
||||||
operation = SMIME_VERIFY_RECEIPT;
|
operation = SMIME_VERIFY_RECEIPT;
|
||||||
@@ -252,21 +258,17 @@ int MAIN(int argc, char **argv)
|
|||||||
else if (!strcmp (*args, "-no_attr_verify"))
|
else if (!strcmp (*args, "-no_attr_verify"))
|
||||||
flags |= CMS_NO_ATTR_VERIFY;
|
flags |= CMS_NO_ATTR_VERIFY;
|
||||||
else if (!strcmp (*args, "-stream"))
|
else if (!strcmp (*args, "-stream"))
|
||||||
{
|
flags |= CMS_STREAM;
|
||||||
args++;
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
else if (!strcmp (*args, "-indef"))
|
else if (!strcmp (*args, "-indef"))
|
||||||
{
|
flags |= CMS_STREAM;
|
||||||
args++;
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
else if (!strcmp (*args, "-noindef"))
|
else if (!strcmp (*args, "-noindef"))
|
||||||
flags &= ~CMS_STREAM;
|
flags &= ~CMS_STREAM;
|
||||||
else if (!strcmp (*args, "-nooldmime"))
|
else if (!strcmp (*args, "-nooldmime"))
|
||||||
flags |= CMS_NOOLDMIMETYPE;
|
flags |= CMS_NOOLDMIMETYPE;
|
||||||
else if (!strcmp (*args, "-crlfeol"))
|
else if (!strcmp (*args, "-crlfeol"))
|
||||||
flags |= CMS_CRLFEOL;
|
flags |= CMS_CRLFEOL;
|
||||||
|
else if (!strcmp (*args, "-noout"))
|
||||||
|
noout = 1;
|
||||||
else if (!strcmp (*args, "-receipt_request_print"))
|
else if (!strcmp (*args, "-receipt_request_print"))
|
||||||
rr_print = 1;
|
rr_print = 1;
|
||||||
else if (!strcmp (*args, "-receipt_request_all"))
|
else if (!strcmp (*args, "-receipt_request_all"))
|
||||||
@@ -279,8 +281,8 @@ int MAIN(int argc, char **argv)
|
|||||||
goto argerr;
|
goto argerr;
|
||||||
args++;
|
args++;
|
||||||
if (!rr_from)
|
if (!rr_from)
|
||||||
rr_from = sk_new_null();
|
rr_from = sk_STRING_new_null();
|
||||||
sk_push(rr_from, *args);
|
sk_STRING_push(rr_from, *args);
|
||||||
}
|
}
|
||||||
else if (!strcmp(*args,"-receipt_request_to"))
|
else if (!strcmp(*args,"-receipt_request_to"))
|
||||||
{
|
{
|
||||||
@@ -288,8 +290,13 @@ int MAIN(int argc, char **argv)
|
|||||||
goto argerr;
|
goto argerr;
|
||||||
args++;
|
args++;
|
||||||
if (!rr_to)
|
if (!rr_to)
|
||||||
rr_to = sk_new_null();
|
rr_to = sk_STRING_new_null();
|
||||||
sk_push(rr_to, *args);
|
sk_STRING_push(rr_to, *args);
|
||||||
|
}
|
||||||
|
else if (!strcmp (*args, "-print"))
|
||||||
|
{
|
||||||
|
noout = 1;
|
||||||
|
print = 1;
|
||||||
}
|
}
|
||||||
else if (!strcmp(*args,"-secretkey"))
|
else if (!strcmp(*args,"-secretkey"))
|
||||||
{
|
{
|
||||||
@@ -380,13 +387,13 @@ int MAIN(int argc, char **argv)
|
|||||||
if (signerfile)
|
if (signerfile)
|
||||||
{
|
{
|
||||||
if (!sksigners)
|
if (!sksigners)
|
||||||
sksigners = sk_new_null();
|
sksigners = sk_STRING_new_null();
|
||||||
sk_push(sksigners, signerfile);
|
sk_STRING_push(sksigners, signerfile);
|
||||||
if (!keyfile)
|
if (!keyfile)
|
||||||
keyfile = signerfile;
|
keyfile = signerfile;
|
||||||
if (!skkeys)
|
if (!skkeys)
|
||||||
skkeys = sk_new_null();
|
skkeys = sk_STRING_new_null();
|
||||||
sk_push(skkeys, keyfile);
|
sk_STRING_push(skkeys, keyfile);
|
||||||
keyfile = NULL;
|
keyfile = NULL;
|
||||||
}
|
}
|
||||||
signerfile = *++args;
|
signerfile = *++args;
|
||||||
@@ -428,12 +435,12 @@ int MAIN(int argc, char **argv)
|
|||||||
goto argerr;
|
goto argerr;
|
||||||
}
|
}
|
||||||
if (!sksigners)
|
if (!sksigners)
|
||||||
sksigners = sk_new_null();
|
sksigners = sk_STRING_new_null();
|
||||||
sk_push(sksigners, signerfile);
|
sk_STRING_push(sksigners, signerfile);
|
||||||
signerfile = NULL;
|
signerfile = NULL;
|
||||||
if (!skkeys)
|
if (!skkeys)
|
||||||
skkeys = sk_new_null();
|
skkeys = sk_STRING_new_null();
|
||||||
sk_push(skkeys, keyfile);
|
sk_STRING_push(skkeys, keyfile);
|
||||||
}
|
}
|
||||||
keyfile = *++args;
|
keyfile = *++args;
|
||||||
}
|
}
|
||||||
@@ -532,13 +539,13 @@ int MAIN(int argc, char **argv)
|
|||||||
if (signerfile)
|
if (signerfile)
|
||||||
{
|
{
|
||||||
if (!sksigners)
|
if (!sksigners)
|
||||||
sksigners = sk_new_null();
|
sksigners = sk_STRING_new_null();
|
||||||
sk_push(sksigners, signerfile);
|
sk_STRING_push(sksigners, signerfile);
|
||||||
if (!skkeys)
|
if (!skkeys)
|
||||||
skkeys = sk_new_null();
|
skkeys = sk_STRING_new_null();
|
||||||
if (!keyfile)
|
if (!keyfile)
|
||||||
keyfile = signerfile;
|
keyfile = signerfile;
|
||||||
sk_push(skkeys, keyfile);
|
sk_STRING_push(skkeys, keyfile);
|
||||||
}
|
}
|
||||||
if (!sksigners)
|
if (!sksigners)
|
||||||
{
|
{
|
||||||
@@ -697,7 +704,7 @@ int MAIN(int argc, char **argv)
|
|||||||
|
|
||||||
if (secret_key && !secret_keyid)
|
if (secret_key && !secret_keyid)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "No sectre key id\n");
|
BIO_printf(bio_err, "No secret key id\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -973,11 +980,11 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else
|
else
|
||||||
flags |= CMS_REUSE_DIGEST;
|
flags |= CMS_REUSE_DIGEST;
|
||||||
for (i = 0; i < sk_num(sksigners); i++)
|
for (i = 0; i < sk_STRING_num(sksigners); i++)
|
||||||
{
|
{
|
||||||
CMS_SignerInfo *si;
|
CMS_SignerInfo *si;
|
||||||
signerfile = sk_value(sksigners, i);
|
signerfile = sk_STRING_value(sksigners, i);
|
||||||
keyfile = sk_value(skkeys, i);
|
keyfile = sk_STRING_value(skkeys, i);
|
||||||
signer = load_cert(bio_err, signerfile,FORMAT_PEM, NULL,
|
signer = load_cert(bio_err, signerfile,FORMAT_PEM, NULL,
|
||||||
e, "signer certificate");
|
e, "signer certificate");
|
||||||
if (!signer)
|
if (!signer)
|
||||||
@@ -1075,6 +1082,8 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Verification failure\n");
|
BIO_printf(bio_err, "Verification failure\n");
|
||||||
|
if (verify_retcode)
|
||||||
|
ret = verify_err + 32;
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (signerfile)
|
if (signerfile)
|
||||||
@@ -1107,7 +1116,12 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
if (outformat == FORMAT_SMIME)
|
if (noout)
|
||||||
|
{
|
||||||
|
if (print)
|
||||||
|
CMS_ContentInfo_print_ctx(out, cms, 0, NULL);
|
||||||
|
}
|
||||||
|
else if (outformat == FORMAT_SMIME)
|
||||||
{
|
{
|
||||||
if (to)
|
if (to)
|
||||||
BIO_printf(out, "To: %s\n", to);
|
BIO_printf(out, "To: %s\n", to);
|
||||||
@@ -1121,9 +1135,9 @@ int MAIN(int argc, char **argv)
|
|||||||
ret = SMIME_write_CMS(out, cms, in, flags);
|
ret = SMIME_write_CMS(out, cms, in, flags);
|
||||||
}
|
}
|
||||||
else if (outformat == FORMAT_PEM)
|
else if (outformat == FORMAT_PEM)
|
||||||
ret = PEM_write_bio_CMS(out, cms);
|
ret = PEM_write_bio_CMS_stream(out, cms, in, flags);
|
||||||
else if (outformat == FORMAT_ASN1)
|
else if (outformat == FORMAT_ASN1)
|
||||||
ret = i2d_CMS_bio(out,cms);
|
ret = i2d_CMS_bio_stream(out,cms, in, flags);
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad output format for CMS file\n");
|
BIO_printf(bio_err, "Bad output format for CMS file\n");
|
||||||
@@ -1146,9 +1160,9 @@ end:
|
|||||||
if (vpm)
|
if (vpm)
|
||||||
X509_VERIFY_PARAM_free(vpm);
|
X509_VERIFY_PARAM_free(vpm);
|
||||||
if (sksigners)
|
if (sksigners)
|
||||||
sk_free(sksigners);
|
sk_STRING_free(sksigners);
|
||||||
if (skkeys)
|
if (skkeys)
|
||||||
sk_free(skkeys);
|
sk_STRING_free(skkeys);
|
||||||
if (secret_key)
|
if (secret_key)
|
||||||
OPENSSL_free(secret_key);
|
OPENSSL_free(secret_key);
|
||||||
if (secret_keyid)
|
if (secret_keyid)
|
||||||
@@ -1158,9 +1172,9 @@ end:
|
|||||||
if (rr)
|
if (rr)
|
||||||
CMS_ReceiptRequest_free(rr);
|
CMS_ReceiptRequest_free(rr);
|
||||||
if (rr_to)
|
if (rr_to)
|
||||||
sk_free(rr_to);
|
sk_STRING_free(rr_to);
|
||||||
if (rr_from)
|
if (rr_from)
|
||||||
sk_free(rr_from);
|
sk_STRING_free(rr_from);
|
||||||
X509_STORE_free(store);
|
X509_STORE_free(store);
|
||||||
X509_free(cert);
|
X509_free(cert);
|
||||||
X509_free(recip);
|
X509_free(recip);
|
||||||
@@ -1199,6 +1213,8 @@ static int cms_cb(int ok, X509_STORE_CTX *ctx)
|
|||||||
|
|
||||||
error = X509_STORE_CTX_get_error(ctx);
|
error = X509_STORE_CTX_get_error(ctx);
|
||||||
|
|
||||||
|
verify_err = error;
|
||||||
|
|
||||||
if ((error != X509_V_ERR_NO_EXPLICIT_POLICY)
|
if ((error != X509_V_ERR_NO_EXPLICIT_POLICY)
|
||||||
&& ((error != X509_V_OK) || (ok != 2)))
|
&& ((error != X509_V_OK) || (ok != 2)))
|
||||||
return ok;
|
return ok;
|
||||||
@@ -1280,7 +1296,7 @@ static void receipt_request_print(BIO *out, CMS_ContentInfo *cms)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK *ns)
|
static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK_OF(STRING) *ns)
|
||||||
{
|
{
|
||||||
int i;
|
int i;
|
||||||
STACK_OF(GENERAL_NAMES) *ret;
|
STACK_OF(GENERAL_NAMES) *ret;
|
||||||
@@ -1289,12 +1305,10 @@ static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK *ns)
|
|||||||
ret = sk_GENERAL_NAMES_new_null();
|
ret = sk_GENERAL_NAMES_new_null();
|
||||||
if (!ret)
|
if (!ret)
|
||||||
goto err;
|
goto err;
|
||||||
for (i = 0; i < sk_num(ns); i++)
|
for (i = 0; i < sk_STRING_num(ns); i++)
|
||||||
{
|
{
|
||||||
CONF_VALUE cnf;
|
char *str = sk_STRING_value(ns, i);
|
||||||
cnf.name = "email";
|
gen = a2i_GENERAL_NAME(NULL, NULL, NULL, GEN_EMAIL, str, 0);
|
||||||
cnf.value = sk_value(ns, i);
|
|
||||||
gen = v2i_GENERAL_NAME(NULL, NULL, &cnf);
|
|
||||||
if (!gen)
|
if (!gen)
|
||||||
goto err;
|
goto err;
|
||||||
gens = GENERAL_NAMES_new();
|
gens = GENERAL_NAMES_new();
|
||||||
@@ -1321,8 +1335,9 @@ static STACK_OF(GENERAL_NAMES) *make_names_stack(STACK *ns)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
static CMS_ReceiptRequest *make_receipt_request(STACK *rr_to, int rr_allorfirst,
|
static CMS_ReceiptRequest *make_receipt_request(STACK_OF(STRING) *rr_to,
|
||||||
STACK *rr_from)
|
int rr_allorfirst,
|
||||||
|
STACK_OF(STRING) *rr_from)
|
||||||
{
|
{
|
||||||
STACK_OF(GENERAL_NAMES) *rct_to, *rct_from;
|
STACK_OF(GENERAL_NAMES) *rct_to, *rct_from;
|
||||||
CMS_ReceiptRequest *rr;
|
CMS_ReceiptRequest *rr;
|
||||||
|
|||||||
21
apps/crl.c
21
apps/crl.c
@@ -85,6 +85,7 @@ static const char *crl_usage[]={
|
|||||||
" -issuer - print issuer DN\n",
|
" -issuer - print issuer DN\n",
|
||||||
" -lastupdate - lastUpdate field\n",
|
" -lastupdate - lastUpdate field\n",
|
||||||
" -nextupdate - nextUpdate field\n",
|
" -nextupdate - nextUpdate field\n",
|
||||||
|
" -crlnumber - print CRL number\n",
|
||||||
" -noout - no CRL output\n",
|
" -noout - no CRL output\n",
|
||||||
" -CAfile name - verify CRL using certificates in file \"name\"\n",
|
" -CAfile name - verify CRL using certificates in file \"name\"\n",
|
||||||
" -CApath dir - verify CRL using certificates in \"dir\"\n",
|
" -CApath dir - verify CRL using certificates in \"dir\"\n",
|
||||||
@@ -107,7 +108,7 @@ int MAIN(int argc, char **argv)
|
|||||||
int informat,outformat;
|
int informat,outformat;
|
||||||
char *infile=NULL,*outfile=NULL;
|
char *infile=NULL,*outfile=NULL;
|
||||||
int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
|
int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
|
||||||
int fingerprint = 0;
|
int fingerprint = 0, crlnumber = 0;
|
||||||
const char **pp;
|
const char **pp;
|
||||||
X509_STORE *store = NULL;
|
X509_STORE *store = NULL;
|
||||||
X509_STORE_CTX ctx;
|
X509_STORE_CTX ctx;
|
||||||
@@ -206,6 +207,8 @@ int MAIN(int argc, char **argv)
|
|||||||
noout= ++num;
|
noout= ++num;
|
||||||
else if (strcmp(*argv,"-fingerprint") == 0)
|
else if (strcmp(*argv,"-fingerprint") == 0)
|
||||||
fingerprint= ++num;
|
fingerprint= ++num;
|
||||||
|
else if (strcmp(*argv,"-crlnumber") == 0)
|
||||||
|
crlnumber= ++num;
|
||||||
else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
|
else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
|
||||||
{
|
{
|
||||||
/* ok */
|
/* ok */
|
||||||
@@ -281,7 +284,21 @@ bad:
|
|||||||
{
|
{
|
||||||
print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), nmflag);
|
print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), nmflag);
|
||||||
}
|
}
|
||||||
|
if (crlnumber == i)
|
||||||
|
{
|
||||||
|
ASN1_INTEGER *crlnum;
|
||||||
|
crlnum = X509_CRL_get_ext_d2i(x, NID_crl_number,
|
||||||
|
NULL, NULL);
|
||||||
|
BIO_printf(bio_out,"crlNumber=");
|
||||||
|
if (crlnum)
|
||||||
|
{
|
||||||
|
i2a_ASN1_INTEGER(bio_out, crlnum);
|
||||||
|
ASN1_INTEGER_free(crlnum);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
BIO_puts(bio_out, "<NONE>");
|
||||||
|
BIO_printf(bio_out,"\n");
|
||||||
|
}
|
||||||
if (hash == i)
|
if (hash == i)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_out,"%08lx\n",
|
BIO_printf(bio_out,"%08lx\n",
|
||||||
|
|||||||
@@ -63,7 +63,6 @@
|
|||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
@@ -93,7 +92,7 @@ int MAIN(int argc, char **argv)
|
|||||||
PKCS7 *p7 = NULL;
|
PKCS7 *p7 = NULL;
|
||||||
PKCS7_SIGNED *p7s = NULL;
|
PKCS7_SIGNED *p7s = NULL;
|
||||||
X509_CRL *crl=NULL;
|
X509_CRL *crl=NULL;
|
||||||
STACK *certflst=NULL;
|
STACK_OF(STRING) *certflst=NULL;
|
||||||
STACK_OF(X509_CRL) *crl_stack=NULL;
|
STACK_OF(X509_CRL) *crl_stack=NULL;
|
||||||
STACK_OF(X509) *cert_stack=NULL;
|
STACK_OF(X509) *cert_stack=NULL;
|
||||||
int ret=1,nocrl=0;
|
int ret=1,nocrl=0;
|
||||||
@@ -141,8 +140,8 @@ int MAIN(int argc, char **argv)
|
|||||||
else if (strcmp(*argv,"-certfile") == 0)
|
else if (strcmp(*argv,"-certfile") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
if(!certflst) certflst = sk_new_null();
|
if(!certflst) certflst = sk_STRING_new_null();
|
||||||
sk_push(certflst,*(++argv));
|
sk_STRING_push(certflst,*(++argv));
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
@@ -227,8 +226,8 @@ bad:
|
|||||||
if ((cert_stack=sk_X509_new_null()) == NULL) goto end;
|
if ((cert_stack=sk_X509_new_null()) == NULL) goto end;
|
||||||
p7s->cert=cert_stack;
|
p7s->cert=cert_stack;
|
||||||
|
|
||||||
if(certflst) for(i = 0; i < sk_num(certflst); i++) {
|
if(certflst) for(i = 0; i < sk_STRING_num(certflst); i++) {
|
||||||
certfile = sk_value(certflst, i);
|
certfile = sk_STRING_value(certflst, i);
|
||||||
if (add_certs_from_file(cert_stack,certfile) < 0)
|
if (add_certs_from_file(cert_stack,certfile) < 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "error loading certificates\n");
|
BIO_printf(bio_err, "error loading certificates\n");
|
||||||
@@ -237,7 +236,7 @@ bad:
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
sk_free(certflst);
|
sk_STRING_free(certflst);
|
||||||
|
|
||||||
if (outfile == NULL)
|
if (outfile == NULL)
|
||||||
{
|
{
|
||||||
@@ -295,19 +294,12 @@ end:
|
|||||||
*/
|
*/
|
||||||
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
|
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
|
||||||
{
|
{
|
||||||
struct stat st;
|
|
||||||
BIO *in=NULL;
|
BIO *in=NULL;
|
||||||
int count=0;
|
int count=0;
|
||||||
int ret= -1;
|
int ret= -1;
|
||||||
STACK_OF(X509_INFO) *sk=NULL;
|
STACK_OF(X509_INFO) *sk=NULL;
|
||||||
X509_INFO *xi;
|
X509_INFO *xi;
|
||||||
|
|
||||||
if ((stat(certfile,&st) != 0))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load the file, %s\n",certfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in=BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (BIO_read_filename(in,certfile) <= 0))
|
if ((in == NULL) || (BIO_read_filename(in,certfile) <= 0))
|
||||||
{
|
{
|
||||||
|
|||||||
344
apps/dgst.c
344
apps/dgst.c
@@ -75,8 +75,29 @@
|
|||||||
#define PROG dgst_main
|
#define PROG dgst_main
|
||||||
|
|
||||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
||||||
EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
|
EVP_PKEY *key, unsigned char *sigin, int siglen,
|
||||||
const char *file,BIO *bmd,const char *hmac_key, int non_fips_allow);
|
const char *sig_name, const char *md_name,
|
||||||
|
const char *file,BIO *bmd);
|
||||||
|
|
||||||
|
static void list_md_fn(const EVP_MD *m,
|
||||||
|
const char *from, const char *to, void *arg)
|
||||||
|
{
|
||||||
|
const char *mname;
|
||||||
|
/* Skip aliases */
|
||||||
|
if (!m)
|
||||||
|
return;
|
||||||
|
mname = OBJ_nid2ln(EVP_MD_type(m));
|
||||||
|
/* Skip shortnames */
|
||||||
|
if (strcmp(from, mname))
|
||||||
|
return;
|
||||||
|
/* Skip clones */
|
||||||
|
if (EVP_MD_flags(m) & EVP_MD_FLAG_PKEY_DIGEST)
|
||||||
|
return;
|
||||||
|
if (strchr(mname, ' '))
|
||||||
|
mname= EVP_MD_name(m);
|
||||||
|
BIO_printf(arg, "-%-14s to use the %s message digest algorithm\n",
|
||||||
|
mname, mname);
|
||||||
|
}
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
@@ -84,12 +105,11 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
unsigned char *buf=NULL;
|
unsigned char *buf=NULL;
|
||||||
int i,err=0;
|
int i,err=1;
|
||||||
const EVP_MD *md=NULL,*m;
|
const EVP_MD *md=NULL,*m;
|
||||||
BIO *in=NULL,*inp;
|
BIO *in=NULL,*inp;
|
||||||
BIO *bmd=NULL;
|
BIO *bmd=NULL;
|
||||||
BIO *out = NULL;
|
BIO *out = NULL;
|
||||||
const char *name;
|
|
||||||
#define PROG_NAME_SIZE 39
|
#define PROG_NAME_SIZE 39
|
||||||
char pname[PROG_NAME_SIZE+1];
|
char pname[PROG_NAME_SIZE+1];
|
||||||
int separator=0;
|
int separator=0;
|
||||||
@@ -101,16 +121,16 @@ int MAIN(int argc, char **argv)
|
|||||||
EVP_PKEY *sigkey = NULL;
|
EVP_PKEY *sigkey = NULL;
|
||||||
unsigned char *sigbuf = NULL;
|
unsigned char *sigbuf = NULL;
|
||||||
int siglen = 0;
|
int siglen = 0;
|
||||||
unsigned int sig_flags = 0;
|
|
||||||
char *passargin = NULL, *passin = NULL;
|
char *passargin = NULL, *passin = NULL;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine=NULL;
|
||||||
#endif
|
#endif
|
||||||
char *hmac_key=NULL;
|
char *hmac_key=NULL;
|
||||||
int non_fips_allow = 0;
|
char *mac_name=NULL;
|
||||||
|
STACK_OF(STRING) *sigopts = NULL, *macopts = NULL;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
ERR_load_crypto_strings();
|
|
||||||
if ((buf=(unsigned char *)OPENSSL_malloc(BUFSIZE)) == NULL)
|
if ((buf=(unsigned char *)OPENSSL_malloc(BUFSIZE)) == NULL)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"out of memory\n");
|
BIO_printf(bio_err,"out of memory\n");
|
||||||
@@ -169,27 +189,6 @@ ERR_load_crypto_strings();
|
|||||||
keyfile=*(++argv);
|
keyfile=*(++argv);
|
||||||
do_verify = 1;
|
do_verify = 1;
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-x931") == 0)
|
|
||||||
sig_flags = EVP_MD_CTX_FLAG_PAD_X931;
|
|
||||||
else if (strcmp(*argv,"-pss_saltlen") == 0)
|
|
||||||
{
|
|
||||||
int saltlen;
|
|
||||||
if (--argc < 1) break;
|
|
||||||
saltlen=atoi(*(++argv));
|
|
||||||
if (saltlen == -1)
|
|
||||||
sig_flags = EVP_MD_CTX_FLAG_PSS_MREC;
|
|
||||||
else if (saltlen == -2)
|
|
||||||
sig_flags = EVP_MD_CTX_FLAG_PSS_MDLEN;
|
|
||||||
else if (saltlen < -2 || saltlen >= 0xFFFE)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Invalid PSS salt length %d\n", saltlen);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
sig_flags = saltlen;
|
|
||||||
sig_flags <<= 16;
|
|
||||||
sig_flags |= EVP_MD_CTX_FLAG_PAD_PSS;
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-signature") == 0)
|
else if (strcmp(*argv,"-signature") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) break;
|
if (--argc < 1) break;
|
||||||
@@ -205,6 +204,7 @@ ERR_load_crypto_strings();
|
|||||||
{
|
{
|
||||||
if (--argc < 1) break;
|
if (--argc < 1) break;
|
||||||
engine= *(++argv);
|
engine= *(++argv);
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
else if (strcmp(*argv,"-hex") == 0)
|
else if (strcmp(*argv,"-hex") == 0)
|
||||||
@@ -213,16 +213,36 @@ ERR_load_crypto_strings();
|
|||||||
out_bin = 1;
|
out_bin = 1;
|
||||||
else if (strcmp(*argv,"-d") == 0)
|
else if (strcmp(*argv,"-d") == 0)
|
||||||
debug=1;
|
debug=1;
|
||||||
else if (strcmp(*argv,"-non-fips-allow") == 0)
|
|
||||||
non_fips_allow=1;
|
|
||||||
else if (!strcmp(*argv,"-fips-fingerprint"))
|
|
||||||
hmac_key = "etaonrishdlcupfm";
|
|
||||||
else if (!strcmp(*argv,"-hmac"))
|
else if (!strcmp(*argv,"-hmac"))
|
||||||
{
|
{
|
||||||
if (--argc < 1)
|
if (--argc < 1)
|
||||||
break;
|
break;
|
||||||
hmac_key=*++argv;
|
hmac_key=*++argv;
|
||||||
}
|
}
|
||||||
|
else if (!strcmp(*argv,"-mac"))
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
mac_name=*++argv;
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-sigopt") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
if (!sigopts)
|
||||||
|
sigopts = sk_STRING_new_null();
|
||||||
|
if (!sigopts || !sk_STRING_push(sigopts, *(++argv)))
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-macopt") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
break;
|
||||||
|
if (!macopts)
|
||||||
|
macopts = sk_STRING_new_null();
|
||||||
|
if (!macopts || !sk_STRING_push(macopts, *(++argv)))
|
||||||
|
break;
|
||||||
|
}
|
||||||
else if ((m=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
|
else if ((m=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
|
||||||
md=m;
|
md=m;
|
||||||
else
|
else
|
||||||
@@ -231,12 +251,9 @@ ERR_load_crypto_strings();
|
|||||||
argv++;
|
argv++;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (md == NULL)
|
|
||||||
md=EVP_md5();
|
|
||||||
|
|
||||||
if(do_verify && !sigfile) {
|
if(do_verify && !sigfile) {
|
||||||
BIO_printf(bio_err, "No signature to verify: use the -signature option\n");
|
BIO_printf(bio_err, "No signature to verify: use the -signature option\n");
|
||||||
err = 1;
|
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -252,49 +269,20 @@ ERR_load_crypto_strings();
|
|||||||
BIO_printf(bio_err,"-verify file verify a signature using public key in file\n");
|
BIO_printf(bio_err,"-verify file verify a signature using public key in file\n");
|
||||||
BIO_printf(bio_err,"-prverify file verify a signature using private key in file\n");
|
BIO_printf(bio_err,"-prverify file verify a signature using private key in file\n");
|
||||||
BIO_printf(bio_err,"-keyform arg key file format (PEM or ENGINE)\n");
|
BIO_printf(bio_err,"-keyform arg key file format (PEM or ENGINE)\n");
|
||||||
|
BIO_printf(bio_err,"-out filename output to filename rather than stdout\n");
|
||||||
BIO_printf(bio_err,"-signature file signature to verify\n");
|
BIO_printf(bio_err,"-signature file signature to verify\n");
|
||||||
BIO_printf(bio_err,"-binary output in binary form\n");
|
BIO_printf(bio_err,"-sigopt nm:v signature parameter\n");
|
||||||
BIO_printf(bio_err,"-hmac key create hashed MAC with key\n");
|
BIO_printf(bio_err,"-hmac key create hashed MAC with key\n");
|
||||||
|
BIO_printf(bio_err,"-mac algorithm create MAC (not neccessarily HMAC)\n");
|
||||||
|
BIO_printf(bio_err,"-macopt nm:v MAC algorithm parameters or key\n");
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err,"-engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err,"-engine e use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm (default)\n",
|
EVP_MD_do_all_sorted(list_md_fn, bio_err);
|
||||||
LN_md5,LN_md5);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_md4,LN_md4);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_md2,LN_md2);
|
|
||||||
#ifndef OPENSSL_NO_SHA
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha1,LN_sha1);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha,LN_sha);
|
|
||||||
#ifndef OPENSSL_NO_SHA256
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha224,LN_sha224);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha256,LN_sha256);
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_SHA512
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha384,LN_sha384);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_sha512,LN_sha512);
|
|
||||||
#endif
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_mdc2,LN_mdc2);
|
|
||||||
BIO_printf(bio_err,"-%-14s to use the %s message digest algorithm\n",
|
|
||||||
LN_ripemd160,LN_ripemd160);
|
|
||||||
err=1;
|
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in=BIO_new(BIO_s_file());
|
||||||
bmd=BIO_new(BIO_f_md());
|
bmd=BIO_new(BIO_f_md());
|
||||||
if (debug)
|
if (debug)
|
||||||
@@ -317,8 +305,10 @@ ERR_load_crypto_strings();
|
|||||||
}
|
}
|
||||||
|
|
||||||
if(out_bin == -1) {
|
if(out_bin == -1) {
|
||||||
if(keyfile) out_bin = 1;
|
if(keyfile)
|
||||||
else out_bin = 0;
|
out_bin = 1;
|
||||||
|
else
|
||||||
|
out_bin = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
if(randfile)
|
if(randfile)
|
||||||
@@ -344,6 +334,11 @@ ERR_load_crypto_strings();
|
|||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
if ((!!mac_name + !!keyfile + !!hmac_key) > 1)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "MAC and Signing key cannot both be specified\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if(keyfile)
|
if(keyfile)
|
||||||
{
|
{
|
||||||
@@ -361,6 +356,101 @@ ERR_load_crypto_strings();
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (mac_name)
|
||||||
|
{
|
||||||
|
EVP_PKEY_CTX *mac_ctx = NULL;
|
||||||
|
int r = 0;
|
||||||
|
if (!init_gen_str(bio_err, &mac_ctx, mac_name,e, 0))
|
||||||
|
goto mac_end;
|
||||||
|
if (macopts)
|
||||||
|
{
|
||||||
|
char *macopt;
|
||||||
|
for (i = 0; i < sk_STRING_num(macopts); i++)
|
||||||
|
{
|
||||||
|
macopt = sk_STRING_value(macopts, i);
|
||||||
|
if (pkey_ctrl_string(mac_ctx, macopt) <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"MAC parameter error \"%s\"\n",
|
||||||
|
macopt);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto mac_end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (EVP_PKEY_keygen(mac_ctx, &sigkey) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error generating key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto mac_end;
|
||||||
|
}
|
||||||
|
r = 1;
|
||||||
|
mac_end:
|
||||||
|
if (mac_ctx)
|
||||||
|
EVP_PKEY_CTX_free(mac_ctx);
|
||||||
|
if (r == 0)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (hmac_key)
|
||||||
|
{
|
||||||
|
sigkey = EVP_PKEY_new_mac_key(EVP_PKEY_HMAC, e,
|
||||||
|
(unsigned char *)hmac_key, -1);
|
||||||
|
if (!sigkey)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sigkey)
|
||||||
|
{
|
||||||
|
EVP_MD_CTX *mctx = NULL;
|
||||||
|
EVP_PKEY_CTX *pctx = NULL;
|
||||||
|
int r;
|
||||||
|
if (!BIO_get_md_ctx(bmd, &mctx))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error getting context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (do_verify)
|
||||||
|
r = EVP_DigestVerifyInit(mctx, &pctx, md, e, sigkey);
|
||||||
|
else
|
||||||
|
r = EVP_DigestSignInit(mctx, &pctx, md, e, sigkey);
|
||||||
|
if (!r)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error setting context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (sigopts)
|
||||||
|
{
|
||||||
|
char *sigopt;
|
||||||
|
for (i = 0; i < sk_STRING_num(sigopts); i++)
|
||||||
|
{
|
||||||
|
sigopt = sk_STRING_value(sigopts, i);
|
||||||
|
if (pkey_ctrl_string(pctx, sigopt) <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"parameter error \"%s\"\n",
|
||||||
|
sigopt);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
/* we use md as a filter, reading from 'in' */
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (md == NULL)
|
||||||
|
md = EVP_md5();
|
||||||
|
if (!BIO_set_md(bmd,md))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error setting digest %s\n", pname);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if(sigfile && sigkey) {
|
if(sigfile && sigkey) {
|
||||||
BIO *sigbio;
|
BIO *sigbio;
|
||||||
sigbio = BIO_new_file(sigfile, "rb");
|
sigbio = BIO_new_file(sigfile, "rb");
|
||||||
@@ -381,66 +471,51 @@ ERR_load_crypto_strings();
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (non_fips_allow)
|
|
||||||
{
|
|
||||||
EVP_MD_CTX *md_ctx;
|
|
||||||
BIO_get_md_ctx(bmd,&md_ctx);
|
|
||||||
EVP_MD_CTX_set_flags(md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (sig_flags)
|
|
||||||
{
|
|
||||||
EVP_MD_CTX *md_ctx;
|
|
||||||
BIO_get_md_ctx(bmd,&md_ctx);
|
|
||||||
EVP_MD_CTX_set_flags(md_ctx, sig_flags);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* we use md as a filter, reading from 'in' */
|
|
||||||
if (!BIO_set_md(bmd,md))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error setting digest %s\n", pname);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
inp=BIO_push(bmd,in);
|
inp=BIO_push(bmd,in);
|
||||||
|
|
||||||
|
if (md == NULL)
|
||||||
|
{
|
||||||
|
EVP_MD_CTX *tctx;
|
||||||
|
BIO_get_md_ctx(bmd, &tctx);
|
||||||
|
md = EVP_MD_CTX_md(tctx);
|
||||||
|
}
|
||||||
|
|
||||||
if (argc == 0)
|
if (argc == 0)
|
||||||
{
|
{
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
||||||
err=do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf,
|
err=do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf,
|
||||||
siglen,"","(stdin)",bmd,hmac_key,non_fips_allow);
|
siglen,NULL,NULL,"stdin",bmd);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
name=OBJ_nid2sn(md->type);
|
const char *md_name = NULL, *sig_name = NULL;
|
||||||
|
if(!out_bin)
|
||||||
|
{
|
||||||
|
if (sigkey)
|
||||||
|
{
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
ameth = EVP_PKEY_get0_asn1(sigkey);
|
||||||
|
if (ameth)
|
||||||
|
EVP_PKEY_asn1_get0_info(NULL, NULL,
|
||||||
|
NULL, NULL, &sig_name, ameth);
|
||||||
|
}
|
||||||
|
md_name = EVP_MD_name(md);
|
||||||
|
}
|
||||||
|
err = 0;
|
||||||
for (i=0; i<argc; i++)
|
for (i=0; i<argc; i++)
|
||||||
{
|
{
|
||||||
char *tmp,*tofree=NULL;
|
|
||||||
int r;
|
int r;
|
||||||
|
|
||||||
if (BIO_read_filename(in,argv[i]) <= 0)
|
if (BIO_read_filename(in,argv[i]) <= 0)
|
||||||
{
|
{
|
||||||
perror(argv[i]);
|
perror(argv[i]);
|
||||||
err++;
|
err++;
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
if(!out_bin)
|
|
||||||
{
|
|
||||||
size_t len = strlen(name)+strlen(argv[i])+(hmac_key ? 5 : 0)+5;
|
|
||||||
tmp=tofree=OPENSSL_malloc(len);
|
|
||||||
BIO_snprintf(tmp,len,"%s%s(%s)= ",
|
|
||||||
hmac_key ? "HMAC-" : "",name,argv[i]);
|
|
||||||
}
|
|
||||||
else
|
else
|
||||||
tmp="";
|
|
||||||
r=do_fp(out,buf,inp,separator,out_bin,sigkey,sigbuf,
|
r=do_fp(out,buf,inp,separator,out_bin,sigkey,sigbuf,
|
||||||
siglen,tmp,argv[i],bmd,hmac_key,non_fips_allow);
|
siglen,sig_name,md_name, argv[i],bmd);
|
||||||
if(r)
|
if(r)
|
||||||
err=r;
|
err=r;
|
||||||
if(tofree)
|
|
||||||
OPENSSL_free(tofree);
|
|
||||||
(void)BIO_reset(bmd);
|
(void)BIO_reset(bmd);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -455,6 +530,10 @@ end:
|
|||||||
OPENSSL_free(passin);
|
OPENSSL_free(passin);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
EVP_PKEY_free(sigkey);
|
EVP_PKEY_free(sigkey);
|
||||||
|
if (sigopts)
|
||||||
|
sk_STRING_free(sigopts);
|
||||||
|
if (macopts)
|
||||||
|
sk_STRING_free(macopts);
|
||||||
if(sigbuf) OPENSSL_free(sigbuf);
|
if(sigbuf) OPENSSL_free(sigbuf);
|
||||||
if (bmd != NULL) BIO_free(bmd);
|
if (bmd != NULL) BIO_free(bmd);
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
@@ -462,24 +541,13 @@ end:
|
|||||||
}
|
}
|
||||||
|
|
||||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
||||||
EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
|
EVP_PKEY *key, unsigned char *sigin, int siglen,
|
||||||
const char *file,BIO *bmd,const char *hmac_key,int non_fips_allow)
|
const char *sig_name, const char *md_name,
|
||||||
|
const char *file,BIO *bmd)
|
||||||
{
|
{
|
||||||
unsigned int len;
|
size_t len;
|
||||||
int i;
|
int i;
|
||||||
EVP_MD_CTX *md_ctx;
|
|
||||||
HMAC_CTX hmac_ctx;
|
|
||||||
|
|
||||||
if (hmac_key)
|
|
||||||
{
|
|
||||||
EVP_MD *md;
|
|
||||||
|
|
||||||
BIO_get_md(bmd,&md);
|
|
||||||
HMAC_CTX_init(&hmac_ctx);
|
|
||||||
HMAC_Init_ex(&hmac_ctx,hmac_key,strlen(hmac_key),md, NULL);
|
|
||||||
BIO_get_md_ctx(bmd,&md_ctx);
|
|
||||||
BIO_set_md_ctx(bmd,&hmac_ctx.md_ctx);
|
|
||||||
}
|
|
||||||
for (;;)
|
for (;;)
|
||||||
{
|
{
|
||||||
i=BIO_read(bp,(char *)buf,BUFSIZE);
|
i=BIO_read(bp,(char *)buf,BUFSIZE);
|
||||||
@@ -495,7 +563,7 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
|||||||
{
|
{
|
||||||
EVP_MD_CTX *ctx;
|
EVP_MD_CTX *ctx;
|
||||||
BIO_get_md_ctx(bp, &ctx);
|
BIO_get_md_ctx(bp, &ctx);
|
||||||
i = EVP_VerifyFinal(ctx, sigin, (unsigned int)siglen, key);
|
i = EVP_DigestVerifyFinal(ctx, sigin, (unsigned int)siglen);
|
||||||
if(i > 0)
|
if(i > 0)
|
||||||
BIO_printf(out, "Verified OK\n");
|
BIO_printf(out, "Verified OK\n");
|
||||||
else if(i == 0)
|
else if(i == 0)
|
||||||
@@ -515,25 +583,33 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
|||||||
{
|
{
|
||||||
EVP_MD_CTX *ctx;
|
EVP_MD_CTX *ctx;
|
||||||
BIO_get_md_ctx(bp, &ctx);
|
BIO_get_md_ctx(bp, &ctx);
|
||||||
if(!EVP_SignFinal(ctx, buf, (unsigned int *)&len, key))
|
len = BUFSIZE;
|
||||||
|
if(!EVP_DigestSignFinal(ctx, buf, &len))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error Signing Data\n");
|
BIO_printf(bio_err, "Error Signing Data\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else if(hmac_key)
|
|
||||||
{
|
|
||||||
HMAC_Final(&hmac_ctx,buf,&len);
|
|
||||||
HMAC_CTX_cleanup(&hmac_ctx);
|
|
||||||
}
|
|
||||||
else
|
else
|
||||||
|
{
|
||||||
len=BIO_gets(bp,(char *)buf,BUFSIZE);
|
len=BIO_gets(bp,(char *)buf,BUFSIZE);
|
||||||
|
if ((int)len <0)
|
||||||
|
{
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if(binout) BIO_write(out, buf, len);
|
if(binout) BIO_write(out, buf, len);
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_write(out,title,strlen(title));
|
if (sig_name)
|
||||||
|
BIO_printf(out, "%s-%s(%s)= ", sig_name, md_name, file);
|
||||||
|
else if (md_name)
|
||||||
|
BIO_printf(out, "%s(%s)= ", md_name, file);
|
||||||
|
else
|
||||||
|
BIO_printf(out, "(%s)= ", file);
|
||||||
for (i=0; i<(int)len; i++)
|
for (i=0; i<(int)len; i++)
|
||||||
{
|
{
|
||||||
if (sep && (i != 0))
|
if (sep && (i != 0))
|
||||||
@@ -542,10 +618,6 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
|
|||||||
}
|
}
|
||||||
BIO_printf(out, "\n");
|
BIO_printf(out, "\n");
|
||||||
}
|
}
|
||||||
if (hmac_key)
|
|
||||||
{
|
|
||||||
BIO_set_md_ctx(bmd,md_ctx);
|
|
||||||
}
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -349,4 +349,10 @@ end:
|
|||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_DH */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -554,4 +554,10 @@ static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#else /* !OPENSSL_NO_DH */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
51
apps/dsa.c
51
apps/dsa.c
@@ -96,9 +96,7 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
#endif
|
|
||||||
int ret=1;
|
int ret=1;
|
||||||
DSA *dsa=NULL;
|
DSA *dsa=NULL;
|
||||||
int i,badops=0;
|
int i,badops=0;
|
||||||
@@ -114,6 +112,8 @@ int MAIN(int argc, char **argv)
|
|||||||
char *passin = NULL, *passout = NULL;
|
char *passin = NULL, *passout = NULL;
|
||||||
int modulus=0;
|
int modulus=0;
|
||||||
|
|
||||||
|
int pvk_encr = 2;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
@@ -173,6 +173,12 @@ int MAIN(int argc, char **argv)
|
|||||||
engine= *(++argv);
|
engine= *(++argv);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
else if (strcmp(*argv,"-pvk-strong") == 0)
|
||||||
|
pvk_encr=2;
|
||||||
|
else if (strcmp(*argv,"-pvk-weak") == 0)
|
||||||
|
pvk_encr=1;
|
||||||
|
else if (strcmp(*argv,"-pvk-none") == 0)
|
||||||
|
pvk_encr=0;
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
else if (strcmp(*argv,"-noout") == 0)
|
||||||
noout=1;
|
noout=1;
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
else if (strcmp(*argv,"-text") == 0)
|
||||||
@@ -240,16 +246,30 @@ bad:
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
in=BIO_new(BIO_s_file());
|
||||||
out=BIO_new(BIO_s_file());
|
out=BIO_new(BIO_s_file());
|
||||||
if (out == NULL)
|
if ((in == NULL) || (out == NULL))
|
||||||
{
|
{
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (infile == NULL)
|
||||||
|
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (BIO_read_filename(in,infile) <= 0)
|
||||||
|
{
|
||||||
|
perror(infile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
BIO_printf(bio_err,"read DSA key\n");
|
BIO_printf(bio_err,"read DSA key\n");
|
||||||
|
|
||||||
{
|
{
|
||||||
EVP_PKEY *pkey;
|
EVP_PKEY *pkey;
|
||||||
|
|
||||||
if (pubin)
|
if (pubin)
|
||||||
pkey = load_pubkey(bio_err, infile, informat, 1,
|
pkey = load_pubkey(bio_err, infile, informat, 1,
|
||||||
passin, e, "Public Key");
|
passin, e, "Public Key");
|
||||||
@@ -257,10 +277,12 @@ bad:
|
|||||||
pkey = load_key(bio_err, infile, informat, 1,
|
pkey = load_key(bio_err, infile, informat, 1,
|
||||||
passin, e, "Private Key");
|
passin, e, "Private Key");
|
||||||
|
|
||||||
if (pkey != NULL)
|
if (pkey)
|
||||||
dsa = pkey == NULL ? NULL : EVP_PKEY_get1_DSA(pkey);
|
{
|
||||||
|
dsa = EVP_PKEY_get1_DSA(pkey);
|
||||||
EVP_PKEY_free(pkey);
|
EVP_PKEY_free(pkey);
|
||||||
}
|
}
|
||||||
|
}
|
||||||
if (dsa == NULL)
|
if (dsa == NULL)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"unable to load Key\n");
|
BIO_printf(bio_err,"unable to load Key\n");
|
||||||
@@ -312,6 +334,19 @@ bad:
|
|||||||
i=PEM_write_bio_DSA_PUBKEY(out,dsa);
|
i=PEM_write_bio_DSA_PUBKEY(out,dsa);
|
||||||
else i=PEM_write_bio_DSAPrivateKey(out,dsa,enc,
|
else i=PEM_write_bio_DSAPrivateKey(out,dsa,enc,
|
||||||
NULL,0,NULL, passout);
|
NULL,0,NULL, passout);
|
||||||
|
#ifndef OPENSSL_NO_RSA
|
||||||
|
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
|
||||||
|
EVP_PKEY *pk;
|
||||||
|
pk = EVP_PKEY_new();
|
||||||
|
EVP_PKEY_set1_DSA(pk, dsa);
|
||||||
|
if (outformat == FORMAT_PVK)
|
||||||
|
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
|
||||||
|
else if (pubin || pubout)
|
||||||
|
i = i2b_PublicKey_bio(out, pk);
|
||||||
|
else
|
||||||
|
i = i2b_PrivateKey_bio(out, pk);
|
||||||
|
EVP_PKEY_free(pk);
|
||||||
|
#endif
|
||||||
} else {
|
} else {
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
||||||
goto end;
|
goto end;
|
||||||
@@ -332,4 +367,10 @@ end:
|
|||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -475,4 +475,10 @@ static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb)
|
|||||||
#endif
|
#endif
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -400,4 +400,10 @@ end:
|
|||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_EC */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -725,4 +725,10 @@ static int ecparam_print_var(BIO *out, BIGNUM *in, const char *var,
|
|||||||
BIO_printf(out, "\n\t};\n\n");
|
BIO_printf(out, "\n\t};\n\n");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_EC */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
50
apps/enc.c
50
apps/enc.c
@@ -67,6 +67,7 @@
|
|||||||
#include <openssl/x509.h>
|
#include <openssl/x509.h>
|
||||||
#include <openssl/rand.h>
|
#include <openssl/rand.h>
|
||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/comp.h>
|
||||||
#include <ctype.h>
|
#include <ctype.h>
|
||||||
|
|
||||||
int set_hex(char *in,unsigned char *out,int size);
|
int set_hex(char *in,unsigned char *out,int size);
|
||||||
@@ -116,6 +117,10 @@ int MAIN(int argc, char **argv)
|
|||||||
char *hkey=NULL,*hiv=NULL,*hsalt = NULL;
|
char *hkey=NULL,*hiv=NULL,*hsalt = NULL;
|
||||||
char *md=NULL;
|
char *md=NULL;
|
||||||
int enc=1,printkey=0,i,base64=0;
|
int enc=1,printkey=0,i,base64=0;
|
||||||
|
#ifdef ZLIB
|
||||||
|
int do_zlib=0;
|
||||||
|
BIO *bzl = NULL;
|
||||||
|
#endif
|
||||||
int debug=0,olb64=0,nosalt=0;
|
int debug=0,olb64=0,nosalt=0;
|
||||||
const EVP_CIPHER *cipher=NULL,*c;
|
const EVP_CIPHER *cipher=NULL,*c;
|
||||||
EVP_CIPHER_CTX *ctx = NULL;
|
EVP_CIPHER_CTX *ctx = NULL;
|
||||||
@@ -127,7 +132,6 @@ int MAIN(int argc, char **argv)
|
|||||||
char *engine = NULL;
|
char *engine = NULL;
|
||||||
#endif
|
#endif
|
||||||
const EVP_MD *dgst=NULL;
|
const EVP_MD *dgst=NULL;
|
||||||
int non_fips_allow = 0;
|
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
@@ -142,9 +146,18 @@ int MAIN(int argc, char **argv)
|
|||||||
program_name(argv[0],pname,sizeof pname);
|
program_name(argv[0],pname,sizeof pname);
|
||||||
if (strcmp(pname,"base64") == 0)
|
if (strcmp(pname,"base64") == 0)
|
||||||
base64=1;
|
base64=1;
|
||||||
|
#ifdef ZLIB
|
||||||
|
if (strcmp(pname,"zlib") == 0)
|
||||||
|
do_zlib=1;
|
||||||
|
#endif
|
||||||
|
|
||||||
cipher=EVP_get_cipherbyname(pname);
|
cipher=EVP_get_cipherbyname(pname);
|
||||||
|
#ifdef ZLIB
|
||||||
|
if (!do_zlib && !base64 && (cipher == NULL)
|
||||||
|
&& (strcmp(pname,"enc") != 0))
|
||||||
|
#else
|
||||||
if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
|
if (!base64 && (cipher == NULL) && (strcmp(pname,"enc") != 0))
|
||||||
|
#endif
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
|
BIO_printf(bio_err,"%s is an unknown cipher\n",pname);
|
||||||
goto bad;
|
goto bad;
|
||||||
@@ -200,6 +213,10 @@ int MAIN(int argc, char **argv)
|
|||||||
base64=1;
|
base64=1;
|
||||||
else if (strcmp(*argv,"-base64") == 0)
|
else if (strcmp(*argv,"-base64") == 0)
|
||||||
base64=1;
|
base64=1;
|
||||||
|
#ifdef ZLIB
|
||||||
|
else if (strcmp(*argv,"-z") == 0)
|
||||||
|
do_zlib=1;
|
||||||
|
#endif
|
||||||
else if (strcmp(*argv,"-bufsize") == 0)
|
else if (strcmp(*argv,"-bufsize") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
@@ -262,8 +279,6 @@ int MAIN(int argc, char **argv)
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
md= *(++argv);
|
md= *(++argv);
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-non-fips-allow") == 0)
|
|
||||||
non_fips_allow = 1;
|
|
||||||
else if ((argv[0][0] == '-') &&
|
else if ((argv[0][0] == '-') &&
|
||||||
((c=EVP_get_cipherbyname(&(argv[0][1]))) != NULL))
|
((c=EVP_get_cipherbyname(&(argv[0][1]))) != NULL))
|
||||||
{
|
{
|
||||||
@@ -286,9 +301,11 @@ bad:
|
|||||||
BIO_printf(bio_err,"%-14s passphrase is the first line of the file argument\n","-kfile");
|
BIO_printf(bio_err,"%-14s passphrase is the first line of the file argument\n","-kfile");
|
||||||
BIO_printf(bio_err,"%-14s the next argument is the md to use to create a key\n","-md");
|
BIO_printf(bio_err,"%-14s the next argument is the md to use to create a key\n","-md");
|
||||||
BIO_printf(bio_err,"%-14s from a passphrase. One of md2, md5, sha or sha1\n","");
|
BIO_printf(bio_err,"%-14s from a passphrase. One of md2, md5, sha or sha1\n","");
|
||||||
|
BIO_printf(bio_err,"%-14s salt in hex is the next argument\n","-S");
|
||||||
BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
|
BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
|
||||||
BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
|
BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
|
||||||
BIO_printf(bio_err,"%-14s buffer size\n","-bufsize <n>");
|
BIO_printf(bio_err,"%-14s buffer size\n","-bufsize <n>");
|
||||||
|
BIO_printf(bio_err,"%-14s disable standard block padding\n","-nopad");
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err,"%-14s use engine e, possibly a hardware device.\n","-engine e");
|
BIO_printf(bio_err,"%-14s use engine e, possibly a hardware device.\n","-engine e");
|
||||||
#endif
|
#endif
|
||||||
@@ -317,9 +334,6 @@ bad:
|
|||||||
|
|
||||||
if (dgst == NULL)
|
if (dgst == NULL)
|
||||||
{
|
{
|
||||||
if (in_FIPS_mode)
|
|
||||||
dgst = EVP_sha1();
|
|
||||||
else
|
|
||||||
dgst = EVP_md5();
|
dgst = EVP_md5();
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -452,6 +466,19 @@ bad:
|
|||||||
rbio=in;
|
rbio=in;
|
||||||
wbio=out;
|
wbio=out;
|
||||||
|
|
||||||
|
#ifdef ZLIB
|
||||||
|
|
||||||
|
if (do_zlib)
|
||||||
|
{
|
||||||
|
if ((bzl=BIO_new(BIO_f_zlib())) == NULL)
|
||||||
|
goto end;
|
||||||
|
if (enc)
|
||||||
|
wbio=BIO_push(bzl,wbio);
|
||||||
|
else
|
||||||
|
rbio=BIO_push(bzl,rbio);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
if (base64)
|
if (base64)
|
||||||
{
|
{
|
||||||
if ((b64=BIO_new(BIO_f_base64())) == NULL)
|
if ((b64=BIO_new(BIO_f_base64())) == NULL)
|
||||||
@@ -533,7 +560,8 @@ bad:
|
|||||||
BIO_printf(bio_err,"invalid hex iv value\n");
|
BIO_printf(bio_err,"invalid hex iv value\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if ((hiv == NULL) && (str == NULL))
|
if ((hiv == NULL) && (str == NULL)
|
||||||
|
&& EVP_CIPHER_iv_length(cipher) != 0)
|
||||||
{
|
{
|
||||||
/* No IV was explicitly set and no IV was generated
|
/* No IV was explicitly set and no IV was generated
|
||||||
* during EVP_BytesToKey. Hence the IV is undefined,
|
* during EVP_BytesToKey. Hence the IV is undefined,
|
||||||
@@ -555,11 +583,6 @@ bad:
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
BIO_get_cipher_ctx(benc, &ctx);
|
BIO_get_cipher_ctx(benc, &ctx);
|
||||||
|
|
||||||
if (non_fips_allow)
|
|
||||||
EVP_CIPHER_CTX_set_flags(ctx,
|
|
||||||
EVP_CIPH_FLAG_NON_FIPS_ALLOW);
|
|
||||||
|
|
||||||
if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, enc))
|
if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, enc))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error setting cipher %s\n",
|
BIO_printf(bio_err, "Error setting cipher %s\n",
|
||||||
@@ -650,6 +673,9 @@ end:
|
|||||||
if (out != NULL) BIO_free_all(out);
|
if (out != NULL) BIO_free_all(out);
|
||||||
if (benc != NULL) BIO_free(benc);
|
if (benc != NULL) BIO_free(benc);
|
||||||
if (b64 != NULL) BIO_free(b64);
|
if (b64 != NULL) BIO_free(b64);
|
||||||
|
#ifdef ZLIB
|
||||||
|
if (bzl != NULL) BIO_free(bzl);
|
||||||
|
#endif
|
||||||
if(pass) OPENSSL_free(pass);
|
if(pass) OPENSSL_free(pass);
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
|
|||||||
@@ -56,7 +56,6 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
@@ -66,6 +65,7 @@
|
|||||||
#endif
|
#endif
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
#include <openssl/engine.h>
|
#include <openssl/engine.h>
|
||||||
#include <openssl/ssl.h>
|
#include <openssl/ssl.h>
|
||||||
|
|
||||||
@@ -92,7 +92,7 @@ static const char *engine_usage[]={
|
|||||||
NULL
|
NULL
|
||||||
};
|
};
|
||||||
|
|
||||||
static void identity(void *ptr)
|
static void identity(char *ptr)
|
||||||
{
|
{
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
@@ -148,11 +148,6 @@ static int util_flags(BIO *bio_out, unsigned int flags, const char *indent)
|
|||||||
|
|
||||||
if(flags & ENGINE_CMD_FLAG_NUMERIC)
|
if(flags & ENGINE_CMD_FLAG_NUMERIC)
|
||||||
{
|
{
|
||||||
if(started)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out, "|");
|
|
||||||
err = 1;
|
|
||||||
}
|
|
||||||
BIO_printf(bio_out, "NUMERIC");
|
BIO_printf(bio_out, "NUMERIC");
|
||||||
started = 1;
|
started = 1;
|
||||||
}
|
}
|
||||||
@@ -205,7 +200,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
|
|||||||
char *desc = NULL;
|
char *desc = NULL;
|
||||||
int flags;
|
int flags;
|
||||||
int xpos = 0;
|
int xpos = 0;
|
||||||
STACK *cmds = NULL;
|
STACK_OF(STRING) *cmds = NULL;
|
||||||
if(!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
if(!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
||||||
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
||||||
0, NULL, NULL)) <= 0))
|
0, NULL, NULL)) <= 0))
|
||||||
@@ -216,7 +211,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
|
|||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
cmds = sk_new_null();
|
cmds = sk_STRING_new_null();
|
||||||
|
|
||||||
if(!cmds)
|
if(!cmds)
|
||||||
goto err;
|
goto err;
|
||||||
@@ -252,7 +247,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
|
|||||||
/* Now decide on the output */
|
/* Now decide on the output */
|
||||||
if(xpos == 0)
|
if(xpos == 0)
|
||||||
/* Do an indent */
|
/* Do an indent */
|
||||||
xpos = BIO_printf(bio_out, indent);
|
xpos = BIO_puts(bio_out, indent);
|
||||||
else
|
else
|
||||||
/* Otherwise prepend a ", " */
|
/* Otherwise prepend a ", " */
|
||||||
xpos += BIO_printf(bio_out, ", ");
|
xpos += BIO_printf(bio_out, ", ");
|
||||||
@@ -263,7 +258,7 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
|
|||||||
(xpos + (int)strlen(name) > line_wrap))
|
(xpos + (int)strlen(name) > line_wrap))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_out, "\n");
|
BIO_printf(bio_out, "\n");
|
||||||
xpos = BIO_printf(bio_out, indent);
|
xpos = BIO_puts(bio_out, indent);
|
||||||
}
|
}
|
||||||
xpos += BIO_printf(bio_out, "%s", name);
|
xpos += BIO_printf(bio_out, "%s", name);
|
||||||
}
|
}
|
||||||
@@ -289,15 +284,17 @@ static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent
|
|||||||
BIO_printf(bio_out, "\n");
|
BIO_printf(bio_out, "\n");
|
||||||
ret = 1;
|
ret = 1;
|
||||||
err:
|
err:
|
||||||
if(cmds) sk_pop_free(cmds, identity);
|
if(cmds) sk_STRING_pop_free(cmds, identity);
|
||||||
if(name) OPENSSL_free(name);
|
if(name) OPENSSL_free(name);
|
||||||
if(desc) OPENSSL_free(desc);
|
if(desc) OPENSSL_free(desc);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void util_do_cmds(ENGINE *e, STACK *cmds, BIO *bio_out, const char *indent)
|
static void util_do_cmds(ENGINE *e, STACK_OF(STRING) *cmds, BIO *bio_out,
|
||||||
|
const char *indent)
|
||||||
{
|
{
|
||||||
int loop, res, num = sk_num(cmds);
|
int loop, res, num = sk_STRING_num(cmds);
|
||||||
|
|
||||||
if(num < 0)
|
if(num < 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_out, "[Error]: internal stack error\n");
|
BIO_printf(bio_out, "[Error]: internal stack error\n");
|
||||||
@@ -307,7 +304,7 @@ static void util_do_cmds(ENGINE *e, STACK *cmds, BIO *bio_out, const char *inden
|
|||||||
{
|
{
|
||||||
char buf[256];
|
char buf[256];
|
||||||
const char *cmd, *arg;
|
const char *cmd, *arg;
|
||||||
cmd = sk_value(cmds, loop);
|
cmd = sk_STRING_value(cmds, loop);
|
||||||
res = 1; /* assume success */
|
res = 1; /* assume success */
|
||||||
/* Check if this command has no ":arg" */
|
/* Check if this command has no ":arg" */
|
||||||
if((arg = strstr(cmd, ":")) == NULL)
|
if((arg = strstr(cmd, ":")) == NULL)
|
||||||
@@ -347,9 +344,9 @@ int MAIN(int argc, char **argv)
|
|||||||
const char **pp;
|
const char **pp;
|
||||||
int verbose=0, list_cap=0, test_avail=0, test_avail_noise = 0;
|
int verbose=0, list_cap=0, test_avail=0, test_avail_noise = 0;
|
||||||
ENGINE *e;
|
ENGINE *e;
|
||||||
STACK *engines = sk_new_null();
|
STACK_OF(STRING) *engines = sk_STRING_new_null();
|
||||||
STACK *pre_cmds = sk_new_null();
|
STACK_OF(STRING) *pre_cmds = sk_STRING_new_null();
|
||||||
STACK *post_cmds = sk_new_null();
|
STACK_OF(STRING) *post_cmds = sk_STRING_new_null();
|
||||||
int badops=1;
|
int badops=1;
|
||||||
BIO *bio_out=NULL;
|
BIO *bio_out=NULL;
|
||||||
const char *indent = " ";
|
const char *indent = " ";
|
||||||
@@ -396,20 +393,20 @@ int MAIN(int argc, char **argv)
|
|||||||
argc--; argv++;
|
argc--; argv++;
|
||||||
if (argc == 0)
|
if (argc == 0)
|
||||||
goto skip_arg_loop;
|
goto skip_arg_loop;
|
||||||
sk_push(pre_cmds,*argv);
|
sk_STRING_push(pre_cmds,*argv);
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-post") == 0)
|
else if (strcmp(*argv,"-post") == 0)
|
||||||
{
|
{
|
||||||
argc--; argv++;
|
argc--; argv++;
|
||||||
if (argc == 0)
|
if (argc == 0)
|
||||||
goto skip_arg_loop;
|
goto skip_arg_loop;
|
||||||
sk_push(post_cmds,*argv);
|
sk_STRING_push(post_cmds,*argv);
|
||||||
}
|
}
|
||||||
else if ((strncmp(*argv,"-h",2) == 0) ||
|
else if ((strncmp(*argv,"-h",2) == 0) ||
|
||||||
(strcmp(*argv,"-?") == 0))
|
(strcmp(*argv,"-?") == 0))
|
||||||
goto skip_arg_loop;
|
goto skip_arg_loop;
|
||||||
else
|
else
|
||||||
sk_push(engines,*argv);
|
sk_STRING_push(engines,*argv);
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
}
|
}
|
||||||
@@ -424,17 +421,17 @@ skip_arg_loop:
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (sk_num(engines) == 0)
|
if (sk_STRING_num(engines) == 0)
|
||||||
{
|
{
|
||||||
for(e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e))
|
for(e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e))
|
||||||
{
|
{
|
||||||
sk_push(engines,(char *)ENGINE_get_id(e));
|
sk_STRING_push(engines,(char *)ENGINE_get_id(e));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
for (i=0; i<sk_num(engines); i++)
|
for (i=0; i<sk_STRING_num(engines); i++)
|
||||||
{
|
{
|
||||||
const char *id = sk_value(engines,i);
|
const char *id = sk_STRING_value(engines,i);
|
||||||
if ((e = ENGINE_by_id(id)) != NULL)
|
if ((e = ENGINE_by_id(id)) != NULL)
|
||||||
{
|
{
|
||||||
const char *name = ENGINE_get_name(e);
|
const char *name = ENGINE_get_name(e);
|
||||||
@@ -454,6 +451,7 @@ skip_arg_loop:
|
|||||||
const int *nids;
|
const int *nids;
|
||||||
ENGINE_CIPHERS_PTR fn_c;
|
ENGINE_CIPHERS_PTR fn_c;
|
||||||
ENGINE_DIGESTS_PTR fn_d;
|
ENGINE_DIGESTS_PTR fn_d;
|
||||||
|
ENGINE_PKEY_METHS_PTR fn_pk;
|
||||||
|
|
||||||
if (ENGINE_get_RSA(e) != NULL
|
if (ENGINE_get_RSA(e) != NULL
|
||||||
&& !append_buf(&cap_buf, "RSA",
|
&& !append_buf(&cap_buf, "RSA",
|
||||||
@@ -492,6 +490,15 @@ skip_ciphers:
|
|||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
skip_digests:
|
skip_digests:
|
||||||
|
fn_pk = ENGINE_get_pkey_meths(e);
|
||||||
|
if(!fn_pk) goto skip_pmeths;
|
||||||
|
n = fn_pk(e, NULL, &nids, 0);
|
||||||
|
for(k=0 ; k < n ; ++k)
|
||||||
|
if(!append_buf(&cap_buf,
|
||||||
|
OBJ_nid2sn(nids[k]),
|
||||||
|
&cap_size, 256))
|
||||||
|
goto end;
|
||||||
|
skip_pmeths:
|
||||||
if (cap_buf && (*cap_buf != '\0'))
|
if (cap_buf && (*cap_buf != '\0'))
|
||||||
BIO_printf(bio_out, " [%s]\n", cap_buf);
|
BIO_printf(bio_out, " [%s]\n", cap_buf);
|
||||||
|
|
||||||
@@ -526,9 +533,9 @@ skip_digests:
|
|||||||
end:
|
end:
|
||||||
|
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
sk_pop_free(engines, identity);
|
sk_STRING_pop_free(engines, identity);
|
||||||
sk_pop_free(pre_cmds, identity);
|
sk_STRING_pop_free(pre_cmds, identity);
|
||||||
sk_pop_free(post_cmds, identity);
|
sk_STRING_pop_free(post_cmds, identity);
|
||||||
if (bio_out != NULL) BIO_free_all(bio_out);
|
if (bio_out != NULL) BIO_free_all(bio_out);
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
|
|||||||
@@ -97,9 +97,11 @@ int MAIN(int argc, char **argv)
|
|||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
lh_node_stats_bio((LHASH *)ERR_get_string_table(),out);
|
lh_ERR_STRING_DATA_node_stats_bio(
|
||||||
lh_stats_bio((LHASH *)ERR_get_string_table(),out);
|
ERR_get_string_table(), out);
|
||||||
lh_node_usage_stats_bio((LHASH *)
|
lh_ERR_STRING_DATA_stats_bio(ERR_get_string_table(),
|
||||||
|
out);
|
||||||
|
lh_ERR_STRING_DATA_node_usage_stats_bio(
|
||||||
ERR_get_string_table(),out);
|
ERR_get_string_table(),out);
|
||||||
}
|
}
|
||||||
if (out != NULL) BIO_free_all(out);
|
if (out != NULL) BIO_free_all(out);
|
||||||
|
|||||||
@@ -235,4 +235,10 @@ static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
|
|||||||
#endif
|
#endif
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_DH */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -279,4 +279,10 @@ end:
|
|||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
440
apps/genpkey.c
Normal file
440
apps/genpkey.c
Normal file
@@ -0,0 +1,440 @@
|
|||||||
|
/* apps/genpkey.c */
|
||||||
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
|
* project 2006
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include "apps.h"
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
#include <openssl/engine.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
|
static int init_keygen_file(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *file, ENGINE *e);
|
||||||
|
static int genpkey_cb(EVP_PKEY_CTX *ctx);
|
||||||
|
|
||||||
|
#define PROG genpkey_main
|
||||||
|
|
||||||
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
ENGINE *e = NULL;
|
||||||
|
char **args, *outfile = NULL;
|
||||||
|
char *passarg = NULL;
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
const EVP_CIPHER *cipher = NULL;
|
||||||
|
int outformat;
|
||||||
|
int text = 0;
|
||||||
|
EVP_PKEY *pkey=NULL;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
char *pass = NULL;
|
||||||
|
int badarg = 0;
|
||||||
|
int ret = 1, rv;
|
||||||
|
|
||||||
|
int do_param = 0;
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
outformat=FORMAT_PEM;
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
args = argv + 1;
|
||||||
|
while (!badarg && *args && *args[0] == '-')
|
||||||
|
{
|
||||||
|
if (!strcmp(*args,"-outform"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
outformat=str2fmt(*args);
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp(*args,"-pass"))
|
||||||
|
{
|
||||||
|
if (!args[1]) goto bad;
|
||||||
|
passarg= *(++args);
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*args,"-engine") == 0)
|
||||||
|
{
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
e = setup_engine(bio_err, *(++args), 0);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if (!strcmp (*args, "-paramfile"))
|
||||||
|
{
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
args++;
|
||||||
|
if (do_param == 1)
|
||||||
|
goto bad;
|
||||||
|
if (!init_keygen_file(bio_err, &ctx, *args, e))
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
else if (!strcmp (*args, "-out"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
outfile = *args;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-algorithm") == 0)
|
||||||
|
{
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
if (!init_gen_str(bio_err, &ctx, *(++args),e, do_param))
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-pkeyopt") == 0)
|
||||||
|
{
|
||||||
|
if (!args[1])
|
||||||
|
goto bad;
|
||||||
|
if (!ctx)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "No keytype specified\n");
|
||||||
|
goto bad;
|
||||||
|
}
|
||||||
|
else if (pkey_ctrl_string(ctx, *(++args)) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "parameter setting error\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-genparam") == 0)
|
||||||
|
{
|
||||||
|
if (ctx)
|
||||||
|
goto bad;
|
||||||
|
do_param = 1;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-text") == 0)
|
||||||
|
text=1;
|
||||||
|
else
|
||||||
|
{
|
||||||
|
cipher = EVP_get_cipherbyname(*args + 1);
|
||||||
|
if (!cipher)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Unknown cipher %s\n",
|
||||||
|
*args + 1);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
if (do_param == 1)
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
badarg = 1;
|
||||||
|
|
||||||
|
if (badarg)
|
||||||
|
{
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "Usage: genpkey [options]\n");
|
||||||
|
BIO_printf(bio_err, "where options may be\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err, "-pass arg output file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
BIO_printf(bio_err, "-paramfile file parameters file\n");
|
||||||
|
BIO_printf(bio_err, "-algorithm alg the public key algorithm\n");
|
||||||
|
BIO_printf(bio_err, "-pkeyopt opt:value set the public key algorithm option <opt>\n"
|
||||||
|
" to value <value>\n");
|
||||||
|
BIO_printf(bio_err, "-genparam generate parameters, not key\n");
|
||||||
|
BIO_printf(bio_err, "-text print the in text\n");
|
||||||
|
BIO_printf(bio_err, "NB: options order may be important! See the manual page.\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, passarg, NULL, &pass, NULL))
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error getting password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile)
|
||||||
|
{
|
||||||
|
if (!(out = BIO_new_file (outfile, "wb")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Can't open output file %s\n", outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
EVP_PKEY_CTX_set_cb(ctx, genpkey_cb);
|
||||||
|
EVP_PKEY_CTX_set_app_data(ctx, bio_err);
|
||||||
|
|
||||||
|
if (do_param)
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_paramgen(ctx, &pkey) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error generating parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_keygen(ctx, &pkey) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error generating key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (do_param)
|
||||||
|
rv = PEM_write_bio_Parameters(out, pkey);
|
||||||
|
else if (outformat == FORMAT_PEM)
|
||||||
|
rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
|
||||||
|
NULL, pass);
|
||||||
|
else if (outformat == FORMAT_ASN1)
|
||||||
|
rv = i2d_PrivateKey_bio(out, pkey);
|
||||||
|
else
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (rv <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error writing key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text)
|
||||||
|
{
|
||||||
|
if (do_param)
|
||||||
|
rv = EVP_PKEY_print_params(out, pkey, 0, NULL);
|
||||||
|
else
|
||||||
|
rv = EVP_PKEY_print_private(out, pkey, 0, NULL);
|
||||||
|
|
||||||
|
if (rv <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Error printing key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
end:
|
||||||
|
if (pkey)
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
if (out)
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
if (pass)
|
||||||
|
OPENSSL_free(pass);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int init_keygen_file(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *file, ENGINE *e)
|
||||||
|
{
|
||||||
|
BIO *pbio;
|
||||||
|
EVP_PKEY *pkey = NULL;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
if (*pctx)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Parameters already set!\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
pbio = BIO_new_file(file, "r");
|
||||||
|
if (!pbio)
|
||||||
|
{
|
||||||
|
BIO_printf(err, "Can't open parameter file %s\n", file);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
pkey = PEM_read_bio_Parameters(pbio, NULL);
|
||||||
|
BIO_free(pbio);
|
||||||
|
|
||||||
|
if (!pkey)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading parameter file %s\n", file);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx = EVP_PKEY_CTX_new(pkey, e);
|
||||||
|
if (!ctx)
|
||||||
|
goto err;
|
||||||
|
if (EVP_PKEY_keygen_init(ctx) <= 0)
|
||||||
|
goto err;
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
*pctx = ctx;
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
err:
|
||||||
|
BIO_puts(err, "Error initializing context\n");
|
||||||
|
ERR_print_errors(err);
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
if (pkey)
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
|
||||||
|
const char *algname, ENGINE *e, int do_param)
|
||||||
|
{
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
ENGINE *tmpeng = NULL;
|
||||||
|
int pkey_id;
|
||||||
|
|
||||||
|
if (*pctx)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Algorithm already set!\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ameth = EVP_PKEY_asn1_find_str(&tmpeng, algname, -1);
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (!ameth && e)
|
||||||
|
ameth = ENGINE_get_pkey_asn1_meth_str(e, algname, -1);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (!ameth)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Algorithm %s not found\n", algname);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ERR_clear_error();
|
||||||
|
|
||||||
|
EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth);
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (tmpeng)
|
||||||
|
ENGINE_finish(tmpeng);
|
||||||
|
#endif
|
||||||
|
ctx = EVP_PKEY_CTX_new_id(pkey_id, e);
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
goto err;
|
||||||
|
if (do_param)
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_paramgen_init(ctx) <= 0)
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_keygen_init(ctx) <= 0)
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
*pctx = ctx;
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
err:
|
||||||
|
BIO_printf(err, "Error initializing %s context\n", algname);
|
||||||
|
ERR_print_errors(err);
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static int genpkey_cb(EVP_PKEY_CTX *ctx)
|
||||||
|
{
|
||||||
|
char c='*';
|
||||||
|
BIO *b = EVP_PKEY_CTX_get_app_data(ctx);
|
||||||
|
int p;
|
||||||
|
p = EVP_PKEY_CTX_get_keygen_info(ctx, 0);
|
||||||
|
if (p == 0) c='.';
|
||||||
|
if (p == 1) c='+';
|
||||||
|
if (p == 2) c='*';
|
||||||
|
if (p == 3) c='\n';
|
||||||
|
BIO_write(b,&c,1);
|
||||||
|
(void)BIO_flush(b);
|
||||||
|
#ifdef LINT
|
||||||
|
p=n;
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
@@ -95,7 +95,6 @@ int MAIN(int argc, char **argv)
|
|||||||
int ret=1;
|
int ret=1;
|
||||||
int i,num=DEFBITS;
|
int i,num=DEFBITS;
|
||||||
long l;
|
long l;
|
||||||
int use_x931 = 0;
|
|
||||||
const EVP_CIPHER *enc=NULL;
|
const EVP_CIPHER *enc=NULL;
|
||||||
unsigned long f4=RSA_F4;
|
unsigned long f4=RSA_F4;
|
||||||
char *outfile=NULL;
|
char *outfile=NULL;
|
||||||
@@ -106,9 +105,9 @@ int MAIN(int argc, char **argv)
|
|||||||
char *inrand=NULL;
|
char *inrand=NULL;
|
||||||
BIO *out=NULL;
|
BIO *out=NULL;
|
||||||
BIGNUM *bn = BN_new();
|
BIGNUM *bn = BN_new();
|
||||||
RSA *rsa = RSA_new();
|
RSA *rsa = NULL;
|
||||||
|
|
||||||
if(!bn || !rsa) goto err;
|
if(!bn) goto err;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
BN_GENCB_set(&cb, genrsa_cb, bio_err);
|
BN_GENCB_set(&cb, genrsa_cb, bio_err);
|
||||||
@@ -139,8 +138,6 @@ int MAIN(int argc, char **argv)
|
|||||||
f4=3;
|
f4=3;
|
||||||
else if (strcmp(*argv,"-F4") == 0 || strcmp(*argv,"-f4") == 0)
|
else if (strcmp(*argv,"-F4") == 0 || strcmp(*argv,"-f4") == 0)
|
||||||
f4=RSA_F4;
|
f4=RSA_F4;
|
||||||
else if (strcmp(*argv,"-x931") == 0)
|
|
||||||
use_x931 = 1;
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
else if (strcmp(*argv,"-engine") == 0)
|
||||||
{
|
{
|
||||||
@@ -269,17 +266,11 @@ bad:
|
|||||||
BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
|
BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
|
||||||
num);
|
num);
|
||||||
|
|
||||||
if (use_x931)
|
rsa = RSA_new();
|
||||||
{
|
if (!rsa)
|
||||||
BIGNUM *pubexp;
|
|
||||||
pubexp = BN_new();
|
|
||||||
if (!BN_set_word(pubexp, f4))
|
|
||||||
goto err;
|
goto err;
|
||||||
if (!RSA_X931_generate_key_ex(rsa, num, pubexp, &cb))
|
|
||||||
goto err;
|
if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb))
|
||||||
BN_free(pubexp);
|
|
||||||
}
|
|
||||||
else if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb))
|
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
app_RAND_write_file(NULL, bio_err);
|
||||||
|
|||||||
@@ -5,13 +5,23 @@ $! Time of creation: 22-MAY-1998 10:13
|
|||||||
$!
|
$!
|
||||||
$! P1 root of the directory tree
|
$! P1 root of the directory tree
|
||||||
$!
|
$!
|
||||||
|
$
|
||||||
$ IF P1 .EQS. ""
|
$ IF P1 .EQS. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ WRITE SYS$OUTPUT "First argument missing."
|
$ WRITE SYS$OUTPUT "First argument missing."
|
||||||
$ WRITE SYS$OUTPUT "Should be the directory where you want things installed."
|
$ WRITE SYS$OUTPUT -
|
||||||
|
"Should be the directory where you want things installed."
|
||||||
$ EXIT
|
$ EXIT
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$
|
$
|
||||||
|
$ IF (F$GETSYI("CPU").LT.128)
|
||||||
|
$ THEN
|
||||||
|
$ ARCH := VAX
|
||||||
|
$ ELSE
|
||||||
|
$ ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ IF (ARCH .EQS. "") THEN ARCH = "UNK"
|
||||||
|
$ ENDIF
|
||||||
|
$
|
||||||
$ ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
|
$ ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
|
||||||
$ ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
|
$ ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
|
||||||
$ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
$ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
||||||
@@ -19,23 +29,16 @@ $ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
|||||||
$ ROOT = ROOT_DEV + "[" + ROOT_DIR
|
$ ROOT = ROOT_DEV + "[" + ROOT_DIR
|
||||||
$
|
$
|
||||||
$ DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
|
$ DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
|
||||||
$ DEFINE/NOLOG WRK_SSLVEXE WRK_SSLROOT:[VAX_EXE]
|
$ DEFINE/NOLOG WRK_SSLEXE WRK_SSLROOT:['ARCH'_EXE]
|
||||||
$ DEFINE/NOLOG WRK_SSLAEXE WRK_SSLROOT:[ALPHA_EXE]
|
|
||||||
$ DEFINE/NOLOG WRK_SSLLIB WRK_SSLROOT:[LIB]
|
|
||||||
$
|
$
|
||||||
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
||||||
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
||||||
$ IF F$PARSE("WRK_SSLVEXE:") .EQS. "" THEN -
|
$ IF F$PARSE("WRK_SSLEXE:") .EQS. "" THEN -
|
||||||
CREATE/DIR/LOG WRK_SSLVEXE:
|
CREATE/DIR/LOG WRK_SSLEXE:
|
||||||
$ IF F$PARSE("WRK_SSLAEXE:") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLAEXE:
|
|
||||||
$ IF F$PARSE("WRK_SSLLIB:") .EQS. "" THEN -
|
|
||||||
CREATE/DIR/LOG WRK_SSLLIB:
|
|
||||||
$
|
$
|
||||||
$ EXE := openssl
|
$ EXE := openssl
|
||||||
$
|
$
|
||||||
$ VEXE_DIR := [-.VAX.EXE.APPS]
|
$ EXE_DIR := [-.'ARCH'.EXE.APPS]
|
||||||
$ AEXE_DIR := [-.AXP.EXE.APPS]
|
|
||||||
$
|
$
|
||||||
$ I = 0
|
$ I = 0
|
||||||
$ LOOP_EXE:
|
$ LOOP_EXE:
|
||||||
@@ -43,24 +46,17 @@ $ E = F$EDIT(F$ELEMENT(I, ",", EXE),"TRIM")
|
|||||||
$ I = I + 1
|
$ I = I + 1
|
||||||
$ IF E .EQS. "," THEN GOTO LOOP_EXE_END
|
$ IF E .EQS. "," THEN GOTO LOOP_EXE_END
|
||||||
$ SET NOON
|
$ SET NOON
|
||||||
$ IF F$SEARCH(VEXE_DIR+E+".EXE") .NES. ""
|
$ IF F$SEARCH(EXE_DIR+E+".EXE") .NES. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ COPY 'VEXE_DIR''E'.EXE WRK_SSLVEXE:'E'.EXE/log
|
$ COPY 'EXE_DIR''E'.EXE WRK_SSLEXE:'E'.EXE/log
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLVEXE:'E'.EXE
|
$ SET FILE/PROT=W:RE WRK_SSLEXE:'E'.EXE
|
||||||
$ ENDIF
|
|
||||||
$ IF F$SEARCH(AEXE_DIR+E+".EXE") .NES. ""
|
|
||||||
$ THEN
|
|
||||||
$ COPY 'AEXE_DIR''E'.EXE WRK_SSLAEXE:'E'.EXE/log
|
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLAEXE:'E'.EXE
|
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ SET ON
|
$ SET ON
|
||||||
$ GOTO LOOP_EXE
|
$ GOTO LOOP_EXE
|
||||||
$ LOOP_EXE_END:
|
$ LOOP_EXE_END:
|
||||||
$
|
$
|
||||||
$ SET NOON
|
$ SET NOON
|
||||||
$ COPY CA.COM WRK_SSLAEXE:CA.COM/LOG
|
$ COPY CA.COM WRK_SSLEXE:CA.COM/LOG
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLAEXE:CA.COM
|
|
||||||
$ COPY CA.COM WRK_SSLVEXE:CA.COM/LOG
|
|
||||||
$ SET FILE/PROT=W:RE WRK_SSLVEXE:CA.COM
|
$ SET FILE/PROT=W:RE WRK_SSLVEXE:CA.COM
|
||||||
$ COPY OPENSSL-VMS.CNF WRK_SSLROOT:[000000]OPENSSL.CNF/LOG
|
$ COPY OPENSSL-VMS.CNF WRK_SSLROOT:[000000]OPENSSL.CNF/LOG
|
||||||
$ SET FILE/PROT=W:R WRK_SSLROOT:[000000]OPENSSL.CNF
|
$ SET FILE/PROT=W:R WRK_SSLROOT:[000000]OPENSSL.CNF
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ $!
|
|||||||
$! This command files compiles and creates all the various different
|
$! This command files compiles and creates all the various different
|
||||||
$! "application" programs for the different types of encryption for OpenSSL.
|
$! "application" programs for the different types of encryption for OpenSSL.
|
||||||
$! The EXE's are placed in the directory [.xxx.EXE.APPS] where "xxx" denotes
|
$! The EXE's are placed in the directory [.xxx.EXE.APPS] where "xxx" denotes
|
||||||
$! either AXP or VAX depending on your machine architecture.
|
$! ALPHA, IA64 or VAX, depending on your machine architecture.
|
||||||
$!
|
$!
|
||||||
$! It was written so it would try to determine what "C" compiler to
|
$! It was written so it would try to determine what "C" compiler to
|
||||||
$! use or you can specify which "C" compiler to use.
|
$! use or you can specify which "C" compiler to use.
|
||||||
@@ -46,20 +46,21 @@ $ TCPIP_LIB = ""
|
|||||||
$!
|
$!
|
||||||
$! Check What Architecture We Are Using.
|
$! Check What Architecture We Are Using.
|
||||||
$!
|
$!
|
||||||
$ IF (F$GETSYI("CPU").GE.128)
|
$ IF (F$GETSYI("CPU").LT.128)
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$! The Architecture Is AXP.
|
$! The Architecture Is VAX.
|
||||||
$!
|
$!
|
||||||
$ ARCH := AXP
|
$ ARCH := VAX
|
||||||
$!
|
$!
|
||||||
$! Else...
|
$! Else...
|
||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
$! The Architecture Is VAX.
|
$! The Architecture Is Alpha, IA64 or whatever comes in the future.
|
||||||
$!
|
$!
|
||||||
$ ARCH := VAX
|
$ ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ IF (ARCH .EQS. "") THEN ARCH = "UNK"
|
||||||
$!
|
$!
|
||||||
$! End The Architecture Check.
|
$! End The Architecture Check.
|
||||||
$!
|
$!
|
||||||
@@ -68,22 +69,6 @@ $!
|
|||||||
$! Define what programs should be compiled
|
$! Define what programs should be compiled
|
||||||
$!
|
$!
|
||||||
$ PROGRAMS := OPENSSL
|
$ PROGRAMS := OPENSSL
|
||||||
$!$ PROGRAMS := VERIFY,ASN1PARS,REQ,DGST,DH,ENC,PASSWD,GENDH,ERRSTR,CA,CRL,-
|
|
||||||
$! RSA,DSA,DSAPARAM,-
|
|
||||||
$! X509,GENRSA,GENDSA,S_SERVER,S_CLIENT,SPEED,-
|
|
||||||
$! S_TIME,VERSION,PKCS7,CRL2P7,SESS_ID,CIPHERS,NSEQ,
|
|
||||||
$!
|
|
||||||
$! Check To Make Sure We Have Valid Command Line Parameters.
|
|
||||||
$!
|
|
||||||
$ GOSUB CHECK_OPTIONS
|
|
||||||
$!
|
|
||||||
$! Initialise logical names and such
|
|
||||||
$!
|
|
||||||
$ GOSUB INITIALISE
|
|
||||||
$!
|
|
||||||
$! Tell The User What Kind of Machine We Run On.
|
|
||||||
$!
|
|
||||||
$ WRITE SYS$OUTPUT "Compiling On A ",ARCH," Machine."
|
|
||||||
$!
|
$!
|
||||||
$! Define The CRYPTO Library.
|
$! Define The CRYPTO Library.
|
||||||
$!
|
$!
|
||||||
@@ -97,6 +82,22 @@ $! Define The OBJ Directory.
|
|||||||
$!
|
$!
|
||||||
$ OBJ_DIR := SYS$DISK:[-.'ARCH'.OBJ.APPS]
|
$ OBJ_DIR := SYS$DISK:[-.'ARCH'.OBJ.APPS]
|
||||||
$!
|
$!
|
||||||
|
$! Define The EXE Directory.
|
||||||
|
$!
|
||||||
|
$ EXE_DIR := SYS$DISK:[-.'ARCH'.EXE.APPS]
|
||||||
|
$!
|
||||||
|
$! Check To Make Sure We Have Valid Command Line Parameters.
|
||||||
|
$!
|
||||||
|
$ GOSUB CHECK_OPTIONS
|
||||||
|
$!
|
||||||
|
$! Initialise logical names and such
|
||||||
|
$!
|
||||||
|
$ GOSUB INITIALISE
|
||||||
|
$!
|
||||||
|
$! Tell The User What Kind of Machine We Run On.
|
||||||
|
$!
|
||||||
|
$ WRITE SYS$OUTPUT "Compiling On A ",ARCH," Machine."
|
||||||
|
$!
|
||||||
$! Check To See If The OBJ Directory Exists.
|
$! Check To See If The OBJ Directory Exists.
|
||||||
$!
|
$!
|
||||||
$ IF (F$PARSE(OBJ_DIR).EQS."")
|
$ IF (F$PARSE(OBJ_DIR).EQS."")
|
||||||
@@ -110,10 +111,6 @@ $! End The OBJ Directory Check.
|
|||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Define The EXE Directory.
|
|
||||||
$!
|
|
||||||
$ EXE_DIR := SYS$DISK:[-.'ARCH'.EXE.APPS]
|
|
||||||
$!
|
|
||||||
$! Check To See If The EXE Directory Exists.
|
$! Check To See If The EXE Directory Exists.
|
||||||
$!
|
$!
|
||||||
$ IF (F$PARSE(EXE_DIR).EQS."")
|
$ IF (F$PARSE(EXE_DIR).EQS."")
|
||||||
@@ -136,13 +133,17 @@ $!
|
|||||||
$ GOSUB CHECK_OPT_FILE
|
$ GOSUB CHECK_OPT_FILE
|
||||||
$!
|
$!
|
||||||
$! Define The Application Files.
|
$! Define The Application Files.
|
||||||
|
$! NOTE: Some might think this list ugly. However, it's made this way to
|
||||||
|
$! reflect the E_OBJ variable in Makefile as closely as possible, thereby
|
||||||
|
$! making it fairly easy to verify that the lists are the same.
|
||||||
$!
|
$!
|
||||||
$ LIB_FILES = "VERIFY;ASN1PARS;REQ;DGST;DH;DHPARAM;ENC;PASSWD;GENDH;ERRSTR;"+-
|
$ LIB_OPENSSL = "VERIFY,ASN1PARS,REQ,DGST,DH,DHPARAM,ENC,PASSWD,GENDH,ERRSTR,"+-
|
||||||
"CA;PKCS7;CRL2P7;CRL;"+-
|
"CA,PKCS7,CRL2P7,CRL,"+-
|
||||||
"RSA;RSAUTL;DSA;DSAPARAM;EC;ECPARAM;"+-
|
"RSA,RSAUTL,DSA,DSAPARAM,EC,ECPARAM,"+-
|
||||||
"X509;GENRSA;GENDSA;S_SERVER;S_CLIENT;SPEED;"+-
|
"X509,GENRSA,GENDSA,GENPKEY,S_SERVER,S_CLIENT,SPEED,"+-
|
||||||
"S_TIME;APPS;S_CB;S_SOCKET;APP_RAND;VERSION;SESS_ID;"+-
|
"S_TIME,APPS,S_CB,S_SOCKET,APP_RAND,VERSION,SESS_ID,"+-
|
||||||
"CIPHERS;NSEQ;PKCS12;PKCS8;SPKAC;SMIME;RAND;ENGINE;OCSP;PRIME"
|
"CIPHERS,NSEQ,PKCS12,PKCS8,PKEY,PKEYPARAM,PKEYUTL,"+ -
|
||||||
|
"SPKAC,SMIME,CMS,RAND,ENGINE,OCSP,PRIME,TS"
|
||||||
$ TCPIP_PROGRAMS = ",,"
|
$ TCPIP_PROGRAMS = ",,"
|
||||||
$ IF COMPILER .EQS. "VAXC" THEN -
|
$ IF COMPILER .EQS. "VAXC" THEN -
|
||||||
TCPIP_PROGRAMS = ",OPENSSL,"
|
TCPIP_PROGRAMS = ",OPENSSL,"
|
||||||
@@ -155,45 +156,74 @@ $ PHASE := LIB
|
|||||||
$!
|
$!
|
||||||
$ RESTART:
|
$ RESTART:
|
||||||
$!
|
$!
|
||||||
$! Define A File Counter And Set It To "0".
|
$! Define An App Counter And Set It To "0".
|
||||||
$!
|
$!
|
||||||
$ FILE_COUNTER = 0
|
$ APP_COUNTER = 0
|
||||||
$!
|
$!
|
||||||
$! Top Of The File Loop.
|
$! Top Of The App Loop.
|
||||||
$!
|
$!
|
||||||
$ NEXT_FILE:
|
$ NEXT_APP:
|
||||||
$!
|
$!
|
||||||
$! O.K, Extract The File Name From The File List.
|
$! Make The Application File Name
|
||||||
$!
|
$!
|
||||||
$ FILE_NAME0 = F$EDIT(F$ELEMENT(FILE_COUNTER,";",'PHASE'_FILES),"TRIM")
|
$ CURRENT_APP = F$EDIT(F$ELEMENT(APP_COUNTER,",",PROGRAMS),"TRIM")
|
||||||
$ FILE_NAME = F$EDIT(F$ELEMENT(0,",",FILE_NAME0),"TRIM")
|
|
||||||
$ EXTRA_OBJ = FILE_NAME0 - FILE_NAME
|
|
||||||
$!
|
$!
|
||||||
$! Check To See If We Are At The End Of The File List.
|
$! Check To See If We Are At The End Of The File List.
|
||||||
$!
|
$!
|
||||||
$ IF (FILE_NAME0.EQS.";")
|
$ IF (CURRENT_APP.EQS.",")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ IF (PHASE.EQS."LIB")
|
$ IF (PHASE.EQS."LIB")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ PHASE := APP
|
$ PHASE := APP
|
||||||
$ GOTO RESTART
|
$ GOTO RESTART
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ GOTO FILE_DONE
|
$ GOTO APP_DONE
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Increment The Counter.
|
$! Increment The Counter.
|
||||||
$!
|
$!
|
||||||
$ FILE_COUNTER = FILE_COUNTER + 1
|
$ APP_COUNTER = APP_COUNTER + 1
|
||||||
$!
|
$!
|
||||||
$! Check to see if this program should actually be compiled
|
$! Decide if we're building the object files or not.
|
||||||
$!
|
$!
|
||||||
$ IF PHASE .EQS. "APP" .AND. -
|
$ IF (PHASE.EQS."LIB")
|
||||||
","+PROGRAMS+"," - (","+F$EDIT(FILE_NAME,"UPCASE")+",") .EQS. ","+PROGRAMS+","
|
|
||||||
$ THEN
|
$ THEN
|
||||||
$ GOTO NEXT_FILE
|
$!
|
||||||
|
$! Define A Library File Counter And Set It To "-1".
|
||||||
|
$! -1 Means The Application File Name Is To Be Used.
|
||||||
|
$!
|
||||||
|
$ LIB_COUNTER = -1
|
||||||
|
$!
|
||||||
|
$! Create a .OPT file for the object files
|
||||||
|
$!
|
||||||
|
$ OPEN/WRITE OBJECTS 'EXE_DIR''CURRENT_APP'.OPT
|
||||||
|
$!
|
||||||
|
$! Top Of The File Loop.
|
||||||
|
$!
|
||||||
|
$ NEXT_LIB:
|
||||||
|
$!
|
||||||
|
$! O.K, Extract The File Name From The File List.
|
||||||
|
$!
|
||||||
|
$ IF LIB_COUNTER .GE. 0
|
||||||
|
$ THEN
|
||||||
|
$ FILE_NAME = F$EDIT(F$ELEMENT(LIB_COUNTER,",",LIB_'CURRENT_APP'),"TRIM")
|
||||||
|
$ ELSE
|
||||||
|
$ FILE_NAME = CURRENT_APP
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
|
$! Check To See If We Are At The End Of The File List.
|
||||||
|
$!
|
||||||
|
$ IF (FILE_NAME.EQS.",")
|
||||||
|
$ THEN
|
||||||
|
$ CLOSE OBJECTS
|
||||||
|
$ GOTO NEXT_APP
|
||||||
|
$ ENDIF
|
||||||
|
$!
|
||||||
|
$! Increment The Counter.
|
||||||
|
$!
|
||||||
|
$ LIB_COUNTER = LIB_COUNTER + 1
|
||||||
|
$!
|
||||||
$! Create The Source File Name.
|
$! Create The Source File Name.
|
||||||
$!
|
$!
|
||||||
$ SOURCE_FILE = "SYS$DISK:[]" + FILE_NAME + ".C"
|
$ SOURCE_FILE = "SYS$DISK:[]" + FILE_NAME + ".C"
|
||||||
@@ -205,7 +235,7 @@ $!
|
|||||||
$! Create The Executable File Name.
|
$! Create The Executable File Name.
|
||||||
$!
|
$!
|
||||||
$ EXE_FILE = EXE_DIR + FILE_NAME + ".EXE"
|
$ EXE_FILE = EXE_DIR + FILE_NAME + ".EXE"
|
||||||
$ ON WARNING THEN GOTO NEXT_FILE
|
$ ON WARNING THEN GOTO NEXT_LIB
|
||||||
$!
|
$!
|
||||||
$! Check To See If The File We Want To Compile Actually Exists.
|
$! Check To See If The File We Want To Compile Actually Exists.
|
||||||
$!
|
$!
|
||||||
@@ -237,39 +267,38 @@ $ ENDIF
|
|||||||
$!
|
$!
|
||||||
$! Compile The File.
|
$! Compile The File.
|
||||||
$!
|
$!
|
||||||
$ ON ERROR THEN GOTO NEXT_FILE
|
$ ON ERROR THEN GOTO NEXT_LIB
|
||||||
$ IF COMPILEWITH_CC2 - FILE_NAME .NES. COMPILEWITH_CC2
|
$ IF COMPILEWITH_CC2 - FILE_NAME .NES. COMPILEWITH_CC2
|
||||||
$ THEN
|
$ THEN
|
||||||
$ CC2/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
$ CC2/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ CC/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
$ CC/OBJECT='OBJECT_FILE' 'SOURCE_FILE'
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
|
$ WRITE OBJECTS OBJECT_FILE
|
||||||
$!
|
$!
|
||||||
$ ON WARNING THEN GOTO NEXT_FILE
|
$ GOTO NEXT_LIB
|
||||||
$!
|
|
||||||
$ IF (PHASE.EQS."LIB")
|
|
||||||
$ THEN
|
|
||||||
$ GOTO NEXT_FILE
|
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Check if this program works well without a TCPIP library
|
$! Check if this program works well without a TCPIP library
|
||||||
$!
|
$!
|
||||||
$ IF TCPIP_LIB .EQS. "" .AND. TCPIP_PROGRAMS - FILE_NAME .NES. TCPIP_PROGRAMS
|
$ IF TCPIP_LIB .EQS. "" .AND. TCPIP_PROGRAMS - CURRENT_APP .NES. TCPIP_PROGRAMS
|
||||||
$ THEN
|
$ THEN
|
||||||
$ WRITE SYS$OUTPUT FILE_NAME," needs a TCP/IP library. Can't link. Skipping..."
|
$ WRITE SYS$OUTPUT CURRENT_APP," needs a TCP/IP library. Can't link. Skipping..."
|
||||||
$ GOTO NEXT_FILE
|
$ GOTO NEXT_APP
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Link The Program.
|
$! Link The Program.
|
||||||
$! Check To See If We Are To Link With A Specific TCP/IP Library.
|
$! Check To See If We Are To Link With A Specific TCP/IP Library.
|
||||||
$!
|
$!
|
||||||
|
$ ON WARNING THEN GOTO NEXT_APP
|
||||||
|
$!
|
||||||
$ IF (TCPIP_LIB.NES."")
|
$ IF (TCPIP_LIB.NES."")
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$! Don't Link With The RSAREF Routines And TCP/IP Library.
|
$! Don't Link With The RSAREF Routines And TCP/IP Library.
|
||||||
$!
|
$!
|
||||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
||||||
'OBJECT_FILE''EXTRA_OBJ', -
|
'EXE_DIR''CURRENT_APP'.OPT/OPTION, -
|
||||||
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
||||||
'TCPIP_LIB','OPT_FILE'/OPTION
|
'TCPIP_LIB','OPT_FILE'/OPTION
|
||||||
$!
|
$!
|
||||||
@@ -280,7 +309,7 @@ $!
|
|||||||
$! Don't Link With The RSAREF Routines And Link With A TCP/IP Library.
|
$! Don't Link With The RSAREF Routines And Link With A TCP/IP Library.
|
||||||
$!
|
$!
|
||||||
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
||||||
'OBJECT_FILE''EXTRA_OBJ', -
|
'EXE_DIR''CURRENT_APP'.OPT/OPTION, -
|
||||||
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
||||||
'OPT_FILE'/OPTION
|
'OPT_FILE'/OPTION
|
||||||
$!
|
$!
|
||||||
@@ -290,11 +319,11 @@ $ ENDIF
|
|||||||
$!
|
$!
|
||||||
$! Go Back And Do It Again.
|
$! Go Back And Do It Again.
|
||||||
$!
|
$!
|
||||||
$ GOTO NEXT_FILE
|
$ GOTO NEXT_APP
|
||||||
$!
|
$!
|
||||||
$! All Done With This File.
|
$! All Done With This File.
|
||||||
$!
|
$!
|
||||||
$ FILE_DONE:
|
$ APP_DONE:
|
||||||
$ EXIT:
|
$ EXIT:
|
||||||
$!
|
$!
|
||||||
$! All Done, Time To Clean Up And Exit.
|
$! All Done, Time To Clean Up And Exit.
|
||||||
@@ -395,19 +424,19 @@ $! Else...
|
|||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
$! Create The AXP Linker Option File.
|
$! Create The non-VAX Linker Option File.
|
||||||
$!
|
$!
|
||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File For AXP To Link Agianst
|
! Default System Options File For non-VAX To Link Agianst
|
||||||
! The Sharable C Runtime Library.
|
! The Sharable C Runtime Library.
|
||||||
!
|
!
|
||||||
SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
|
SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
|
||||||
SYS$SHARE:CMA$OPEN_RTL/SHARE
|
SYS$SHARE:CMA$OPEN_RTL/SHARE
|
||||||
$EOD
|
$EOD
|
||||||
$!
|
$!
|
||||||
$! End The VAX/AXP DEC C Option File Check.
|
$! End The DEC C Option File Check.
|
||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
@@ -556,7 +585,7 @@ $ ELSE
|
|||||||
$!
|
$!
|
||||||
$! Check To See If We Have VAXC Or DECC.
|
$! Check To See If We Have VAXC Or DECC.
|
||||||
$!
|
$!
|
||||||
$ IF (ARCH.EQS."AXP").OR.(F$TRNLNM("DECC$CC_DEFAULT").NES."")
|
$ IF (ARCH.NES."VAX").OR.(F$TRNLNM("DECC$CC_DEFAULT").NES."")
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$! Looks Like DECC, Set To Use DECC.
|
$! Looks Like DECC, Set To Use DECC.
|
||||||
@@ -666,7 +695,7 @@ $ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/STANDARD=ANSI89" + -
|
|||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "SYS$DISK:[]VAX_DECC_OPTIONS.OPT"
|
$ OPT_FILE = "''EXE_DIR'VAX_DECC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End DECC Check.
|
$! End DECC Check.
|
||||||
$!
|
$!
|
||||||
@@ -687,9 +716,9 @@ $!
|
|||||||
$! Compile Using VAXC.
|
$! Compile Using VAXC.
|
||||||
$!
|
$!
|
||||||
$ CC = "CC"
|
$ CC = "CC"
|
||||||
$ IF ARCH.EQS."AXP"
|
$ IF ARCH.NES."VAX"
|
||||||
$ THEN
|
$ THEN
|
||||||
$ WRITE SYS$OUTPUT "There is no VAX C on Alpha!"
|
$ WRITE SYS$OUTPUT "There is no VAX C on ''ARCH'!"
|
||||||
$ EXIT
|
$ EXIT
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
|
$ IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
|
||||||
@@ -703,7 +732,7 @@ $ DEFINE/NOLOG SYS SYS$COMMON:[SYSLIB]
|
|||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "SYS$DISK:[]VAX_VAXC_OPTIONS.OPT"
|
$ OPT_FILE = "''EXE_DIR'VAX_VAXC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End VAXC Check
|
$! End VAXC Check
|
||||||
$!
|
$!
|
||||||
@@ -730,7 +759,7 @@ $ CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
|||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "SYS$DISK:[]VAX_GNUC_OPTIONS.OPT"
|
$ OPT_FILE = "''EXE_DIR'VAX_GNUC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End The GNU C Check.
|
$! End The GNU C Check.
|
||||||
$!
|
$!
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
/* nseq.c */
|
/* nseq.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project 1999.
|
* project 1999.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
|
|||||||
101
apps/ocsp.c
101
apps/ocsp.c
@@ -1,5 +1,5 @@
|
|||||||
/* ocsp.c */
|
/* ocsp.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project 2000.
|
* project 2000.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
@@ -56,25 +56,52 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
#ifndef OPENSSL_NO_OCSP
|
#ifndef OPENSSL_NO_OCSP
|
||||||
|
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
#define _XOPEN_SOURCE_EXTENDED /* So fd_set and friends get properly defined
|
||||||
|
on OpenVMS */
|
||||||
|
#endif
|
||||||
|
|
||||||
#define USE_SOCKETS
|
#define USE_SOCKETS
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
#include <time.h>
|
||||||
#include "apps.h" /* needs to be included before the openssl headers! */
|
#include "apps.h" /* needs to be included before the openssl headers! */
|
||||||
#include <openssl/e_os2.h>
|
#include <openssl/e_os2.h>
|
||||||
#include <openssl/ssl.h>
|
#include <openssl/crypto.h>
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/ssl.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
#include <openssl/bn.h>
|
||||||
|
|
||||||
|
#if defined(NETWARE_CLIB)
|
||||||
|
# ifdef NETWARE_BSDSOCK
|
||||||
|
# include <sys/socket.h>
|
||||||
|
# include <sys/bsdskt.h>
|
||||||
|
# else
|
||||||
|
# include <novsock2.h>
|
||||||
|
# endif
|
||||||
|
#elif defined(NETWARE_LIBC)
|
||||||
|
# ifdef NETWARE_BSDSOCK
|
||||||
|
# include <sys/select.h>
|
||||||
|
# else
|
||||||
|
# include <novsock2.h>
|
||||||
|
# endif
|
||||||
|
#endif
|
||||||
|
|
||||||
/* Maximum leeway in validity period: default 5 minutes */
|
/* Maximum leeway in validity period: default 5 minutes */
|
||||||
#define MAX_VALIDITY_PERIOD (5 * 60)
|
#define MAX_VALIDITY_PERIOD (5 * 60)
|
||||||
|
|
||||||
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
|
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md, X509 *issuer,
|
||||||
STACK_OF(OCSP_CERTID) *ids);
|
STACK_OF(OCSP_CERTID) *ids);
|
||||||
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer,
|
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, const EVP_MD * cert_id_md, X509 *issuer,
|
||||||
STACK_OF(OCSP_CERTID) *ids);
|
STACK_OF(OCSP_CERTID) *ids);
|
||||||
static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
|
static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
|
||||||
STACK *names, STACK_OF(OCSP_CERTID) *ids,
|
STACK_OF(STRING) *names,
|
||||||
long nsec, long maxage);
|
STACK_OF(OCSP_CERTID) *ids, long nsec,
|
||||||
|
long maxage);
|
||||||
|
|
||||||
static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db,
|
static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db,
|
||||||
X509 *ca, X509 *rcert, EVP_PKEY *rkey,
|
X509 *ca, X509 *rcert, EVP_PKEY *rkey,
|
||||||
@@ -126,7 +153,7 @@ int MAIN(int argc, char **argv)
|
|||||||
int badarg = 0;
|
int badarg = 0;
|
||||||
int i;
|
int i;
|
||||||
int ignore_err = 0;
|
int ignore_err = 0;
|
||||||
STACK *reqnames = NULL;
|
STACK_OF(STRING) *reqnames = NULL;
|
||||||
STACK_OF(OCSP_CERTID) *ids = NULL;
|
STACK_OF(OCSP_CERTID) *ids = NULL;
|
||||||
|
|
||||||
X509 *rca_cert = NULL;
|
X509 *rca_cert = NULL;
|
||||||
@@ -134,6 +161,7 @@ int MAIN(int argc, char **argv)
|
|||||||
char *rca_filename = NULL;
|
char *rca_filename = NULL;
|
||||||
CA_DB *rdb = NULL;
|
CA_DB *rdb = NULL;
|
||||||
int nmin = 0, ndays = -1;
|
int nmin = 0, ndays = -1;
|
||||||
|
const EVP_MD *cert_id_md = NULL;
|
||||||
|
|
||||||
if (bio_err == NULL) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
if (bio_err == NULL) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
@@ -142,7 +170,7 @@ int MAIN(int argc, char **argv)
|
|||||||
SSL_load_error_strings();
|
SSL_load_error_strings();
|
||||||
OpenSSL_add_ssl_algorithms();
|
OpenSSL_add_ssl_algorithms();
|
||||||
args = argv + 1;
|
args = argv + 1;
|
||||||
reqnames = sk_new_null();
|
reqnames = sk_STRING_new_null();
|
||||||
ids = sk_OCSP_CERTID_new_null();
|
ids = sk_OCSP_CERTID_new_null();
|
||||||
while (!badarg && *args && *args[0] == '-')
|
while (!badarg && *args && *args[0] == '-')
|
||||||
{
|
{
|
||||||
@@ -401,9 +429,10 @@ int MAIN(int argc, char **argv)
|
|||||||
cert = load_cert(bio_err, *args, FORMAT_PEM,
|
cert = load_cert(bio_err, *args, FORMAT_PEM,
|
||||||
NULL, e, "certificate");
|
NULL, e, "certificate");
|
||||||
if(!cert) goto end;
|
if(!cert) goto end;
|
||||||
if(!add_ocsp_cert(&req, cert, issuer, ids))
|
if (!cert_id_md) cert_id_md = EVP_sha1();
|
||||||
|
if(!add_ocsp_cert(&req, cert, cert_id_md, issuer, ids))
|
||||||
goto end;
|
goto end;
|
||||||
if(!sk_push(reqnames, *args))
|
if(!sk_STRING_push(reqnames, *args))
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
else badarg = 1;
|
else badarg = 1;
|
||||||
@@ -413,9 +442,10 @@ int MAIN(int argc, char **argv)
|
|||||||
if (args[1])
|
if (args[1])
|
||||||
{
|
{
|
||||||
args++;
|
args++;
|
||||||
if(!add_ocsp_serial(&req, *args, issuer, ids))
|
if (!cert_id_md) cert_id_md = EVP_sha1();
|
||||||
|
if(!add_ocsp_serial(&req, *args, cert_id_md, issuer, ids))
|
||||||
goto end;
|
goto end;
|
||||||
if(!sk_push(reqnames, *args))
|
if(!sk_STRING_push(reqnames, *args))
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
else badarg = 1;
|
else badarg = 1;
|
||||||
@@ -515,7 +545,10 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else badarg = 1;
|
else badarg = 1;
|
||||||
}
|
}
|
||||||
else badarg = 1;
|
else if ((cert_id_md = EVP_get_digestbyname((*args)+1))==NULL)
|
||||||
|
{
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
args++;
|
args++;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -571,6 +604,7 @@ int MAIN(int argc, char **argv)
|
|||||||
BIO_printf (bio_err, "-ndays n number of days before next update\n");
|
BIO_printf (bio_err, "-ndays n number of days before next update\n");
|
||||||
BIO_printf (bio_err, "-resp_key_id identify reponse by signing certificate key ID\n");
|
BIO_printf (bio_err, "-resp_key_id identify reponse by signing certificate key ID\n");
|
||||||
BIO_printf (bio_err, "-nrequest n number of requests to accept (default unlimited)\n");
|
BIO_printf (bio_err, "-nrequest n number of requests to accept (default unlimited)\n");
|
||||||
|
BIO_printf (bio_err, "-<dgst alg> use specified digest in the request");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -677,7 +711,8 @@ int MAIN(int argc, char **argv)
|
|||||||
"signer private key");
|
"signer private key");
|
||||||
if (!key)
|
if (!key)
|
||||||
goto end;
|
goto end;
|
||||||
if (!OCSP_request_sign(req, signer, key, EVP_sha1(), sign_other, sign_flags))
|
|
||||||
|
if (!OCSP_request_sign(req, signer, key, NULL, sign_other, sign_flags))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error signing OCSP request\n");
|
BIO_printf(bio_err, "Error signing OCSP request\n");
|
||||||
goto end;
|
goto end;
|
||||||
@@ -866,7 +901,7 @@ end:
|
|||||||
OCSP_REQUEST_free(req);
|
OCSP_REQUEST_free(req);
|
||||||
OCSP_RESPONSE_free(resp);
|
OCSP_RESPONSE_free(resp);
|
||||||
OCSP_BASICRESP_free(bs);
|
OCSP_BASICRESP_free(bs);
|
||||||
sk_free(reqnames);
|
sk_STRING_free(reqnames);
|
||||||
sk_OCSP_CERTID_free(ids);
|
sk_OCSP_CERTID_free(ids);
|
||||||
sk_X509_pop_free(sign_other, X509_free);
|
sk_X509_pop_free(sign_other, X509_free);
|
||||||
sk_X509_pop_free(verify_other, X509_free);
|
sk_X509_pop_free(verify_other, X509_free);
|
||||||
@@ -881,7 +916,7 @@ end:
|
|||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
|
static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, const EVP_MD *cert_id_md,X509 *issuer,
|
||||||
STACK_OF(OCSP_CERTID) *ids)
|
STACK_OF(OCSP_CERTID) *ids)
|
||||||
{
|
{
|
||||||
OCSP_CERTID *id;
|
OCSP_CERTID *id;
|
||||||
@@ -892,7 +927,7 @@ static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
|
|||||||
}
|
}
|
||||||
if(!*req) *req = OCSP_REQUEST_new();
|
if(!*req) *req = OCSP_REQUEST_new();
|
||||||
if(!*req) goto err;
|
if(!*req) goto err;
|
||||||
id = OCSP_cert_to_id(NULL, cert, issuer);
|
id = OCSP_cert_to_id(cert_id_md, cert, issuer);
|
||||||
if(!id || !sk_OCSP_CERTID_push(ids, id)) goto err;
|
if(!id || !sk_OCSP_CERTID_push(ids, id)) goto err;
|
||||||
if(!OCSP_request_add0_id(*req, id)) goto err;
|
if(!OCSP_request_add0_id(*req, id)) goto err;
|
||||||
return 1;
|
return 1;
|
||||||
@@ -902,7 +937,7 @@ static int add_ocsp_cert(OCSP_REQUEST **req, X509 *cert, X509 *issuer,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer,
|
static int add_ocsp_serial(OCSP_REQUEST **req, char *serial,const EVP_MD *cert_id_md, X509 *issuer,
|
||||||
STACK_OF(OCSP_CERTID) *ids)
|
STACK_OF(OCSP_CERTID) *ids)
|
||||||
{
|
{
|
||||||
OCSP_CERTID *id;
|
OCSP_CERTID *id;
|
||||||
@@ -924,7 +959,7 @@ static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer,
|
|||||||
BIO_printf(bio_err, "Error converting serial number %s\n", serial);
|
BIO_printf(bio_err, "Error converting serial number %s\n", serial);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
id = OCSP_cert_id_new(EVP_sha1(), iname, ikey, sno);
|
id = OCSP_cert_id_new(cert_id_md, iname, ikey, sno);
|
||||||
ASN1_INTEGER_free(sno);
|
ASN1_INTEGER_free(sno);
|
||||||
if(!id || !sk_OCSP_CERTID_push(ids, id)) goto err;
|
if(!id || !sk_OCSP_CERTID_push(ids, id)) goto err;
|
||||||
if(!OCSP_request_add0_id(*req, id)) goto err;
|
if(!OCSP_request_add0_id(*req, id)) goto err;
|
||||||
@@ -936,8 +971,9 @@ static int add_ocsp_serial(OCSP_REQUEST **req, char *serial, X509 *issuer,
|
|||||||
}
|
}
|
||||||
|
|
||||||
static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
|
static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
|
||||||
STACK *names, STACK_OF(OCSP_CERTID) *ids,
|
STACK_OF(STRING) *names,
|
||||||
long nsec, long maxage)
|
STACK_OF(OCSP_CERTID) *ids, long nsec,
|
||||||
|
long maxage)
|
||||||
{
|
{
|
||||||
OCSP_CERTID *id;
|
OCSP_CERTID *id;
|
||||||
char *name;
|
char *name;
|
||||||
@@ -947,13 +983,13 @@ static int print_ocsp_summary(BIO *out, OCSP_BASICRESP *bs, OCSP_REQUEST *req,
|
|||||||
|
|
||||||
ASN1_GENERALIZEDTIME *rev, *thisupd, *nextupd;
|
ASN1_GENERALIZEDTIME *rev, *thisupd, *nextupd;
|
||||||
|
|
||||||
if (!bs || !req || !sk_num(names) || !sk_OCSP_CERTID_num(ids))
|
if (!bs || !req || !sk_STRING_num(names) || !sk_OCSP_CERTID_num(ids))
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
for (i = 0; i < sk_OCSP_CERTID_num(ids); i++)
|
for (i = 0; i < sk_OCSP_CERTID_num(ids); i++)
|
||||||
{
|
{
|
||||||
id = sk_OCSP_CERTID_value(ids, i);
|
id = sk_OCSP_CERTID_value(ids, i);
|
||||||
name = sk_value(names, i);
|
name = sk_STRING_value(names, i);
|
||||||
BIO_printf(out, "%s: ", name);
|
BIO_printf(out, "%s: ", name);
|
||||||
|
|
||||||
if(!OCSP_resp_find_status(bs, id, &status, &reason,
|
if(!OCSP_resp_find_status(bs, id, &status, &reason,
|
||||||
@@ -1010,7 +1046,6 @@ static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db
|
|||||||
OCSP_BASICRESP *bs = NULL;
|
OCSP_BASICRESP *bs = NULL;
|
||||||
int i, id_count, ret = 1;
|
int i, id_count, ret = 1;
|
||||||
|
|
||||||
|
|
||||||
id_count = OCSP_request_onereq_count(req);
|
id_count = OCSP_request_onereq_count(req);
|
||||||
|
|
||||||
if (id_count <= 0)
|
if (id_count <= 0)
|
||||||
@@ -1019,7 +1054,6 @@ static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
ca_id = OCSP_cert_to_id(EVP_sha1(), NULL, ca);
|
|
||||||
|
|
||||||
bs = OCSP_BASICRESP_new();
|
bs = OCSP_BASICRESP_new();
|
||||||
thisupd = X509_gmtime_adj(NULL, 0);
|
thisupd = X509_gmtime_adj(NULL, 0);
|
||||||
@@ -1032,8 +1066,23 @@ static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db
|
|||||||
OCSP_ONEREQ *one;
|
OCSP_ONEREQ *one;
|
||||||
ASN1_INTEGER *serial;
|
ASN1_INTEGER *serial;
|
||||||
char **inf;
|
char **inf;
|
||||||
|
ASN1_OBJECT *cert_id_md_oid;
|
||||||
|
const EVP_MD *cert_id_md;
|
||||||
one = OCSP_request_onereq_get0(req, i);
|
one = OCSP_request_onereq_get0(req, i);
|
||||||
cid = OCSP_onereq_get0_id(one);
|
cid = OCSP_onereq_get0_id(one);
|
||||||
|
|
||||||
|
OCSP_id_get0_info(NULL,&cert_id_md_oid, NULL,NULL, cid);
|
||||||
|
|
||||||
|
cert_id_md = EVP_get_digestbyobj(cert_id_md_oid);
|
||||||
|
if (! cert_id_md)
|
||||||
|
{
|
||||||
|
*resp = OCSP_response_create(OCSP_RESPONSE_STATUS_INTERNALERROR,
|
||||||
|
NULL);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (ca_id) OCSP_CERTID_free(ca_id);
|
||||||
|
ca_id = OCSP_cert_to_id(cert_id_md, NULL, ca);
|
||||||
|
|
||||||
/* Is this request about our CA? */
|
/* Is this request about our CA? */
|
||||||
if (OCSP_id_issuer_cmp(ca_id, cid))
|
if (OCSP_id_issuer_cmp(ca_id, cid))
|
||||||
{
|
{
|
||||||
@@ -1079,7 +1128,7 @@ static int make_ocsp_response(OCSP_RESPONSE **resp, OCSP_REQUEST *req, CA_DB *db
|
|||||||
|
|
||||||
OCSP_copy_nonce(bs, req);
|
OCSP_copy_nonce(bs, req);
|
||||||
|
|
||||||
OCSP_basic_sign(bs, rcert, rkey, EVP_sha1(), rother, flags);
|
OCSP_basic_sign(bs, rcert, rkey, NULL, rother, flags);
|
||||||
|
|
||||||
*resp = OCSP_response_create(OCSP_RESPONSE_STATUS_SUCCESSFUL, bs);
|
*resp = OCSP_response_create(OCSP_RESPONSE_STATUS_SUCCESSFUL, bs);
|
||||||
|
|
||||||
|
|||||||
@@ -8,8 +8,9 @@
|
|||||||
HOME = .
|
HOME = .
|
||||||
RANDFILE = $ENV::HOME/.rnd
|
RANDFILE = $ENV::HOME/.rnd
|
||||||
|
|
||||||
# Uncomment out to enable OpenSSL configuration see config(3)
|
# Extra OBJECT IDENTIFIER info:
|
||||||
# openssl_conf = openssl_init
|
#oid_file = $ENV::HOME/.oid
|
||||||
|
oid_section = new_oids
|
||||||
|
|
||||||
# To use this configuration file with the "-extfile" option of the
|
# To use this configuration file with the "-extfile" option of the
|
||||||
# "openssl x509" utility, name here the section containing the
|
# "openssl x509" utility, name here the section containing the
|
||||||
@@ -18,22 +19,18 @@ RANDFILE = $ENV::HOME/.rnd
|
|||||||
# (Alternatively, use a configuration file that has only
|
# (Alternatively, use a configuration file that has only
|
||||||
# X.509v3 extensions in its main [= default] section.)
|
# X.509v3 extensions in its main [= default] section.)
|
||||||
|
|
||||||
[openssl_init]
|
|
||||||
# Extra OBJECT IDENTIFIER info:
|
|
||||||
oid_section = new_oids
|
|
||||||
alg_section = algs
|
|
||||||
|
|
||||||
[ new_oids ]
|
[ new_oids ]
|
||||||
|
|
||||||
# We can add new OIDs in here for use by any config aware application
|
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
||||||
# Add a simple OID like this:
|
# Add a simple OID like this:
|
||||||
# shortname=Long Object Identifier Name, 1.2.3.4
|
# testoid1=1.2.3.4
|
||||||
# Or use config file substitution like this:
|
# Or use config file substitution like this:
|
||||||
# testoid2=OID2 LONG NAME, ${testoid1}.5.6, OTHER OID
|
# testoid2=${testoid1}.5.6
|
||||||
|
|
||||||
[ algs ]
|
# Policies used by the TSA examples.
|
||||||
# Algorithm configuration options. Currently just fips_mode
|
tsa_policy1 = 1.2.3.4.1
|
||||||
fips_mode = no
|
tsa_policy2 = 1.2.3.4.5.6
|
||||||
|
tsa_policy3 = 1.2.3.4.5.7
|
||||||
|
|
||||||
####################################################################
|
####################################################################
|
||||||
[ ca ]
|
[ ca ]
|
||||||
@@ -75,7 +72,7 @@ cert_opt = ca_default # Certificate field options
|
|||||||
|
|
||||||
default_days = 365 # how long to certify for
|
default_days = 365 # how long to certify for
|
||||||
default_crl_days= 30 # how long before next CRL
|
default_crl_days= 30 # how long before next CRL
|
||||||
default_md = sha1 # which md to use.
|
default_md = default # use public key default MD
|
||||||
preserve = no # keep passed DN ordering
|
preserve = no # keep passed DN ordering
|
||||||
|
|
||||||
# A few difference way of specifying how similar the request should look
|
# A few difference way of specifying how similar the request should look
|
||||||
@@ -118,13 +115,12 @@ x509_extensions = v3_ca # The extentions to add to the self signed cert
|
|||||||
|
|
||||||
# This sets a mask for permitted string types. There are several options.
|
# This sets a mask for permitted string types. There are several options.
|
||||||
# default: PrintableString, T61String, BMPString.
|
# default: PrintableString, T61String, BMPString.
|
||||||
# pkix : PrintableString, BMPString.
|
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
||||||
# utf8only: only UTF8Strings.
|
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||||
# MASK:XXXX a literal mask value.
|
# MASK:XXXX a literal mask value.
|
||||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
||||||
# so use this option with caution!
|
string_mask = utf8only
|
||||||
string_mask = nombstr
|
|
||||||
|
|
||||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||||
|
|
||||||
@@ -215,6 +211,9 @@ authorityKeyIdentifier=keyid,issuer
|
|||||||
#nsCaPolicyUrl
|
#nsCaPolicyUrl
|
||||||
#nsSslServerName
|
#nsSslServerName
|
||||||
|
|
||||||
|
# This is required for TSA certificates.
|
||||||
|
# extendedKeyUsage = critical,timeStamping
|
||||||
|
|
||||||
[ v3_req ]
|
[ v3_req ]
|
||||||
|
|
||||||
# Extensions to add to a certificate request
|
# Extensions to add to a certificate request
|
||||||
@@ -232,7 +231,7 @@ keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|||||||
|
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
|
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always,issuer
|
||||||
|
|
||||||
# This is what PKIX recommends but some broken software chokes on critical
|
# This is what PKIX recommends but some broken software chokes on critical
|
||||||
# extensions.
|
# extensions.
|
||||||
@@ -265,7 +264,7 @@ basicConstraints = CA:true
|
|||||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||||
|
|
||||||
# issuerAltName=issuer:copy
|
# issuerAltName=issuer:copy
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always
|
||||||
|
|
||||||
[ proxy_cert_ext ]
|
[ proxy_cert_ext ]
|
||||||
# These extensions should be added when creating a proxy certificate
|
# These extensions should be added when creating a proxy certificate
|
||||||
@@ -298,7 +297,7 @@ nsComment = "OpenSSL Generated Certificate"
|
|||||||
|
|
||||||
# PKIX recommendations harmless if included in all certificates.
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
authorityKeyIdentifier=keyid,issuer:always
|
authorityKeyIdentifier=keyid,issuer
|
||||||
|
|
||||||
# This stuff is for subjectAltName and issuerAltname.
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
# Import the email address.
|
# Import the email address.
|
||||||
@@ -319,3 +318,33 @@ authorityKeyIdentifier=keyid,issuer:always
|
|||||||
|
|
||||||
# This really needs to be in place for it to be a proxy certificate.
|
# This really needs to be in place for it to be a proxy certificate.
|
||||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
||||||
|
|
||||||
|
####################################################################
|
||||||
|
[ tsa ]
|
||||||
|
|
||||||
|
default_tsa = tsa_config1 # the default TSA section
|
||||||
|
|
||||||
|
[ tsa_config1 ]
|
||||||
|
|
||||||
|
# These are used by the TSA reply generation only.
|
||||||
|
dir = sys\$disk:[.demoCA # TSA root directory
|
||||||
|
serial = $dir]tsaserial. # The current serial number (mandatory)
|
||||||
|
crypto_device = builtin # OpenSSL engine to use for signing
|
||||||
|
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
||||||
|
# (optional)
|
||||||
|
certs = $dir.cacert.pem] # Certificate chain to include in reply
|
||||||
|
# (optional)
|
||||||
|
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
||||||
|
|
||||||
|
default_policy = tsa_policy1 # Policy if request did not specify it
|
||||||
|
# (optional)
|
||||||
|
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
||||||
|
digests = md5, sha1 # Acceptable message digests (mandatory)
|
||||||
|
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
||||||
|
clock_precision_digits = 0 # number of digits after dot. (optional)
|
||||||
|
ordering = yes # Is ordering defined for timestamps?
|
||||||
|
# (optional, default: no)
|
||||||
|
tsa_name = yes # Must the TSA name be included in the reply?
|
||||||
|
# (optional, default: no)
|
||||||
|
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
||||||
|
# (optional, default: no)
|
||||||
|
|||||||
201
apps/openssl.c
201
apps/openssl.c
@@ -135,19 +135,17 @@
|
|||||||
* type of "FUNCTION*"). This removes the necessity for macro-generated wrapper
|
* type of "FUNCTION*"). This removes the necessity for macro-generated wrapper
|
||||||
* functions. */
|
* functions. */
|
||||||
|
|
||||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a); */
|
static LHASH_OF(FUNCTION) *prog_init(void );
|
||||||
static unsigned long MS_CALLBACK hash(const void *a_void);
|
static int do_cmd(LHASH_OF(FUNCTION) *prog,int argc,char *argv[]);
|
||||||
/* static int MS_CALLBACK cmp(FUNCTION *a,FUNCTION *b); */
|
static void list_pkey(BIO *out);
|
||||||
static int MS_CALLBACK cmp(const void *a_void,const void *b_void);
|
static void list_cipher(BIO *out);
|
||||||
static LHASH *prog_init(void );
|
static void list_md(BIO *out);
|
||||||
static int do_cmd(LHASH *prog,int argc,char *argv[]);
|
|
||||||
char *default_config_file=NULL;
|
char *default_config_file=NULL;
|
||||||
|
|
||||||
/* Make sure there is only one when MONOLITH is defined */
|
/* Make sure there is only one when MONOLITH is defined */
|
||||||
#ifdef MONOLITH
|
#ifdef MONOLITH
|
||||||
CONF *config=NULL;
|
CONF *config=NULL;
|
||||||
BIO *bio_err=NULL;
|
BIO *bio_err=NULL;
|
||||||
int in_FIPS_mode=0;
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
@@ -227,25 +225,12 @@ int main(int Argc, char *Argv[])
|
|||||||
int n,i,ret=0;
|
int n,i,ret=0;
|
||||||
int argc;
|
int argc;
|
||||||
char **argv,*p;
|
char **argv,*p;
|
||||||
LHASH *prog=NULL;
|
LHASH_OF(FUNCTION) *prog=NULL;
|
||||||
long errline;
|
long errline;
|
||||||
|
|
||||||
arg.data=NULL;
|
arg.data=NULL;
|
||||||
arg.count=0;
|
arg.count=0;
|
||||||
|
|
||||||
in_FIPS_mode = 0;
|
|
||||||
|
|
||||||
#ifdef OPENSSL_FIPS
|
|
||||||
if(getenv("OPENSSL_FIPS")) {
|
|
||||||
if (!FIPS_mode_set(1)) {
|
|
||||||
ERR_load_crypto_strings();
|
|
||||||
ERR_print_errors(BIO_new_fp(stderr,BIO_NOCLOSE));
|
|
||||||
EXIT(1);
|
|
||||||
}
|
|
||||||
in_FIPS_mode = 1;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
||||||
@@ -287,9 +272,21 @@ int main(int Argc, char *Argv[])
|
|||||||
i=NCONF_load(config,p,&errline);
|
i=NCONF_load(config,p,&errline);
|
||||||
if (i == 0)
|
if (i == 0)
|
||||||
{
|
{
|
||||||
|
if (ERR_GET_REASON(ERR_peek_last_error())
|
||||||
|
== CONF_R_NO_SUCH_FILE)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"WARNING: can't open config file: %s\n",p);
|
||||||
|
ERR_clear_error();
|
||||||
NCONF_free(config);
|
NCONF_free(config);
|
||||||
config = NULL;
|
config = NULL;
|
||||||
ERR_clear_error();
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
NCONF_free(config);
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
prog=prog_init();
|
prog=prog_init();
|
||||||
@@ -298,7 +295,7 @@ int main(int Argc, char *Argv[])
|
|||||||
program_name(Argv[0],pname,sizeof pname);
|
program_name(Argv[0],pname,sizeof pname);
|
||||||
|
|
||||||
f.name=pname;
|
f.name=pname;
|
||||||
fp=(FUNCTION *)lh_retrieve(prog,&f);
|
fp=lh_FUNCTION_retrieve(prog,&f);
|
||||||
if (fp != NULL)
|
if (fp != NULL)
|
||||||
{
|
{
|
||||||
Argv[0]=pname;
|
Argv[0]=pname;
|
||||||
@@ -364,7 +361,7 @@ end:
|
|||||||
NCONF_free(config);
|
NCONF_free(config);
|
||||||
config=NULL;
|
config=NULL;
|
||||||
}
|
}
|
||||||
if (prog != NULL) lh_free(prog);
|
if (prog != NULL) lh_FUNCTION_free(prog);
|
||||||
if (arg.data != NULL) OPENSSL_free(arg.data);
|
if (arg.data != NULL) OPENSSL_free(arg.data);
|
||||||
|
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
@@ -380,9 +377,13 @@ end:
|
|||||||
|
|
||||||
#define LIST_STANDARD_COMMANDS "list-standard-commands"
|
#define LIST_STANDARD_COMMANDS "list-standard-commands"
|
||||||
#define LIST_MESSAGE_DIGEST_COMMANDS "list-message-digest-commands"
|
#define LIST_MESSAGE_DIGEST_COMMANDS "list-message-digest-commands"
|
||||||
|
#define LIST_MESSAGE_DIGEST_ALGORITHMS "list-message-digest-algorithms"
|
||||||
#define LIST_CIPHER_COMMANDS "list-cipher-commands"
|
#define LIST_CIPHER_COMMANDS "list-cipher-commands"
|
||||||
|
#define LIST_CIPHER_ALGORITHMS "list-cipher-algorithms"
|
||||||
|
#define LIST_PUBLIC_KEY_ALGORITHMS "list-public-key-algorithms"
|
||||||
|
|
||||||
static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|
||||||
|
static int do_cmd(LHASH_OF(FUNCTION) *prog, int argc, char *argv[])
|
||||||
{
|
{
|
||||||
FUNCTION f,*fp;
|
FUNCTION f,*fp;
|
||||||
int i,ret=1,tp,nl;
|
int i,ret=1,tp,nl;
|
||||||
@@ -390,7 +391,22 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|||||||
if ((argc <= 0) || (argv[0] == NULL))
|
if ((argc <= 0) || (argv[0] == NULL))
|
||||||
{ ret=0; goto end; }
|
{ ret=0; goto end; }
|
||||||
f.name=argv[0];
|
f.name=argv[0];
|
||||||
fp=(FUNCTION *)lh_retrieve(prog,&f);
|
fp=lh_FUNCTION_retrieve(prog,&f);
|
||||||
|
if (fp == NULL)
|
||||||
|
{
|
||||||
|
if (EVP_get_digestbyname(argv[0]))
|
||||||
|
{
|
||||||
|
f.type = FUNC_TYPE_MD;
|
||||||
|
f.func = dgst_main;
|
||||||
|
fp = &f;
|
||||||
|
}
|
||||||
|
else if (EVP_get_cipherbyname(argv[0]))
|
||||||
|
{
|
||||||
|
f.type = FUNC_TYPE_CIPHER;
|
||||||
|
f.func = enc_main;
|
||||||
|
fp = &f;
|
||||||
|
}
|
||||||
|
}
|
||||||
if (fp != NULL)
|
if (fp != NULL)
|
||||||
{
|
{
|
||||||
ret=fp->func(argc,argv);
|
ret=fp->func(argc,argv);
|
||||||
@@ -405,7 +421,7 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
f.name=argv[0]+3;
|
f.name=argv[0]+3;
|
||||||
ret = (lh_retrieve(prog,&f) != NULL);
|
ret = (lh_FUNCTION_retrieve(prog,&f) != NULL);
|
||||||
if (!ret)
|
if (!ret)
|
||||||
BIO_printf(bio_stdout, "%s\n", argv[0]);
|
BIO_printf(bio_stdout, "%s\n", argv[0]);
|
||||||
else
|
else
|
||||||
@@ -423,7 +439,10 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|||||||
}
|
}
|
||||||
else if ((strcmp(argv[0],LIST_STANDARD_COMMANDS) == 0) ||
|
else if ((strcmp(argv[0],LIST_STANDARD_COMMANDS) == 0) ||
|
||||||
(strcmp(argv[0],LIST_MESSAGE_DIGEST_COMMANDS) == 0) ||
|
(strcmp(argv[0],LIST_MESSAGE_DIGEST_COMMANDS) == 0) ||
|
||||||
(strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0))
|
(strcmp(argv[0],LIST_MESSAGE_DIGEST_ALGORITHMS) == 0) ||
|
||||||
|
(strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0) ||
|
||||||
|
(strcmp(argv[0],LIST_CIPHER_ALGORITHMS) == 0) ||
|
||||||
|
(strcmp(argv[0],LIST_PUBLIC_KEY_ALGORITHMS) == 0))
|
||||||
{
|
{
|
||||||
int list_type;
|
int list_type;
|
||||||
BIO *bio_stdout;
|
BIO *bio_stdout;
|
||||||
@@ -432,6 +451,12 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|||||||
list_type = FUNC_TYPE_GENERAL;
|
list_type = FUNC_TYPE_GENERAL;
|
||||||
else if (strcmp(argv[0],LIST_MESSAGE_DIGEST_COMMANDS) == 0)
|
else if (strcmp(argv[0],LIST_MESSAGE_DIGEST_COMMANDS) == 0)
|
||||||
list_type = FUNC_TYPE_MD;
|
list_type = FUNC_TYPE_MD;
|
||||||
|
else if (strcmp(argv[0],LIST_MESSAGE_DIGEST_ALGORITHMS) == 0)
|
||||||
|
list_type = FUNC_TYPE_MD_ALG;
|
||||||
|
else if (strcmp(argv[0],LIST_PUBLIC_KEY_ALGORITHMS) == 0)
|
||||||
|
list_type = FUNC_TYPE_PKEY;
|
||||||
|
else if (strcmp(argv[0],LIST_CIPHER_ALGORITHMS) == 0)
|
||||||
|
list_type = FUNC_TYPE_CIPHER_ALG;
|
||||||
else /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
|
else /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
|
||||||
list_type = FUNC_TYPE_CIPHER;
|
list_type = FUNC_TYPE_CIPHER;
|
||||||
bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
|
bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
|
||||||
@@ -442,9 +467,22 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
if (list_type == FUNC_TYPE_PKEY)
|
||||||
|
list_pkey(bio_stdout);
|
||||||
|
if (list_type == FUNC_TYPE_MD_ALG)
|
||||||
|
list_md(bio_stdout);
|
||||||
|
if (list_type == FUNC_TYPE_CIPHER_ALG)
|
||||||
|
list_cipher(bio_stdout);
|
||||||
|
else
|
||||||
|
{
|
||||||
for (fp=functions; fp->name != NULL; fp++)
|
for (fp=functions; fp->name != NULL; fp++)
|
||||||
if (fp->type == list_type)
|
if (fp->type == list_type)
|
||||||
BIO_printf(bio_stdout, "%s\n", fp->name);
|
BIO_printf(bio_stdout, "%s\n",
|
||||||
|
fp->name);
|
||||||
|
}
|
||||||
BIO_free_all(bio_stdout);
|
BIO_free_all(bio_stdout);
|
||||||
ret=0;
|
ret=0;
|
||||||
goto end;
|
goto end;
|
||||||
@@ -507,9 +545,94 @@ static int SortFnByName(const void *_f1,const void *_f2)
|
|||||||
return strcmp(f1->name,f2->name);
|
return strcmp(f1->name,f2->name);
|
||||||
}
|
}
|
||||||
|
|
||||||
static LHASH *prog_init(void)
|
static void list_pkey(BIO *out)
|
||||||
{
|
{
|
||||||
LHASH *ret;
|
int i;
|
||||||
|
for (i = 0; i < EVP_PKEY_asn1_get_count(); i++)
|
||||||
|
{
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
int pkey_id, pkey_base_id, pkey_flags;
|
||||||
|
const char *pinfo, *pem_str;
|
||||||
|
ameth = EVP_PKEY_asn1_get0(i);
|
||||||
|
EVP_PKEY_asn1_get0_info(&pkey_id, &pkey_base_id, &pkey_flags,
|
||||||
|
&pinfo, &pem_str, ameth);
|
||||||
|
if (pkey_flags & ASN1_PKEY_ALIAS)
|
||||||
|
{
|
||||||
|
BIO_printf(out, "Name: %s\n",
|
||||||
|
OBJ_nid2ln(pkey_id));
|
||||||
|
BIO_printf(out, "\tType: Alias to %s\n",
|
||||||
|
OBJ_nid2ln(pkey_base_id));
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
BIO_printf(out, "Name: %s\n", pinfo);
|
||||||
|
BIO_printf(out, "\tType: %s Algorithm\n",
|
||||||
|
pkey_flags & ASN1_PKEY_DYNAMIC ?
|
||||||
|
"External" : "Builtin");
|
||||||
|
BIO_printf(out, "\tOID: %s\n", OBJ_nid2ln(pkey_id));
|
||||||
|
if (pem_str == NULL)
|
||||||
|
pem_str = "(none)";
|
||||||
|
BIO_printf(out, "\tPEM string: %s\n", pem_str);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_cipher_fn(const EVP_CIPHER *c,
|
||||||
|
const char *from, const char *to, void *arg)
|
||||||
|
{
|
||||||
|
if (c)
|
||||||
|
BIO_printf(arg, "%s\n", EVP_CIPHER_name(c));
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (!from)
|
||||||
|
from = "<undefined>";
|
||||||
|
if (!to)
|
||||||
|
to = "<undefined>";
|
||||||
|
BIO_printf(arg, "%s => %s\n", from, to);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_cipher(BIO *out)
|
||||||
|
{
|
||||||
|
EVP_CIPHER_do_all_sorted(list_cipher_fn, out);
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_md_fn(const EVP_MD *m,
|
||||||
|
const char *from, const char *to, void *arg)
|
||||||
|
{
|
||||||
|
if (m)
|
||||||
|
BIO_printf(arg, "%s\n", EVP_MD_name(m));
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (!from)
|
||||||
|
from = "<undefined>";
|
||||||
|
if (!to)
|
||||||
|
to = "<undefined>";
|
||||||
|
BIO_printf(arg, "%s => %s\n", from, to);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
static void list_md(BIO *out)
|
||||||
|
{
|
||||||
|
EVP_MD_do_all_sorted(list_md_fn, out);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int MS_CALLBACK function_cmp(const FUNCTION *a, const FUNCTION *b)
|
||||||
|
{
|
||||||
|
return strncmp(a->name,b->name,8);
|
||||||
|
}
|
||||||
|
static IMPLEMENT_LHASH_COMP_FN(function, FUNCTION)
|
||||||
|
|
||||||
|
static unsigned long MS_CALLBACK function_hash(const FUNCTION *a)
|
||||||
|
{
|
||||||
|
return lh_strhash(a->name);
|
||||||
|
}
|
||||||
|
static IMPLEMENT_LHASH_HASH_FN(function, FUNCTION)
|
||||||
|
|
||||||
|
static LHASH_OF(FUNCTION) *prog_init(void)
|
||||||
|
{
|
||||||
|
LHASH_OF(FUNCTION) *ret;
|
||||||
FUNCTION *f;
|
FUNCTION *f;
|
||||||
size_t i;
|
size_t i;
|
||||||
|
|
||||||
@@ -518,23 +641,11 @@ static LHASH *prog_init(void)
|
|||||||
;
|
;
|
||||||
qsort(functions,i,sizeof *functions,SortFnByName);
|
qsort(functions,i,sizeof *functions,SortFnByName);
|
||||||
|
|
||||||
if ((ret=lh_new(hash, cmp)) == NULL)
|
if ((ret=lh_FUNCTION_new()) == NULL)
|
||||||
return(NULL);
|
return(NULL);
|
||||||
|
|
||||||
for (f=functions; f->name != NULL; f++)
|
for (f=functions; f->name != NULL; f++)
|
||||||
lh_insert(ret,f);
|
(void)lh_FUNCTION_insert(ret,f);
|
||||||
return(ret);
|
return(ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
/* static int MS_CALLBACK cmp(FUNCTION *a, FUNCTION *b) */
|
|
||||||
static int MS_CALLBACK cmp(const void *a_void, const void *b_void)
|
|
||||||
{
|
|
||||||
return(strncmp(((const FUNCTION *)a_void)->name,
|
|
||||||
((const FUNCTION *)b_void)->name,8));
|
|
||||||
}
|
|
||||||
|
|
||||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a) */
|
|
||||||
static unsigned long MS_CALLBACK hash(const void *a_void)
|
|
||||||
{
|
|
||||||
return(lh_strhash(((const FUNCTION *)a_void)->name));
|
|
||||||
}
|
|
||||||
|
|||||||
@@ -8,8 +8,9 @@
|
|||||||
HOME = .
|
HOME = .
|
||||||
RANDFILE = $ENV::HOME/.rnd
|
RANDFILE = $ENV::HOME/.rnd
|
||||||
|
|
||||||
# Uncomment out to enable OpenSSL configuration see config(3)
|
# Extra OBJECT IDENTIFIER info:
|
||||||
# openssl_conf = openssl_init
|
#oid_file = $ENV::HOME/.oid
|
||||||
|
oid_section = new_oids
|
||||||
|
|
||||||
# To use this configuration file with the "-extfile" option of the
|
# To use this configuration file with the "-extfile" option of the
|
||||||
# "openssl x509" utility, name here the section containing the
|
# "openssl x509" utility, name here the section containing the
|
||||||
@@ -18,22 +19,18 @@ RANDFILE = $ENV::HOME/.rnd
|
|||||||
# (Alternatively, use a configuration file that has only
|
# (Alternatively, use a configuration file that has only
|
||||||
# X.509v3 extensions in its main [= default] section.)
|
# X.509v3 extensions in its main [= default] section.)
|
||||||
|
|
||||||
[openssl_init]
|
|
||||||
# Extra OBJECT IDENTIFIER info:
|
|
||||||
oid_section = new_oids
|
|
||||||
alg_section = algs
|
|
||||||
|
|
||||||
[ new_oids ]
|
[ new_oids ]
|
||||||
|
|
||||||
# We can add new OIDs in here for use by any config aware application
|
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
||||||
# Add a simple OID like this:
|
# Add a simple OID like this:
|
||||||
# shortname=Long Object Identifier Name, 1.2.3.4
|
# testoid1=1.2.3.4
|
||||||
# Or use config file substitution like this:
|
# Or use config file substitution like this:
|
||||||
# testoid2=OID2 LONG NAME, ${testoid1}.5.6, OTHER OID
|
# testoid2=${testoid1}.5.6
|
||||||
|
|
||||||
[ algs ]
|
# Policies used by the TSA examples.
|
||||||
# Algorithm configuration options. Currently just fips_mode
|
tsa_policy1 = 1.2.3.4.1
|
||||||
fips_mode = no
|
tsa_policy2 = 1.2.3.4.5.6
|
||||||
|
tsa_policy3 = 1.2.3.4.5.7
|
||||||
|
|
||||||
####################################################################
|
####################################################################
|
||||||
[ ca ]
|
[ ca ]
|
||||||
@@ -75,7 +72,7 @@ cert_opt = ca_default # Certificate field options
|
|||||||
|
|
||||||
default_days = 365 # how long to certify for
|
default_days = 365 # how long to certify for
|
||||||
default_crl_days= 30 # how long before next CRL
|
default_crl_days= 30 # how long before next CRL
|
||||||
default_md = sha1 # which md to use.
|
default_md = default # use public key default MD
|
||||||
preserve = no # keep passed DN ordering
|
preserve = no # keep passed DN ordering
|
||||||
|
|
||||||
# A few difference way of specifying how similar the request should look
|
# A few difference way of specifying how similar the request should look
|
||||||
@@ -118,13 +115,12 @@ x509_extensions = v3_ca # The extentions to add to the self signed cert
|
|||||||
|
|
||||||
# This sets a mask for permitted string types. There are several options.
|
# This sets a mask for permitted string types. There are several options.
|
||||||
# default: PrintableString, T61String, BMPString.
|
# default: PrintableString, T61String, BMPString.
|
||||||
# pkix : PrintableString, BMPString.
|
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
||||||
# utf8only: only UTF8Strings.
|
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
||||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||||
# MASK:XXXX a literal mask value.
|
# MASK:XXXX a literal mask value.
|
||||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
||||||
# so use this option with caution!
|
string_mask = utf8only
|
||||||
string_mask = nombstr
|
|
||||||
|
|
||||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||||
|
|
||||||
@@ -215,6 +211,9 @@ authorityKeyIdentifier=keyid,issuer
|
|||||||
#nsCaPolicyUrl
|
#nsCaPolicyUrl
|
||||||
#nsSslServerName
|
#nsSslServerName
|
||||||
|
|
||||||
|
# This is required for TSA certificates.
|
||||||
|
# extendedKeyUsage = critical,timeStamping
|
||||||
|
|
||||||
[ v3_req ]
|
[ v3_req ]
|
||||||
|
|
||||||
# Extensions to add to a certificate request
|
# Extensions to add to a certificate request
|
||||||
@@ -232,7 +231,7 @@ keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|||||||
|
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
|
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always,issuer
|
||||||
|
|
||||||
# This is what PKIX recommends but some broken software chokes on critical
|
# This is what PKIX recommends but some broken software chokes on critical
|
||||||
# extensions.
|
# extensions.
|
||||||
@@ -265,7 +264,7 @@ basicConstraints = CA:true
|
|||||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||||
|
|
||||||
# issuerAltName=issuer:copy
|
# issuerAltName=issuer:copy
|
||||||
authorityKeyIdentifier=keyid:always,issuer:always
|
authorityKeyIdentifier=keyid:always
|
||||||
|
|
||||||
[ proxy_cert_ext ]
|
[ proxy_cert_ext ]
|
||||||
# These extensions should be added when creating a proxy certificate
|
# These extensions should be added when creating a proxy certificate
|
||||||
@@ -298,7 +297,7 @@ nsComment = "OpenSSL Generated Certificate"
|
|||||||
|
|
||||||
# PKIX recommendations harmless if included in all certificates.
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
authorityKeyIdentifier=keyid,issuer:always
|
authorityKeyIdentifier=keyid,issuer
|
||||||
|
|
||||||
# This stuff is for subjectAltName and issuerAltname.
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
# Import the email address.
|
# Import the email address.
|
||||||
@@ -319,3 +318,33 @@ authorityKeyIdentifier=keyid,issuer:always
|
|||||||
|
|
||||||
# This really needs to be in place for it to be a proxy certificate.
|
# This really needs to be in place for it to be a proxy certificate.
|
||||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
||||||
|
|
||||||
|
####################################################################
|
||||||
|
[ tsa ]
|
||||||
|
|
||||||
|
default_tsa = tsa_config1 # the default TSA section
|
||||||
|
|
||||||
|
[ tsa_config1 ]
|
||||||
|
|
||||||
|
# These are used by the TSA reply generation only.
|
||||||
|
dir = ./demoCA # TSA root directory
|
||||||
|
serial = $dir/tsaserial # The current serial number (mandatory)
|
||||||
|
crypto_device = builtin # OpenSSL engine to use for signing
|
||||||
|
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
||||||
|
# (optional)
|
||||||
|
certs = $dir/cacert.pem # Certificate chain to include in reply
|
||||||
|
# (optional)
|
||||||
|
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
||||||
|
|
||||||
|
default_policy = tsa_policy1 # Policy if request did not specify it
|
||||||
|
# (optional)
|
||||||
|
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
||||||
|
digests = md5, sha1 # Acceptable message digests (mandatory)
|
||||||
|
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
||||||
|
clock_precision_digits = 0 # number of digits after dot. (optional)
|
||||||
|
ordering = yes # Is ordering defined for timestamps?
|
||||||
|
# (optional, default: no)
|
||||||
|
tsa_name = yes # Must the TSA name be included in the reply?
|
||||||
|
# (optional, default: no)
|
||||||
|
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
||||||
|
# (optional, default: no)
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
/* pkcs12.c */
|
/* pkcs12.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project.
|
* project.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
@@ -88,6 +88,7 @@ int print_attribs(BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst,const char *name);
|
|||||||
void hex_prin(BIO *out, unsigned char *buf, int len);
|
void hex_prin(BIO *out, unsigned char *buf, int len);
|
||||||
int alg_print(BIO *x, X509_ALGOR *alg);
|
int alg_print(BIO *x, X509_ALGOR *alg);
|
||||||
int cert_load(BIO *in, STACK_OF(X509) *sk);
|
int cert_load(BIO *in, STACK_OF(X509) *sk);
|
||||||
|
static int set_pbe(BIO *err, int *ppbe, const char *str);
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
@@ -111,16 +112,17 @@ int MAIN(int argc, char **argv)
|
|||||||
int maciter = PKCS12_DEFAULT_ITER;
|
int maciter = PKCS12_DEFAULT_ITER;
|
||||||
int twopass = 0;
|
int twopass = 0;
|
||||||
int keytype = 0;
|
int keytype = 0;
|
||||||
int cert_pbe;
|
int cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
|
||||||
int key_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
|
int key_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
|
||||||
int ret = 1;
|
int ret = 1;
|
||||||
int macver = 1;
|
int macver = 1;
|
||||||
int noprompt = 0;
|
int noprompt = 0;
|
||||||
STACK *canames = NULL;
|
STACK_OF(STRING) *canames = NULL;
|
||||||
char *cpass = NULL, *mpass = NULL;
|
char *cpass = NULL, *mpass = NULL;
|
||||||
char *passargin = NULL, *passargout = NULL, *passarg = NULL;
|
char *passargin = NULL, *passargout = NULL, *passarg = NULL;
|
||||||
char *passin = NULL, *passout = NULL;
|
char *passin = NULL, *passout = NULL;
|
||||||
char *inrand = NULL;
|
char *inrand = NULL;
|
||||||
|
char *macalg = NULL;
|
||||||
char *CApath = NULL, *CAfile = NULL;
|
char *CApath = NULL, *CAfile = NULL;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine=NULL;
|
||||||
@@ -128,13 +130,6 @@ int MAIN(int argc, char **argv)
|
|||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
#ifdef OPENSSL_FIPS
|
|
||||||
if (FIPS_mode())
|
|
||||||
cert_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
|
|
||||||
|
|
||||||
enc = EVP_des_ede3_cbc();
|
enc = EVP_des_ede3_cbc();
|
||||||
if (bio_err == NULL ) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
if (bio_err == NULL ) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
@@ -185,33 +180,18 @@ int MAIN(int argc, char **argv)
|
|||||||
maciter = 1;
|
maciter = 1;
|
||||||
else if (!strcmp (*args, "-nomac"))
|
else if (!strcmp (*args, "-nomac"))
|
||||||
maciter = -1;
|
maciter = -1;
|
||||||
|
else if (!strcmp (*args, "-macalg"))
|
||||||
|
if (args[1]) {
|
||||||
|
args++;
|
||||||
|
macalg = *args;
|
||||||
|
} else badarg = 1;
|
||||||
else if (!strcmp (*args, "-nodes")) enc=NULL;
|
else if (!strcmp (*args, "-nodes")) enc=NULL;
|
||||||
else if (!strcmp (*args, "-certpbe")) {
|
else if (!strcmp (*args, "-certpbe")) {
|
||||||
if (args[1]) {
|
if (!set_pbe(bio_err, &cert_pbe, *++args))
|
||||||
args++;
|
|
||||||
if (!strcmp(*args, "NONE"))
|
|
||||||
cert_pbe = -1;
|
|
||||||
else
|
|
||||||
cert_pbe=OBJ_txt2nid(*args);
|
|
||||||
if(cert_pbe == NID_undef) {
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Unknown PBE algorithm %s\n", *args);
|
|
||||||
badarg = 1;
|
badarg = 1;
|
||||||
}
|
|
||||||
} else badarg = 1;
|
|
||||||
} else if (!strcmp (*args, "-keypbe")) {
|
} else if (!strcmp (*args, "-keypbe")) {
|
||||||
if (args[1]) {
|
if (!set_pbe(bio_err, &key_pbe, *++args))
|
||||||
args++;
|
|
||||||
if (!strcmp(*args, "NONE"))
|
|
||||||
key_pbe = -1;
|
|
||||||
else
|
|
||||||
key_pbe=OBJ_txt2nid(*args);
|
|
||||||
if(key_pbe == NID_undef) {
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Unknown PBE algorithm %s\n", *args);
|
|
||||||
badarg = 1;
|
badarg = 1;
|
||||||
}
|
|
||||||
} else badarg = 1;
|
|
||||||
} else if (!strcmp (*args, "-rand")) {
|
} else if (!strcmp (*args, "-rand")) {
|
||||||
if (args[1]) {
|
if (args[1]) {
|
||||||
args++;
|
args++;
|
||||||
@@ -242,8 +222,8 @@ int MAIN(int argc, char **argv)
|
|||||||
} else if (!strcmp (*args, "-caname")) {
|
} else if (!strcmp (*args, "-caname")) {
|
||||||
if (args[1]) {
|
if (args[1]) {
|
||||||
args++;
|
args++;
|
||||||
if (!canames) canames = sk_new_null();
|
if (!canames) canames = sk_STRING_new_null();
|
||||||
sk_push(canames, *args);
|
sk_STRING_push(canames, *args);
|
||||||
} else badarg = 1;
|
} else badarg = 1;
|
||||||
} else if (!strcmp (*args, "-in")) {
|
} else if (!strcmp (*args, "-in")) {
|
||||||
if (args[1]) {
|
if (args[1]) {
|
||||||
@@ -332,11 +312,14 @@ int MAIN(int argc, char **argv)
|
|||||||
#endif
|
#endif
|
||||||
BIO_printf (bio_err, "-nodes don't encrypt private keys\n");
|
BIO_printf (bio_err, "-nodes don't encrypt private keys\n");
|
||||||
BIO_printf (bio_err, "-noiter don't use encryption iteration\n");
|
BIO_printf (bio_err, "-noiter don't use encryption iteration\n");
|
||||||
|
BIO_printf (bio_err, "-nomaciter don't use MAC iteration\n");
|
||||||
BIO_printf (bio_err, "-maciter use MAC iteration\n");
|
BIO_printf (bio_err, "-maciter use MAC iteration\n");
|
||||||
|
BIO_printf (bio_err, "-nomac don't generate MAC\n");
|
||||||
BIO_printf (bio_err, "-twopass separate MAC, encryption passwords\n");
|
BIO_printf (bio_err, "-twopass separate MAC, encryption passwords\n");
|
||||||
BIO_printf (bio_err, "-descert encrypt PKCS#12 certificates with triple DES (default RC2-40)\n");
|
BIO_printf (bio_err, "-descert encrypt PKCS#12 certificates with triple DES (default RC2-40)\n");
|
||||||
BIO_printf (bio_err, "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n");
|
BIO_printf (bio_err, "-certpbe alg specify certificate PBE algorithm (default RC2-40)\n");
|
||||||
BIO_printf (bio_err, "-keypbe alg specify private key PBE algorithm (default 3DES)\n");
|
BIO_printf (bio_err, "-keypbe alg specify private key PBE algorithm (default 3DES)\n");
|
||||||
|
BIO_printf (bio_err, "-macalg alg digest algorithm used in MAC (default SHA1)\n");
|
||||||
BIO_printf (bio_err, "-keyex set MS key exchange type\n");
|
BIO_printf (bio_err, "-keyex set MS key exchange type\n");
|
||||||
BIO_printf (bio_err, "-keysig set MS key signature type\n");
|
BIO_printf (bio_err, "-keysig set MS key signature type\n");
|
||||||
BIO_printf (bio_err, "-password p set import/export password source\n");
|
BIO_printf (bio_err, "-password p set import/export password source\n");
|
||||||
@@ -439,6 +422,7 @@ int MAIN(int argc, char **argv)
|
|||||||
EVP_PKEY *key = NULL;
|
EVP_PKEY *key = NULL;
|
||||||
X509 *ucert = NULL, *x = NULL;
|
X509 *ucert = NULL, *x = NULL;
|
||||||
STACK_OF(X509) *certs=NULL;
|
STACK_OF(X509) *certs=NULL;
|
||||||
|
const EVP_MD *macmd = NULL;
|
||||||
unsigned char *catmp = NULL;
|
unsigned char *catmp = NULL;
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
@@ -565,9 +549,9 @@ int MAIN(int argc, char **argv)
|
|||||||
|
|
||||||
/* Add any CA names */
|
/* Add any CA names */
|
||||||
|
|
||||||
for (i = 0; i < sk_num(canames); i++)
|
for (i = 0; i < sk_STRING_num(canames); i++)
|
||||||
{
|
{
|
||||||
catmp = (unsigned char *)sk_value(canames, i);
|
catmp = (unsigned char *)sk_STRING_value(canames, i);
|
||||||
X509_alias_set1(sk_X509_value(certs, i), catmp, -1);
|
X509_alias_set1(sk_X509_value(certs, i), catmp, -1);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -605,8 +589,18 @@ int MAIN(int argc, char **argv)
|
|||||||
goto export_end;
|
goto export_end;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (macalg)
|
||||||
|
{
|
||||||
|
macmd = EVP_get_digestbyname(macalg);
|
||||||
|
if (!macmd)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Unknown digest algorithm %s\n",
|
||||||
|
macalg);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (maciter != -1)
|
if (maciter != -1)
|
||||||
PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, NULL);
|
PKCS12_set_mac(p12, mpass, -1, NULL, 0, maciter, macmd);
|
||||||
|
|
||||||
#ifdef CRYPTO_MDEBUG
|
#ifdef CRYPTO_MDEBUG
|
||||||
CRYPTO_pop_info();
|
CRYPTO_pop_info();
|
||||||
@@ -693,7 +687,7 @@ int MAIN(int argc, char **argv)
|
|||||||
#endif
|
#endif
|
||||||
BIO_free(in);
|
BIO_free(in);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
if (canames) sk_free(canames);
|
if (canames) sk_STRING_free(canames);
|
||||||
if(passin) OPENSSL_free(passin);
|
if(passin) OPENSSL_free(passin);
|
||||||
if(passout) OPENSSL_free(passout);
|
if(passout) OPENSSL_free(passout);
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
@@ -929,7 +923,7 @@ int print_attribs (BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst,const char *name)
|
|||||||
av = sk_ASN1_TYPE_value(attr->value.set, 0);
|
av = sk_ASN1_TYPE_value(attr->value.set, 0);
|
||||||
switch(av->type) {
|
switch(av->type) {
|
||||||
case V_ASN1_BMPSTRING:
|
case V_ASN1_BMPSTRING:
|
||||||
value = uni2asc(av->value.bmpstring->data,
|
value = OPENSSL_uni2asc(av->value.bmpstring->data,
|
||||||
av->value.bmpstring->length);
|
av->value.bmpstring->length);
|
||||||
BIO_printf(out, "%s\n", value);
|
BIO_printf(out, "%s\n", value);
|
||||||
OPENSSL_free(value);
|
OPENSSL_free(value);
|
||||||
@@ -962,4 +956,22 @@ void hex_prin(BIO *out, unsigned char *buf, int len)
|
|||||||
for (i = 0; i < len; i++) BIO_printf (out, "%02X ", buf[i]);
|
for (i = 0; i < len; i++) BIO_printf (out, "%02X ", buf[i]);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static int set_pbe(BIO *err, int *ppbe, const char *str)
|
||||||
|
{
|
||||||
|
if (!str)
|
||||||
|
return 0;
|
||||||
|
if (!strcmp(str, "NONE"))
|
||||||
|
{
|
||||||
|
*ppbe = -1;
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
*ppbe=OBJ_txt2nid(str);
|
||||||
|
if (*ppbe == NID_undef)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Unknown PBE algorithm %s\n", str);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -90,7 +90,7 @@ int MAIN(int argc, char **argv)
|
|||||||
BIO *in=NULL,*out=NULL;
|
BIO *in=NULL,*out=NULL;
|
||||||
int informat,outformat;
|
int informat,outformat;
|
||||||
char *infile,*outfile,*prog;
|
char *infile,*outfile,*prog;
|
||||||
int print_certs=0,text=0,noout=0;
|
int print_certs=0,text=0,noout=0,p7_print=0;
|
||||||
int ret=1;
|
int ret=1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine=NULL;
|
||||||
@@ -139,6 +139,8 @@ int MAIN(int argc, char **argv)
|
|||||||
noout=1;
|
noout=1;
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
else if (strcmp(*argv,"-text") == 0)
|
||||||
text=1;
|
text=1;
|
||||||
|
else if (strcmp(*argv,"-print") == 0)
|
||||||
|
p7_print=1;
|
||||||
else if (strcmp(*argv,"-print_certs") == 0)
|
else if (strcmp(*argv,"-print_certs") == 0)
|
||||||
print_certs=1;
|
print_certs=1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
@@ -238,6 +240,9 @@ bad:
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (p7_print)
|
||||||
|
PKCS7_print_ctx(out, p7, 0, NULL);
|
||||||
|
|
||||||
if (print_certs)
|
if (print_certs)
|
||||||
{
|
{
|
||||||
STACK_OF(X509) *certs=NULL;
|
STACK_OF(X509) *certs=NULL;
|
||||||
|
|||||||
76
apps/pkcs8.c
76
apps/pkcs8.c
@@ -1,5 +1,5 @@
|
|||||||
/* pkcs8.c */
|
/* pkcs8.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project 1999-2004.
|
* project 1999-2004.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
@@ -80,11 +80,12 @@ int MAIN(int argc, char **argv)
|
|||||||
int informat, outformat;
|
int informat, outformat;
|
||||||
int p8_broken = PKCS8_OK;
|
int p8_broken = PKCS8_OK;
|
||||||
int nocrypt = 0;
|
int nocrypt = 0;
|
||||||
X509_SIG *p8;
|
X509_SIG *p8 = NULL;
|
||||||
PKCS8_PRIV_KEY_INFO *p8inf;
|
PKCS8_PRIV_KEY_INFO *p8inf = NULL;
|
||||||
EVP_PKEY *pkey=NULL;
|
EVP_PKEY *pkey=NULL;
|
||||||
char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
|
char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
|
||||||
int badarg = 0;
|
int badarg = 0;
|
||||||
|
int ret = 1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine=NULL;
|
||||||
#endif
|
#endif
|
||||||
@@ -225,7 +226,7 @@ int MAIN(int argc, char **argv)
|
|||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
#endif
|
||||||
return 1;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
@@ -235,7 +236,7 @@ int MAIN(int argc, char **argv)
|
|||||||
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
return 1;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((pbe_nid == -1) && !cipher)
|
if ((pbe_nid == -1) && !cipher)
|
||||||
@@ -247,7 +248,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
BIO_printf(bio_err,
|
BIO_printf(bio_err,
|
||||||
"Can't open input file %s\n", infile);
|
"Can't open input file %s\n", infile);
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -259,7 +260,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
BIO_printf(bio_err,
|
BIO_printf(bio_err,
|
||||||
"Can't open output file %s\n", outfile);
|
"Can't open output file %s\n", outfile);
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -278,17 +279,12 @@ int MAIN(int argc, char **argv)
|
|||||||
pkey = load_key(bio_err, infile, informat, 1,
|
pkey = load_key(bio_err, infile, informat, 1,
|
||||||
passin, e, "key");
|
passin, e, "key");
|
||||||
if (!pkey)
|
if (!pkey)
|
||||||
{
|
goto end;
|
||||||
BIO_free_all(out);
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken)))
|
if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken)))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error converting key\n");
|
BIO_printf(bio_err, "Error converting key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
EVP_PKEY_free(pkey);
|
goto end;
|
||||||
BIO_free_all(out);
|
|
||||||
return 1;
|
|
||||||
}
|
}
|
||||||
if (nocrypt)
|
if (nocrypt)
|
||||||
{
|
{
|
||||||
@@ -299,10 +295,7 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
goto end;
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
return (1);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -313,12 +306,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
p8pass = pass;
|
p8pass = pass;
|
||||||
if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
|
if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
|
||||||
{
|
goto end;
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
return (1);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
app_RAND_load_file(NULL, bio_err, 0);
|
app_RAND_load_file(NULL, bio_err, 0);
|
||||||
if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
||||||
@@ -327,10 +315,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error encrypting key\n");
|
BIO_printf(bio_err, "Error encrypting key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
goto end;
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
return (1);
|
|
||||||
}
|
}
|
||||||
app_RAND_write_file(NULL, bio_err);
|
app_RAND_write_file(NULL, bio_err);
|
||||||
if (outformat == FORMAT_PEM)
|
if (outformat == FORMAT_PEM)
|
||||||
@@ -340,22 +325,12 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
goto end;
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
return (1);
|
|
||||||
}
|
}
|
||||||
X509_SIG_free(p8);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
PKCS8_PRIV_KEY_INFO_free (p8inf);
|
ret = 0;
|
||||||
EVP_PKEY_free(pkey);
|
goto end;
|
||||||
BIO_free_all(out);
|
|
||||||
if (passin)
|
|
||||||
OPENSSL_free(passin);
|
|
||||||
if (passout)
|
|
||||||
OPENSSL_free(passout);
|
|
||||||
return (0);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (nocrypt)
|
if (nocrypt)
|
||||||
@@ -367,7 +342,7 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -379,14 +354,14 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!p8)
|
if (!p8)
|
||||||
{
|
{
|
||||||
BIO_printf (bio_err, "Error reading key\n");
|
BIO_printf (bio_err, "Error reading key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
if (passin)
|
if (passin)
|
||||||
p8pass = passin;
|
p8pass = passin;
|
||||||
@@ -396,21 +371,20 @@ int MAIN(int argc, char **argv)
|
|||||||
EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
||||||
}
|
}
|
||||||
p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
|
p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
|
||||||
X509_SIG_free(p8);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!p8inf)
|
if (!p8inf)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error decrypting key\n");
|
BIO_printf(bio_err, "Error decrypting key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!(pkey = EVP_PKCS82PKEY(p8inf)))
|
if (!(pkey = EVP_PKCS82PKEY(p8inf)))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Error converting key\n");
|
BIO_printf(bio_err, "Error converting key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (p8inf->broken)
|
if (p8inf->broken)
|
||||||
@@ -436,7 +410,6 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
|
||||||
if (outformat == FORMAT_PEM)
|
if (outformat == FORMAT_PEM)
|
||||||
PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
|
PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
|
||||||
else if (outformat == FORMAT_ASN1)
|
else if (outformat == FORMAT_ASN1)
|
||||||
@@ -444,10 +417,13 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
return (1);
|
goto end;
|
||||||
}
|
}
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
end:
|
end:
|
||||||
|
X509_SIG_free(p8);
|
||||||
|
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
||||||
EVP_PKEY_free(pkey);
|
EVP_PKEY_free(pkey);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
BIO_free(in);
|
BIO_free(in);
|
||||||
@@ -456,5 +432,5 @@ int MAIN(int argc, char **argv)
|
|||||||
if (passout)
|
if (passout)
|
||||||
OPENSSL_free(passout);
|
OPENSSL_free(passout);
|
||||||
|
|
||||||
return (0);
|
return ret;
|
||||||
}
|
}
|
||||||
|
|||||||
284
apps/pkey.c
Normal file
284
apps/pkey.c
Normal file
@@ -0,0 +1,284 @@
|
|||||||
|
/* apps/pkey.c */
|
||||||
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
|
* project 2006
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include "apps.h"
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
|
#define PROG pkey_main
|
||||||
|
|
||||||
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
ENGINE *e = NULL;
|
||||||
|
char **args, *infile = NULL, *outfile = NULL;
|
||||||
|
char *passargin = NULL, *passargout = NULL;
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
const EVP_CIPHER *cipher = NULL;
|
||||||
|
int informat, outformat;
|
||||||
|
int pubin = 0, pubout = 0, pubtext = 0, text = 0, noout = 0;
|
||||||
|
EVP_PKEY *pkey=NULL;
|
||||||
|
char *passin = NULL, *passout = NULL;
|
||||||
|
int badarg = 0;
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
char *engine=NULL;
|
||||||
|
#endif
|
||||||
|
int ret = 1;
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
informat=FORMAT_PEM;
|
||||||
|
outformat=FORMAT_PEM;
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
args = argv + 1;
|
||||||
|
while (!badarg && *args && *args[0] == '-')
|
||||||
|
{
|
||||||
|
if (!strcmp(*args,"-inform"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
informat=str2fmt(*args);
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp(*args,"-outform"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
outformat=str2fmt(*args);
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp(*args,"-passin"))
|
||||||
|
{
|
||||||
|
if (!args[1]) goto bad;
|
||||||
|
passargin= *(++args);
|
||||||
|
}
|
||||||
|
else if (!strcmp(*args,"-passout"))
|
||||||
|
{
|
||||||
|
if (!args[1]) goto bad;
|
||||||
|
passargout= *(++args);
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*args,"-engine") == 0)
|
||||||
|
{
|
||||||
|
if (!args[1]) goto bad;
|
||||||
|
engine= *(++args);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if (!strcmp (*args, "-in"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
infile = *args;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp (*args, "-out"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
outfile = *args;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-pubin") == 0)
|
||||||
|
{
|
||||||
|
pubin=1;
|
||||||
|
pubout=1;
|
||||||
|
pubtext=1;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-pubout") == 0)
|
||||||
|
pubout=1;
|
||||||
|
else if (strcmp(*args,"-text_pub") == 0)
|
||||||
|
{
|
||||||
|
pubtext=1;
|
||||||
|
text=1;
|
||||||
|
}
|
||||||
|
else if (strcmp(*args,"-text") == 0)
|
||||||
|
text=1;
|
||||||
|
else if (strcmp(*args,"-noout") == 0)
|
||||||
|
noout=1;
|
||||||
|
else
|
||||||
|
{
|
||||||
|
cipher = EVP_get_cipherbyname(*args + 1);
|
||||||
|
if (!cipher)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Unknown cipher %s\n",
|
||||||
|
*args + 1);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (badarg)
|
||||||
|
{
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "Usage pkey [options]\n");
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
|
BIO_printf(bio_err, "-inform X input format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
|
||||||
|
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err, "-passout arg output file pass phrase source\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile)
|
||||||
|
{
|
||||||
|
if (!(out = BIO_new_file (outfile, "wb")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Can't open output file %s\n", outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (pubin)
|
||||||
|
pkey = load_pubkey(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "Public Key");
|
||||||
|
else
|
||||||
|
pkey = load_key(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "key");
|
||||||
|
if (!pkey)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
if (!noout)
|
||||||
|
{
|
||||||
|
if (outformat == FORMAT_PEM)
|
||||||
|
{
|
||||||
|
if (pubout)
|
||||||
|
PEM_write_bio_PUBKEY(out,pkey);
|
||||||
|
else
|
||||||
|
PEM_write_bio_PrivateKey(out, pkey, cipher,
|
||||||
|
NULL, 0, NULL, passout);
|
||||||
|
}
|
||||||
|
else if (outformat == FORMAT_ASN1)
|
||||||
|
{
|
||||||
|
if (pubout)
|
||||||
|
i2d_PUBKEY_bio(out, pkey);
|
||||||
|
else
|
||||||
|
i2d_PrivateKey_bio(out, pkey);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text)
|
||||||
|
{
|
||||||
|
if (pubtext)
|
||||||
|
EVP_PKEY_print_public(out, pkey, 0, NULL);
|
||||||
|
else
|
||||||
|
EVP_PKEY_print_private(out, pkey, 0, NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
end:
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
201
apps/pkeyparam.c
Normal file
201
apps/pkeyparam.c
Normal file
@@ -0,0 +1,201 @@
|
|||||||
|
/* apps/pkeyparam.c */
|
||||||
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
|
* project 2006
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include "apps.h"
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
|
#define PROG pkeyparam_main
|
||||||
|
|
||||||
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
char **args, *infile = NULL, *outfile = NULL;
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
int text = 0, noout = 0;
|
||||||
|
EVP_PKEY *pkey=NULL;
|
||||||
|
int badarg = 0;
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
ENGINE *e = NULL;
|
||||||
|
char *engine=NULL;
|
||||||
|
#endif
|
||||||
|
int ret = 1;
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
args = argv + 1;
|
||||||
|
while (!badarg && *args && *args[0] == '-')
|
||||||
|
{
|
||||||
|
if (!strcmp (*args, "-in"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
infile = *args;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp (*args, "-out"))
|
||||||
|
{
|
||||||
|
if (args[1])
|
||||||
|
{
|
||||||
|
args++;
|
||||||
|
outfile = *args;
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*args,"-engine") == 0)
|
||||||
|
{
|
||||||
|
if (!args[1]) goto bad;
|
||||||
|
engine= *(++args);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
else if (strcmp(*args,"-text") == 0)
|
||||||
|
text=1;
|
||||||
|
else if (strcmp(*args,"-noout") == 0)
|
||||||
|
noout=1;
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (badarg)
|
||||||
|
{
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
bad:
|
||||||
|
#endif
|
||||||
|
BIO_printf(bio_err, "Usage pkeyparam [options]\n");
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err, "-text print parameters as text\n");
|
||||||
|
BIO_printf(bio_err, "-noout don't output encoded parameters\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (infile)
|
||||||
|
{
|
||||||
|
if (!(in = BIO_new_file (infile, "r")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Can't open input file %s\n", infile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
in = BIO_new_fp (stdin, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (outfile)
|
||||||
|
{
|
||||||
|
if (!(out = BIO_new_file (outfile, "w")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Can't open output file %s\n", outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
pkey = PEM_read_bio_Parameters(in, NULL);
|
||||||
|
if (!pkey)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!noout)
|
||||||
|
PEM_write_bio_Parameters(out,pkey);
|
||||||
|
|
||||||
|
if (text)
|
||||||
|
EVP_PKEY_print_params(out, pkey, 0, NULL);
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
end:
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
570
apps/pkeyutl.c
Normal file
570
apps/pkeyutl.c
Normal file
@@ -0,0 +1,570 @@
|
|||||||
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
|
* project 2006.
|
||||||
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
||||||
|
*
|
||||||
|
* Redistribution and use in source and binary forms, with or without
|
||||||
|
* modification, are permitted provided that the following conditions
|
||||||
|
* are met:
|
||||||
|
*
|
||||||
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer.
|
||||||
|
*
|
||||||
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
* notice, this list of conditions and the following disclaimer in
|
||||||
|
* the documentation and/or other materials provided with the
|
||||||
|
* distribution.
|
||||||
|
*
|
||||||
|
* 3. All advertising materials mentioning features or use of this
|
||||||
|
* software must display the following acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
||||||
|
* endorse or promote products derived from this software without
|
||||||
|
* prior written permission. For written permission, please contact
|
||||||
|
* licensing@OpenSSL.org.
|
||||||
|
*
|
||||||
|
* 5. Products derived from this software may not be called "OpenSSL"
|
||||||
|
* nor may "OpenSSL" appear in their names without prior written
|
||||||
|
* permission of the OpenSSL Project.
|
||||||
|
*
|
||||||
|
* 6. Redistributions of any form whatsoever must retain the following
|
||||||
|
* acknowledgment:
|
||||||
|
* "This product includes software developed by the OpenSSL Project
|
||||||
|
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
||||||
|
*
|
||||||
|
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
||||||
|
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||||
|
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
||||||
|
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
||||||
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
||||||
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
||||||
|
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||||||
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
||||||
|
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||||
|
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
* ====================================================================
|
||||||
|
*
|
||||||
|
* This product includes cryptographic software written by Eric Young
|
||||||
|
* (eay@cryptsoft.com). This product includes software written by Tim
|
||||||
|
* Hudson (tjh@cryptsoft.com).
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
#include "apps.h"
|
||||||
|
#include <string.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
#include <openssl/pem.h>
|
||||||
|
#include <openssl/evp.h>
|
||||||
|
|
||||||
|
#define KEY_PRIVKEY 1
|
||||||
|
#define KEY_PUBKEY 2
|
||||||
|
#define KEY_CERT 3
|
||||||
|
|
||||||
|
static void usage(void);
|
||||||
|
|
||||||
|
#undef PROG
|
||||||
|
|
||||||
|
#define PROG pkeyutl_main
|
||||||
|
|
||||||
|
static EVP_PKEY_CTX *init_ctx(int *pkeysize,
|
||||||
|
char *keyfile, int keyform, int key_type,
|
||||||
|
char *passargin, int pkey_op, ENGINE *e);
|
||||||
|
|
||||||
|
static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
|
||||||
|
const char *file);
|
||||||
|
|
||||||
|
static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
|
||||||
|
unsigned char *out, size_t *poutlen,
|
||||||
|
unsigned char *in, size_t inlen);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **);
|
||||||
|
|
||||||
|
int MAIN(int argc, char **argv)
|
||||||
|
{
|
||||||
|
BIO *in = NULL, *out = NULL;
|
||||||
|
char *infile = NULL, *outfile = NULL, *sigfile = NULL;
|
||||||
|
ENGINE *e = NULL;
|
||||||
|
int pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY;
|
||||||
|
int keyform = FORMAT_PEM, peerform = FORMAT_PEM;
|
||||||
|
char badarg = 0, rev = 0;
|
||||||
|
char hexdump = 0, asn1parse = 0;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
char *passargin = NULL;
|
||||||
|
int keysize = -1;
|
||||||
|
|
||||||
|
unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL;
|
||||||
|
size_t buf_outlen;
|
||||||
|
int buf_inlen = 0, siglen = -1;
|
||||||
|
|
||||||
|
int ret = 1, rv = -1;
|
||||||
|
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
|
||||||
|
if(!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
OpenSSL_add_all_algorithms();
|
||||||
|
|
||||||
|
while(argc >= 1)
|
||||||
|
{
|
||||||
|
if (!strcmp(*argv,"-in"))
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
infile= *(++argv);
|
||||||
|
}
|
||||||
|
else if (!strcmp(*argv,"-out"))
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
outfile= *(++argv);
|
||||||
|
}
|
||||||
|
else if (!strcmp(*argv,"-sigfile"))
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
sigfile= *(++argv);
|
||||||
|
}
|
||||||
|
else if(!strcmp(*argv, "-inkey"))
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
{
|
||||||
|
ctx = init_ctx(&keysize,
|
||||||
|
*(++argv), keyform, key_type,
|
||||||
|
passargin, pkey_op, e);
|
||||||
|
if (!ctx)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err,
|
||||||
|
"Error initializing context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else if (!strcmp(*argv,"-peerkey"))
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else if (!setup_peer(bio_err, ctx, peerform, *(++argv)))
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
else if (!strcmp(*argv,"-passin"))
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
passargin= *(++argv);
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-peerform") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
peerform=str2fmt(*(++argv));
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-keyform") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) badarg = 1;
|
||||||
|
keyform=str2fmt(*(++argv));
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if(!strcmp(*argv, "-engine"))
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
e = setup_engine(bio_err, *(++argv), 0);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
else if(!strcmp(*argv, "-pubin"))
|
||||||
|
key_type = KEY_PUBKEY;
|
||||||
|
else if(!strcmp(*argv, "-certin"))
|
||||||
|
key_type = KEY_CERT;
|
||||||
|
else if(!strcmp(*argv, "-asn1parse"))
|
||||||
|
asn1parse = 1;
|
||||||
|
else if(!strcmp(*argv, "-hexdump"))
|
||||||
|
hexdump = 1;
|
||||||
|
else if(!strcmp(*argv, "-sign"))
|
||||||
|
pkey_op = EVP_PKEY_OP_SIGN;
|
||||||
|
else if(!strcmp(*argv, "-verify"))
|
||||||
|
pkey_op = EVP_PKEY_OP_VERIFY;
|
||||||
|
else if(!strcmp(*argv, "-verifyrecover"))
|
||||||
|
pkey_op = EVP_PKEY_OP_VERIFYRECOVER;
|
||||||
|
else if(!strcmp(*argv, "-rev"))
|
||||||
|
rev = 1;
|
||||||
|
else if(!strcmp(*argv, "-encrypt"))
|
||||||
|
pkey_op = EVP_PKEY_OP_ENCRYPT;
|
||||||
|
else if(!strcmp(*argv, "-decrypt"))
|
||||||
|
pkey_op = EVP_PKEY_OP_DECRYPT;
|
||||||
|
else if(!strcmp(*argv, "-derive"))
|
||||||
|
pkey_op = EVP_PKEY_OP_DERIVE;
|
||||||
|
else if (strcmp(*argv,"-pkeyopt") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else if (!ctx)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err,
|
||||||
|
"-pkeyopt command before -inkey\n");
|
||||||
|
badarg = 1;
|
||||||
|
}
|
||||||
|
else if (pkey_ctrl_string(ctx, *(++argv)) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "parameter setting error\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else badarg = 1;
|
||||||
|
if(badarg)
|
||||||
|
{
|
||||||
|
usage();
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
{
|
||||||
|
usage();
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sigfile && (pkey_op != EVP_PKEY_OP_VERIFY))
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Signature file specified for non verify\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!sigfile && (pkey_op == EVP_PKEY_OP_VERIFY))
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "No signature file specified for verify\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* FIXME: seed PRNG only if needed */
|
||||||
|
app_RAND_load_file(NULL, bio_err, 0);
|
||||||
|
|
||||||
|
if (pkey_op != EVP_PKEY_OP_DERIVE)
|
||||||
|
{
|
||||||
|
if(infile)
|
||||||
|
{
|
||||||
|
if(!(in = BIO_new_file(infile, "rb")))
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err,
|
||||||
|
"Error Opening Input File\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
|
}
|
||||||
|
|
||||||
|
if(outfile)
|
||||||
|
{
|
||||||
|
if(!(out = BIO_new_file(outfile, "wb")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error Creating Output File\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
|
#ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (sigfile)
|
||||||
|
{
|
||||||
|
BIO *sigbio = BIO_new_file(sigfile, "rb");
|
||||||
|
if (!sigbio)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Can't open signature file %s\n",
|
||||||
|
sigfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
siglen = bio_to_mem(&sig, keysize * 10, sigbio);
|
||||||
|
BIO_free(sigbio);
|
||||||
|
if (siglen <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading signature data\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (in)
|
||||||
|
{
|
||||||
|
/* Read the input data */
|
||||||
|
buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
|
||||||
|
if(buf_inlen <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading input Data\n");
|
||||||
|
exit(1);
|
||||||
|
}
|
||||||
|
if(rev)
|
||||||
|
{
|
||||||
|
size_t i;
|
||||||
|
unsigned char ctmp;
|
||||||
|
size_t l = (size_t)buf_inlen;
|
||||||
|
for(i = 0; i < l/2; i++)
|
||||||
|
{
|
||||||
|
ctmp = buf_in[i];
|
||||||
|
buf_in[i] = buf_in[l - 1 - i];
|
||||||
|
buf_in[l - 1 - i] = ctmp;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if(pkey_op == EVP_PKEY_OP_VERIFY)
|
||||||
|
{
|
||||||
|
rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen,
|
||||||
|
buf_in, (size_t)buf_inlen);
|
||||||
|
if (rv == 0)
|
||||||
|
BIO_puts(out, "Signature Verification Failure\n");
|
||||||
|
else if (rv == 1)
|
||||||
|
BIO_puts(out, "Signature Verified Successfully\n");
|
||||||
|
if (rv >= 0)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
rv = do_keyop(ctx, pkey_op, NULL, (size_t *)&buf_outlen,
|
||||||
|
buf_in, (size_t)buf_inlen);
|
||||||
|
if (rv > 0)
|
||||||
|
{
|
||||||
|
buf_out = OPENSSL_malloc(buf_outlen);
|
||||||
|
if (!buf_out)
|
||||||
|
rv = -1;
|
||||||
|
else
|
||||||
|
rv = do_keyop(ctx, pkey_op,
|
||||||
|
buf_out, (size_t *)&buf_outlen,
|
||||||
|
buf_in, (size_t)buf_inlen);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if(rv <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Public Key operation error\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
ret = 0;
|
||||||
|
if(asn1parse)
|
||||||
|
{
|
||||||
|
if(!ASN1_parse_dump(out, buf_out, buf_outlen, 1, -1))
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
else if(hexdump)
|
||||||
|
BIO_dump(out, (char *)buf_out, buf_outlen);
|
||||||
|
else
|
||||||
|
BIO_write(out, buf_out, buf_outlen);
|
||||||
|
|
||||||
|
end:
|
||||||
|
if (ctx)
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
BIO_free(in);
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (buf_in)
|
||||||
|
OPENSSL_free(buf_in);
|
||||||
|
if (buf_out)
|
||||||
|
OPENSSL_free(buf_out);
|
||||||
|
if (sig)
|
||||||
|
OPENSSL_free(sig);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void usage()
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Usage: pkeyutl [options]\n");
|
||||||
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
|
BIO_printf(bio_err, "-sigfile file signature file (verify operation only)\n");
|
||||||
|
BIO_printf(bio_err, "-inkey file input key\n");
|
||||||
|
BIO_printf(bio_err, "-keyform arg private key format - default PEM\n");
|
||||||
|
BIO_printf(bio_err, "-pubin input is a public key\n");
|
||||||
|
BIO_printf(bio_err, "-certin input is a certificate carrying a public key\n");
|
||||||
|
BIO_printf(bio_err, "-pkeyopt X:Y public key options\n");
|
||||||
|
BIO_printf(bio_err, "-sign sign with private key\n");
|
||||||
|
BIO_printf(bio_err, "-verify verify with public key\n");
|
||||||
|
BIO_printf(bio_err, "-verifyrecover verify with public key, recover original data\n");
|
||||||
|
BIO_printf(bio_err, "-encrypt encrypt with public key\n");
|
||||||
|
BIO_printf(bio_err, "-decrypt decrypt with private key\n");
|
||||||
|
BIO_printf(bio_err, "-derive derive shared secret\n");
|
||||||
|
BIO_printf(bio_err, "-hexdump hex dump output\n");
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
#endif
|
||||||
|
BIO_printf(bio_err, "-passin arg pass phrase source\n");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static EVP_PKEY_CTX *init_ctx(int *pkeysize,
|
||||||
|
char *keyfile, int keyform, int key_type,
|
||||||
|
char *passargin, int pkey_op, ENGINE *e)
|
||||||
|
{
|
||||||
|
EVP_PKEY *pkey = NULL;
|
||||||
|
EVP_PKEY_CTX *ctx = NULL;
|
||||||
|
char *passin = NULL;
|
||||||
|
int rv = -1;
|
||||||
|
X509 *x;
|
||||||
|
if(((pkey_op == EVP_PKEY_OP_SIGN) || (pkey_op == EVP_PKEY_OP_DECRYPT)
|
||||||
|
|| (pkey_op == EVP_PKEY_OP_DERIVE))
|
||||||
|
&& (key_type != KEY_PRIVKEY))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "A private key is needed for this operation\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error getting password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
switch(key_type)
|
||||||
|
{
|
||||||
|
case KEY_PRIVKEY:
|
||||||
|
pkey = load_key(bio_err, keyfile, keyform, 0,
|
||||||
|
passin, e, "Private Key");
|
||||||
|
break;
|
||||||
|
|
||||||
|
case KEY_PUBKEY:
|
||||||
|
pkey = load_pubkey(bio_err, keyfile, keyform, 0,
|
||||||
|
NULL, e, "Public Key");
|
||||||
|
break;
|
||||||
|
|
||||||
|
case KEY_CERT:
|
||||||
|
x = load_cert(bio_err, keyfile, keyform,
|
||||||
|
NULL, e, "Certificate");
|
||||||
|
if(x)
|
||||||
|
{
|
||||||
|
pkey = X509_get_pubkey(x);
|
||||||
|
X509_free(x);
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
*pkeysize = EVP_PKEY_size(pkey);
|
||||||
|
|
||||||
|
if (!pkey)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
ctx = EVP_PKEY_CTX_new(pkey, e);
|
||||||
|
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
|
||||||
|
if (!ctx)
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
switch(pkey_op)
|
||||||
|
{
|
||||||
|
case EVP_PKEY_OP_SIGN:
|
||||||
|
rv = EVP_PKEY_sign_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_VERIFY:
|
||||||
|
rv = EVP_PKEY_verify_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_VERIFYRECOVER:
|
||||||
|
rv = EVP_PKEY_verify_recover_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_ENCRYPT:
|
||||||
|
rv = EVP_PKEY_encrypt_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DECRYPT:
|
||||||
|
rv = EVP_PKEY_decrypt_init(ctx);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DERIVE:
|
||||||
|
rv = EVP_PKEY_derive_init(ctx);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (rv <= 0)
|
||||||
|
{
|
||||||
|
EVP_PKEY_CTX_free(ctx);
|
||||||
|
ctx = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
end:
|
||||||
|
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
|
||||||
|
return ctx;
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
|
||||||
|
const char *file)
|
||||||
|
{
|
||||||
|
EVP_PKEY *peer = NULL;
|
||||||
|
int ret;
|
||||||
|
if (!ctx)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "-peerkey command before -inkey\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key");
|
||||||
|
|
||||||
|
if (!peer)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading peer key %s\n", file);
|
||||||
|
ERR_print_errors(err);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = EVP_PKEY_derive_set_peer(ctx, peer);
|
||||||
|
|
||||||
|
EVP_PKEY_free(peer);
|
||||||
|
if (ret <= 0)
|
||||||
|
ERR_print_errors(err);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
|
||||||
|
unsigned char *out, size_t *poutlen,
|
||||||
|
unsigned char *in, size_t inlen)
|
||||||
|
{
|
||||||
|
int rv = 0;
|
||||||
|
switch(pkey_op)
|
||||||
|
{
|
||||||
|
case EVP_PKEY_OP_VERIFYRECOVER:
|
||||||
|
rv = EVP_PKEY_verify_recover(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_SIGN:
|
||||||
|
rv = EVP_PKEY_sign(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_ENCRYPT:
|
||||||
|
rv = EVP_PKEY_encrypt(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DECRYPT:
|
||||||
|
rv = EVP_PKEY_decrypt(ctx, out, poutlen, in, inlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
case EVP_PKEY_OP_DERIVE:
|
||||||
|
rv = EVP_PKEY_derive(ctx, out, poutlen);
|
||||||
|
break;
|
||||||
|
|
||||||
|
}
|
||||||
|
return rv;
|
||||||
|
}
|
||||||
32
apps/prime.c
32
apps/prime.c
@@ -62,6 +62,9 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
int hex=0;
|
int hex=0;
|
||||||
int checks=20;
|
int checks=20;
|
||||||
|
int generate=0;
|
||||||
|
int bits=0;
|
||||||
|
int safe=0;
|
||||||
BIGNUM *bn=NULL;
|
BIGNUM *bn=NULL;
|
||||||
BIO *bio_out;
|
BIO *bio_out;
|
||||||
|
|
||||||
@@ -77,6 +80,15 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
if(!strcmp(*argv,"-hex"))
|
if(!strcmp(*argv,"-hex"))
|
||||||
hex=1;
|
hex=1;
|
||||||
|
else if(!strcmp(*argv,"-generate"))
|
||||||
|
generate=1;
|
||||||
|
else if(!strcmp(*argv,"-bits"))
|
||||||
|
if(--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
else
|
||||||
|
bits=atoi(*++argv);
|
||||||
|
else if(!strcmp(*argv,"-safe"))
|
||||||
|
safe=1;
|
||||||
else if(!strcmp(*argv,"-checks"))
|
else if(!strcmp(*argv,"-checks"))
|
||||||
if(--argc < 1)
|
if(--argc < 1)
|
||||||
goto bad;
|
goto bad;
|
||||||
@@ -91,7 +103,7 @@ int MAIN(int argc, char **argv)
|
|||||||
++argv;
|
++argv;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (argv[0] == NULL)
|
if (argv[0] == NULL && !generate)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"No prime specified\n");
|
BIO_printf(bio_err,"No prime specified\n");
|
||||||
goto bad;
|
goto bad;
|
||||||
@@ -108,6 +120,23 @@ int MAIN(int argc, char **argv)
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if(generate)
|
||||||
|
{
|
||||||
|
char *s;
|
||||||
|
|
||||||
|
if(!bits)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"Specifiy the number of bits.\n");
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
bn=BN_new();
|
||||||
|
BN_generate_prime_ex(bn,bits,safe,NULL,NULL,NULL);
|
||||||
|
s=hex ? BN_bn2hex(bn) : BN_bn2dec(bn);
|
||||||
|
BIO_printf(bio_out,"%s\n",s);
|
||||||
|
OPENSSL_free(s);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
if(hex)
|
if(hex)
|
||||||
BN_hex2bn(&bn,argv[0]);
|
BN_hex2bn(&bn,argv[0]);
|
||||||
else
|
else
|
||||||
@@ -116,6 +145,7 @@ int MAIN(int argc, char **argv)
|
|||||||
BN_print(bio_out,bn);
|
BN_print(bio_out,bn);
|
||||||
BIO_printf(bio_out," is %sprime\n",
|
BIO_printf(bio_out," is %sprime\n",
|
||||||
BN_is_prime_ex(bn,checks,NULL,NULL) ? "" : "not ");
|
BN_is_prime_ex(bn,checks,NULL,NULL) ? "" : "not ");
|
||||||
|
}
|
||||||
|
|
||||||
BN_free(bn);
|
BN_free(bn);
|
||||||
BIO_free_all(bio_out);
|
BIO_free_all(bio_out);
|
||||||
|
|||||||
19
apps/progs.h
19
apps/progs.h
@@ -22,6 +22,7 @@ extern int ecparam_main(int argc,char *argv[]);
|
|||||||
extern int x509_main(int argc,char *argv[]);
|
extern int x509_main(int argc,char *argv[]);
|
||||||
extern int genrsa_main(int argc,char *argv[]);
|
extern int genrsa_main(int argc,char *argv[]);
|
||||||
extern int gendsa_main(int argc,char *argv[]);
|
extern int gendsa_main(int argc,char *argv[]);
|
||||||
|
extern int genpkey_main(int argc,char *argv[]);
|
||||||
extern int s_server_main(int argc,char *argv[]);
|
extern int s_server_main(int argc,char *argv[]);
|
||||||
extern int s_client_main(int argc,char *argv[]);
|
extern int s_client_main(int argc,char *argv[]);
|
||||||
extern int speed_main(int argc,char *argv[]);
|
extern int speed_main(int argc,char *argv[]);
|
||||||
@@ -35,22 +36,30 @@ extern int ciphers_main(int argc,char *argv[]);
|
|||||||
extern int nseq_main(int argc,char *argv[]);
|
extern int nseq_main(int argc,char *argv[]);
|
||||||
extern int pkcs12_main(int argc,char *argv[]);
|
extern int pkcs12_main(int argc,char *argv[]);
|
||||||
extern int pkcs8_main(int argc,char *argv[]);
|
extern int pkcs8_main(int argc,char *argv[]);
|
||||||
|
extern int pkey_main(int argc,char *argv[]);
|
||||||
|
extern int pkeyparam_main(int argc,char *argv[]);
|
||||||
|
extern int pkeyutl_main(int argc,char *argv[]);
|
||||||
extern int spkac_main(int argc,char *argv[]);
|
extern int spkac_main(int argc,char *argv[]);
|
||||||
extern int smime_main(int argc,char *argv[]);
|
extern int smime_main(int argc,char *argv[]);
|
||||||
extern int rand_main(int argc,char *argv[]);
|
extern int rand_main(int argc,char *argv[]);
|
||||||
extern int engine_main(int argc,char *argv[]);
|
extern int engine_main(int argc,char *argv[]);
|
||||||
extern int ocsp_main(int argc,char *argv[]);
|
extern int ocsp_main(int argc,char *argv[]);
|
||||||
extern int prime_main(int argc,char *argv[]);
|
extern int prime_main(int argc,char *argv[]);
|
||||||
|
extern int ts_main(int argc,char *argv[]);
|
||||||
|
|
||||||
#define FUNC_TYPE_GENERAL 1
|
#define FUNC_TYPE_GENERAL 1
|
||||||
#define FUNC_TYPE_MD 2
|
#define FUNC_TYPE_MD 2
|
||||||
#define FUNC_TYPE_CIPHER 3
|
#define FUNC_TYPE_CIPHER 3
|
||||||
|
#define FUNC_TYPE_PKEY 4
|
||||||
|
#define FUNC_TYPE_MD_ALG 5
|
||||||
|
#define FUNC_TYPE_CIPHER_ALG 6
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int type;
|
int type;
|
||||||
const char *name;
|
const char *name;
|
||||||
int (*func)(int argc,char *argv[]);
|
int (*func)(int argc,char *argv[]);
|
||||||
} FUNCTION;
|
} FUNCTION;
|
||||||
|
DECLARE_LHASH_OF(FUNCTION);
|
||||||
|
|
||||||
FUNCTION functions[] = {
|
FUNCTION functions[] = {
|
||||||
{FUNC_TYPE_GENERAL,"verify",verify_main},
|
{FUNC_TYPE_GENERAL,"verify",verify_main},
|
||||||
@@ -96,6 +105,7 @@ FUNCTION functions[] = {
|
|||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
|
{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
|
||||||
#endif
|
#endif
|
||||||
|
{FUNC_TYPE_GENERAL,"genpkey",genpkey_main},
|
||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
||||||
{FUNC_TYPE_GENERAL,"s_server",s_server_main},
|
{FUNC_TYPE_GENERAL,"s_server",s_server_main},
|
||||||
#endif
|
#endif
|
||||||
@@ -123,14 +133,20 @@ FUNCTION functions[] = {
|
|||||||
{FUNC_TYPE_GENERAL,"pkcs12",pkcs12_main},
|
{FUNC_TYPE_GENERAL,"pkcs12",pkcs12_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"pkcs8",pkcs8_main},
|
{FUNC_TYPE_GENERAL,"pkcs8",pkcs8_main},
|
||||||
|
{FUNC_TYPE_GENERAL,"pkey",pkey_main},
|
||||||
|
{FUNC_TYPE_GENERAL,"pkeyparam",pkeyparam_main},
|
||||||
|
{FUNC_TYPE_GENERAL,"pkeyutl",pkeyutl_main},
|
||||||
{FUNC_TYPE_GENERAL,"spkac",spkac_main},
|
{FUNC_TYPE_GENERAL,"spkac",spkac_main},
|
||||||
{FUNC_TYPE_GENERAL,"smime",smime_main},
|
{FUNC_TYPE_GENERAL,"smime",smime_main},
|
||||||
{FUNC_TYPE_GENERAL,"rand",rand_main},
|
{FUNC_TYPE_GENERAL,"rand",rand_main},
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
{FUNC_TYPE_GENERAL,"engine",engine_main},
|
{FUNC_TYPE_GENERAL,"engine",engine_main},
|
||||||
#endif
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_OCSP
|
||||||
{FUNC_TYPE_GENERAL,"ocsp",ocsp_main},
|
{FUNC_TYPE_GENERAL,"ocsp",ocsp_main},
|
||||||
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"prime",prime_main},
|
{FUNC_TYPE_GENERAL,"prime",prime_main},
|
||||||
|
{FUNC_TYPE_GENERAL,"ts",ts_main},
|
||||||
#ifndef OPENSSL_NO_MD2
|
#ifndef OPENSSL_NO_MD2
|
||||||
{FUNC_TYPE_MD,"md2",dgst_main},
|
{FUNC_TYPE_MD,"md2",dgst_main},
|
||||||
#endif
|
#endif
|
||||||
@@ -189,6 +205,9 @@ FUNCTION functions[] = {
|
|||||||
{FUNC_TYPE_CIPHER,"camellia-256-ecb",enc_main},
|
{FUNC_TYPE_CIPHER,"camellia-256-ecb",enc_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_CIPHER,"base64",enc_main},
|
{FUNC_TYPE_CIPHER,"base64",enc_main},
|
||||||
|
#ifdef ZLIB
|
||||||
|
{FUNC_TYPE_CIPHER,"zlib",enc_main},
|
||||||
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des",enc_main},
|
{FUNC_TYPE_CIPHER,"des",enc_main},
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -13,12 +13,16 @@ print <<'EOF';
|
|||||||
#define FUNC_TYPE_GENERAL 1
|
#define FUNC_TYPE_GENERAL 1
|
||||||
#define FUNC_TYPE_MD 2
|
#define FUNC_TYPE_MD 2
|
||||||
#define FUNC_TYPE_CIPHER 3
|
#define FUNC_TYPE_CIPHER 3
|
||||||
|
#define FUNC_TYPE_PKEY 4
|
||||||
|
#define FUNC_TYPE_MD_ALG 5
|
||||||
|
#define FUNC_TYPE_CIPHER_ALG 6
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int type;
|
int type;
|
||||||
const char *name;
|
const char *name;
|
||||||
int (*func)(int argc,char *argv[]);
|
int (*func)(int argc,char *argv[]);
|
||||||
} FUNCTION;
|
} FUNCTION;
|
||||||
|
DECLARE_LHASH_OF(FUNCTION);
|
||||||
|
|
||||||
FUNCTION functions[] = {
|
FUNCTION functions[] = {
|
||||||
EOF
|
EOF
|
||||||
@@ -45,6 +49,8 @@ foreach (@ARGV)
|
|||||||
{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
|
{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
|
||||||
elsif ( ($_ =~ /^cms$/))
|
elsif ( ($_ =~ /^cms$/))
|
||||||
{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
|
{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
|
||||||
|
elsif ( ($_ =~ /^ocsp$/))
|
||||||
|
{ print "#ifndef OPENSSL_NO_OCSP\n${str}#endif\n"; }
|
||||||
else
|
else
|
||||||
{ print $str; }
|
{ print $str; }
|
||||||
}
|
}
|
||||||
@@ -62,7 +68,7 @@ foreach (
|
|||||||
"camellia-128-cbc", "camellia-128-ecb",
|
"camellia-128-cbc", "camellia-128-ecb",
|
||||||
"camellia-192-cbc", "camellia-192-ecb",
|
"camellia-192-cbc", "camellia-192-ecb",
|
||||||
"camellia-256-cbc", "camellia-256-ecb",
|
"camellia-256-cbc", "camellia-256-ecb",
|
||||||
"base64",
|
"base64", "zlib",
|
||||||
"des", "des3", "desx", "idea", "seed", "rc4", "rc4-40",
|
"des", "des3", "desx", "idea", "seed", "rc4", "rc4-40",
|
||||||
"rc2", "bf", "cast", "rc5",
|
"rc2", "bf", "cast", "rc5",
|
||||||
"des-ecb", "des-ede", "des-ede3",
|
"des-ecb", "des-ede", "des-ede3",
|
||||||
@@ -89,6 +95,7 @@ foreach (
|
|||||||
elsif ($_ =~ /bf/) { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
|
elsif ($_ =~ /bf/) { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
|
elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /rc5/) { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
|
elsif ($_ =~ /rc5/) { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
|
||||||
|
elsif ($_ =~ /zlib/) { $t="#ifdef ZLIB\n${t}#endif\n"; }
|
||||||
print $t;
|
print $t;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
25
apps/rand.c
25
apps/rand.c
@@ -68,7 +68,8 @@
|
|||||||
|
|
||||||
/* -out file - write to file
|
/* -out file - write to file
|
||||||
* -rand file:file - PRNG seed files
|
* -rand file:file - PRNG seed files
|
||||||
* -base64 - encode output
|
* -base64 - base64 encode output
|
||||||
|
* -hex - hex encode output
|
||||||
* num - write 'num' bytes
|
* num - write 'num' bytes
|
||||||
*/
|
*/
|
||||||
|
|
||||||
@@ -84,6 +85,7 @@ int MAIN(int argc, char **argv)
|
|||||||
char *outfile = NULL;
|
char *outfile = NULL;
|
||||||
char *inrand = NULL;
|
char *inrand = NULL;
|
||||||
int base64 = 0;
|
int base64 = 0;
|
||||||
|
int hex = 0;
|
||||||
BIO *out = NULL;
|
BIO *out = NULL;
|
||||||
int num = -1;
|
int num = -1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
@@ -133,6 +135,13 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
badopt = 1;
|
badopt = 1;
|
||||||
}
|
}
|
||||||
|
else if (strcmp(argv[i], "-hex") == 0)
|
||||||
|
{
|
||||||
|
if (!hex)
|
||||||
|
hex = 1;
|
||||||
|
else
|
||||||
|
badopt = 1;
|
||||||
|
}
|
||||||
else if (isdigit((unsigned char)argv[i][0]))
|
else if (isdigit((unsigned char)argv[i][0]))
|
||||||
{
|
{
|
||||||
if (num < 0)
|
if (num < 0)
|
||||||
@@ -148,6 +157,9 @@ int MAIN(int argc, char **argv)
|
|||||||
badopt = 1;
|
badopt = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (hex && base64)
|
||||||
|
badopt = 1;
|
||||||
|
|
||||||
if (num < 0)
|
if (num < 0)
|
||||||
badopt = 1;
|
badopt = 1;
|
||||||
|
|
||||||
@@ -160,7 +172,8 @@ int MAIN(int argc, char **argv)
|
|||||||
BIO_printf(bio_err, "-engine e - use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err, "-engine e - use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
#endif
|
||||||
BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
||||||
BIO_printf(bio_err, "-base64 - encode output\n");
|
BIO_printf(bio_err, "-base64 - base64 encode output\n");
|
||||||
|
BIO_printf(bio_err, "-hex - hex encode output\n");
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -210,9 +223,17 @@ int MAIN(int argc, char **argv)
|
|||||||
r = RAND_bytes(buf, chunk);
|
r = RAND_bytes(buf, chunk);
|
||||||
if (r <= 0)
|
if (r <= 0)
|
||||||
goto err;
|
goto err;
|
||||||
|
if (!hex)
|
||||||
BIO_write(out, buf, chunk);
|
BIO_write(out, buf, chunk);
|
||||||
|
else
|
||||||
|
{
|
||||||
|
for (i = 0; i < chunk; i++)
|
||||||
|
BIO_printf(out, "%02x", buf[i]);
|
||||||
|
}
|
||||||
num -= chunk;
|
num -= chunk;
|
||||||
}
|
}
|
||||||
|
if (hex)
|
||||||
|
BIO_puts(out, "\n");
|
||||||
(void)BIO_flush(out);
|
(void)BIO_flush(out);
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
app_RAND_write_file(NULL, bio_err);
|
||||||
|
|||||||
493
apps/req.c
493
apps/req.c
@@ -141,39 +141,33 @@ static int add_attribute_object(X509_REQ *req, char *text, const char *def,
|
|||||||
int n_max, unsigned long chtype);
|
int n_max, unsigned long chtype);
|
||||||
static int add_DN_object(X509_NAME *n, char *text, const char *def, char *value,
|
static int add_DN_object(X509_NAME *n, char *text, const char *def, char *value,
|
||||||
int nid,int n_min,int n_max, unsigned long chtype, int mval);
|
int nid,int n_min,int n_max, unsigned long chtype, int mval);
|
||||||
#ifndef OPENSSL_NO_RSA
|
static int genpkey_cb(EVP_PKEY_CTX *ctx);
|
||||||
static int MS_CALLBACK req_cb(int p, int n, BN_GENCB *cb);
|
|
||||||
#endif
|
|
||||||
static int req_check_len(int len,int n_min,int n_max);
|
static int req_check_len(int len,int n_min,int n_max);
|
||||||
static int check_end(const char *str, const char *end);
|
static int check_end(const char *str, const char *end);
|
||||||
|
static EVP_PKEY_CTX *set_keygen_ctx(BIO *err, const char *gstr, int *pkey_type,
|
||||||
|
long *pkeylen, char **palgnam,
|
||||||
|
ENGINE *keygen_engine);
|
||||||
#ifndef MONOLITH
|
#ifndef MONOLITH
|
||||||
static char *default_config_file=NULL;
|
static char *default_config_file=NULL;
|
||||||
#endif
|
#endif
|
||||||
static CONF *req_conf=NULL;
|
static CONF *req_conf=NULL;
|
||||||
static int batch=0;
|
static int batch=0;
|
||||||
|
|
||||||
#define TYPE_RSA 1
|
|
||||||
#define TYPE_DSA 2
|
|
||||||
#define TYPE_DH 3
|
|
||||||
#define TYPE_EC 4
|
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL, *gen_eng = NULL;
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
DSA *dsa_params=NULL;
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
EC_KEY *ec_params = NULL;
|
|
||||||
#endif
|
|
||||||
unsigned long nmflag = 0, reqflag = 0;
|
unsigned long nmflag = 0, reqflag = 0;
|
||||||
int ex=1,x509=0,days=30;
|
int ex=1,x509=0,days=30;
|
||||||
X509 *x509ss=NULL;
|
X509 *x509ss=NULL;
|
||||||
X509_REQ *req=NULL;
|
X509_REQ *req=NULL;
|
||||||
|
EVP_PKEY_CTX *genctx = NULL;
|
||||||
|
const char *keyalg = NULL;
|
||||||
|
char *keyalgstr = NULL;
|
||||||
|
STACK_OF(STRING) *pkeyopts = NULL;
|
||||||
EVP_PKEY *pkey=NULL;
|
EVP_PKEY *pkey=NULL;
|
||||||
int i=0,badops=0,newreq=0,verbose=0,pkey_type=TYPE_RSA;
|
int i=0,badops=0,newreq=0,verbose=0,pkey_type=-1;
|
||||||
long newkey = -1;
|
long newkey = -1;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in=NULL,*out=NULL;
|
||||||
int informat,outformat,verify=0,noout=0,text=0,keyform=FORMAT_PEM;
|
int informat,outformat,verify=0,noout=0,text=0,keyform=FORMAT_PEM;
|
||||||
@@ -193,7 +187,7 @@ int MAIN(int argc, char **argv)
|
|||||||
char *p;
|
char *p;
|
||||||
char *subj = NULL;
|
char *subj = NULL;
|
||||||
int multirdn = 0;
|
int multirdn = 0;
|
||||||
const EVP_MD *md_alg=NULL,*digest=EVP_sha1();
|
const EVP_MD *md_alg=NULL,*digest=NULL;
|
||||||
unsigned long chtype = MBSTRING_ASC;
|
unsigned long chtype = MBSTRING_ASC;
|
||||||
#ifndef MONOLITH
|
#ifndef MONOLITH
|
||||||
char *to_free;
|
char *to_free;
|
||||||
@@ -236,6 +230,16 @@ int MAIN(int argc, char **argv)
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
engine= *(++argv);
|
engine= *(++argv);
|
||||||
}
|
}
|
||||||
|
else if (strcmp(*argv,"-keygen_engine") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) goto bad;
|
||||||
|
gen_eng = ENGINE_by_id(*(++argv));
|
||||||
|
if (gen_eng == NULL)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Can't find keygen engine %s\n", *argv);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
else if (strcmp(*argv,"-key") == 0)
|
else if (strcmp(*argv,"-key") == 0)
|
||||||
{
|
{
|
||||||
@@ -292,126 +296,20 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-newkey") == 0)
|
else if (strcmp(*argv,"-newkey") == 0)
|
||||||
{
|
{
|
||||||
int is_numeric;
|
if (--argc < 1)
|
||||||
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
p= *(++argv);
|
|
||||||
is_numeric = p[0] >= '0' && p[0] <= '9';
|
|
||||||
if (strncmp("rsa:",p,4) == 0 || is_numeric)
|
|
||||||
{
|
|
||||||
pkey_type=TYPE_RSA;
|
|
||||||
if(!is_numeric)
|
|
||||||
p+=4;
|
|
||||||
newkey= atoi(p);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (strncmp("dsa:",p,4) == 0)
|
|
||||||
{
|
|
||||||
X509 *xtmp=NULL;
|
|
||||||
EVP_PKEY *dtmp;
|
|
||||||
|
|
||||||
pkey_type=TYPE_DSA;
|
|
||||||
p+=4;
|
|
||||||
if ((in=BIO_new_file(p,"r")) == NULL)
|
|
||||||
{
|
|
||||||
perror(p);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if ((dsa_params=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL)
|
|
||||||
{
|
|
||||||
ERR_clear_error();
|
|
||||||
(void)BIO_reset(in);
|
|
||||||
if ((xtmp=PEM_read_bio_X509(in,NULL,NULL,NULL)) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load DSA parameters from file\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((dtmp=X509_get_pubkey(xtmp)) == NULL) goto end;
|
|
||||||
if (dtmp->type == EVP_PKEY_DSA)
|
|
||||||
dsa_params=DSAparams_dup(dtmp->pkey.dsa);
|
|
||||||
EVP_PKEY_free(dtmp);
|
|
||||||
X509_free(xtmp);
|
|
||||||
if (dsa_params == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"Certificate does not contain DSA parameters\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
BIO_free(in);
|
|
||||||
in=NULL;
|
|
||||||
newkey=BN_num_bits(dsa_params->p);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (strncmp("ec:",p,3) == 0)
|
|
||||||
{
|
|
||||||
X509 *xtmp=NULL;
|
|
||||||
EVP_PKEY *dtmp;
|
|
||||||
EC_GROUP *group;
|
|
||||||
|
|
||||||
pkey_type=TYPE_EC;
|
|
||||||
p+=3;
|
|
||||||
if ((in=BIO_new_file(p,"r")) == NULL)
|
|
||||||
{
|
|
||||||
perror(p);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if ((ec_params = EC_KEY_new()) == NULL)
|
|
||||||
goto end;
|
|
||||||
group = PEM_read_bio_ECPKParameters(in, NULL, NULL, NULL);
|
|
||||||
if (group == NULL)
|
|
||||||
{
|
|
||||||
EC_KEY_free(ec_params);
|
|
||||||
ERR_clear_error();
|
|
||||||
(void)BIO_reset(in);
|
|
||||||
if ((xtmp=PEM_read_bio_X509(in,NULL,NULL,NULL)) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load EC parameters from file\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((dtmp=X509_get_pubkey(xtmp))==NULL)
|
|
||||||
goto end;
|
|
||||||
if (dtmp->type == EVP_PKEY_EC)
|
|
||||||
ec_params = EC_KEY_dup(dtmp->pkey.ec);
|
|
||||||
EVP_PKEY_free(dtmp);
|
|
||||||
X509_free(xtmp);
|
|
||||||
if (ec_params == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"Certificate does not contain EC parameters\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (EC_KEY_set_group(ec_params, group) == 0)
|
|
||||||
goto end;
|
|
||||||
EC_GROUP_free(group);
|
|
||||||
}
|
|
||||||
|
|
||||||
BIO_free(in);
|
|
||||||
in=NULL;
|
|
||||||
newkey = EC_GROUP_get_degree(EC_KEY_get0_group(ec_params));
|
|
||||||
}
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_DH
|
|
||||||
if (strncmp("dh:",p,4) == 0)
|
|
||||||
{
|
|
||||||
pkey_type=TYPE_DH;
|
|
||||||
p+=3;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
{
|
|
||||||
goto bad;
|
goto bad;
|
||||||
}
|
keyalg = *(++argv);
|
||||||
|
|
||||||
newreq=1;
|
newreq=1;
|
||||||
}
|
}
|
||||||
|
else if (strcmp(*argv,"-pkeyopt") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
if (!pkeyopts)
|
||||||
|
pkeyopts = sk_STRING_new_null();
|
||||||
|
if (!pkeyopts || !sk_STRING_push(pkeyopts, *(++argv)))
|
||||||
|
goto bad;
|
||||||
|
}
|
||||||
else if (strcmp(*argv,"-batch") == 0)
|
else if (strcmp(*argv,"-batch") == 0)
|
||||||
batch=1;
|
batch=1;
|
||||||
else if (strcmp(*argv,"-newhdr") == 0)
|
else if (strcmp(*argv,"-newhdr") == 0)
|
||||||
@@ -467,11 +365,6 @@ int MAIN(int argc, char **argv)
|
|||||||
serial = s2i_ASN1_INTEGER(NULL, *(++argv));
|
serial = s2i_ASN1_INTEGER(NULL, *(++argv));
|
||||||
if (!serial) goto bad;
|
if (!serial) goto bad;
|
||||||
}
|
}
|
||||||
else if ((md_alg=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
|
|
||||||
{
|
|
||||||
/* ok */
|
|
||||||
digest=md_alg;
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-extensions") == 0)
|
else if (strcmp(*argv,"-extensions") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
@@ -482,6 +375,11 @@ int MAIN(int argc, char **argv)
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
req_exts = *(++argv);
|
req_exts = *(++argv);
|
||||||
}
|
}
|
||||||
|
else if ((md_alg=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
|
||||||
|
{
|
||||||
|
/* ok */
|
||||||
|
digest=md_alg;
|
||||||
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
||||||
@@ -730,9 +628,6 @@ bad:
|
|||||||
|
|
||||||
if (newreq && (pkey == NULL))
|
if (newreq && (pkey == NULL))
|
||||||
{
|
{
|
||||||
#ifndef OPENSSL_NO_RSA
|
|
||||||
BN_GENCB cb;
|
|
||||||
#endif
|
|
||||||
char *randfile = NCONF_get_string(req_conf,SECTION,"RANDFILE");
|
char *randfile = NCONF_get_string(req_conf,SECTION,"RANDFILE");
|
||||||
if (randfile == NULL)
|
if (randfile == NULL)
|
||||||
ERR_clear_error();
|
ERR_clear_error();
|
||||||
@@ -740,64 +635,69 @@ bad:
|
|||||||
if (inrand)
|
if (inrand)
|
||||||
app_RAND_load_files(inrand);
|
app_RAND_load_files(inrand);
|
||||||
|
|
||||||
|
if (keyalg)
|
||||||
|
{
|
||||||
|
genctx = set_keygen_ctx(bio_err, keyalg, &pkey_type, &newkey,
|
||||||
|
&keyalgstr, gen_eng);
|
||||||
|
if (!genctx)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if (newkey <= 0)
|
if (newkey <= 0)
|
||||||
{
|
{
|
||||||
if (!NCONF_get_number(req_conf,SECTION,BITS, &newkey))
|
if (!NCONF_get_number(req_conf,SECTION,BITS, &newkey))
|
||||||
newkey=DEFAULT_KEY_LENGTH;
|
newkey=DEFAULT_KEY_LENGTH;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (newkey < MIN_KEY_LENGTH && (pkey_type == TYPE_RSA || pkey_type == TYPE_DSA))
|
if (newkey < MIN_KEY_LENGTH && (pkey_type == EVP_PKEY_RSA || pkey_type == EVP_PKEY_DSA))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"private key length is too short,\n");
|
BIO_printf(bio_err,"private key length is too short,\n");
|
||||||
BIO_printf(bio_err,"it needs to be at least %d bits, not %ld\n",MIN_KEY_LENGTH,newkey);
|
BIO_printf(bio_err,"it needs to be at least %d bits, not %ld\n",MIN_KEY_LENGTH,newkey);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!genctx)
|
||||||
|
{
|
||||||
|
genctx = set_keygen_ctx(bio_err, NULL, &pkey_type, &newkey,
|
||||||
|
&keyalgstr, gen_eng);
|
||||||
|
if (!genctx)
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (pkeyopts)
|
||||||
|
{
|
||||||
|
char *genopt;
|
||||||
|
for (i = 0; i < sk_STRING_num(pkeyopts); i++)
|
||||||
|
{
|
||||||
|
genopt = sk_STRING_value(pkeyopts, i);
|
||||||
|
if (pkey_ctrl_string(genctx, genopt) <= 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"parameter error \"%s\"\n",
|
||||||
|
genopt);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
BIO_printf(bio_err,"Generating a %ld bit %s private key\n",
|
BIO_printf(bio_err,"Generating a %ld bit %s private key\n",
|
||||||
newkey,(pkey_type == TYPE_RSA)?"RSA":
|
newkey, keyalgstr);
|
||||||
(pkey_type == TYPE_DSA)?"DSA":"EC");
|
|
||||||
|
|
||||||
if ((pkey=EVP_PKEY_new()) == NULL) goto end;
|
EVP_PKEY_CTX_set_cb(genctx, genpkey_cb);
|
||||||
|
EVP_PKEY_CTX_set_app_data(genctx, bio_err);
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_RSA
|
if (EVP_PKEY_keygen(genctx, &pkey) <= 0)
|
||||||
BN_GENCB_set(&cb, req_cb, bio_err);
|
|
||||||
if (pkey_type == TYPE_RSA)
|
|
||||||
{
|
{
|
||||||
RSA *rsa = RSA_new();
|
BIO_puts(bio_err, "Error Generating Key\n");
|
||||||
BIGNUM *bn = BN_new();
|
|
||||||
if(!bn || !rsa || !BN_set_word(bn, 0x10001) ||
|
|
||||||
!RSA_generate_key_ex(rsa, newkey, bn, &cb) ||
|
|
||||||
!EVP_PKEY_assign_RSA(pkey, rsa))
|
|
||||||
{
|
|
||||||
if(bn) BN_free(bn);
|
|
||||||
if(rsa) RSA_free(rsa);
|
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
BN_free(bn);
|
|
||||||
}
|
EVP_PKEY_CTX_free(genctx);
|
||||||
else
|
genctx = NULL;
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (pkey_type == TYPE_DSA)
|
|
||||||
{
|
|
||||||
if (!DSA_generate_key(dsa_params)) goto end;
|
|
||||||
if (!EVP_PKEY_assign_DSA(pkey,dsa_params)) goto end;
|
|
||||||
dsa_params=NULL;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (pkey_type == TYPE_EC)
|
|
||||||
{
|
|
||||||
if (!EC_KEY_generate_key(ec_params)) goto end;
|
|
||||||
if (!EVP_PKEY_assign_EC_KEY(pkey, ec_params))
|
|
||||||
goto end;
|
|
||||||
ec_params = NULL;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
app_RAND_write_file(randfile, bio_err);
|
app_RAND_write_file(randfile, bio_err);
|
||||||
|
|
||||||
if (pkey == NULL) goto end;
|
|
||||||
|
|
||||||
if (keyout == NULL)
|
if (keyout == NULL)
|
||||||
{
|
{
|
||||||
keyout=NCONF_get_string(req_conf,SECTION,KEYFILE);
|
keyout=NCONF_get_string(req_conf,SECTION,KEYFILE);
|
||||||
@@ -895,14 +795,7 @@ loop:
|
|||||||
BIO_printf(bio_err,"you need to specify a private key\n");
|
BIO_printf(bio_err,"you need to specify a private key\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (pkey->type == EVP_PKEY_DSA)
|
|
||||||
digest=EVP_dss1();
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (pkey->type == EVP_PKEY_EC)
|
|
||||||
digest=EVP_ecdsa();
|
|
||||||
#endif
|
|
||||||
if (req == NULL)
|
if (req == NULL)
|
||||||
{
|
{
|
||||||
req=X509_REQ_new();
|
req=X509_REQ_new();
|
||||||
@@ -945,7 +838,7 @@ loop:
|
|||||||
|
|
||||||
if (!X509_set_issuer_name(x509ss, X509_REQ_get_subject_name(req))) goto end;
|
if (!X509_set_issuer_name(x509ss, X509_REQ_get_subject_name(req))) goto end;
|
||||||
if (!X509_gmtime_adj(X509_get_notBefore(x509ss),0)) goto end;
|
if (!X509_gmtime_adj(X509_get_notBefore(x509ss),0)) goto end;
|
||||||
if (!X509_gmtime_adj(X509_get_notAfter(x509ss), (long)60*60*24*days)) goto end;
|
if (!X509_time_adj_ex(X509_get_notAfter(x509ss), days, 0, NULL)) goto end;
|
||||||
if (!X509_set_subject_name(x509ss, X509_REQ_get_subject_name(req))) goto end;
|
if (!X509_set_subject_name(x509ss, X509_REQ_get_subject_name(req))) goto end;
|
||||||
tmppkey = X509_REQ_get_pubkey(req);
|
tmppkey = X509_REQ_get_pubkey(req);
|
||||||
if (!tmppkey || !X509_set_pubkey(x509ss,tmppkey)) goto end;
|
if (!tmppkey || !X509_set_pubkey(x509ss,tmppkey)) goto end;
|
||||||
@@ -967,8 +860,11 @@ loop:
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (!(i=X509_sign(x509ss,pkey,digest)))
|
if (!(i=X509_sign(x509ss,pkey,digest)))
|
||||||
|
{
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
X509V3_CTX ext_ctx;
|
X509V3_CTX ext_ctx;
|
||||||
@@ -988,9 +884,12 @@ loop:
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (!(i=X509_REQ_sign(req,pkey,digest)))
|
if (!(i=X509_REQ_sign(req,pkey,digest)))
|
||||||
|
{
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (subj && x509)
|
if (subj && x509)
|
||||||
{
|
{
|
||||||
@@ -1125,7 +1024,7 @@ loop:
|
|||||||
}
|
}
|
||||||
fprintf(stdout,"Modulus=");
|
fprintf(stdout,"Modulus=");
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
if (tpubkey->type == EVP_PKEY_RSA)
|
if (EVP_PKEY_base_id(tpubkey) == EVP_PKEY_RSA)
|
||||||
BN_print(out,tpubkey->pkey.rsa->n);
|
BN_print(out,tpubkey->pkey.rsa->n);
|
||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
@@ -1181,18 +1080,22 @@ end:
|
|||||||
BIO_free(in);
|
BIO_free(in);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
EVP_PKEY_free(pkey);
|
EVP_PKEY_free(pkey);
|
||||||
|
if (genctx)
|
||||||
|
EVP_PKEY_CTX_free(genctx);
|
||||||
|
if (pkeyopts)
|
||||||
|
sk_STRING_free(pkeyopts);
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (gen_eng)
|
||||||
|
ENGINE_free(gen_eng);
|
||||||
|
#endif
|
||||||
|
if (keyalgstr)
|
||||||
|
OPENSSL_free(keyalgstr);
|
||||||
X509_REQ_free(req);
|
X509_REQ_free(req);
|
||||||
X509_free(x509ss);
|
X509_free(x509ss);
|
||||||
ASN1_INTEGER_free(serial);
|
ASN1_INTEGER_free(serial);
|
||||||
if(passargin && passin) OPENSSL_free(passin);
|
if(passargin && passin) OPENSSL_free(passin);
|
||||||
if(passargout && passout) OPENSSL_free(passout);
|
if(passargout && passout) OPENSSL_free(passout);
|
||||||
OBJ_cleanup();
|
OBJ_cleanup();
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (dsa_params != NULL) DSA_free(dsa_params);
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (ec_params != NULL) EC_KEY_free(ec_params);
|
|
||||||
#endif
|
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ex);
|
OPENSSL_EXIT(ex);
|
||||||
}
|
}
|
||||||
@@ -1639,24 +1542,6 @@ err:
|
|||||||
return(0);
|
return(0);
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_RSA
|
|
||||||
static int MS_CALLBACK req_cb(int p, int n, BN_GENCB *cb)
|
|
||||||
{
|
|
||||||
char c='*';
|
|
||||||
|
|
||||||
if (p == 0) c='.';
|
|
||||||
if (p == 1) c='+';
|
|
||||||
if (p == 2) c='*';
|
|
||||||
if (p == 3) c='\n';
|
|
||||||
BIO_write(cb->arg,&c,1);
|
|
||||||
(void)BIO_flush(cb->arg);
|
|
||||||
#ifdef LINT
|
|
||||||
p=n;
|
|
||||||
#endif
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
static int req_check_len(int len, int n_min, int n_max)
|
static int req_check_len(int len, int n_min, int n_max)
|
||||||
{
|
{
|
||||||
if ((n_min > 0) && (len < n_min))
|
if ((n_min > 0) && (len < n_min))
|
||||||
@@ -1683,3 +1568,183 @@ static int check_end(const char *str, const char *end)
|
|||||||
tmp = str + slen - elen;
|
tmp = str + slen - elen;
|
||||||
return strcmp(tmp, end);
|
return strcmp(tmp, end);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static EVP_PKEY_CTX *set_keygen_ctx(BIO *err, const char *gstr, int *pkey_type,
|
||||||
|
long *pkeylen, char **palgnam,
|
||||||
|
ENGINE *keygen_engine)
|
||||||
|
{
|
||||||
|
EVP_PKEY_CTX *gctx = NULL;
|
||||||
|
EVP_PKEY *param = NULL;
|
||||||
|
long keylen = -1;
|
||||||
|
BIO *pbio = NULL;
|
||||||
|
const char *paramfile = NULL;
|
||||||
|
|
||||||
|
if (gstr == NULL)
|
||||||
|
{
|
||||||
|
*pkey_type = EVP_PKEY_RSA;
|
||||||
|
keylen = *pkeylen;
|
||||||
|
}
|
||||||
|
else if (gstr[0] >= '0' && gstr[0] <= '9')
|
||||||
|
{
|
||||||
|
*pkey_type = EVP_PKEY_RSA;
|
||||||
|
keylen = atol(gstr);
|
||||||
|
*pkeylen = keylen;
|
||||||
|
}
|
||||||
|
else if (!strncmp(gstr, "param:", 6))
|
||||||
|
paramfile = gstr + 6;
|
||||||
|
else
|
||||||
|
{
|
||||||
|
const char *p = strchr(gstr, ':');
|
||||||
|
int len;
|
||||||
|
ENGINE *tmpeng;
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
|
||||||
|
if (p)
|
||||||
|
len = p - gstr;
|
||||||
|
else
|
||||||
|
len = strlen(gstr);
|
||||||
|
/* The lookup of a the string will cover all engines so
|
||||||
|
* keep a note of the implementation.
|
||||||
|
*/
|
||||||
|
|
||||||
|
ameth = EVP_PKEY_asn1_find_str(&tmpeng, gstr, len);
|
||||||
|
|
||||||
|
if (!ameth)
|
||||||
|
{
|
||||||
|
BIO_printf(err, "Unknown algorithm %.*s\n", len, gstr);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
EVP_PKEY_asn1_get0_info(NULL, pkey_type, NULL, NULL, NULL,
|
||||||
|
ameth);
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (tmpeng)
|
||||||
|
ENGINE_finish(tmpeng);
|
||||||
|
#endif
|
||||||
|
if (*pkey_type == EVP_PKEY_RSA)
|
||||||
|
{
|
||||||
|
if (p)
|
||||||
|
{
|
||||||
|
keylen = atol(p + 1);
|
||||||
|
*pkeylen = keylen;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else if (p)
|
||||||
|
paramfile = p + 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (paramfile)
|
||||||
|
{
|
||||||
|
pbio = BIO_new_file(paramfile, "r");
|
||||||
|
if (!pbio)
|
||||||
|
{
|
||||||
|
BIO_printf(err, "Can't open parameter file %s\n",
|
||||||
|
paramfile);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
param = PEM_read_bio_Parameters(pbio, NULL);
|
||||||
|
|
||||||
|
if (!param)
|
||||||
|
{
|
||||||
|
X509 *x;
|
||||||
|
(void)BIO_reset(pbio);
|
||||||
|
x = PEM_read_bio_X509(pbio, NULL, NULL, NULL);
|
||||||
|
if (x)
|
||||||
|
{
|
||||||
|
param = X509_get_pubkey(x);
|
||||||
|
X509_free(x);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
BIO_free(pbio);
|
||||||
|
|
||||||
|
if (!param)
|
||||||
|
{
|
||||||
|
BIO_printf(err, "Error reading parameter file %s\n",
|
||||||
|
paramfile);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
if (*pkey_type == -1)
|
||||||
|
*pkey_type = EVP_PKEY_id(param);
|
||||||
|
else if (*pkey_type != EVP_PKEY_base_id(param))
|
||||||
|
{
|
||||||
|
BIO_printf(err, "Key Type does not match parameters\n");
|
||||||
|
EVP_PKEY_free(param);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (palgnam)
|
||||||
|
{
|
||||||
|
const EVP_PKEY_ASN1_METHOD *ameth;
|
||||||
|
ENGINE *tmpeng;
|
||||||
|
const char *anam;
|
||||||
|
ameth = EVP_PKEY_asn1_find(&tmpeng, *pkey_type);
|
||||||
|
if (!ameth)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Internal error: can't find key algorithm\n");
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
EVP_PKEY_asn1_get0_info(NULL, NULL, NULL, NULL, &anam, ameth);
|
||||||
|
*palgnam = BUF_strdup(anam);
|
||||||
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
|
if (tmpeng)
|
||||||
|
ENGINE_finish(tmpeng);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (param)
|
||||||
|
{
|
||||||
|
gctx = EVP_PKEY_CTX_new(param, keygen_engine);
|
||||||
|
*pkeylen = EVP_PKEY_bits(param);
|
||||||
|
EVP_PKEY_free(param);
|
||||||
|
}
|
||||||
|
else
|
||||||
|
gctx = EVP_PKEY_CTX_new_id(*pkey_type, keygen_engine);
|
||||||
|
|
||||||
|
if (!gctx)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Error allocating keygen context\n");
|
||||||
|
ERR_print_errors(err);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (EVP_PKEY_keygen_init(gctx) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Error initializing keygen context\n");
|
||||||
|
ERR_print_errors(err);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
#ifndef OPENSSL_NO_RSA
|
||||||
|
if ((*pkey_type == EVP_PKEY_RSA) && (keylen != -1))
|
||||||
|
{
|
||||||
|
if (EVP_PKEY_CTX_set_rsa_keygen_bits(gctx, keylen) <= 0)
|
||||||
|
{
|
||||||
|
BIO_puts(err, "Error setting RSA keysize\n");
|
||||||
|
ERR_print_errors(err);
|
||||||
|
EVP_PKEY_CTX_free(gctx);
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
|
return gctx;
|
||||||
|
}
|
||||||
|
|
||||||
|
static int genpkey_cb(EVP_PKEY_CTX *ctx)
|
||||||
|
{
|
||||||
|
char c='*';
|
||||||
|
BIO *b = EVP_PKEY_CTX_get_app_data(ctx);
|
||||||
|
int p;
|
||||||
|
p = EVP_PKEY_CTX_get_keygen_info(ctx, 0);
|
||||||
|
if (p == 0) c='.';
|
||||||
|
if (p == 1) c='+';
|
||||||
|
if (p == 2) c='*';
|
||||||
|
if (p == 3) c='\n';
|
||||||
|
BIO_write(b,&c,1);
|
||||||
|
(void)BIO_flush(b);
|
||||||
|
#ifdef LINT
|
||||||
|
p=n;
|
||||||
|
#endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|||||||
59
apps/rsa.c
59
apps/rsa.c
@@ -115,6 +115,8 @@ int MAIN(int argc, char **argv)
|
|||||||
#endif
|
#endif
|
||||||
int modulus=0;
|
int modulus=0;
|
||||||
|
|
||||||
|
int pvk_encr = 2;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
@@ -177,6 +179,16 @@ int MAIN(int argc, char **argv)
|
|||||||
pubin=1;
|
pubin=1;
|
||||||
else if (strcmp(*argv,"-pubout") == 0)
|
else if (strcmp(*argv,"-pubout") == 0)
|
||||||
pubout=1;
|
pubout=1;
|
||||||
|
else if (strcmp(*argv,"-RSAPublicKey_in") == 0)
|
||||||
|
pubin = 2;
|
||||||
|
else if (strcmp(*argv,"-RSAPublicKey_out") == 0)
|
||||||
|
pubout = 2;
|
||||||
|
else if (strcmp(*argv,"-pvk-strong") == 0)
|
||||||
|
pvk_encr=2;
|
||||||
|
else if (strcmp(*argv,"-pvk-weak") == 0)
|
||||||
|
pvk_encr=1;
|
||||||
|
else if (strcmp(*argv,"-pvk-none") == 0)
|
||||||
|
pvk_encr=0;
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
else if (strcmp(*argv,"-noout") == 0)
|
||||||
noout=1;
|
noout=1;
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
else if (strcmp(*argv,"-text") == 0)
|
||||||
@@ -257,10 +269,23 @@ bad:
|
|||||||
EVP_PKEY *pkey;
|
EVP_PKEY *pkey;
|
||||||
|
|
||||||
if (pubin)
|
if (pubin)
|
||||||
pkey = load_pubkey(bio_err, infile,
|
{
|
||||||
(informat == FORMAT_NETSCAPE && sgckey ?
|
int tmpformat=-1;
|
||||||
FORMAT_IISSGC : informat), 1,
|
if (pubin == 2)
|
||||||
|
{
|
||||||
|
if (informat == FORMAT_PEM)
|
||||||
|
tmpformat = FORMAT_PEMRSA;
|
||||||
|
else if (informat == FORMAT_ASN1)
|
||||||
|
tmpformat = FORMAT_ASN1RSA;
|
||||||
|
}
|
||||||
|
else if (informat == FORMAT_NETSCAPE && sgckey)
|
||||||
|
tmpformat = FORMAT_IISSGC;
|
||||||
|
else
|
||||||
|
tmpformat = informat;
|
||||||
|
|
||||||
|
pkey = load_pubkey(bio_err, infile, tmpformat, 1,
|
||||||
passin, e, "Public Key");
|
passin, e, "Public Key");
|
||||||
|
}
|
||||||
else
|
else
|
||||||
pkey = load_key(bio_err, infile,
|
pkey = load_key(bio_err, infile,
|
||||||
(informat == FORMAT_NETSCAPE && sgckey ?
|
(informat == FORMAT_NETSCAPE && sgckey ?
|
||||||
@@ -268,7 +293,7 @@ bad:
|
|||||||
passin, e, "Private Key");
|
passin, e, "Private Key");
|
||||||
|
|
||||||
if (pkey != NULL)
|
if (pkey != NULL)
|
||||||
rsa = pkey == NULL ? NULL : EVP_PKEY_get1_RSA(pkey);
|
rsa = EVP_PKEY_get1_RSA(pkey);
|
||||||
EVP_PKEY_free(pkey);
|
EVP_PKEY_free(pkey);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -346,7 +371,13 @@ bad:
|
|||||||
}
|
}
|
||||||
BIO_printf(bio_err,"writing RSA key\n");
|
BIO_printf(bio_err,"writing RSA key\n");
|
||||||
if (outformat == FORMAT_ASN1) {
|
if (outformat == FORMAT_ASN1) {
|
||||||
if(pubout || pubin) i=i2d_RSA_PUBKEY_bio(out,rsa);
|
if(pubout || pubin)
|
||||||
|
{
|
||||||
|
if (pubout == 2)
|
||||||
|
i=i2d_RSAPublicKey_bio(out,rsa);
|
||||||
|
else
|
||||||
|
i=i2d_RSA_PUBKEY_bio(out,rsa);
|
||||||
|
}
|
||||||
else i=i2d_RSAPrivateKey_bio(out,rsa);
|
else i=i2d_RSAPrivateKey_bio(out,rsa);
|
||||||
}
|
}
|
||||||
#ifndef OPENSSL_NO_RC4
|
#ifndef OPENSSL_NO_RC4
|
||||||
@@ -370,9 +401,27 @@ bad:
|
|||||||
#endif
|
#endif
|
||||||
else if (outformat == FORMAT_PEM) {
|
else if (outformat == FORMAT_PEM) {
|
||||||
if(pubout || pubin)
|
if(pubout || pubin)
|
||||||
|
{
|
||||||
|
if (pubout == 2)
|
||||||
|
i=PEM_write_bio_RSAPublicKey(out,rsa);
|
||||||
|
else
|
||||||
i=PEM_write_bio_RSA_PUBKEY(out,rsa);
|
i=PEM_write_bio_RSA_PUBKEY(out,rsa);
|
||||||
|
}
|
||||||
else i=PEM_write_bio_RSAPrivateKey(out,rsa,
|
else i=PEM_write_bio_RSAPrivateKey(out,rsa,
|
||||||
enc,NULL,0,NULL,passout);
|
enc,NULL,0,NULL,passout);
|
||||||
|
#ifndef OPENSSL_NO_DSA
|
||||||
|
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
|
||||||
|
EVP_PKEY *pk;
|
||||||
|
pk = EVP_PKEY_new();
|
||||||
|
EVP_PKEY_set1_RSA(pk, rsa);
|
||||||
|
if (outformat == FORMAT_PVK)
|
||||||
|
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
|
||||||
|
else if (pubin || pubout)
|
||||||
|
i = i2b_PublicKey_bio(out, pk);
|
||||||
|
else
|
||||||
|
i = i2b_PrivateKey_bio(out, pk);
|
||||||
|
EVP_PKEY_free(pk);
|
||||||
|
#endif
|
||||||
} else {
|
} else {
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
||||||
goto end;
|
goto end;
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
/* rsautl.c */
|
/* rsautl.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project 2000.
|
* project 2000.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
@@ -342,4 +342,10 @@ static void usage()
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#else /* !OPENSSL_NO_RSA */
|
||||||
|
|
||||||
|
# if PEDANTIC
|
||||||
|
static void *dummy=&dummy;
|
||||||
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -117,7 +117,7 @@
|
|||||||
#include <conio.h>
|
#include <conio.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifdef OPENSSL_SYS_MSDOS
|
#if defined(OPENSSL_SYS_MSDOS) && !defined(_WIN32)
|
||||||
#define _kbhit kbhit
|
#define _kbhit kbhit
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|||||||
32
apps/s_cb.c
32
apps/s_cb.c
@@ -56,7 +56,7 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
@@ -123,6 +123,7 @@
|
|||||||
|
|
||||||
int verify_depth=0;
|
int verify_depth=0;
|
||||||
int verify_error=X509_V_OK;
|
int verify_error=X509_V_OK;
|
||||||
|
int verify_return_error=0;
|
||||||
|
|
||||||
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
|
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
|
||||||
{
|
{
|
||||||
@@ -142,6 +143,7 @@ int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
|
|||||||
X509_verify_cert_error_string(err));
|
X509_verify_cert_error_string(err));
|
||||||
if (verify_depth >= depth)
|
if (verify_depth >= depth)
|
||||||
{
|
{
|
||||||
|
if (!verify_return_error)
|
||||||
ok=1;
|
ok=1;
|
||||||
verify_error=X509_V_OK;
|
verify_error=X509_V_OK;
|
||||||
}
|
}
|
||||||
@@ -267,15 +269,15 @@ long MS_CALLBACK bio_dump_callback(BIO *bio, int cmd, const char *argp,
|
|||||||
|
|
||||||
if (cmd == (BIO_CB_READ|BIO_CB_RETURN))
|
if (cmd == (BIO_CB_READ|BIO_CB_RETURN))
|
||||||
{
|
{
|
||||||
BIO_printf(out,"read from %p [%p] (%d bytes => %ld (0x%lX))\n",
|
BIO_printf(out,"read from %p [%p] (%lu bytes => %ld (0x%lX))\n",
|
||||||
(void *)bio,argp,argi,ret,ret);
|
(void *)bio,argp,(unsigned long)argi,ret,ret);
|
||||||
BIO_dump(out,argp,(int)ret);
|
BIO_dump(out,argp,(int)ret);
|
||||||
return(ret);
|
return(ret);
|
||||||
}
|
}
|
||||||
else if (cmd == (BIO_CB_WRITE|BIO_CB_RETURN))
|
else if (cmd == (BIO_CB_WRITE|BIO_CB_RETURN))
|
||||||
{
|
{
|
||||||
BIO_printf(out,"write to %p [%p] (%d bytes => %ld (0x%lX))\n",
|
BIO_printf(out,"write to %p [%p] (%lu bytes => %ld (0x%lX))\n",
|
||||||
(void *)bio,argp,argi,ret,ret);
|
(void *)bio,argp,(unsigned long)argi,ret,ret);
|
||||||
BIO_dump(out,argp,(int)ret);
|
BIO_dump(out,argp,(int)ret);
|
||||||
}
|
}
|
||||||
return(ret);
|
return(ret);
|
||||||
@@ -504,6 +506,21 @@ void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *
|
|||||||
case 100:
|
case 100:
|
||||||
str_details2 = " no_renegotiation";
|
str_details2 = " no_renegotiation";
|
||||||
break;
|
break;
|
||||||
|
case 110:
|
||||||
|
str_details2 = " unsupported_extension";
|
||||||
|
break;
|
||||||
|
case 111:
|
||||||
|
str_details2 = " certificate_unobtainable";
|
||||||
|
break;
|
||||||
|
case 112:
|
||||||
|
str_details2 = " unrecognized_name";
|
||||||
|
break;
|
||||||
|
case 113:
|
||||||
|
str_details2 = " bad_certificate_status_response";
|
||||||
|
break;
|
||||||
|
case 114:
|
||||||
|
str_details2 = " bad_certificate_hash_value";
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -621,6 +638,11 @@ void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
|
|||||||
extname = "server ticket";
|
extname = "server ticket";
|
||||||
break;
|
break;
|
||||||
|
|
||||||
|
#ifdef TLSEXT_TYPE_opaque_prf_input
|
||||||
|
case TLSEXT_TYPE_opaque_prf_input:
|
||||||
|
extname = "opaque PRF input";
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
|
||||||
default:
|
default:
|
||||||
extname = "unknown";
|
extname = "unknown";
|
||||||
|
|||||||
363
apps/s_client.c
363
apps/s_client.c
@@ -56,7 +56,7 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
@@ -108,8 +108,35 @@
|
|||||||
* Hudson (tjh@cryptsoft.com).
|
* Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright 2005 Nokia. All rights reserved.
|
||||||
|
*
|
||||||
|
* The portions of the attached software ("Contribution") is developed by
|
||||||
|
* Nokia Corporation and is licensed pursuant to the OpenSSL open source
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* The Contribution, originally written by Mika Kousa and Pasi Eronen of
|
||||||
|
* Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
|
||||||
|
* support (see RFC 4279) to OpenSSL.
|
||||||
|
*
|
||||||
|
* No patent licenses or other rights except those expressly stated in
|
||||||
|
* the OpenSSL open source license shall be deemed granted or received
|
||||||
|
* expressly, by implication, estoppel, or otherwise.
|
||||||
|
*
|
||||||
|
* No assurances are provided by Nokia that the Contribution does not
|
||||||
|
* infringe the patent or other intellectual property rights of any third
|
||||||
|
* party or that the license provides you with all the necessary rights
|
||||||
|
* to make use of the Contribution.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
|
||||||
|
* ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
|
||||||
|
* SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
|
||||||
|
* OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
|
||||||
|
* OTHERWISE.
|
||||||
|
*/
|
||||||
|
|
||||||
#include <assert.h>
|
#include <assert.h>
|
||||||
|
#include <ctype.h>
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
@@ -135,23 +162,19 @@ typedef unsigned int u_int;
|
|||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
#include <openssl/rand.h>
|
#include <openssl/rand.h>
|
||||||
#include <openssl/ocsp.h>
|
#include <openssl/ocsp.h>
|
||||||
|
#include <openssl/bn.h>
|
||||||
#include "s_apps.h"
|
#include "s_apps.h"
|
||||||
#include "timeouts.h"
|
#include "timeouts.h"
|
||||||
|
|
||||||
#ifdef OPENSSL_SYS_WINCE
|
|
||||||
/* Windows CE incorrectly defines fileno as returning void*, so to avoid problems below... */
|
|
||||||
#ifdef fileno
|
|
||||||
#undef fileno
|
|
||||||
#endif
|
|
||||||
#define fileno(a) (int)_fileno(a)
|
|
||||||
#endif
|
|
||||||
|
|
||||||
|
|
||||||
#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
|
#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
|
||||||
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
|
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
|
||||||
#undef FIONBIO
|
#undef FIONBIO
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if defined(OPENSSL_SYS_BEOS_R5)
|
||||||
|
#include <fcntl.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG s_client_main
|
#define PROG s_client_main
|
||||||
|
|
||||||
@@ -166,6 +189,7 @@ typedef unsigned int u_int;
|
|||||||
|
|
||||||
extern int verify_depth;
|
extern int verify_depth;
|
||||||
extern int verify_error;
|
extern int verify_error;
|
||||||
|
extern int verify_return_error;
|
||||||
|
|
||||||
#ifdef FIONBIO
|
#ifdef FIONBIO
|
||||||
static int c_nbio=0;
|
static int c_nbio=0;
|
||||||
@@ -188,6 +212,69 @@ static BIO *bio_c_out=NULL;
|
|||||||
static int c_quiet=0;
|
static int c_quiet=0;
|
||||||
static int c_ign_eof=0;
|
static int c_ign_eof=0;
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
/* Default PSK identity and key */
|
||||||
|
static char *psk_identity="Client_identity";
|
||||||
|
/*char *psk_key=NULL; by default PSK is not used */
|
||||||
|
|
||||||
|
static unsigned int psk_client_cb(SSL *ssl, const char *hint, char *identity,
|
||||||
|
unsigned int max_identity_len, unsigned char *psk,
|
||||||
|
unsigned int max_psk_len)
|
||||||
|
{
|
||||||
|
unsigned int psk_len = 0;
|
||||||
|
int ret;
|
||||||
|
BIGNUM *bn=NULL;
|
||||||
|
|
||||||
|
if (c_debug)
|
||||||
|
BIO_printf(bio_c_out, "psk_client_cb\n");
|
||||||
|
if (!hint)
|
||||||
|
{
|
||||||
|
/* no ServerKeyExchange message*/
|
||||||
|
if (c_debug)
|
||||||
|
BIO_printf(bio_c_out,"NULL received PSK identity hint, continuing anyway\n");
|
||||||
|
}
|
||||||
|
else if (c_debug)
|
||||||
|
BIO_printf(bio_c_out, "Received PSK identity hint '%s'\n", hint);
|
||||||
|
|
||||||
|
/* lookup PSK identity and PSK key based on the given identity hint here */
|
||||||
|
ret = BIO_snprintf(identity, max_identity_len, "%s", psk_identity);
|
||||||
|
if (ret < 0 || (unsigned int)ret > max_identity_len)
|
||||||
|
goto out_err;
|
||||||
|
if (c_debug)
|
||||||
|
BIO_printf(bio_c_out, "created identity '%s' len=%d\n", identity, ret);
|
||||||
|
ret=BN_hex2bn(&bn, psk_key);
|
||||||
|
if (!ret)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key);
|
||||||
|
if (bn)
|
||||||
|
BN_free(bn);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((unsigned int)BN_num_bytes(bn) > max_psk_len)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n",
|
||||||
|
max_psk_len, BN_num_bytes(bn));
|
||||||
|
BN_free(bn);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
psk_len=BN_bn2bin(bn, psk);
|
||||||
|
BN_free(bn);
|
||||||
|
if (psk_len == 0)
|
||||||
|
goto out_err;
|
||||||
|
|
||||||
|
if (c_debug)
|
||||||
|
BIO_printf(bio_c_out, "created PSK len=%d\n", psk_len);
|
||||||
|
|
||||||
|
return psk_len;
|
||||||
|
out_err:
|
||||||
|
if (c_debug)
|
||||||
|
BIO_printf(bio_err, "Error in PSK client callback\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
static void sc_usage(void)
|
static void sc_usage(void)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"usage: s_client args\n");
|
BIO_printf(bio_err,"usage: s_client args\n");
|
||||||
@@ -196,7 +283,7 @@ static void sc_usage(void)
|
|||||||
BIO_printf(bio_err," -port port - use -connect instead\n");
|
BIO_printf(bio_err," -port port - use -connect instead\n");
|
||||||
BIO_printf(bio_err," -connect host:port - who to connect to (default is %s:%s)\n",SSL_HOST_NAME,PORT_STR);
|
BIO_printf(bio_err," -connect host:port - who to connect to (default is %s:%s)\n",SSL_HOST_NAME,PORT_STR);
|
||||||
|
|
||||||
BIO_printf(bio_err," -verify depth - turn on peer certificate verification\n");
|
BIO_printf(bio_err," -verify arg - turn on peer certificate verification\n");
|
||||||
BIO_printf(bio_err," -cert arg - certificate file to use, PEM format assumed\n");
|
BIO_printf(bio_err," -cert arg - certificate file to use, PEM format assumed\n");
|
||||||
BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n");
|
BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n");
|
||||||
BIO_printf(bio_err," -key arg - Private key file to use, in cert file if\n");
|
BIO_printf(bio_err," -key arg - Private key file to use, in cert file if\n");
|
||||||
@@ -221,11 +308,19 @@ static void sc_usage(void)
|
|||||||
BIO_printf(bio_err," -crlf - convert LF from terminal into CRLF\n");
|
BIO_printf(bio_err," -crlf - convert LF from terminal into CRLF\n");
|
||||||
BIO_printf(bio_err," -quiet - no s_client output\n");
|
BIO_printf(bio_err," -quiet - no s_client output\n");
|
||||||
BIO_printf(bio_err," -ign_eof - ignore input eof (default when -quiet)\n");
|
BIO_printf(bio_err," -ign_eof - ignore input eof (default when -quiet)\n");
|
||||||
|
BIO_printf(bio_err," -no_ign_eof - don't ignore input eof\n");
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
BIO_printf(bio_err," -psk_identity arg - PSK identity\n");
|
||||||
|
BIO_printf(bio_err," -psk arg - PSK in hex (without 0x)\n");
|
||||||
|
# ifndef OPENSSL_NO_JPAKE
|
||||||
|
BIO_printf(bio_err," -jpake arg - JPAKE secret to use\n");
|
||||||
|
# endif
|
||||||
|
#endif
|
||||||
BIO_printf(bio_err," -ssl2 - just use SSLv2\n");
|
BIO_printf(bio_err," -ssl2 - just use SSLv2\n");
|
||||||
BIO_printf(bio_err," -ssl3 - just use SSLv3\n");
|
BIO_printf(bio_err," -ssl3 - just use SSLv3\n");
|
||||||
BIO_printf(bio_err," -tls1 - just use TLSv1\n");
|
BIO_printf(bio_err," -tls1 - just use TLSv1\n");
|
||||||
BIO_printf(bio_err," -dtls1 - just use DTLSv1\n");
|
BIO_printf(bio_err," -dtls1 - just use DTLSv1\n");
|
||||||
BIO_printf(bio_err," -mtu - set the MTU\n");
|
BIO_printf(bio_err," -mtu - set the link layer MTU\n");
|
||||||
BIO_printf(bio_err," -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
|
BIO_printf(bio_err," -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
|
||||||
BIO_printf(bio_err," -bugs - Switch on all SSL implementation bug workarounds\n");
|
BIO_printf(bio_err," -bugs - Switch on all SSL implementation bug workarounds\n");
|
||||||
BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
|
BIO_printf(bio_err," -serverpref - Use server's cipher preferences (only SSLv2)\n");
|
||||||
@@ -234,7 +329,8 @@ static void sc_usage(void)
|
|||||||
BIO_printf(bio_err," -starttls prot - use the STARTTLS command before starting TLS\n");
|
BIO_printf(bio_err," -starttls prot - use the STARTTLS command before starting TLS\n");
|
||||||
BIO_printf(bio_err," for those protocols that support it, where\n");
|
BIO_printf(bio_err," for those protocols that support it, where\n");
|
||||||
BIO_printf(bio_err," 'prot' defines which one to assume. Currently,\n");
|
BIO_printf(bio_err," 'prot' defines which one to assume. Currently,\n");
|
||||||
BIO_printf(bio_err," only \"smtp\", \"pop3\", \"imap\", and \"ftp\" are supported.\n");
|
BIO_printf(bio_err," only \"smtp\", \"pop3\", \"imap\", \"ftp\" and \"xmpp\"\n");
|
||||||
|
BIO_printf(bio_err," are supported.\n");
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err," -engine id - Initialise and use the specified engine\n");
|
BIO_printf(bio_err," -engine id - Initialise and use the specified engine\n");
|
||||||
#endif
|
#endif
|
||||||
@@ -270,13 +366,15 @@ static int MS_CALLBACK ssl_servername_cb(SSL *s, int *ad, void *arg)
|
|||||||
return SSL_TLSEXT_ERR_OK;
|
return SSL_TLSEXT_ERR_OK;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
enum
|
enum
|
||||||
{
|
{
|
||||||
PROTO_OFF = 0,
|
PROTO_OFF = 0,
|
||||||
PROTO_SMTP,
|
PROTO_SMTP,
|
||||||
PROTO_POP3,
|
PROTO_POP3,
|
||||||
PROTO_IMAP,
|
PROTO_IMAP,
|
||||||
PROTO_FTP
|
PROTO_FTP,
|
||||||
|
PROTO_XMPP
|
||||||
};
|
};
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
@@ -284,8 +382,7 @@ int MAIN(int, char **);
|
|||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int off=0;
|
int off=0;
|
||||||
SSL *con=NULL,*con2=NULL;
|
SSL *con=NULL;
|
||||||
X509_STORE *store = NULL;
|
|
||||||
int s,k,width,state=0;
|
int s,k,width,state=0;
|
||||||
char *cbuf=NULL,*sbuf=NULL,*mbuf=NULL;
|
char *cbuf=NULL,*sbuf=NULL,*mbuf=NULL;
|
||||||
int cbuf_len,cbuf_off;
|
int cbuf_len,cbuf_off;
|
||||||
@@ -306,24 +403,26 @@ int MAIN(int argc, char **argv)
|
|||||||
SSL_CTX *ctx=NULL;
|
SSL_CTX *ctx=NULL;
|
||||||
int ret=1,in_init=1,i,nbio_test=0;
|
int ret=1,in_init=1,i,nbio_test=0;
|
||||||
int starttls_proto = PROTO_OFF;
|
int starttls_proto = PROTO_OFF;
|
||||||
int prexit = 0, vflags = 0;
|
int prexit = 0;
|
||||||
SSL_METHOD *meth=NULL;
|
X509_VERIFY_PARAM *vpm = NULL;
|
||||||
#ifdef sock_type
|
int badarg = 0;
|
||||||
#undef sock_type
|
const SSL_METHOD *meth=NULL;
|
||||||
#endif
|
int socket_type=SOCK_STREAM;
|
||||||
int sock_type=SOCK_STREAM;
|
|
||||||
BIO *sbio;
|
BIO *sbio;
|
||||||
char *inrand=NULL;
|
char *inrand=NULL;
|
||||||
int mbuf_len=0;
|
int mbuf_len=0;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine_id=NULL;
|
char *engine_id=NULL;
|
||||||
char *ssl_client_engine_id=NULL;
|
char *ssl_client_engine_id=NULL;
|
||||||
ENGINE *e=NULL, *ssl_client_engine=NULL;
|
ENGINE *ssl_client_engine=NULL;
|
||||||
#endif
|
#endif
|
||||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE)
|
ENGINE *e=NULL;
|
||||||
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_BEOS_R5)
|
||||||
struct timeval tv;
|
struct timeval tv;
|
||||||
|
#if defined(OPENSSL_SYS_BEOS_R5)
|
||||||
|
int stdin_set = 0;
|
||||||
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_TLSEXT
|
#ifndef OPENSSL_NO_TLSEXT
|
||||||
char *servername = NULL;
|
char *servername = NULL;
|
||||||
tlsextctx tlsextcbp =
|
tlsextctx tlsextcbp =
|
||||||
@@ -334,7 +433,10 @@ int MAIN(int argc, char **argv)
|
|||||||
struct sockaddr peer;
|
struct sockaddr peer;
|
||||||
int peerlen = sizeof(peer);
|
int peerlen = sizeof(peer);
|
||||||
int enable_timeouts = 0 ;
|
int enable_timeouts = 0 ;
|
||||||
long mtu = 0;
|
long socket_mtu = 0;
|
||||||
|
#ifndef OPENSSL_NO_JPAKE
|
||||||
|
char *jpake_secret = NULL;
|
||||||
|
#endif
|
||||||
|
|
||||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
||||||
meth=SSLv23_client_method();
|
meth=SSLv23_client_method();
|
||||||
@@ -420,10 +522,14 @@ int MAIN(int argc, char **argv)
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
cert_format = str2fmt(*(++argv));
|
cert_format = str2fmt(*(++argv));
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-crl_check") == 0)
|
else if (args_verify(&argv, &argc, &badarg, bio_err, &vpm))
|
||||||
vflags |= X509_V_FLAG_CRL_CHECK;
|
{
|
||||||
else if (strcmp(*argv,"-crl_check_all") == 0)
|
if (badarg)
|
||||||
vflags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
|
goto bad;
|
||||||
|
continue;
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-verify_return_error") == 0)
|
||||||
|
verify_return_error = 1;
|
||||||
else if (strcmp(*argv,"-prexit") == 0)
|
else if (strcmp(*argv,"-prexit") == 0)
|
||||||
prexit=1;
|
prexit=1;
|
||||||
else if (strcmp(*argv,"-crlf") == 0)
|
else if (strcmp(*argv,"-crlf") == 0)
|
||||||
@@ -435,6 +541,8 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-ign_eof") == 0)
|
else if (strcmp(*argv,"-ign_eof") == 0)
|
||||||
c_ign_eof=1;
|
c_ign_eof=1;
|
||||||
|
else if (strcmp(*argv,"-no_ign_eof") == 0)
|
||||||
|
c_ign_eof=0;
|
||||||
else if (strcmp(*argv,"-pause") == 0)
|
else if (strcmp(*argv,"-pause") == 0)
|
||||||
c_Pause=1;
|
c_Pause=1;
|
||||||
else if (strcmp(*argv,"-debug") == 0)
|
else if (strcmp(*argv,"-debug") == 0)
|
||||||
@@ -457,6 +565,27 @@ int MAIN(int argc, char **argv)
|
|||||||
nbio_test=1;
|
nbio_test=1;
|
||||||
else if (strcmp(*argv,"-state") == 0)
|
else if (strcmp(*argv,"-state") == 0)
|
||||||
state=1;
|
state=1;
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
else if (strcmp(*argv,"-psk_identity") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) goto bad;
|
||||||
|
psk_identity=*(++argv);
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-psk") == 0)
|
||||||
|
{
|
||||||
|
size_t j;
|
||||||
|
|
||||||
|
if (--argc < 1) goto bad;
|
||||||
|
psk_key=*(++argv);
|
||||||
|
for (j = 0; j < strlen(psk_key); j++)
|
||||||
|
{
|
||||||
|
if (isxdigit((int)psk_key[j]))
|
||||||
|
continue;
|
||||||
|
BIO_printf(bio_err,"Not a hex number '%s'\n",*argv);
|
||||||
|
goto bad;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
#ifndef OPENSSL_NO_SSL2
|
#ifndef OPENSSL_NO_SSL2
|
||||||
else if (strcmp(*argv,"-ssl2") == 0)
|
else if (strcmp(*argv,"-ssl2") == 0)
|
||||||
meth=SSLv2_client_method();
|
meth=SSLv2_client_method();
|
||||||
@@ -473,14 +602,14 @@ int MAIN(int argc, char **argv)
|
|||||||
else if (strcmp(*argv,"-dtls1") == 0)
|
else if (strcmp(*argv,"-dtls1") == 0)
|
||||||
{
|
{
|
||||||
meth=DTLSv1_client_method();
|
meth=DTLSv1_client_method();
|
||||||
sock_type=SOCK_DGRAM;
|
socket_type=SOCK_DGRAM;
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-timeout") == 0)
|
else if (strcmp(*argv,"-timeout") == 0)
|
||||||
enable_timeouts=1;
|
enable_timeouts=1;
|
||||||
else if (strcmp(*argv,"-mtu") == 0)
|
else if (strcmp(*argv,"-mtu") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
mtu = atol(*(++argv));
|
socket_mtu = atol(*(++argv));
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
else if (strcmp(*argv,"-bugs") == 0)
|
else if (strcmp(*argv,"-bugs") == 0)
|
||||||
@@ -520,6 +649,8 @@ int MAIN(int argc, char **argv)
|
|||||||
off|=SSL_OP_NO_SSLv3;
|
off|=SSL_OP_NO_SSLv3;
|
||||||
else if (strcmp(*argv,"-no_ssl2") == 0)
|
else if (strcmp(*argv,"-no_ssl2") == 0)
|
||||||
off|=SSL_OP_NO_SSLv2;
|
off|=SSL_OP_NO_SSLv2;
|
||||||
|
else if (strcmp(*argv,"-no_comp") == 0)
|
||||||
|
{ off|=SSL_OP_NO_COMPRESSION; }
|
||||||
#ifndef OPENSSL_NO_TLSEXT
|
#ifndef OPENSSL_NO_TLSEXT
|
||||||
else if (strcmp(*argv,"-no_ticket") == 0)
|
else if (strcmp(*argv,"-no_ticket") == 0)
|
||||||
{ off|=SSL_OP_NO_TICKET; }
|
{ off|=SSL_OP_NO_TICKET; }
|
||||||
@@ -547,6 +678,8 @@ int MAIN(int argc, char **argv)
|
|||||||
starttls_proto = PROTO_IMAP;
|
starttls_proto = PROTO_IMAP;
|
||||||
else if (strcmp(*argv,"ftp") == 0)
|
else if (strcmp(*argv,"ftp") == 0)
|
||||||
starttls_proto = PROTO_FTP;
|
starttls_proto = PROTO_FTP;
|
||||||
|
else if (strcmp(*argv, "xmpp") == 0)
|
||||||
|
starttls_proto = PROTO_XMPP;
|
||||||
else
|
else
|
||||||
goto bad;
|
goto bad;
|
||||||
}
|
}
|
||||||
@@ -574,6 +707,13 @@ int MAIN(int argc, char **argv)
|
|||||||
servername= *(++argv);
|
servername= *(++argv);
|
||||||
/* meth=TLSv1_client_method(); */
|
/* meth=TLSv1_client_method(); */
|
||||||
}
|
}
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_JPAKE
|
||||||
|
else if (strcmp(*argv,"-jpake") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) goto bad;
|
||||||
|
jpake_secret = *++argv;
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
@@ -591,6 +731,26 @@ bad:
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#if !defined(OPENSSL_NO_JPAKE) && !defined(OPENSSL_NO_PSK)
|
||||||
|
if (jpake_secret)
|
||||||
|
{
|
||||||
|
if (psk_key)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Can't use JPAKE and PSK together\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
psk_identity = "JPAKE";
|
||||||
|
}
|
||||||
|
|
||||||
|
if (cipher)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
cipher = "PSK";
|
||||||
|
#endif
|
||||||
|
|
||||||
OpenSSL_add_ssl_algorithms();
|
OpenSSL_add_ssl_algorithms();
|
||||||
SSL_load_error_strings();
|
SSL_load_error_strings();
|
||||||
|
|
||||||
@@ -606,6 +766,7 @@ bad:
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
if (!app_passwd(bio_err, passarg, NULL, &pass, NULL))
|
if (!app_passwd(bio_err, passarg, NULL, &pass, NULL))
|
||||||
{
|
{
|
||||||
@@ -673,6 +834,9 @@ bad:
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (vpm)
|
||||||
|
SSL_CTX_set1_param(ctx, vpm);
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
if (ssl_client_engine)
|
if (ssl_client_engine)
|
||||||
{
|
{
|
||||||
@@ -687,6 +851,18 @@ bad:
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
#ifdef OPENSSL_NO_JPAKE
|
||||||
|
if (psk_key != NULL)
|
||||||
|
#else
|
||||||
|
if (psk_key != NULL || jpake_secret)
|
||||||
|
#endif
|
||||||
|
{
|
||||||
|
if (c_debug)
|
||||||
|
BIO_printf(bio_c_out, "PSK key given or JPAKE in use, setting client callback\n");
|
||||||
|
SSL_CTX_set_psk_client_callback(ctx, psk_client_cb);
|
||||||
|
}
|
||||||
|
#endif
|
||||||
if (bugs)
|
if (bugs)
|
||||||
SSL_CTX_set_options(ctx,SSL_OP_ALL|off);
|
SSL_CTX_set_options(ctx,SSL_OP_ALL|off);
|
||||||
else
|
else
|
||||||
@@ -694,7 +870,7 @@ bad:
|
|||||||
/* DTLS: partial reads end up discarding unread UDP bytes :-(
|
/* DTLS: partial reads end up discarding unread UDP bytes :-(
|
||||||
* Setting read ahead solves this problem.
|
* Setting read ahead solves this problem.
|
||||||
*/
|
*/
|
||||||
if (sock_type == SOCK_DGRAM) SSL_CTX_set_read_ahead(ctx, 1);
|
if (socket_type == SOCK_DGRAM) SSL_CTX_set_read_ahead(ctx, 1);
|
||||||
|
|
||||||
if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
|
if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
|
||||||
if (cipher != NULL)
|
if (cipher != NULL)
|
||||||
@@ -720,8 +896,6 @@ bad:
|
|||||||
/* goto end; */
|
/* goto end; */
|
||||||
}
|
}
|
||||||
|
|
||||||
store = SSL_CTX_get_cert_store(ctx);
|
|
||||||
X509_STORE_set_flags(store, vflags);
|
|
||||||
#ifndef OPENSSL_NO_TLSEXT
|
#ifndef OPENSSL_NO_TLSEXT
|
||||||
if (servername != NULL)
|
if (servername != NULL)
|
||||||
{
|
{
|
||||||
@@ -766,7 +940,6 @@ bad:
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_KRB5
|
#ifndef OPENSSL_NO_KRB5
|
||||||
if (con && (con->kssl_ctx = kssl_ctx_new()) != NULL)
|
if (con && (con->kssl_ctx = kssl_ctx_new()) != NULL)
|
||||||
{
|
{
|
||||||
@@ -774,10 +947,15 @@ bad:
|
|||||||
}
|
}
|
||||||
#endif /* OPENSSL_NO_KRB5 */
|
#endif /* OPENSSL_NO_KRB5 */
|
||||||
/* SSL_set_cipher_list(con,"RC4-MD5"); */
|
/* SSL_set_cipher_list(con,"RC4-MD5"); */
|
||||||
|
#if 0
|
||||||
|
#ifdef TLSEXT_TYPE_opaque_prf_input
|
||||||
|
SSL_set_tlsext_opaque_prf_input(con, "Test client", 11);
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
re_start:
|
re_start:
|
||||||
|
|
||||||
if (init_client(&s,host,port,sock_type) == 0)
|
if (init_client(&s,host,port,socket_type) == 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"connect:errno=%d\n",get_last_socket_error());
|
BIO_printf(bio_err,"connect:errno=%d\n",get_last_socket_error());
|
||||||
SHUTDOWN(s);
|
SHUTDOWN(s);
|
||||||
@@ -825,10 +1003,10 @@ re_start:
|
|||||||
BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_SEND_TIMEOUT, 0, &timeout);
|
BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_SEND_TIMEOUT, 0, &timeout);
|
||||||
}
|
}
|
||||||
|
|
||||||
if ( mtu > 0)
|
if (socket_mtu > 28)
|
||||||
{
|
{
|
||||||
SSL_set_options(con, SSL_OP_NO_QUERY_MTU);
|
SSL_set_options(con, SSL_OP_NO_QUERY_MTU);
|
||||||
SSL_set_mtu(con, mtu);
|
SSL_set_mtu(con, socket_mtu - 28);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
/* want to do MTU discovery */
|
/* want to do MTU discovery */
|
||||||
@@ -837,8 +1015,6 @@ re_start:
|
|||||||
else
|
else
|
||||||
sbio=BIO_new_socket(s,BIO_NOCLOSE);
|
sbio=BIO_new_socket(s,BIO_NOCLOSE);
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
if (nbio_test)
|
if (nbio_test)
|
||||||
{
|
{
|
||||||
BIO *test;
|
BIO *test;
|
||||||
@@ -882,6 +1058,10 @@ SSL_set_tlsext_status_ids(con, ids);
|
|||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_JPAKE
|
||||||
|
if (jpake_secret)
|
||||||
|
jpake_client_auth(bio_c_out, sbio, jpake_secret);
|
||||||
|
#endif
|
||||||
|
|
||||||
SSL_set_bio(con,sbio,sbio);
|
SSL_set_bio(con,sbio,sbio);
|
||||||
SSL_set_connect_state(con);
|
SSL_set_connect_state(con);
|
||||||
@@ -988,6 +1168,28 @@ SSL_set_tlsext_status_ids(con, ids);
|
|||||||
BIO_printf(sbio,"AUTH TLS\r\n");
|
BIO_printf(sbio,"AUTH TLS\r\n");
|
||||||
BIO_read(sbio,sbuf,BUFSIZZ);
|
BIO_read(sbio,sbuf,BUFSIZZ);
|
||||||
}
|
}
|
||||||
|
if (starttls_proto == PROTO_XMPP)
|
||||||
|
{
|
||||||
|
int seen = 0;
|
||||||
|
BIO_printf(sbio,"<stream:stream "
|
||||||
|
"xmlns:stream='http://etherx.jabber.org/streams' "
|
||||||
|
"xmlns='jabber:client' to='%s' version='1.0'>", host);
|
||||||
|
seen = BIO_read(sbio,mbuf,BUFSIZZ);
|
||||||
|
mbuf[seen] = 0;
|
||||||
|
while (!strstr(mbuf, "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'"))
|
||||||
|
{
|
||||||
|
if (strstr(mbuf, "/stream:features>"))
|
||||||
|
goto shut;
|
||||||
|
seen = BIO_read(sbio,mbuf,BUFSIZZ);
|
||||||
|
mbuf[seen] = 0;
|
||||||
|
}
|
||||||
|
BIO_printf(sbio, "<starttls xmlns='urn:ietf:params:xml:ns:xmpp-tls'/>");
|
||||||
|
seen = BIO_read(sbio,sbuf,BUFSIZZ);
|
||||||
|
sbuf[seen] = 0;
|
||||||
|
if (!strstr(sbuf, "<proceed"))
|
||||||
|
goto shut;
|
||||||
|
mbuf[0] = 0;
|
||||||
|
}
|
||||||
|
|
||||||
for (;;)
|
for (;;)
|
||||||
{
|
{
|
||||||
@@ -1005,6 +1207,14 @@ SSL_set_tlsext_status_ids(con, ids);
|
|||||||
if (in_init)
|
if (in_init)
|
||||||
{
|
{
|
||||||
in_init=0;
|
in_init=0;
|
||||||
|
#if 0 /* This test doesn't really work as intended (needs to be fixed) */
|
||||||
|
#ifndef OPENSSL_NO_TLSEXT
|
||||||
|
if (servername != NULL && !SSL_session_reused(con))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_c_out,"Server did %sacknowledge servername extension.\n",tlsextcbp.ack?"":"not ");
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
if (sess_out)
|
if (sess_out)
|
||||||
{
|
{
|
||||||
BIO *stmp = BIO_new_file(sess_out, "w");
|
BIO *stmp = BIO_new_file(sess_out, "w");
|
||||||
@@ -1042,22 +1252,22 @@ SSL_set_tlsext_status_ids(con, ids);
|
|||||||
|
|
||||||
if (!ssl_pending)
|
if (!ssl_pending)
|
||||||
{
|
{
|
||||||
#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_NETWARE)
|
#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_NETWARE) && !defined (OPENSSL_SYS_BEOS_R5)
|
||||||
if (tty_on)
|
if (tty_on)
|
||||||
{
|
{
|
||||||
if (read_tty) FD_SET(fileno(stdin),&readfds);
|
if (read_tty) openssl_fdset(fileno(stdin),&readfds);
|
||||||
if (write_tty) FD_SET(fileno(stdout),&writefds);
|
if (write_tty) openssl_fdset(fileno(stdout),&writefds);
|
||||||
}
|
}
|
||||||
if (read_ssl)
|
if (read_ssl)
|
||||||
FD_SET(SSL_get_fd(con),&readfds);
|
openssl_fdset(SSL_get_fd(con),&readfds);
|
||||||
if (write_ssl)
|
if (write_ssl)
|
||||||
FD_SET(SSL_get_fd(con),&writefds);
|
openssl_fdset(SSL_get_fd(con),&writefds);
|
||||||
#else
|
#else
|
||||||
if(!tty_on || !write_tty) {
|
if(!tty_on || !write_tty) {
|
||||||
if (read_ssl)
|
if (read_ssl)
|
||||||
FD_SET(SSL_get_fd(con),&readfds);
|
openssl_fdset(SSL_get_fd(con),&readfds);
|
||||||
if (write_ssl)
|
if (write_ssl)
|
||||||
FD_SET(SSL_get_fd(con),&writefds);
|
openssl_fdset(SSL_get_fd(con),&writefds);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
/* printf("mode tty(%d %d%d) ssl(%d%d)\n",
|
/* printf("mode tty(%d %d%d) ssl(%d%d)\n",
|
||||||
@@ -1102,6 +1312,25 @@ SSL_set_tlsext_status_ids(con, ids);
|
|||||||
} else i=select(width,(void *)&readfds,(void *)&writefds,
|
} else i=select(width,(void *)&readfds,(void *)&writefds,
|
||||||
NULL,NULL);
|
NULL,NULL);
|
||||||
}
|
}
|
||||||
|
#elif defined(OPENSSL_SYS_BEOS_R5)
|
||||||
|
/* Under BeOS-R5 the situation is similar to DOS */
|
||||||
|
i=0;
|
||||||
|
stdin_set = 0;
|
||||||
|
(void)fcntl(fileno(stdin), F_SETFL, O_NONBLOCK);
|
||||||
|
if(!write_tty) {
|
||||||
|
if(read_tty) {
|
||||||
|
tv.tv_sec = 1;
|
||||||
|
tv.tv_usec = 0;
|
||||||
|
i=select(width,(void *)&readfds,(void *)&writefds,
|
||||||
|
NULL,&tv);
|
||||||
|
if (read(fileno(stdin), sbuf, 0) >= 0)
|
||||||
|
stdin_set = 1;
|
||||||
|
if (!i && (stdin_set != 1 || !read_tty))
|
||||||
|
continue;
|
||||||
|
} else i=select(width,(void *)&readfds,(void *)&writefds,
|
||||||
|
NULL,NULL);
|
||||||
|
}
|
||||||
|
(void)fcntl(fileno(stdin), F_SETFL, 0);
|
||||||
#else
|
#else
|
||||||
i=select(width,(void *)&readfds,(void *)&writefds,
|
i=select(width,(void *)&readfds,(void *)&writefds,
|
||||||
NULL,NULL);
|
NULL,NULL);
|
||||||
@@ -1155,6 +1384,7 @@ SSL_set_tlsext_status_ids(con, ids);
|
|||||||
if (cbuf_len != 0)
|
if (cbuf_len != 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_c_out,"shutdown\n");
|
BIO_printf(bio_c_out,"shutdown\n");
|
||||||
|
ret = 0;
|
||||||
goto shut;
|
goto shut;
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
@@ -1182,8 +1412,8 @@ SSL_set_tlsext_status_ids(con, ids);
|
|||||||
goto shut;
|
goto shut;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE)
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_BEOS_R5)
|
||||||
/* Assume Windows/DOS can always write */
|
/* Assume Windows/DOS/BeOS can always write */
|
||||||
else if (!ssl_pending && write_tty)
|
else if (!ssl_pending && write_tty)
|
||||||
#else
|
#else
|
||||||
else if (!ssl_pending && FD_ISSET(fileno(stdout),&writefds))
|
else if (!ssl_pending && FD_ISSET(fileno(stdout),&writefds))
|
||||||
@@ -1192,11 +1422,12 @@ SSL_set_tlsext_status_ids(con, ids);
|
|||||||
#ifdef CHARSET_EBCDIC
|
#ifdef CHARSET_EBCDIC
|
||||||
ascii2ebcdic(&(sbuf[sbuf_off]),&(sbuf[sbuf_off]),sbuf_len);
|
ascii2ebcdic(&(sbuf[sbuf_off]),&(sbuf[sbuf_off]),sbuf_len);
|
||||||
#endif
|
#endif
|
||||||
i=write(fileno(stdout),&(sbuf[sbuf_off]),sbuf_len);
|
i=raw_write_stdout(&(sbuf[sbuf_off]),sbuf_len);
|
||||||
|
|
||||||
if (i <= 0)
|
if (i <= 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_c_out,"DONE\n");
|
BIO_printf(bio_c_out,"DONE\n");
|
||||||
|
ret = 0;
|
||||||
goto shut;
|
goto shut;
|
||||||
/* goto end; */
|
/* goto end; */
|
||||||
}
|
}
|
||||||
@@ -1251,10 +1482,12 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
|
|||||||
BIO_printf(bio_c_out,"read X BLOCK\n");
|
BIO_printf(bio_c_out,"read X BLOCK\n");
|
||||||
break;
|
break;
|
||||||
case SSL_ERROR_SYSCALL:
|
case SSL_ERROR_SYSCALL:
|
||||||
BIO_printf(bio_err,"read:errno=%d\n",get_last_socket_error());
|
ret=get_last_socket_error();
|
||||||
|
BIO_printf(bio_err,"read:errno=%d\n",ret);
|
||||||
goto shut;
|
goto shut;
|
||||||
case SSL_ERROR_ZERO_RETURN:
|
case SSL_ERROR_ZERO_RETURN:
|
||||||
BIO_printf(bio_c_out,"closed\n");
|
BIO_printf(bio_c_out,"closed\n");
|
||||||
|
ret=0;
|
||||||
goto shut;
|
goto shut;
|
||||||
case SSL_ERROR_SSL:
|
case SSL_ERROR_SSL:
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
@@ -1271,6 +1504,8 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
|
|||||||
#endif
|
#endif
|
||||||
#elif defined (OPENSSL_SYS_NETWARE)
|
#elif defined (OPENSSL_SYS_NETWARE)
|
||||||
else if (_kbhit())
|
else if (_kbhit())
|
||||||
|
#elif defined(OPENSSL_SYS_BEOS_R5)
|
||||||
|
else if (stdin_set)
|
||||||
#else
|
#else
|
||||||
else if (FD_ISSET(fileno(stdin),&readfds))
|
else if (FD_ISSET(fileno(stdin),&readfds))
|
||||||
#endif
|
#endif
|
||||||
@@ -1279,7 +1514,7 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
|
|||||||
{
|
{
|
||||||
int j, lf_num;
|
int j, lf_num;
|
||||||
|
|
||||||
i=read(fileno(stdin),cbuf,BUFSIZZ/2);
|
i=raw_read_stdin(cbuf,BUFSIZZ/2);
|
||||||
lf_num = 0;
|
lf_num = 0;
|
||||||
/* both loops are skipped when i <= 0 */
|
/* both loops are skipped when i <= 0 */
|
||||||
for (j = 0; j < i; j++)
|
for (j = 0; j < i; j++)
|
||||||
@@ -1298,11 +1533,12 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
|
|||||||
assert(lf_num == 0);
|
assert(lf_num == 0);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
i=read(fileno(stdin),cbuf,BUFSIZZ);
|
i=raw_read_stdin(cbuf,BUFSIZZ);
|
||||||
|
|
||||||
if ((!c_ign_eof) && ((i <= 0) || (cbuf[0] == 'Q')))
|
if ((!c_ign_eof) && ((i <= 0) || (cbuf[0] == 'Q')))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"DONE\n");
|
BIO_printf(bio_err,"DONE\n");
|
||||||
|
ret=0;
|
||||||
goto shut;
|
goto shut;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -1325,14 +1561,20 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
|
|||||||
read_tty=0;
|
read_tty=0;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
ret=0;
|
||||||
shut:
|
shut:
|
||||||
|
if (in_init)
|
||||||
|
print_stuff(bio_c_out,con,full_log);
|
||||||
SSL_shutdown(con);
|
SSL_shutdown(con);
|
||||||
SHUTDOWN(SSL_get_fd(con));
|
SHUTDOWN(SSL_get_fd(con));
|
||||||
ret=0;
|
|
||||||
end:
|
end:
|
||||||
if(prexit) print_stuff(bio_c_out,con,1);
|
if (con != NULL)
|
||||||
if (con != NULL) SSL_free(con);
|
{
|
||||||
if (con2 != NULL) SSL_free(con2);
|
if (prexit != 0)
|
||||||
|
print_stuff(bio_c_out,con,1);
|
||||||
|
SSL_free(con);
|
||||||
|
}
|
||||||
if (ctx != NULL) SSL_CTX_free(ctx);
|
if (ctx != NULL) SSL_CTX_free(ctx);
|
||||||
if (cert)
|
if (cert)
|
||||||
X509_free(cert);
|
X509_free(cert);
|
||||||
@@ -1361,7 +1603,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
|
|||||||
char buf[BUFSIZ];
|
char buf[BUFSIZ];
|
||||||
STACK_OF(X509) *sk;
|
STACK_OF(X509) *sk;
|
||||||
STACK_OF(X509_NAME) *sk2;
|
STACK_OF(X509_NAME) *sk2;
|
||||||
SSL_CIPHER *c;
|
const SSL_CIPHER *c;
|
||||||
X509_NAME *xn;
|
X509_NAME *xn;
|
||||||
int j,i;
|
int j,i;
|
||||||
#ifndef OPENSSL_NO_COMP
|
#ifndef OPENSSL_NO_COMP
|
||||||
@@ -1512,4 +1754,5 @@ static int ocsp_resp_cb(SSL *s, void *arg)
|
|||||||
OCSP_RESPONSE_free(rsp);
|
OCSP_RESPONSE_free(rsp);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
#endif /* ndef OPENSSL_NO_TLSEXT */
|
|
||||||
|
#endif
|
||||||
|
|||||||
332
apps/s_server.c
332
apps/s_server.c
@@ -56,7 +56,7 @@
|
|||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2001 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
@@ -113,6 +113,32 @@
|
|||||||
* ECC cipher suite support in OpenSSL originally developed by
|
* ECC cipher suite support in OpenSSL originally developed by
|
||||||
* SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
* SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project.
|
||||||
*/
|
*/
|
||||||
|
/* ====================================================================
|
||||||
|
* Copyright 2005 Nokia. All rights reserved.
|
||||||
|
*
|
||||||
|
* The portions of the attached software ("Contribution") is developed by
|
||||||
|
* Nokia Corporation and is licensed pursuant to the OpenSSL open source
|
||||||
|
* license.
|
||||||
|
*
|
||||||
|
* The Contribution, originally written by Mika Kousa and Pasi Eronen of
|
||||||
|
* Nokia Corporation, consists of the "PSK" (Pre-Shared Key) ciphersuites
|
||||||
|
* support (see RFC 4279) to OpenSSL.
|
||||||
|
*
|
||||||
|
* No patent licenses or other rights except those expressly stated in
|
||||||
|
* the OpenSSL open source license shall be deemed granted or received
|
||||||
|
* expressly, by implication, estoppel, or otherwise.
|
||||||
|
*
|
||||||
|
* No assurances are provided by Nokia that the Contribution does not
|
||||||
|
* infringe the patent or other intellectual property rights of any third
|
||||||
|
* party or that the license provides you with all the necessary rights
|
||||||
|
* to make use of the Contribution.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. IN
|
||||||
|
* ADDITION TO THE DISCLAIMERS INCLUDED IN THE LICENSE, NOKIA
|
||||||
|
* SPECIFICALLY DISCLAIMS ANY LIABILITY FOR CLAIMS BROUGHT BY YOU OR ANY
|
||||||
|
* OTHER ENTITY BASED ON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS OR
|
||||||
|
* OTHERWISE.
|
||||||
|
*/
|
||||||
|
|
||||||
/* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
/* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
||||||
* deprecated functions for openssl-internal code */
|
* deprecated functions for openssl-internal code */
|
||||||
@@ -121,11 +147,11 @@
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#include <assert.h>
|
#include <assert.h>
|
||||||
|
#include <ctype.h>
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
|
|
||||||
#include <sys/stat.h>
|
|
||||||
#include <openssl/e_os2.h>
|
#include <openssl/e_os2.h>
|
||||||
#ifdef OPENSSL_NO_STDIO
|
#ifdef OPENSSL_NO_STDIO
|
||||||
#define APPS_WIN16
|
#define APPS_WIN16
|
||||||
@@ -163,19 +189,15 @@ typedef unsigned int u_int;
|
|||||||
#include "s_apps.h"
|
#include "s_apps.h"
|
||||||
#include "timeouts.h"
|
#include "timeouts.h"
|
||||||
|
|
||||||
#ifdef OPENSSL_SYS_WINCE
|
|
||||||
/* Windows CE incorrectly defines fileno as returning void*, so to avoid problems below... */
|
|
||||||
#ifdef fileno
|
|
||||||
#undef fileno
|
|
||||||
#endif
|
|
||||||
#define fileno(a) (int)_fileno(a)
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
|
#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
|
||||||
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
|
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
|
||||||
#undef FIONBIO
|
#undef FIONBIO
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#if defined(OPENSSL_SYS_BEOS_R5)
|
||||||
|
#include <fcntl.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength);
|
static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength);
|
||||||
#endif
|
#endif
|
||||||
@@ -196,14 +218,6 @@ static DH *get_dh512(void);
|
|||||||
static void s_server_init(void);
|
static void s_server_init(void);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef S_ISDIR
|
|
||||||
# if defined(_S_IFMT) && defined(_S_IFDIR)
|
|
||||||
# define S_ISDIR(a) (((a) & _S_IFMT) == _S_IFDIR)
|
|
||||||
# else
|
|
||||||
# define S_ISDIR(a) (((a) & S_IFMT) == S_IFDIR)
|
|
||||||
# endif
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
static unsigned char dh512_p[]={
|
static unsigned char dh512_p[]={
|
||||||
0xDA,0x58,0x3C,0x16,0xD9,0x85,0x22,0x89,0xD0,0xE4,0xAF,0x75,
|
0xDA,0x58,0x3C,0x16,0xD9,0x85,0x22,0x89,0xD0,0xE4,0xAF,0x75,
|
||||||
@@ -245,7 +259,7 @@ static int accept_socket= -1;
|
|||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG s_server_main
|
#define PROG s_server_main
|
||||||
|
|
||||||
extern int verify_depth;
|
extern int verify_depth, verify_return_error;
|
||||||
|
|
||||||
static char *cipher=NULL;
|
static char *cipher=NULL;
|
||||||
static int s_server_verify=SSL_VERIFY_NONE;
|
static int s_server_verify=SSL_VERIFY_NONE;
|
||||||
@@ -283,12 +297,77 @@ static char *engine_id=NULL;
|
|||||||
static const char *session_id_prefix=NULL;
|
static const char *session_id_prefix=NULL;
|
||||||
|
|
||||||
static int enable_timeouts = 0;
|
static int enable_timeouts = 0;
|
||||||
#ifdef mtu
|
static long socket_mtu;
|
||||||
#undef mtu
|
#ifndef OPENSSL_NO_DTLS1
|
||||||
#endif
|
|
||||||
static long mtu;
|
|
||||||
static int cert_chain = 0;
|
static int cert_chain = 0;
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
static char *psk_identity="Client_identity";
|
||||||
|
char *psk_key=NULL; /* by default PSK is not used */
|
||||||
|
|
||||||
|
static unsigned int psk_server_cb(SSL *ssl, const char *identity,
|
||||||
|
unsigned char *psk, unsigned int max_psk_len)
|
||||||
|
{
|
||||||
|
unsigned int psk_len = 0;
|
||||||
|
int ret;
|
||||||
|
BIGNUM *bn = NULL;
|
||||||
|
|
||||||
|
if (s_debug)
|
||||||
|
BIO_printf(bio_s_out,"psk_server_cb\n");
|
||||||
|
if (!identity)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"Error: client did not send PSK identity\n");
|
||||||
|
goto out_err;
|
||||||
|
}
|
||||||
|
if (s_debug)
|
||||||
|
BIO_printf(bio_s_out,"identity_len=%d identity=%s\n",
|
||||||
|
identity ? (int)strlen(identity) : 0, identity);
|
||||||
|
|
||||||
|
/* here we could lookup the given identity e.g. from a database */
|
||||||
|
if (strcmp(identity, psk_identity) != 0)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_s_out, "PSK error: client identity not found"
|
||||||
|
" (got '%s' expected '%s')\n", identity,
|
||||||
|
psk_identity);
|
||||||
|
goto out_err;
|
||||||
|
}
|
||||||
|
if (s_debug)
|
||||||
|
BIO_printf(bio_s_out, "PSK client identity found\n");
|
||||||
|
|
||||||
|
/* convert the PSK key to binary */
|
||||||
|
ret = BN_hex2bn(&bn, psk_key);
|
||||||
|
if (!ret)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"Could not convert PSK key '%s' to BIGNUM\n", psk_key);
|
||||||
|
if (bn)
|
||||||
|
BN_free(bn);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
if (BN_num_bytes(bn) > (int)max_psk_len)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"psk buffer of callback is too small (%d) for key (%d)\n",
|
||||||
|
max_psk_len, BN_num_bytes(bn));
|
||||||
|
BN_free(bn);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = BN_bn2bin(bn, psk);
|
||||||
|
BN_free(bn);
|
||||||
|
|
||||||
|
if (ret < 0)
|
||||||
|
goto out_err;
|
||||||
|
psk_len = (unsigned int)ret;
|
||||||
|
|
||||||
|
if (s_debug)
|
||||||
|
BIO_printf(bio_s_out, "fetched PSK len=%d\n", psk_len);
|
||||||
|
return psk_len;
|
||||||
|
out_err:
|
||||||
|
if (s_debug)
|
||||||
|
BIO_printf(bio_err, "Error in PSK server callback\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
#ifdef MONOLITH
|
#ifdef MONOLITH
|
||||||
static void s_server_init(void)
|
static void s_server_init(void)
|
||||||
@@ -353,7 +432,7 @@ static void sv_usage(void)
|
|||||||
#ifndef OPENSSL_NO_ECDH
|
#ifndef OPENSSL_NO_ECDH
|
||||||
BIO_printf(bio_err," -named_curve arg - Elliptic curve name to use for ephemeral ECDH keys.\n" \
|
BIO_printf(bio_err," -named_curve arg - Elliptic curve name to use for ephemeral ECDH keys.\n" \
|
||||||
" Use \"openssl ecparam -list_curves\" for all names\n" \
|
" Use \"openssl ecparam -list_curves\" for all names\n" \
|
||||||
" (default is sect163r2).\n");
|
" (default is nistp256).\n");
|
||||||
#endif
|
#endif
|
||||||
#ifdef FIONBIO
|
#ifdef FIONBIO
|
||||||
BIO_printf(bio_err," -nbio - Run with non-blocking IO\n");
|
BIO_printf(bio_err," -nbio - Run with non-blocking IO\n");
|
||||||
@@ -370,12 +449,19 @@ static void sv_usage(void)
|
|||||||
BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
|
BIO_printf(bio_err," -serverpref - Use server's cipher preferences\n");
|
||||||
BIO_printf(bio_err," -quiet - No server output\n");
|
BIO_printf(bio_err," -quiet - No server output\n");
|
||||||
BIO_printf(bio_err," -no_tmp_rsa - Do not generate a tmp RSA key\n");
|
BIO_printf(bio_err," -no_tmp_rsa - Do not generate a tmp RSA key\n");
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
BIO_printf(bio_err," -psk_hint arg - PSK identity hint to use\n");
|
||||||
|
BIO_printf(bio_err," -psk arg - PSK in hex (without 0x)\n");
|
||||||
|
# ifndef OPENSSL_NO_JPAKE
|
||||||
|
BIO_printf(bio_err," -jpake arg - JPAKE secret to use\n");
|
||||||
|
# endif
|
||||||
|
#endif
|
||||||
BIO_printf(bio_err," -ssl2 - Just talk SSLv2\n");
|
BIO_printf(bio_err," -ssl2 - Just talk SSLv2\n");
|
||||||
BIO_printf(bio_err," -ssl3 - Just talk SSLv3\n");
|
BIO_printf(bio_err," -ssl3 - Just talk SSLv3\n");
|
||||||
BIO_printf(bio_err," -tls1 - Just talk TLSv1\n");
|
BIO_printf(bio_err," -tls1 - Just talk TLSv1\n");
|
||||||
BIO_printf(bio_err," -dtls1 - Just talk DTLSv1\n");
|
BIO_printf(bio_err," -dtls1 - Just talk DTLSv1\n");
|
||||||
BIO_printf(bio_err," -timeout - Enable timeouts\n");
|
BIO_printf(bio_err," -timeout - Enable timeouts\n");
|
||||||
BIO_printf(bio_err," -mtu - Set MTU\n");
|
BIO_printf(bio_err," -mtu - Set link layer MTU\n");
|
||||||
BIO_printf(bio_err," -chain - Read a certificate chain\n");
|
BIO_printf(bio_err," -chain - Read a certificate chain\n");
|
||||||
BIO_printf(bio_err," -no_ssl2 - Just disable SSLv2\n");
|
BIO_printf(bio_err," -no_ssl2 - Just disable SSLv2\n");
|
||||||
BIO_printf(bio_err," -no_ssl3 - Just disable SSLv3\n");
|
BIO_printf(bio_err," -no_ssl3 - Just disable SSLv3\n");
|
||||||
@@ -587,7 +673,7 @@ static int MS_CALLBACK ssl_servername_cb(SSL *s, int *ad, void *arg)
|
|||||||
return p->extension_error;
|
return p->extension_error;
|
||||||
if (ctx2)
|
if (ctx2)
|
||||||
{
|
{
|
||||||
BIO_printf(p->biodebug,"Swiching server context.\n");
|
BIO_printf(p->biodebug,"Switching server context.\n");
|
||||||
SSL_set_SSL_CTX(s,ctx2);
|
SSL_set_SSL_CTX(s,ctx2);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -626,7 +712,7 @@ static int cert_status_cb(SSL *s, void *arg)
|
|||||||
int use_ssl;
|
int use_ssl;
|
||||||
unsigned char *rspder = NULL;
|
unsigned char *rspder = NULL;
|
||||||
int rspderlen;
|
int rspderlen;
|
||||||
STACK *aia = NULL;
|
STACK_OF(STRING) *aia = NULL;
|
||||||
X509 *x = NULL;
|
X509 *x = NULL;
|
||||||
X509_STORE_CTX inctx;
|
X509_STORE_CTX inctx;
|
||||||
X509_OBJECT obj;
|
X509_OBJECT obj;
|
||||||
@@ -648,7 +734,7 @@ BIO_printf(err, "cert_status: received %d ids\n", sk_OCSP_RESPID_num(ids));
|
|||||||
aia = X509_get1_ocsp(x);
|
aia = X509_get1_ocsp(x);
|
||||||
if (aia)
|
if (aia)
|
||||||
{
|
{
|
||||||
if (!OCSP_parse_url(sk_value(aia, 0),
|
if (!OCSP_parse_url(sk_STRING_value(aia, 0),
|
||||||
&host, &port, &path, &use_ssl))
|
&host, &port, &path, &use_ssl))
|
||||||
{
|
{
|
||||||
BIO_puts(err, "cert_status: can't parse AIA URL\n");
|
BIO_puts(err, "cert_status: can't parse AIA URL\n");
|
||||||
@@ -656,7 +742,7 @@ BIO_printf(err, "cert_status: received %d ids\n", sk_OCSP_RESPID_num(ids));
|
|||||||
}
|
}
|
||||||
if (srctx->verbose)
|
if (srctx->verbose)
|
||||||
BIO_printf(err, "cert_status: AIA URL: %s\n",
|
BIO_printf(err, "cert_status: AIA URL: %s\n",
|
||||||
sk_value(aia, 0));
|
sk_STRING_value(aia, 0));
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
@@ -740,12 +826,17 @@ BIO_printf(err, "cert_status: received %d ids\n", sk_OCSP_RESPID_num(ids));
|
|||||||
goto done;
|
goto done;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_JPAKE
|
||||||
|
static char *jpake_secret = NULL;
|
||||||
|
#endif
|
||||||
|
|
||||||
int MAIN(int argc, char *argv[])
|
int MAIN(int argc, char *argv[])
|
||||||
{
|
{
|
||||||
X509_STORE *store = NULL;
|
X509_VERIFY_PARAM *vpm = NULL;
|
||||||
int vflags = 0;
|
int badarg = 0;
|
||||||
short port=PORT;
|
short port=PORT;
|
||||||
char *CApath=NULL,*CAfile=NULL;
|
char *CApath=NULL,*CAfile=NULL;
|
||||||
unsigned char *context = NULL;
|
unsigned char *context = NULL;
|
||||||
@@ -758,11 +849,9 @@ int MAIN(int argc, char *argv[])
|
|||||||
int off=0;
|
int off=0;
|
||||||
int no_tmp_rsa=0,no_dhe=0,no_ecdhe=0,nocert=0;
|
int no_tmp_rsa=0,no_dhe=0,no_ecdhe=0,nocert=0;
|
||||||
int state=0;
|
int state=0;
|
||||||
SSL_METHOD *meth=NULL;
|
const SSL_METHOD *meth=NULL;
|
||||||
int socket_type=SOCK_STREAM;
|
int socket_type=SOCK_STREAM;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
ENGINE *e=NULL;
|
ENGINE *e=NULL;
|
||||||
#endif
|
|
||||||
char *inrand=NULL;
|
char *inrand=NULL;
|
||||||
int s_cert_format = FORMAT_PEM, s_key_format = FORMAT_PEM;
|
int s_cert_format = FORMAT_PEM, s_key_format = FORMAT_PEM;
|
||||||
char *passarg = NULL, *pass = NULL;
|
char *passarg = NULL, *pass = NULL;
|
||||||
@@ -774,11 +863,13 @@ int MAIN(int argc, char *argv[])
|
|||||||
EVP_PKEY *s_key2 = NULL;
|
EVP_PKEY *s_key2 = NULL;
|
||||||
X509 *s_cert2 = NULL;
|
X509 *s_cert2 = NULL;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_TLSEXT
|
#ifndef OPENSSL_NO_TLSEXT
|
||||||
tlsextctx tlsextcbp = {NULL, NULL, SSL_TLSEXT_ERR_ALERT_WARNING};
|
tlsextctx tlsextcbp = {NULL, NULL, SSL_TLSEXT_ERR_ALERT_WARNING};
|
||||||
#endif
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
/* by default do not send a PSK identity hint */
|
||||||
|
static char *psk_identity_hint=NULL;
|
||||||
|
#endif
|
||||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
||||||
meth=SSLv23_server_method();
|
meth=SSLv23_server_method();
|
||||||
#elif !defined(OPENSSL_NO_SSL3)
|
#elif !defined(OPENSSL_NO_SSL3)
|
||||||
@@ -910,14 +1001,14 @@ int MAIN(int argc, char *argv[])
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
CApath= *(++argv);
|
CApath= *(++argv);
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-crl_check") == 0)
|
else if (args_verify(&argv, &argc, &badarg, bio_err, &vpm))
|
||||||
{
|
{
|
||||||
vflags |= X509_V_FLAG_CRL_CHECK;
|
if (badarg)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-crl_check_all") == 0)
|
continue;
|
||||||
{
|
|
||||||
vflags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
|
|
||||||
}
|
}
|
||||||
|
else if (strcmp(*argv,"-verify_return_error") == 0)
|
||||||
|
verify_return_error = 1;
|
||||||
else if (strcmp(*argv,"-serverpref") == 0)
|
else if (strcmp(*argv,"-serverpref") == 0)
|
||||||
{ off|=SSL_OP_CIPHER_SERVER_PREFERENCE; }
|
{ off|=SSL_OP_CIPHER_SERVER_PREFERENCE; }
|
||||||
else if (strcmp(*argv,"-cipher") == 0)
|
else if (strcmp(*argv,"-cipher") == 0)
|
||||||
@@ -992,6 +1083,27 @@ int MAIN(int argc, char *argv[])
|
|||||||
{ no_dhe=1; }
|
{ no_dhe=1; }
|
||||||
else if (strcmp(*argv,"-no_ecdhe") == 0)
|
else if (strcmp(*argv,"-no_ecdhe") == 0)
|
||||||
{ no_ecdhe=1; }
|
{ no_ecdhe=1; }
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
else if (strcmp(*argv,"-psk_hint") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) goto bad;
|
||||||
|
psk_identity_hint= *(++argv);
|
||||||
|
}
|
||||||
|
else if (strcmp(*argv,"-psk") == 0)
|
||||||
|
{
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
if (--argc < 1) goto bad;
|
||||||
|
psk_key=*(++argv);
|
||||||
|
for (i=0; i<strlen(psk_key); i++)
|
||||||
|
{
|
||||||
|
if (isxdigit((int)psk_key[i]))
|
||||||
|
continue;
|
||||||
|
BIO_printf(bio_err,"Not a hex number '%s'\n",*argv);
|
||||||
|
goto bad;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
else if (strcmp(*argv,"-www") == 0)
|
else if (strcmp(*argv,"-www") == 0)
|
||||||
{ www=1; }
|
{ www=1; }
|
||||||
else if (strcmp(*argv,"-WWW") == 0)
|
else if (strcmp(*argv,"-WWW") == 0)
|
||||||
@@ -1004,6 +1116,8 @@ int MAIN(int argc, char *argv[])
|
|||||||
{ off|=SSL_OP_NO_SSLv3; }
|
{ off|=SSL_OP_NO_SSLv3; }
|
||||||
else if (strcmp(*argv,"-no_tls1") == 0)
|
else if (strcmp(*argv,"-no_tls1") == 0)
|
||||||
{ off|=SSL_OP_NO_TLSv1; }
|
{ off|=SSL_OP_NO_TLSv1; }
|
||||||
|
else if (strcmp(*argv,"-no_comp") == 0)
|
||||||
|
{ off|=SSL_OP_NO_COMPRESSION; }
|
||||||
#ifndef OPENSSL_NO_TLSEXT
|
#ifndef OPENSSL_NO_TLSEXT
|
||||||
else if (strcmp(*argv,"-no_ticket") == 0)
|
else if (strcmp(*argv,"-no_ticket") == 0)
|
||||||
{ off|=SSL_OP_NO_TICKET; }
|
{ off|=SSL_OP_NO_TICKET; }
|
||||||
@@ -1031,7 +1145,7 @@ int MAIN(int argc, char *argv[])
|
|||||||
else if (strcmp(*argv,"-mtu") == 0)
|
else if (strcmp(*argv,"-mtu") == 0)
|
||||||
{
|
{
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
mtu = atol(*(++argv));
|
socket_mtu = atol(*(++argv));
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv, "-chain") == 0)
|
else if (strcmp(*argv, "-chain") == 0)
|
||||||
cert_chain = 1;
|
cert_chain = 1;
|
||||||
@@ -1071,6 +1185,14 @@ int MAIN(int argc, char *argv[])
|
|||||||
if (--argc < 1) goto bad;
|
if (--argc < 1) goto bad;
|
||||||
s_key_file2= *(++argv);
|
s_key_file2= *(++argv);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#endif
|
||||||
|
#if !defined(OPENSSL_NO_JPAKE) && !defined(OPENSSL_NO_PSK)
|
||||||
|
else if (strcmp(*argv,"-jpake") == 0)
|
||||||
|
{
|
||||||
|
if (--argc < 1) goto bad;
|
||||||
|
jpake_secret = *(++argv);
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
@@ -1088,6 +1210,26 @@ bad:
|
|||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#if !defined(OPENSSL_NO_JPAKE) && !defined(OPENSSL_NO_PSK)
|
||||||
|
if (jpake_secret)
|
||||||
|
{
|
||||||
|
if (psk_key)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Can't use JPAKE and PSK together\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
psk_identity = "JPAKE";
|
||||||
|
if (cipher)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "JPAKE sets cipher to PSK\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
cipher = "PSK";
|
||||||
|
}
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|
||||||
SSL_load_error_strings();
|
SSL_load_error_strings();
|
||||||
OpenSSL_add_ssl_algorithms();
|
OpenSSL_add_ssl_algorithms();
|
||||||
|
|
||||||
@@ -1150,6 +1292,8 @@ bad:
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
if (s_dcert_file)
|
if (s_dcert_file)
|
||||||
{
|
{
|
||||||
|
|
||||||
@@ -1266,8 +1410,9 @@ bad:
|
|||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
/* goto end; */
|
/* goto end; */
|
||||||
}
|
}
|
||||||
store = SSL_CTX_get_cert_store(ctx);
|
if (vpm)
|
||||||
X509_STORE_set_flags(store, vflags);
|
SSL_CTX_set1_param(ctx, vpm);
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_TLSEXT
|
#ifndef OPENSSL_NO_TLSEXT
|
||||||
if (s_cert2)
|
if (s_cert2)
|
||||||
{
|
{
|
||||||
@@ -1303,13 +1448,11 @@ bad:
|
|||||||
if (bugs) SSL_CTX_set_options(ctx2,SSL_OP_ALL);
|
if (bugs) SSL_CTX_set_options(ctx2,SSL_OP_ALL);
|
||||||
if (hack) SSL_CTX_set_options(ctx2,SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG);
|
if (hack) SSL_CTX_set_options(ctx2,SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG);
|
||||||
SSL_CTX_set_options(ctx2,off);
|
SSL_CTX_set_options(ctx2,off);
|
||||||
|
|
||||||
/* DTLS: partial reads end up discarding unread UDP bytes :-(
|
/* DTLS: partial reads end up discarding unread UDP bytes :-(
|
||||||
* Setting read ahead solves this problem.
|
* Setting read ahead solves this problem.
|
||||||
*/
|
*/
|
||||||
if (socket_type == SOCK_DGRAM) SSL_CTX_set_read_ahead(ctx2, 1);
|
if (socket_type == SOCK_DGRAM) SSL_CTX_set_read_ahead(ctx2, 1);
|
||||||
|
|
||||||
|
|
||||||
if (state) SSL_CTX_set_info_callback(ctx2,apps_ssl_info_callback);
|
if (state) SSL_CTX_set_info_callback(ctx2,apps_ssl_info_callback);
|
||||||
|
|
||||||
SSL_CTX_sess_set_cache_size(ctx2,128);
|
SSL_CTX_sess_set_cache_size(ctx2,128);
|
||||||
@@ -1319,12 +1462,11 @@ bad:
|
|||||||
{
|
{
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
}
|
}
|
||||||
store = SSL_CTX_get_cert_store(ctx2);
|
if (vpm)
|
||||||
X509_STORE_set_flags(store, vflags);
|
SSL_CTX_set1_param(ctx2, vpm);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
if (!no_dhe)
|
if (!no_dhe)
|
||||||
{
|
{
|
||||||
@@ -1400,10 +1542,10 @@ bad:
|
|||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_s_out,"Using default temp ECDH parameters\n");
|
BIO_printf(bio_s_out,"Using default temp ECDH parameters\n");
|
||||||
ecdh = EC_KEY_new_by_curve_name(NID_sect163r2);
|
ecdh = EC_KEY_new_by_curve_name(NID_X9_62_prime256v1);
|
||||||
if (ecdh == NULL)
|
if (ecdh == NULL)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "unable to create curve (sect163r2)\n");
|
BIO_printf(bio_err, "unable to create curve (nistp256)\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -1471,11 +1613,34 @@ bad:
|
|||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_PSK
|
||||||
|
#ifdef OPENSSL_NO_JPAKE
|
||||||
|
if (psk_key != NULL)
|
||||||
|
#else
|
||||||
|
if (psk_key != NULL || jpake_secret)
|
||||||
|
#endif
|
||||||
|
{
|
||||||
|
if (s_debug)
|
||||||
|
BIO_printf(bio_s_out, "PSK key given or JPAKE in use, setting server callback\n");
|
||||||
|
SSL_CTX_set_psk_server_callback(ctx, psk_server_cb);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!SSL_CTX_use_psk_identity_hint(ctx, psk_identity_hint))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err,"error setting PSK identity hint to context\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
if (cipher != NULL)
|
if (cipher != NULL)
|
||||||
if(!SSL_CTX_set_cipher_list(ctx,cipher)) {
|
{
|
||||||
|
if(!SSL_CTX_set_cipher_list(ctx,cipher))
|
||||||
|
{
|
||||||
BIO_printf(bio_err,"error setting cipher list\n");
|
BIO_printf(bio_err,"error setting cipher list\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
|
}
|
||||||
#ifndef OPENSSL_NO_TLSEXT
|
#ifndef OPENSSL_NO_TLSEXT
|
||||||
if (ctx2 && !SSL_CTX_set_cipher_list(ctx2,cipher))
|
if (ctx2 && !SSL_CTX_set_cipher_list(ctx2,cipher))
|
||||||
{
|
{
|
||||||
@@ -1503,6 +1668,7 @@ bad:
|
|||||||
SSL_CTX_set_tlsext_servername_arg(ctx, &tlsextcbp);
|
SSL_CTX_set_tlsext_servername_arg(ctx, &tlsextcbp);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (CAfile != NULL)
|
if (CAfile != NULL)
|
||||||
{
|
{
|
||||||
SSL_CTX_set_client_CA_list(ctx,SSL_load_client_CA_file(CAfile));
|
SSL_CTX_set_client_CA_list(ctx,SSL_load_client_CA_file(CAfile));
|
||||||
@@ -1511,7 +1677,9 @@ bad:
|
|||||||
SSL_CTX_set_client_CA_list(ctx2,SSL_load_client_CA_file(CAfile));
|
SSL_CTX_set_client_CA_list(ctx2,SSL_load_client_CA_file(CAfile));
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
BIO_printf(bio_s_out,"ACCEPT\n");
|
BIO_printf(bio_s_out,"ACCEPT\n");
|
||||||
|
(void)BIO_flush(bio_s_out);
|
||||||
if (www)
|
if (www)
|
||||||
do_server(port,socket_type,&accept_socket,www_body, context);
|
do_server(port,socket_type,&accept_socket,www_body, context);
|
||||||
else
|
else
|
||||||
@@ -1582,7 +1750,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
|||||||
unsigned long l;
|
unsigned long l;
|
||||||
SSL *con=NULL;
|
SSL *con=NULL;
|
||||||
BIO *sbio;
|
BIO *sbio;
|
||||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE)
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_NETWARE) || defined(OPENSSL_SYS_BEOS_R5)
|
||||||
struct timeval tv;
|
struct timeval tv;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -1632,6 +1800,11 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
|||||||
strlen((char *)context));
|
strlen((char *)context));
|
||||||
}
|
}
|
||||||
SSL_clear(con);
|
SSL_clear(con);
|
||||||
|
#if 0
|
||||||
|
#ifdef TLSEXT_TYPE_opaque_prf_input
|
||||||
|
SSL_set_tlsext_opaque_prf_input(con, "Test server", 11);
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
if (SSL_version(con) == DTLS1_VERSION)
|
if (SSL_version(con) == DTLS1_VERSION)
|
||||||
{
|
{
|
||||||
@@ -1650,11 +1823,10 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
|||||||
BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_SEND_TIMEOUT, 0, &timeout);
|
BIO_ctrl(sbio, BIO_CTRL_DGRAM_SET_SEND_TIMEOUT, 0, &timeout);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (socket_mtu > 28)
|
||||||
if ( mtu > 0)
|
|
||||||
{
|
{
|
||||||
SSL_set_options(con, SSL_OP_NO_QUERY_MTU);
|
SSL_set_options(con, SSL_OP_NO_QUERY_MTU);
|
||||||
SSL_set_mtu(con, mtu);
|
SSL_set_mtu(con, socket_mtu - 28);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
/* want to do MTU discovery */
|
/* want to do MTU discovery */
|
||||||
@@ -1673,6 +1845,11 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
|||||||
test=BIO_new(BIO_f_nbio_test());
|
test=BIO_new(BIO_f_nbio_test());
|
||||||
sbio=BIO_push(test,sbio);
|
sbio=BIO_push(test,sbio);
|
||||||
}
|
}
|
||||||
|
#ifndef OPENSSL_NO_JPAKE
|
||||||
|
if(jpake_secret)
|
||||||
|
jpake_server_auth(bio_s_out, sbio, jpake_secret);
|
||||||
|
#endif
|
||||||
|
|
||||||
SSL_set_bio(con,sbio,sbio);
|
SSL_set_bio(con,sbio,sbio);
|
||||||
SSL_set_accept_state(con);
|
SSL_set_accept_state(con);
|
||||||
/* SSL_set_fd(con,s); */
|
/* SSL_set_fd(con,s); */
|
||||||
@@ -1708,10 +1885,10 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
|||||||
if (!read_from_sslcon)
|
if (!read_from_sslcon)
|
||||||
{
|
{
|
||||||
FD_ZERO(&readfds);
|
FD_ZERO(&readfds);
|
||||||
#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_NETWARE)
|
#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_NETWARE) && !defined(OPENSSL_SYS_BEOS_R5)
|
||||||
FD_SET(fileno(stdin),&readfds);
|
openssl_fdset(fileno(stdin),&readfds);
|
||||||
#endif
|
#endif
|
||||||
FD_SET(s,&readfds);
|
openssl_fdset(s,&readfds);
|
||||||
/* Note: under VMS with SOCKETSHR the second parameter is
|
/* Note: under VMS with SOCKETSHR the second parameter is
|
||||||
* currently of type (int *) whereas under other systems
|
* currently of type (int *) whereas under other systems
|
||||||
* it is (void *) if you don't have a cast it will choke
|
* it is (void *) if you don't have a cast it will choke
|
||||||
@@ -1730,6 +1907,17 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
|||||||
if((i < 0) || (!i && !_kbhit() ) )continue;
|
if((i < 0) || (!i && !_kbhit() ) )continue;
|
||||||
if(_kbhit())
|
if(_kbhit())
|
||||||
read_from_terminal = 1;
|
read_from_terminal = 1;
|
||||||
|
#elif defined(OPENSSL_SYS_BEOS_R5)
|
||||||
|
/* Under BeOS-R5 the situation is similar to DOS */
|
||||||
|
tv.tv_sec = 1;
|
||||||
|
tv.tv_usec = 0;
|
||||||
|
(void)fcntl(fileno(stdin), F_SETFL, O_NONBLOCK);
|
||||||
|
i=select(width,(void *)&readfds,NULL,NULL,&tv);
|
||||||
|
if ((i < 0) || (!i && read(fileno(stdin), buf, 0) < 0))
|
||||||
|
continue;
|
||||||
|
if (read(fileno(stdin), buf, 0) >= 0)
|
||||||
|
read_from_terminal = 1;
|
||||||
|
(void)fcntl(fileno(stdin), F_SETFL, 0);
|
||||||
#else
|
#else
|
||||||
i=select(width,(void *)&readfds,NULL,NULL,NULL);
|
i=select(width,(void *)&readfds,NULL,NULL,NULL);
|
||||||
if (i <= 0) continue;
|
if (i <= 0) continue;
|
||||||
@@ -1745,7 +1933,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
|||||||
{
|
{
|
||||||
int j, lf_num;
|
int j, lf_num;
|
||||||
|
|
||||||
i=read(fileno(stdin), buf, bufsize/2);
|
i=raw_read_stdin(buf, bufsize/2);
|
||||||
lf_num = 0;
|
lf_num = 0;
|
||||||
/* both loops are skipped when i <= 0 */
|
/* both loops are skipped when i <= 0 */
|
||||||
for (j = 0; j < i; j++)
|
for (j = 0; j < i; j++)
|
||||||
@@ -1764,7 +1952,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
|||||||
assert(lf_num == 0);
|
assert(lf_num == 0);
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
i=read(fileno(stdin),buf,bufsize);
|
i=raw_read_stdin(buf,bufsize);
|
||||||
if (!s_quiet)
|
if (!s_quiet)
|
||||||
{
|
{
|
||||||
if ((i <= 0) || (buf[0] == 'Q'))
|
if ((i <= 0) || (buf[0] == 'Q'))
|
||||||
@@ -1784,6 +1972,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
|
|||||||
ret= -11;*/
|
ret= -11;*/
|
||||||
goto err;
|
goto err;
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((buf[0] == 'r') &&
|
if ((buf[0] == 'r') &&
|
||||||
((buf[1] == '\n') || (buf[1] == '\r')))
|
((buf[1] == '\n') || (buf[1] == '\r')))
|
||||||
{
|
{
|
||||||
@@ -1880,7 +2069,7 @@ again:
|
|||||||
#ifdef CHARSET_EBCDIC
|
#ifdef CHARSET_EBCDIC
|
||||||
ascii2ebcdic(buf,buf,i);
|
ascii2ebcdic(buf,buf,i);
|
||||||
#endif
|
#endif
|
||||||
write(fileno(stdout),buf,
|
raw_write_stdout(buf,
|
||||||
(unsigned int)i);
|
(unsigned int)i);
|
||||||
if (SSL_pending(con)) goto again;
|
if (SSL_pending(con)) goto again;
|
||||||
break;
|
break;
|
||||||
@@ -1904,13 +2093,16 @@ again:
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
err:
|
err:
|
||||||
|
if (con != NULL)
|
||||||
|
{
|
||||||
BIO_printf(bio_s_out,"shutting down SSL\n");
|
BIO_printf(bio_s_out,"shutting down SSL\n");
|
||||||
#if 1
|
#if 1
|
||||||
SSL_set_shutdown(con,SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN);
|
SSL_set_shutdown(con,SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN);
|
||||||
#else
|
#else
|
||||||
SSL_shutdown(con);
|
SSL_shutdown(con);
|
||||||
#endif
|
#endif
|
||||||
if (con != NULL) SSL_free(con);
|
SSL_free(con);
|
||||||
|
}
|
||||||
BIO_printf(bio_s_out,"CONNECTION CLOSED\n");
|
BIO_printf(bio_s_out,"CONNECTION CLOSED\n");
|
||||||
if (buf != NULL)
|
if (buf != NULL)
|
||||||
{
|
{
|
||||||
@@ -2032,9 +2224,8 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
|||||||
char *buf=NULL;
|
char *buf=NULL;
|
||||||
int ret=1;
|
int ret=1;
|
||||||
int i,j,k,blank,dot;
|
int i,j,k,blank,dot;
|
||||||
struct stat st_buf;
|
|
||||||
SSL *con;
|
SSL *con;
|
||||||
SSL_CIPHER *c;
|
const SSL_CIPHER *c;
|
||||||
BIO *io,*ssl_bio,*sbio;
|
BIO *io,*ssl_bio,*sbio;
|
||||||
long total_bytes;
|
long total_bytes;
|
||||||
|
|
||||||
@@ -2304,14 +2495,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
/* if a directory, do the index thang */
|
/* if a directory, do the index thang */
|
||||||
if (stat(p,&st_buf) < 0)
|
if (app_isdir(p)>0)
|
||||||
{
|
|
||||||
BIO_puts(io,text);
|
|
||||||
BIO_printf(io,"Error accessing '%s'\r\n",p);
|
|
||||||
ERR_print_errors(io);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
if (S_ISDIR(st_buf.st_mode))
|
|
||||||
{
|
{
|
||||||
#if 0 /* must check buffer size */
|
#if 0 /* must check buffer size */
|
||||||
strcat(p,"/index.html");
|
strcat(p,"/index.html");
|
||||||
|
|||||||
@@ -231,13 +231,11 @@ static int ssl_sock_init(void)
|
|||||||
int init_client(int *sock, char *host, int port, int type)
|
int init_client(int *sock, char *host, int port, int type)
|
||||||
{
|
{
|
||||||
unsigned char ip[4];
|
unsigned char ip[4];
|
||||||
short p=0;
|
|
||||||
|
|
||||||
if (!host_ip(host,&(ip[0])))
|
if (!host_ip(host,&(ip[0])))
|
||||||
{
|
{
|
||||||
return(0);
|
return(0);
|
||||||
}
|
}
|
||||||
if (p != 0) port=p;
|
|
||||||
return(init_client_ip(sock,ip,port,type));
|
return(init_client_ip(sock,ip,port,type));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -266,7 +264,7 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
|
|||||||
|
|
||||||
if (s == INVALID_SOCKET) { perror("socket"); return(0); }
|
if (s == INVALID_SOCKET) { perror("socket"); return(0); }
|
||||||
|
|
||||||
#ifndef OPENSSL_SYS_MPE
|
#if defined(SO_KEEPALIVE) && !defined(OPENSSL_SYS_MPE)
|
||||||
if (type == SOCK_STREAM)
|
if (type == SOCK_STREAM)
|
||||||
{
|
{
|
||||||
i=0;
|
i=0;
|
||||||
@@ -276,7 +274,7 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port, int type)
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (connect(s,(struct sockaddr *)&them,sizeof(them)) == -1)
|
if (connect(s,(struct sockaddr *)&them,sizeof(them)) == -1)
|
||||||
{ close(s); perror("connect"); return(0); }
|
{ closesocket(s); perror("connect"); return(0); }
|
||||||
*sock=s;
|
*sock=s;
|
||||||
return(1);
|
return(1);
|
||||||
}
|
}
|
||||||
@@ -285,7 +283,7 @@ int do_server(int port, int type, int *ret, int (*cb)(char *hostname, int s, uns
|
|||||||
{
|
{
|
||||||
int sock;
|
int sock;
|
||||||
char *name = NULL;
|
char *name = NULL;
|
||||||
int accept_socket;
|
int accept_socket = 0;
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
if (!init_server(&accept_socket,port,type)) return(0);
|
if (!init_server(&accept_socket,port,type)) return(0);
|
||||||
|
|||||||
109
apps/s_time.c
109
apps/s_time.c
@@ -85,54 +85,6 @@
|
|||||||
#include OPENSSL_UNISTD
|
#include OPENSSL_UNISTD
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if !defined(OPENSSL_SYS_NETWARE) && !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_VXWORKS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC))
|
|
||||||
#define TIMES
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef _IRIX
|
|
||||||
#include <time.h>
|
|
||||||
#endif
|
|
||||||
#ifdef TIMES
|
|
||||||
#include <sys/types.h>
|
|
||||||
#include <sys/times.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Depending on the VMS version, the tms structure is perhaps defined.
|
|
||||||
The __TMS macro will show if it was. If it wasn't defined, we should
|
|
||||||
undefine TIMES, since that tells the rest of the program how things
|
|
||||||
should be handled. -- Richard Levitte */
|
|
||||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS)
|
|
||||||
#undef TIMES
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if !defined(TIMES) && !defined(OPENSSL_SYS_VXWORKS) && !defined(OPENSSL_SYS_NETWARE)
|
|
||||||
#include <sys/timeb.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(sun) || defined(__ultrix)
|
|
||||||
#define _POSIX_SOURCE
|
|
||||||
#include <limits.h>
|
|
||||||
#include <sys/param.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* The following if from times(3) man page. It may need to be changed
|
|
||||||
*/
|
|
||||||
#ifndef HZ
|
|
||||||
# ifdef _SC_CLK_TCK
|
|
||||||
# define HZ ((double)sysconf(_SC_CLK_TCK))
|
|
||||||
# else
|
|
||||||
# ifndef CLK_TCK
|
|
||||||
# ifndef _BSD_CLK_TCK_ /* FreeBSD hack */
|
|
||||||
# define HZ 100.0
|
|
||||||
# else /* _BSD_CLK_TCK_ */
|
|
||||||
# define HZ ((double)_BSD_CLK_TCK_)
|
|
||||||
# endif
|
|
||||||
# else /* CLK_TCK */
|
|
||||||
# define HZ ((double)CLK_TCK)
|
|
||||||
# endif
|
|
||||||
# endif
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG s_time_main
|
#define PROG s_time_main
|
||||||
|
|
||||||
@@ -177,7 +129,7 @@ static char *tm_cipher=NULL;
|
|||||||
static int tm_verify = SSL_VERIFY_NONE;
|
static int tm_verify = SSL_VERIFY_NONE;
|
||||||
static int maxTime = SECONDS;
|
static int maxTime = SECONDS;
|
||||||
static SSL_CTX *tm_ctx=NULL;
|
static SSL_CTX *tm_ctx=NULL;
|
||||||
static SSL_METHOD *s_time_meth=NULL;
|
static const SSL_METHOD *s_time_meth=NULL;
|
||||||
static char *s_www_path=NULL;
|
static char *s_www_path=NULL;
|
||||||
static long bytes_read=0;
|
static long bytes_read=0;
|
||||||
static int st_bugs=0;
|
static int st_bugs=0;
|
||||||
@@ -372,62 +324,7 @@ bad:
|
|||||||
|
|
||||||
static double tm_Time_F(int s)
|
static double tm_Time_F(int s)
|
||||||
{
|
{
|
||||||
static double ret;
|
return app_tminterval(s,1);
|
||||||
#ifdef TIMES
|
|
||||||
static struct tms tstart,tend;
|
|
||||||
|
|
||||||
if(s == START) {
|
|
||||||
times(&tstart);
|
|
||||||
return(0);
|
|
||||||
} else {
|
|
||||||
times(&tend);
|
|
||||||
ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
|
|
||||||
return((ret == 0.0)?1e-6:ret);
|
|
||||||
}
|
|
||||||
#elif defined(OPENSSL_SYS_NETWARE)
|
|
||||||
static clock_t tstart,tend;
|
|
||||||
|
|
||||||
if (s == START)
|
|
||||||
{
|
|
||||||
tstart=clock();
|
|
||||||
return(0);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
tend=clock();
|
|
||||||
ret=(double)((double)(tend)-(double)(tstart));
|
|
||||||
return((ret < 0.001)?0.001:ret);
|
|
||||||
}
|
|
||||||
#elif defined(OPENSSL_SYS_VXWORKS)
|
|
||||||
{
|
|
||||||
static unsigned long tick_start, tick_end;
|
|
||||||
|
|
||||||
if( s == START )
|
|
||||||
{
|
|
||||||
tick_start = tickGet();
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
tick_end = tickGet();
|
|
||||||
ret = (double)(tick_end - tick_start) / (double)sysClkRateGet();
|
|
||||||
return((ret == 0.0)?1e-6:ret);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#else /* !times() */
|
|
||||||
static struct timeb tstart,tend;
|
|
||||||
long i;
|
|
||||||
|
|
||||||
if(s == START) {
|
|
||||||
ftime(&tstart);
|
|
||||||
return(0);
|
|
||||||
} else {
|
|
||||||
ftime(&tend);
|
|
||||||
i=(long)tend.millitm-(long)tstart.millitm;
|
|
||||||
ret=((double)(tend.time-tstart.time))+((double)i)/1000.0;
|
|
||||||
return((ret == 0.0)?1e-6:ret);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/***********************************************************************
|
/***********************************************************************
|
||||||
@@ -704,7 +601,7 @@ static SSL *doConnection(SSL *scon)
|
|||||||
i=SSL_get_fd(serverCon);
|
i=SSL_get_fd(serverCon);
|
||||||
width=i+1;
|
width=i+1;
|
||||||
FD_ZERO(&readfds);
|
FD_ZERO(&readfds);
|
||||||
FD_SET(i,&readfds);
|
openssl_fdset(i,&readfds);
|
||||||
/* Note: under VMS with SOCKETSHR the 2nd parameter
|
/* Note: under VMS with SOCKETSHR the 2nd parameter
|
||||||
* is currently of type (int *) whereas under other
|
* is currently of type (int *) whereas under other
|
||||||
* systems it is (void *) if you don't have a cast it
|
* systems it is (void *) if you don't have a cast it
|
||||||
|
|||||||
402
apps/smime.c
402
apps/smime.c
@@ -1,5 +1,5 @@
|
|||||||
/* smime.c */
|
/* smime.c */
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project.
|
* project.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
@@ -73,11 +73,14 @@ static int save_certs(char *signerfile, STACK_OF(X509) *signers);
|
|||||||
static int smime_cb(int ok, X509_STORE_CTX *ctx);
|
static int smime_cb(int ok, X509_STORE_CTX *ctx);
|
||||||
|
|
||||||
#define SMIME_OP 0x10
|
#define SMIME_OP 0x10
|
||||||
|
#define SMIME_IP 0x20
|
||||||
|
#define SMIME_SIGNERS 0x40
|
||||||
#define SMIME_ENCRYPT (1 | SMIME_OP)
|
#define SMIME_ENCRYPT (1 | SMIME_OP)
|
||||||
#define SMIME_DECRYPT 2
|
#define SMIME_DECRYPT (2 | SMIME_IP)
|
||||||
#define SMIME_SIGN (3 | SMIME_OP)
|
#define SMIME_SIGN (3 | SMIME_OP | SMIME_SIGNERS)
|
||||||
#define SMIME_VERIFY 4
|
#define SMIME_VERIFY (4 | SMIME_IP)
|
||||||
#define SMIME_PK7OUT 5
|
#define SMIME_PK7OUT (5 | SMIME_IP | SMIME_OP)
|
||||||
|
#define SMIME_RESIGN (6 | SMIME_IP | SMIME_OP | SMIME_SIGNERS)
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
@@ -90,6 +93,7 @@ int MAIN(int argc, char **argv)
|
|||||||
const char *inmode = "r", *outmode = "w";
|
const char *inmode = "r", *outmode = "w";
|
||||||
char *infile = NULL, *outfile = NULL;
|
char *infile = NULL, *outfile = NULL;
|
||||||
char *signerfile = NULL, *recipfile = NULL;
|
char *signerfile = NULL, *recipfile = NULL;
|
||||||
|
STACK_OF(STRING) *sksigners = NULL, *skkeys = NULL;
|
||||||
char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
|
char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
|
||||||
const EVP_CIPHER *cipher = NULL;
|
const EVP_CIPHER *cipher = NULL;
|
||||||
PKCS7 *p7 = NULL;
|
PKCS7 *p7 = NULL;
|
||||||
@@ -105,6 +109,8 @@ int MAIN(int argc, char **argv)
|
|||||||
char *passargin = NULL, *passin = NULL;
|
char *passargin = NULL, *passin = NULL;
|
||||||
char *inrand = NULL;
|
char *inrand = NULL;
|
||||||
int need_rand = 0;
|
int need_rand = 0;
|
||||||
|
int indef = 0;
|
||||||
|
const EVP_MD *sign_md = NULL;
|
||||||
int informat = FORMAT_SMIME, outformat = FORMAT_SMIME;
|
int informat = FORMAT_SMIME, outformat = FORMAT_SMIME;
|
||||||
int keyform = FORMAT_PEM;
|
int keyform = FORMAT_PEM;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
@@ -135,6 +141,8 @@ int MAIN(int argc, char **argv)
|
|||||||
operation = SMIME_DECRYPT;
|
operation = SMIME_DECRYPT;
|
||||||
else if (!strcmp (*args, "-sign"))
|
else if (!strcmp (*args, "-sign"))
|
||||||
operation = SMIME_SIGN;
|
operation = SMIME_SIGN;
|
||||||
|
else if (!strcmp (*args, "-resign"))
|
||||||
|
operation = SMIME_RESIGN;
|
||||||
else if (!strcmp (*args, "-verify"))
|
else if (!strcmp (*args, "-verify"))
|
||||||
operation = SMIME_VERIFY;
|
operation = SMIME_VERIFY;
|
||||||
else if (!strcmp (*args, "-pk7out"))
|
else if (!strcmp (*args, "-pk7out"))
|
||||||
@@ -193,205 +201,209 @@ int MAIN(int argc, char **argv)
|
|||||||
flags |= PKCS7_BINARY;
|
flags |= PKCS7_BINARY;
|
||||||
else if (!strcmp (*args, "-nosigs"))
|
else if (!strcmp (*args, "-nosigs"))
|
||||||
flags |= PKCS7_NOSIGS;
|
flags |= PKCS7_NOSIGS;
|
||||||
|
else if (!strcmp (*args, "-stream"))
|
||||||
|
indef = 1;
|
||||||
|
else if (!strcmp (*args, "-indef"))
|
||||||
|
indef = 1;
|
||||||
|
else if (!strcmp (*args, "-noindef"))
|
||||||
|
indef = 0;
|
||||||
else if (!strcmp (*args, "-nooldmime"))
|
else if (!strcmp (*args, "-nooldmime"))
|
||||||
flags |= PKCS7_NOOLDMIMETYPE;
|
flags |= PKCS7_NOOLDMIMETYPE;
|
||||||
else if (!strcmp (*args, "-crlfeol"))
|
else if (!strcmp (*args, "-crlfeol"))
|
||||||
flags |= PKCS7_CRLFEOL;
|
flags |= PKCS7_CRLFEOL;
|
||||||
else if (!strcmp(*args,"-rand"))
|
else if (!strcmp(*args,"-rand"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
args++;
|
||||||
inrand = *args;
|
inrand = *args;
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
need_rand = 1;
|
need_rand = 1;
|
||||||
}
|
}
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
else if (!strcmp(*args,"-engine"))
|
else if (!strcmp(*args,"-engine"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
engine = *++args;
|
||||||
engine = *args;
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
else if (!strcmp(*args,"-passin"))
|
else if (!strcmp(*args,"-passin"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
passargin = *++args;
|
||||||
passargin = *args;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-to"))
|
else if (!strcmp (*args, "-to"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
to = *++args;
|
||||||
to = *args;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-from"))
|
else if (!strcmp (*args, "-from"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
from = *++args;
|
||||||
from = *args;
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-subject"))
|
else if (!strcmp (*args, "-subject"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
subject = *++args;
|
||||||
subject = *args;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-signer"))
|
else if (!strcmp (*args, "-signer"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
|
goto argerr;
|
||||||
|
/* If previous -signer argument add signer to list */
|
||||||
|
|
||||||
|
if (signerfile)
|
||||||
{
|
{
|
||||||
args++;
|
if (!sksigners)
|
||||||
signerfile = *args;
|
sksigners = sk_STRING_new_null();
|
||||||
|
sk_STRING_push(sksigners, signerfile);
|
||||||
|
if (!keyfile)
|
||||||
|
keyfile = signerfile;
|
||||||
|
if (!skkeys)
|
||||||
|
skkeys = sk_STRING_new_null();
|
||||||
|
sk_STRING_push(skkeys, keyfile);
|
||||||
|
keyfile = NULL;
|
||||||
}
|
}
|
||||||
else
|
signerfile = *++args;
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-recip"))
|
else if (!strcmp (*args, "-recip"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
recipfile = *++args;
|
||||||
recipfile = *args;
|
}
|
||||||
|
else if (!strcmp (*args, "-md"))
|
||||||
|
{
|
||||||
|
if (!args[1])
|
||||||
|
goto argerr;
|
||||||
|
sign_md = EVP_get_digestbyname(*++args);
|
||||||
|
if (sign_md == NULL)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Unknown digest %s\n",
|
||||||
|
*args);
|
||||||
|
goto argerr;
|
||||||
}
|
}
|
||||||
else badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-inkey"))
|
else if (!strcmp (*args, "-inkey"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
|
goto argerr;
|
||||||
|
/* If previous -inkey arument add signer to list */
|
||||||
|
if (keyfile)
|
||||||
{
|
{
|
||||||
args++;
|
if (!signerfile)
|
||||||
keyfile = *args;
|
{
|
||||||
|
BIO_puts(bio_err, "Illegal -inkey without -signer\n");
|
||||||
|
goto argerr;
|
||||||
}
|
}
|
||||||
else
|
if (!sksigners)
|
||||||
badarg = 1;
|
sksigners = sk_STRING_new_null();
|
||||||
|
sk_STRING_push(sksigners, signerfile);
|
||||||
|
signerfile = NULL;
|
||||||
|
if (!skkeys)
|
||||||
|
skkeys = sk_STRING_new_null();
|
||||||
|
sk_STRING_push(skkeys, keyfile);
|
||||||
|
}
|
||||||
|
keyfile = *++args;
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-keyform"))
|
else if (!strcmp (*args, "-keyform"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
keyform = str2fmt(*++args);
|
||||||
keyform = str2fmt(*args);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-certfile"))
|
else if (!strcmp (*args, "-certfile"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
certfile = *++args;
|
||||||
certfile = *args;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-CAfile"))
|
else if (!strcmp (*args, "-CAfile"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
CAfile = *++args;
|
||||||
CAfile = *args;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-CApath"))
|
else if (!strcmp (*args, "-CApath"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
CApath = *++args;
|
||||||
CApath = *args;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-in"))
|
else if (!strcmp (*args, "-in"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
infile = *++args;
|
||||||
infile = *args;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-inform"))
|
else if (!strcmp (*args, "-inform"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
informat = str2fmt(*++args);
|
||||||
informat = str2fmt(*args);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-outform"))
|
else if (!strcmp (*args, "-outform"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
outformat = str2fmt(*++args);
|
||||||
outformat = str2fmt(*args);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-out"))
|
else if (!strcmp (*args, "-out"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
outfile = *++args;
|
||||||
outfile = *args;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (!strcmp (*args, "-content"))
|
else if (!strcmp (*args, "-content"))
|
||||||
{
|
{
|
||||||
if (args[1])
|
if (!args[1])
|
||||||
{
|
goto argerr;
|
||||||
args++;
|
contfile = *++args;
|
||||||
contfile = *args;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badarg = 1;
|
|
||||||
}
|
}
|
||||||
else if (args_verify(&args, NULL, &badarg, bio_err, &vpm))
|
else if (args_verify(&args, NULL, &badarg, bio_err, &vpm))
|
||||||
continue;
|
continue;
|
||||||
else
|
else if ((cipher = EVP_get_cipherbyname(*args + 1)) == NULL)
|
||||||
badarg = 1;
|
badarg = 1;
|
||||||
args++;
|
args++;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (!(operation & SMIME_SIGNERS) && (skkeys || sksigners))
|
||||||
if (operation == SMIME_SIGN)
|
|
||||||
{
|
{
|
||||||
if (!signerfile)
|
BIO_puts(bio_err, "Multiple signers or keys not allowed\n");
|
||||||
|
goto argerr;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (operation & SMIME_SIGNERS)
|
||||||
|
{
|
||||||
|
/* Check to see if any final signer needs to be appended */
|
||||||
|
if (keyfile && !signerfile)
|
||||||
|
{
|
||||||
|
BIO_puts(bio_err, "Illegal -inkey without -signer\n");
|
||||||
|
goto argerr;
|
||||||
|
}
|
||||||
|
if (signerfile)
|
||||||
|
{
|
||||||
|
if (!sksigners)
|
||||||
|
sksigners = sk_STRING_new_null();
|
||||||
|
sk_STRING_push(sksigners, signerfile);
|
||||||
|
if (!skkeys)
|
||||||
|
skkeys = sk_STRING_new_null();
|
||||||
|
if (!keyfile)
|
||||||
|
keyfile = signerfile;
|
||||||
|
sk_STRING_push(skkeys, keyfile);
|
||||||
|
}
|
||||||
|
if (!sksigners)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "No signer certificate specified\n");
|
BIO_printf(bio_err, "No signer certificate specified\n");
|
||||||
badarg = 1;
|
badarg = 1;
|
||||||
}
|
}
|
||||||
|
signerfile = NULL;
|
||||||
|
keyfile = NULL;
|
||||||
need_rand = 1;
|
need_rand = 1;
|
||||||
}
|
}
|
||||||
else if (operation == SMIME_DECRYPT)
|
else if (operation == SMIME_DECRYPT)
|
||||||
@@ -416,6 +428,7 @@ int MAIN(int argc, char **argv)
|
|||||||
|
|
||||||
if (badarg)
|
if (badarg)
|
||||||
{
|
{
|
||||||
|
argerr:
|
||||||
BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n");
|
BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n");
|
||||||
BIO_printf (bio_err, "where options are\n");
|
BIO_printf (bio_err, "where options are\n");
|
||||||
BIO_printf (bio_err, "-encrypt encrypt message\n");
|
BIO_printf (bio_err, "-encrypt encrypt message\n");
|
||||||
@@ -499,13 +512,11 @@ int MAIN(int argc, char **argv)
|
|||||||
|
|
||||||
ret = 2;
|
ret = 2;
|
||||||
|
|
||||||
if (operation != SMIME_SIGN)
|
if (!(operation & SMIME_SIGNERS))
|
||||||
flags &= ~PKCS7_DETACHED;
|
flags &= ~PKCS7_DETACHED;
|
||||||
|
|
||||||
if (operation & SMIME_OP)
|
if (operation & SMIME_OP)
|
||||||
{
|
{
|
||||||
if (flags & PKCS7_BINARY)
|
|
||||||
inmode = "rb";
|
|
||||||
if (outformat == FORMAT_ASN1)
|
if (outformat == FORMAT_ASN1)
|
||||||
outmode = "wb";
|
outmode = "wb";
|
||||||
}
|
}
|
||||||
@@ -513,9 +524,18 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
if (flags & PKCS7_BINARY)
|
if (flags & PKCS7_BINARY)
|
||||||
outmode = "wb";
|
outmode = "wb";
|
||||||
|
}
|
||||||
|
|
||||||
|
if (operation & SMIME_IP)
|
||||||
|
{
|
||||||
if (informat == FORMAT_ASN1)
|
if (informat == FORMAT_ASN1)
|
||||||
inmode = "rb";
|
inmode = "rb";
|
||||||
}
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
if (flags & PKCS7_BINARY)
|
||||||
|
inmode = "rb";
|
||||||
|
}
|
||||||
|
|
||||||
if (operation == SMIME_ENCRYPT)
|
if (operation == SMIME_ENCRYPT)
|
||||||
{
|
{
|
||||||
@@ -545,26 +565,11 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (signerfile && (operation == SMIME_SIGN))
|
|
||||||
{
|
|
||||||
if (!(signer = load_cert(bio_err,signerfile,FORMAT_PEM, NULL,
|
|
||||||
e, "signer certificate")))
|
|
||||||
{
|
|
||||||
#if 0 /* An appropri message has already been printed */
|
|
||||||
BIO_printf(bio_err, "Can't read signer certificate file %s\n", signerfile);
|
|
||||||
#endif
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (certfile)
|
if (certfile)
|
||||||
{
|
{
|
||||||
if (!(other = load_certs(bio_err,certfile,FORMAT_PEM, NULL,
|
if (!(other = load_certs(bio_err,certfile,FORMAT_PEM, NULL,
|
||||||
e, "certificate file")))
|
e, "certificate file")))
|
||||||
{
|
{
|
||||||
#if 0 /* An appropriate message has already been printed */
|
|
||||||
BIO_printf(bio_err, "Can't read certificate file %s\n", certfile);
|
|
||||||
#endif
|
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
@@ -575,9 +580,6 @@ int MAIN(int argc, char **argv)
|
|||||||
if (!(recip = load_cert(bio_err,recipfile,FORMAT_PEM,NULL,
|
if (!(recip = load_cert(bio_err,recipfile,FORMAT_PEM,NULL,
|
||||||
e, "recipient certificate file")))
|
e, "recipient certificate file")))
|
||||||
{
|
{
|
||||||
#if 0 /* An appropriate message has alrady been printed */
|
|
||||||
BIO_printf(bio_err, "Can't read recipient certificate file %s\n", recipfile);
|
|
||||||
#endif
|
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
@@ -615,6 +617,36 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
|
|
||||||
|
if (operation & SMIME_IP)
|
||||||
|
{
|
||||||
|
if (informat == FORMAT_SMIME)
|
||||||
|
p7 = SMIME_read_PKCS7(in, &indata);
|
||||||
|
else if (informat == FORMAT_PEM)
|
||||||
|
p7 = PEM_read_bio_PKCS7(in, NULL, NULL, NULL);
|
||||||
|
else if (informat == FORMAT_ASN1)
|
||||||
|
p7 = d2i_PKCS7_bio(in, NULL);
|
||||||
|
else
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Bad input format for PKCS#7 file\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!p7)
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Error reading S/MIME message\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (contfile)
|
||||||
|
{
|
||||||
|
BIO_free(indata);
|
||||||
|
if (!(indata = BIO_new_file(contfile, "rb")))
|
||||||
|
{
|
||||||
|
BIO_printf(bio_err, "Can't read content file %s\n", contfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (outfile)
|
if (outfile)
|
||||||
{
|
{
|
||||||
if (!(out = BIO_new_file(outfile, outmode)))
|
if (!(out = BIO_new_file(outfile, outmode)))
|
||||||
@@ -648,43 +680,58 @@ int MAIN(int argc, char **argv)
|
|||||||
ret = 3;
|
ret = 3;
|
||||||
|
|
||||||
if (operation == SMIME_ENCRYPT)
|
if (operation == SMIME_ENCRYPT)
|
||||||
p7 = PKCS7_encrypt(encerts, in, cipher, flags);
|
|
||||||
else if (operation == SMIME_SIGN)
|
|
||||||
{
|
{
|
||||||
/* If detached data and SMIME output enable partial
|
if (indef)
|
||||||
* signing.
|
|
||||||
*/
|
|
||||||
if ((flags & PKCS7_DETACHED) && (outformat == FORMAT_SMIME))
|
|
||||||
flags |= PKCS7_STREAM;
|
flags |= PKCS7_STREAM;
|
||||||
p7 = PKCS7_sign(signer, key, other, in, flags);
|
p7 = PKCS7_encrypt(encerts, in, cipher, flags);
|
||||||
}
|
}
|
||||||
else
|
else if (operation & SMIME_SIGNERS)
|
||||||
{
|
{
|
||||||
if (informat == FORMAT_SMIME)
|
int i;
|
||||||
p7 = SMIME_read_PKCS7(in, &indata);
|
/* If detached data content we only enable streaming if
|
||||||
else if (informat == FORMAT_PEM)
|
* S/MIME output format.
|
||||||
p7 = PEM_read_bio_PKCS7(in, NULL, NULL, NULL);
|
*/
|
||||||
else if (informat == FORMAT_ASN1)
|
if (operation == SMIME_SIGN)
|
||||||
p7 = d2i_PKCS7_bio(in, NULL);
|
|
||||||
else
|
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad input format for PKCS#7 file\n");
|
if (flags & PKCS7_DETACHED)
|
||||||
goto end;
|
{
|
||||||
|
if (outformat == FORMAT_SMIME)
|
||||||
|
flags |= PKCS7_STREAM;
|
||||||
}
|
}
|
||||||
|
else if (indef)
|
||||||
|
flags |= PKCS7_STREAM;
|
||||||
|
flags |= PKCS7_PARTIAL;
|
||||||
|
p7 = PKCS7_sign(NULL, NULL, other, in, flags);
|
||||||
if (!p7)
|
if (!p7)
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error reading S/MIME message\n");
|
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (contfile)
|
else
|
||||||
|
flags |= PKCS7_REUSE_DIGEST;
|
||||||
|
for (i = 0; i < sk_STRING_num(sksigners); i++)
|
||||||
{
|
{
|
||||||
BIO_free(indata);
|
signerfile = sk_STRING_value(sksigners, i);
|
||||||
if (!(indata = BIO_new_file(contfile, "rb")))
|
keyfile = sk_STRING_value(skkeys, i);
|
||||||
{
|
signer = load_cert(bio_err, signerfile,FORMAT_PEM, NULL,
|
||||||
BIO_printf(bio_err, "Can't read content file %s\n", contfile);
|
e, "signer certificate");
|
||||||
|
if (!signer)
|
||||||
goto end;
|
goto end;
|
||||||
|
key = load_key(bio_err, keyfile, keyform, 0, passin, e,
|
||||||
|
"signing key file");
|
||||||
|
if (!key)
|
||||||
|
goto end;
|
||||||
|
if (!PKCS7_sign_add_signer(p7, signer, key,
|
||||||
|
sign_md, flags))
|
||||||
|
goto end;
|
||||||
|
X509_free(signer);
|
||||||
|
signer = NULL;
|
||||||
|
EVP_PKEY_free(key);
|
||||||
|
key = NULL;
|
||||||
}
|
}
|
||||||
|
/* If not streaming or resigning finalize structure */
|
||||||
|
if ((operation == SMIME_SIGN) && !(flags & PKCS7_STREAM))
|
||||||
|
{
|
||||||
|
if (!PKCS7_final(p7, in, flags))
|
||||||
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -734,11 +781,16 @@ int MAIN(int argc, char **argv)
|
|||||||
if (subject)
|
if (subject)
|
||||||
BIO_printf(out, "Subject: %s\n", subject);
|
BIO_printf(out, "Subject: %s\n", subject);
|
||||||
if (outformat == FORMAT_SMIME)
|
if (outformat == FORMAT_SMIME)
|
||||||
|
{
|
||||||
|
if (operation == SMIME_RESIGN)
|
||||||
|
SMIME_write_PKCS7(out, p7, indata, flags);
|
||||||
|
else
|
||||||
SMIME_write_PKCS7(out, p7, in, flags);
|
SMIME_write_PKCS7(out, p7, in, flags);
|
||||||
|
}
|
||||||
else if (outformat == FORMAT_PEM)
|
else if (outformat == FORMAT_PEM)
|
||||||
PEM_write_bio_PKCS7(out,p7);
|
PEM_write_bio_PKCS7_stream(out, p7, in, flags);
|
||||||
else if (outformat == FORMAT_ASN1)
|
else if (outformat == FORMAT_ASN1)
|
||||||
i2d_PKCS7_bio(out,p7);
|
i2d_PKCS7_bio_stream(out,p7, in, flags);
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Bad output format for PKCS#7 file\n");
|
BIO_printf(bio_err, "Bad output format for PKCS#7 file\n");
|
||||||
@@ -754,6 +806,10 @@ end:
|
|||||||
sk_X509_pop_free(other, X509_free);
|
sk_X509_pop_free(other, X509_free);
|
||||||
if (vpm)
|
if (vpm)
|
||||||
X509_VERIFY_PARAM_free(vpm);
|
X509_VERIFY_PARAM_free(vpm);
|
||||||
|
if (sksigners)
|
||||||
|
sk_STRING_free(sksigners);
|
||||||
|
if (skkeys)
|
||||||
|
sk_STRING_free(skkeys);
|
||||||
X509_STORE_free(store);
|
X509_STORE_free(store);
|
||||||
X509_free(cert);
|
X509_free(cert);
|
||||||
X509_free(recip);
|
X509_free(recip);
|
||||||
|
|||||||
323
apps/speed.c
323
apps/speed.c
@@ -108,53 +108,8 @@
|
|||||||
#include <signal.h>
|
#include <signal.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(OPENSSL_SYS_MACOSX)
|
#ifdef _WIN32
|
||||||
# define USE_TOD
|
#include <windows.h>
|
||||||
#elif !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_VXWORKS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC))
|
|
||||||
# define TIMES
|
|
||||||
#endif
|
|
||||||
#if !defined(_UNICOS) && !defined(__OpenBSD__) && !defined(sgi) && !defined(__FreeBSD__) && !(defined(__bsdi) || defined(__bsdi__)) && !defined(_AIX) && !defined(OPENSSL_SYS_MPE) && !defined(__NetBSD__) && !defined(OPENSSL_SYS_VXWORKS) /* FIXME */
|
|
||||||
# define TIMEB
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(OPENSSL_SYS_NETWARE)
|
|
||||||
#undef TIMES
|
|
||||||
#undef TIMEB
|
|
||||||
#include <time.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifndef _IRIX
|
|
||||||
# include <time.h>
|
|
||||||
#endif
|
|
||||||
#ifdef TIMES
|
|
||||||
# include <sys/types.h>
|
|
||||||
# include <sys/times.h>
|
|
||||||
#endif
|
|
||||||
#ifdef USE_TOD
|
|
||||||
# include <sys/time.h>
|
|
||||||
# include <sys/resource.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* Depending on the VMS version, the tms structure is perhaps defined.
|
|
||||||
The __TMS macro will show if it was. If it wasn't defined, we should
|
|
||||||
undefine TIMES, since that tells the rest of the program how things
|
|
||||||
should be handled. -- Richard Levitte */
|
|
||||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS)
|
|
||||||
#undef TIMES
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifdef TIMEB
|
|
||||||
#include <sys/timeb.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if !defined(TIMES) && !defined(TIMEB) && !defined(USE_TOD) && !defined(OPENSSL_SYS_VXWORKS) && !defined(OPENSSL_SYS_NETWARE)
|
|
||||||
#error "It seems neither struct tms nor struct timeb is supported in this platform!"
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(sun) || defined(__ultrix)
|
|
||||||
#define _POSIX_SOURCE
|
|
||||||
#include <limits.h>
|
|
||||||
#include <sys/param.h>
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#include <openssl/bn.h>
|
#include <openssl/bn.h>
|
||||||
@@ -189,6 +144,9 @@
|
|||||||
#ifndef OPENSSL_NO_RIPEMD
|
#ifndef OPENSSL_NO_RIPEMD
|
||||||
#include <openssl/ripemd.h>
|
#include <openssl/ripemd.h>
|
||||||
#endif
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_WHIRLPOOL
|
||||||
|
#include <openssl/whrlpool.h>
|
||||||
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC4
|
#ifndef OPENSSL_NO_RC4
|
||||||
#include <openssl/rc4.h>
|
#include <openssl/rc4.h>
|
||||||
#endif
|
#endif
|
||||||
@@ -226,34 +184,6 @@
|
|||||||
#include <openssl/ecdh.h>
|
#include <openssl/ecdh.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
/*
|
|
||||||
* The following "HZ" timing stuff should be sync'd up with the code in
|
|
||||||
* crypto/tmdiff.[ch]. That appears to try to do the same job, though I think
|
|
||||||
* this code is more up to date than libcrypto's so there may be features to
|
|
||||||
* migrate over first. This is used in two places further down AFAICS.
|
|
||||||
* The point is that nothing in openssl actually *uses* that tmdiff stuff, so
|
|
||||||
* either speed.c should be using it or it should go because it's obviously not
|
|
||||||
* useful enough. Anyone want to do a janitorial job on this?
|
|
||||||
*/
|
|
||||||
|
|
||||||
/* The following if from times(3) man page. It may need to be changed */
|
|
||||||
#ifndef HZ
|
|
||||||
# if defined(_SC_CLK_TCK) \
|
|
||||||
&& (!defined(OPENSSL_SYS_VMS) || __CTRL_VER >= 70000000)
|
|
||||||
# define HZ sysconf(_SC_CLK_TCK)
|
|
||||||
# else
|
|
||||||
# ifndef CLK_TCK
|
|
||||||
# ifndef _BSD_CLK_TCK_ /* FreeBSD hack */
|
|
||||||
# define HZ 100.0
|
|
||||||
# else /* _BSD_CLK_TCK_ */
|
|
||||||
# define HZ ((double)_BSD_CLK_TCK_)
|
|
||||||
# endif
|
|
||||||
# else /* CLK_TCK */
|
|
||||||
# define HZ ((double)CLK_TCK)
|
|
||||||
# endif
|
|
||||||
# endif
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if !defined(OPENSSL_SYS_VMS) && !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MACINTOSH_CLASSIC) && !defined(OPENSSL_SYS_OS2) && !defined(OPENSSL_SYS_NETWARE)
|
#if !defined(OPENSSL_SYS_VMS) && !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MACINTOSH_CLASSIC) && !defined(OPENSSL_SYS_OS2) && !defined(OPENSSL_SYS_NETWARE)
|
||||||
# define HAVE_FORK 1
|
# define HAVE_FORK 1
|
||||||
#endif
|
#endif
|
||||||
@@ -262,7 +192,6 @@
|
|||||||
#define BUFSIZE ((long)1024*8+1)
|
#define BUFSIZE ((long)1024*8+1)
|
||||||
int run=0;
|
int run=0;
|
||||||
|
|
||||||
static char ftime_used = 0, times_used = 0, gettimeofday_used = 0, getrusage_used = 0;
|
|
||||||
static int mr=0;
|
static int mr=0;
|
||||||
static int usertime=1;
|
static int usertime=1;
|
||||||
|
|
||||||
@@ -275,7 +204,7 @@ static void print_result(int alg,int run_no,int count,double time_used);
|
|||||||
static int do_multi(int multi);
|
static int do_multi(int multi);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define ALGOR_NUM 28
|
#define ALGOR_NUM 29
|
||||||
#define SIZE_NUM 5
|
#define SIZE_NUM 5
|
||||||
#define RSA_NUM 4
|
#define RSA_NUM 4
|
||||||
#define DSA_NUM 3
|
#define DSA_NUM 3
|
||||||
@@ -289,7 +218,7 @@ static const char *names[ALGOR_NUM]={
|
|||||||
"rc2 cbc","rc5-32/12 cbc","blowfish cbc","cast cbc",
|
"rc2 cbc","rc5-32/12 cbc","blowfish cbc","cast cbc",
|
||||||
"aes-128 cbc","aes-192 cbc","aes-256 cbc",
|
"aes-128 cbc","aes-192 cbc","aes-256 cbc",
|
||||||
"camellia-128 cbc","camellia-192 cbc","camellia-256 cbc",
|
"camellia-128 cbc","camellia-192 cbc","camellia-256 cbc",
|
||||||
"evp","sha256","sha512",
|
"evp","sha256","sha512","whirlpool",
|
||||||
"aes-128 ige","aes-192 ige","aes-256 ige"};
|
"aes-128 ige","aes-192 ige","aes-256 ige"};
|
||||||
static double results[ALGOR_NUM][SIZE_NUM];
|
static double results[ALGOR_NUM][SIZE_NUM];
|
||||||
static int lengths[SIZE_NUM]={16,64,256,1024,8*1024};
|
static int lengths[SIZE_NUM]={16,64,256,1024,8*1024};
|
||||||
@@ -328,141 +257,46 @@ static SIGRETTYPE sig_done(int sig)
|
|||||||
#define START 0
|
#define START 0
|
||||||
#define STOP 1
|
#define STOP 1
|
||||||
|
|
||||||
#if defined(OPENSSL_SYS_NETWARE)
|
#if defined(_WIN32)
|
||||||
|
|
||||||
|
#define SIGALRM
|
||||||
|
static unsigned int lapse,schlock;
|
||||||
|
static void alarm(unsigned int secs) { lapse = secs*1000; }
|
||||||
|
|
||||||
|
static DWORD WINAPI sleepy(VOID *arg)
|
||||||
|
{
|
||||||
|
schlock = 1;
|
||||||
|
Sleep(lapse);
|
||||||
|
run = 0;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
/* for NetWare the best we can do is use clock() which returns the
|
|
||||||
* time, in hundredths of a second, since the NLM began executing
|
|
||||||
*/
|
|
||||||
static double Time_F(int s)
|
static double Time_F(int s)
|
||||||
{
|
{
|
||||||
double ret;
|
|
||||||
|
|
||||||
static clock_t tstart,tend;
|
|
||||||
|
|
||||||
if (s == START)
|
if (s == START)
|
||||||
{
|
{
|
||||||
tstart=clock();
|
HANDLE thr;
|
||||||
return(0);
|
schlock = 0;
|
||||||
}
|
thr = CreateThread(NULL,4096,sleepy,NULL,0,NULL);
|
||||||
else
|
if (thr==NULL)
|
||||||
{
|
{
|
||||||
tend=clock();
|
DWORD ret=GetLastError();
|
||||||
ret=(double)((double)(tend)-(double)(tstart));
|
BIO_printf(bio_err,"unable to CreateThread (%d)",ret);
|
||||||
return((ret < 0.001)?0.001:ret);
|
ExitProcess(ret);
|
||||||
}
|
}
|
||||||
|
CloseHandle(thr); /* detach the thread */
|
||||||
|
while (!schlock) Sleep(0); /* scheduler spinlock */
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return app_tminterval(s,usertime);
|
||||||
|
}
|
||||||
#else
|
#else
|
||||||
|
|
||||||
static double Time_F(int s)
|
static double Time_F(int s)
|
||||||
{
|
{
|
||||||
double ret;
|
return app_tminterval(s,usertime);
|
||||||
|
|
||||||
#ifdef USE_TOD
|
|
||||||
if(usertime)
|
|
||||||
{
|
|
||||||
static struct rusage tstart,tend;
|
|
||||||
|
|
||||||
getrusage_used = 1;
|
|
||||||
if (s == START)
|
|
||||||
{
|
|
||||||
getrusage(RUSAGE_SELF,&tstart);
|
|
||||||
return(0);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
long i;
|
|
||||||
|
|
||||||
getrusage(RUSAGE_SELF,&tend);
|
|
||||||
i=(long)tend.ru_utime.tv_usec-(long)tstart.ru_utime.tv_usec;
|
|
||||||
ret=((double)(tend.ru_utime.tv_sec-tstart.ru_utime.tv_sec))
|
|
||||||
+((double)i)/1000000.0;
|
|
||||||
return((ret < 0.001)?0.001:ret);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
static struct timeval tstart,tend;
|
|
||||||
long i;
|
|
||||||
|
|
||||||
gettimeofday_used = 1;
|
|
||||||
if (s == START)
|
|
||||||
{
|
|
||||||
gettimeofday(&tstart,NULL);
|
|
||||||
return(0);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
gettimeofday(&tend,NULL);
|
|
||||||
i=(long)tend.tv_usec-(long)tstart.tv_usec;
|
|
||||||
ret=((double)(tend.tv_sec-tstart.tv_sec))+((double)i)/1000000.0;
|
|
||||||
return((ret < 0.001)?0.001:ret);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#else /* ndef USE_TOD */
|
|
||||||
|
|
||||||
# ifdef TIMES
|
|
||||||
if (usertime)
|
|
||||||
{
|
|
||||||
static struct tms tstart,tend;
|
|
||||||
|
|
||||||
times_used = 1;
|
|
||||||
if (s == START)
|
|
||||||
{
|
|
||||||
times(&tstart);
|
|
||||||
return(0);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
times(&tend);
|
|
||||||
ret = HZ;
|
|
||||||
ret=(double)(tend.tms_utime-tstart.tms_utime) / ret;
|
|
||||||
return((ret < 1e-3)?1e-3:ret);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
# endif /* times() */
|
|
||||||
# if defined(TIMES) && defined(TIMEB)
|
|
||||||
else
|
|
||||||
# endif
|
|
||||||
# ifdef OPENSSL_SYS_VXWORKS
|
|
||||||
{
|
|
||||||
static unsigned long tick_start, tick_end;
|
|
||||||
|
|
||||||
if( s == START )
|
|
||||||
{
|
|
||||||
tick_start = tickGet();
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
tick_end = tickGet();
|
|
||||||
ret = (double)(tick_end - tick_start) / (double)sysClkRateGet();
|
|
||||||
return((ret < 0.001)?0.001:ret);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
# elif defined(TIMEB)
|
|
||||||
{
|
|
||||||
static struct timeb tstart,tend;
|
|
||||||
long i;
|
|
||||||
|
|
||||||
ftime_used = 1;
|
|
||||||
if (s == START)
|
|
||||||
{
|
|
||||||
ftime(&tstart);
|
|
||||||
return(0);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
ftime(&tend);
|
|
||||||
i=(long)tend.millitm-(long)tstart.millitm;
|
|
||||||
ret=((double)(tend.time-tstart.time))+((double)i)/1000.0;
|
|
||||||
return((ret < 0.001)?0.001:ret);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
#endif
|
|
||||||
}
|
|
||||||
#endif /* if defined(OPENSSL_SYS_NETWARE) */
|
|
||||||
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ECDH
|
#ifndef OPENSSL_NO_ECDH
|
||||||
@@ -522,6 +356,9 @@ int MAIN(int argc, char **argv)
|
|||||||
unsigned char sha512[SHA512_DIGEST_LENGTH];
|
unsigned char sha512[SHA512_DIGEST_LENGTH];
|
||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_WHIRLPOOL
|
||||||
|
unsigned char whirlpool[WHIRLPOOL_DIGEST_LENGTH];
|
||||||
|
#endif
|
||||||
#ifndef OPENSSL_NO_RIPEMD
|
#ifndef OPENSSL_NO_RIPEMD
|
||||||
unsigned char rmd160[RIPEMD160_DIGEST_LENGTH];
|
unsigned char rmd160[RIPEMD160_DIGEST_LENGTH];
|
||||||
#endif
|
#endif
|
||||||
@@ -618,9 +455,10 @@ int MAIN(int argc, char **argv)
|
|||||||
#define D_EVP 22
|
#define D_EVP 22
|
||||||
#define D_SHA256 23
|
#define D_SHA256 23
|
||||||
#define D_SHA512 24
|
#define D_SHA512 24
|
||||||
#define D_IGE_128_AES 25
|
#define D_WHIRLPOOL 25
|
||||||
#define D_IGE_192_AES 26
|
#define D_IGE_128_AES 26
|
||||||
#define D_IGE_256_AES 27
|
#define D_IGE_192_AES 27
|
||||||
|
#define D_IGE_256_AES 28
|
||||||
double d=0.0;
|
double d=0.0;
|
||||||
long c[ALGOR_NUM][SIZE_NUM];
|
long c[ALGOR_NUM][SIZE_NUM];
|
||||||
#define R_DSA_512 0
|
#define R_DSA_512 0
|
||||||
@@ -940,6 +778,10 @@ int MAIN(int argc, char **argv)
|
|||||||
else
|
else
|
||||||
#endif
|
#endif
|
||||||
#endif
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_WHIRLPOOL
|
||||||
|
if (strcmp(*argv,"whirlpool") == 0) doit[D_WHIRLPOOL]=1;
|
||||||
|
else
|
||||||
|
#endif
|
||||||
#ifndef OPENSSL_NO_RIPEMD
|
#ifndef OPENSSL_NO_RIPEMD
|
||||||
if (strcmp(*argv,"ripemd") == 0) doit[D_RMD160]=1;
|
if (strcmp(*argv,"ripemd") == 0) doit[D_RMD160]=1;
|
||||||
else
|
else
|
||||||
@@ -1151,12 +993,16 @@ int MAIN(int argc, char **argv)
|
|||||||
#ifndef OPENSSL_NO_SHA512
|
#ifndef OPENSSL_NO_SHA512
|
||||||
BIO_printf(bio_err,"sha512 ");
|
BIO_printf(bio_err,"sha512 ");
|
||||||
#endif
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_WHIRLPOOL
|
||||||
|
BIO_printf(bio_err,"whirlpool");
|
||||||
|
#endif
|
||||||
#ifndef OPENSSL_NO_RIPEMD160
|
#ifndef OPENSSL_NO_RIPEMD160
|
||||||
BIO_printf(bio_err,"rmd160");
|
BIO_printf(bio_err,"rmd160");
|
||||||
#endif
|
#endif
|
||||||
#if !defined(OPENSSL_NO_MD2) || !defined(OPENSSL_NO_MDC2) || \
|
#if !defined(OPENSSL_NO_MD2) || !defined(OPENSSL_NO_MDC2) || \
|
||||||
!defined(OPENSSL_NO_MD4) || !defined(OPENSSL_NO_MD5) || \
|
!defined(OPENSSL_NO_MD4) || !defined(OPENSSL_NO_MD5) || \
|
||||||
!defined(OPENSSL_NO_SHA1) || !defined(OPENSSL_NO_RIPEMD160)
|
!defined(OPENSSL_NO_SHA1) || !defined(OPENSSL_NO_RIPEMD160) || \
|
||||||
|
!defined(OPENSSL_NO_WHIRLPOOL)
|
||||||
BIO_printf(bio_err,"\n");
|
BIO_printf(bio_err,"\n");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
@@ -1283,17 +1129,20 @@ int MAIN(int argc, char **argv)
|
|||||||
rsa_doit[i]=1;
|
rsa_doit[i]=1;
|
||||||
for (i=0; i<DSA_NUM; i++)
|
for (i=0; i<DSA_NUM; i++)
|
||||||
dsa_doit[i]=1;
|
dsa_doit[i]=1;
|
||||||
|
#ifndef OPENSSL_NO_ECDSA
|
||||||
|
for (i=0; i<EC_NUM; i++)
|
||||||
|
ecdsa_doit[i]=1;
|
||||||
|
#endif
|
||||||
|
#ifndef OPENSSL_NO_ECDH
|
||||||
|
for (i=0; i<EC_NUM; i++)
|
||||||
|
ecdh_doit[i]=1;
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
for (i=0; i<ALGOR_NUM; i++)
|
for (i=0; i<ALGOR_NUM; i++)
|
||||||
if (doit[i]) pr_header++;
|
if (doit[i]) pr_header++;
|
||||||
|
|
||||||
if (usertime == 0 && !mr)
|
if (usertime == 0 && !mr)
|
||||||
BIO_printf(bio_err,"You have chosen to measure elapsed time instead of user CPU time.\n");
|
BIO_printf(bio_err,"You have chosen to measure elapsed time instead of user CPU time.\n");
|
||||||
if (usertime <= 0 && !mr)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"To get the most accurate results, try to run this\n");
|
|
||||||
BIO_printf(bio_err,"program when this computer is idle.\n");
|
|
||||||
}
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
for (i=0; i<RSA_NUM; i++)
|
for (i=0; i<RSA_NUM; i++)
|
||||||
@@ -1403,6 +1252,7 @@ int MAIN(int argc, char **argv)
|
|||||||
c[D_CBC_256_CML][0]=count;
|
c[D_CBC_256_CML][0]=count;
|
||||||
c[D_SHA256][0]=count;
|
c[D_SHA256][0]=count;
|
||||||
c[D_SHA512][0]=count;
|
c[D_SHA512][0]=count;
|
||||||
|
c[D_WHIRLPOOL][0]=count;
|
||||||
c[D_IGE_128_AES][0]=count;
|
c[D_IGE_128_AES][0]=count;
|
||||||
c[D_IGE_192_AES][0]=count;
|
c[D_IGE_192_AES][0]=count;
|
||||||
c[D_IGE_256_AES][0]=count;
|
c[D_IGE_256_AES][0]=count;
|
||||||
@@ -1418,6 +1268,7 @@ int MAIN(int argc, char **argv)
|
|||||||
c[D_RMD160][i]=c[D_RMD160][0]*4*lengths[0]/lengths[i];
|
c[D_RMD160][i]=c[D_RMD160][0]*4*lengths[0]/lengths[i];
|
||||||
c[D_SHA256][i]=c[D_SHA256][0]*4*lengths[0]/lengths[i];
|
c[D_SHA256][i]=c[D_SHA256][0]*4*lengths[0]/lengths[i];
|
||||||
c[D_SHA512][i]=c[D_SHA512][0]*4*lengths[0]/lengths[i];
|
c[D_SHA512][i]=c[D_SHA512][0]*4*lengths[0]/lengths[i];
|
||||||
|
c[D_WHIRLPOOL][i]=c[D_WHIRLPOOL][0]*4*lengths[0]/lengths[i];
|
||||||
}
|
}
|
||||||
for (i=1; i<SIZE_NUM; i++)
|
for (i=1; i<SIZE_NUM; i++)
|
||||||
{
|
{
|
||||||
@@ -1601,7 +1452,9 @@ int MAIN(int argc, char **argv)
|
|||||||
#else
|
#else
|
||||||
#define COND(c) (run)
|
#define COND(c) (run)
|
||||||
#define COUNT(d) (count)
|
#define COUNT(d) (count)
|
||||||
|
#ifndef _WIN32
|
||||||
signal(SIGALRM,sig_done);
|
signal(SIGALRM,sig_done);
|
||||||
|
#endif
|
||||||
#endif /* SIGALRM */
|
#endif /* SIGALRM */
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_MD2
|
#ifndef OPENSSL_NO_MD2
|
||||||
@@ -1731,8 +1584,23 @@ int MAIN(int argc, char **argv)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#ifndef OPENSSL_NO_WHIRLPOOL
|
||||||
|
if (doit[D_WHIRLPOOL])
|
||||||
|
{
|
||||||
|
for (j=0; j<SIZE_NUM; j++)
|
||||||
|
{
|
||||||
|
print_message(names[D_WHIRLPOOL],c[D_WHIRLPOOL][j],lengths[j]);
|
||||||
|
Time_F(START);
|
||||||
|
for (count=0,run=1; COND(c[D_WHIRLPOOL][j]); count++)
|
||||||
|
WHIRLPOOL(buf,lengths[j],whirlpool);
|
||||||
|
d=Time_F(STOP);
|
||||||
|
print_result(D_WHIRLPOOL,j,count,d);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_RIPEMD
|
#ifndef OPENSSL_NO_RIPEMD
|
||||||
if (doit[D_RMD160])
|
if (doit[D_RMD160])
|
||||||
{
|
{
|
||||||
@@ -1878,6 +1746,8 @@ int MAIN(int argc, char **argv)
|
|||||||
print_result(D_IGE_256_AES,j,count,d);
|
print_result(D_IGE_256_AES,j,count,d);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
if (doit[D_CBC_128_CML])
|
if (doit[D_CBC_128_CML])
|
||||||
@@ -2132,7 +2002,7 @@ int MAIN(int argc, char **argv)
|
|||||||
{
|
{
|
||||||
ret=RSA_verify(NID_md5_sha1, buf,36, buf2,
|
ret=RSA_verify(NID_md5_sha1, buf,36, buf2,
|
||||||
rsa_num, rsa_key[j]);
|
rsa_num, rsa_key[j]);
|
||||||
if (ret == 0)
|
if (ret <= 0)
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,
|
BIO_printf(bio_err,
|
||||||
"RSA verify failure\n");
|
"RSA verify failure\n");
|
||||||
@@ -2490,35 +2360,6 @@ show_res:
|
|||||||
printf("%s ",BF_options());
|
printf("%s ",BF_options());
|
||||||
#endif
|
#endif
|
||||||
fprintf(stdout,"\n%s\n",SSLeay_version(SSLEAY_CFLAGS));
|
fprintf(stdout,"\n%s\n",SSLeay_version(SSLEAY_CFLAGS));
|
||||||
printf("available timing options: ");
|
|
||||||
#ifdef TIMES
|
|
||||||
printf("TIMES ");
|
|
||||||
#endif
|
|
||||||
#ifdef TIMEB
|
|
||||||
printf("TIMEB ");
|
|
||||||
#endif
|
|
||||||
#ifdef USE_TOD
|
|
||||||
printf("USE_TOD ");
|
|
||||||
#endif
|
|
||||||
#ifdef HZ
|
|
||||||
#define as_string(s) (#s)
|
|
||||||
{
|
|
||||||
double dbl = HZ;
|
|
||||||
printf("HZ=%g", dbl);
|
|
||||||
}
|
|
||||||
# ifdef _SC_CLK_TCK
|
|
||||||
printf(" [sysconf value]");
|
|
||||||
# endif
|
|
||||||
#endif
|
|
||||||
printf("\n");
|
|
||||||
printf("timing function used: %s%s%s%s%s%s%s\n",
|
|
||||||
(ftime_used ? "ftime" : ""),
|
|
||||||
(ftime_used + times_used > 1 ? "," : ""),
|
|
||||||
(times_used ? "times" : ""),
|
|
||||||
(ftime_used + times_used + gettimeofday_used > 1 ? "," : ""),
|
|
||||||
(gettimeofday_used ? "gettimeofday" : ""),
|
|
||||||
(ftime_used + times_used + gettimeofday_used + getrusage_used > 1 ? "," : ""),
|
|
||||||
(getrusage_used ? "getrusage" : ""));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if (pr_header)
|
if (pr_header)
|
||||||
@@ -2760,6 +2601,8 @@ static int do_multi(int multi)
|
|||||||
for(n=0 ; n < multi ; ++n)
|
for(n=0 ; n < multi ; ++n)
|
||||||
{
|
{
|
||||||
pipe(fd);
|
pipe(fd);
|
||||||
|
fflush(stdout);
|
||||||
|
fflush(stderr);
|
||||||
if(fork())
|
if(fork())
|
||||||
{
|
{
|
||||||
close(fd[1]);
|
close(fd[1]);
|
||||||
@@ -2773,6 +2616,7 @@ static int do_multi(int multi)
|
|||||||
close(fd[1]);
|
close(fd[1]);
|
||||||
mr=1;
|
mr=1;
|
||||||
usertime=0;
|
usertime=0;
|
||||||
|
free(fds);
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
printf("Forked child %d\n",n);
|
printf("Forked child %d\n",n);
|
||||||
@@ -2921,7 +2765,10 @@ static int do_multi(int multi)
|
|||||||
else
|
else
|
||||||
fprintf(stderr,"Unknown type '%s' from child %d\n",buf,n);
|
fprintf(stderr,"Unknown type '%s' from child %d\n",buf,n);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
fclose(f);
|
||||||
}
|
}
|
||||||
|
free(fds);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
/* apps/spkac.c */
|
/* apps/spkac.c */
|
||||||
|
|
||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
|
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
||||||
* project 1999. Based on an original idea by Massimiliano Pala
|
* project 1999. Based on an original idea by Massimiliano Pala
|
||||||
* (madwolf@openca.org).
|
* (madwolf@openca.org).
|
||||||
*/
|
*/
|
||||||
@@ -285,7 +285,7 @@ bad:
|
|||||||
pkey = NETSCAPE_SPKI_get_pubkey(spki);
|
pkey = NETSCAPE_SPKI_get_pubkey(spki);
|
||||||
if(verify) {
|
if(verify) {
|
||||||
i = NETSCAPE_SPKI_verify(spki, pkey);
|
i = NETSCAPE_SPKI_verify(spki, pkey);
|
||||||
if(i) BIO_printf(bio_err, "Signature OK\n");
|
if (i > 0) BIO_printf(bio_err, "Signature OK\n");
|
||||||
else {
|
else {
|
||||||
BIO_printf(bio_err, "Signature Failure\n");
|
BIO_printf(bio_err, "Signature Failure\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
|
|||||||
195
apps/tsget
Normal file
195
apps/tsget
Normal file
@@ -0,0 +1,195 @@
|
|||||||
|
#!/usr/bin/perl -w
|
||||||
|
# Written by Zoltan Glozik <zglozik@stones.com>.
|
||||||
|
# Copyright (c) 2002 The OpenTSA Project. All rights reserved.
|
||||||
|
$::version = '$Id: tsget,v 1.1 2006/02/12 23:11:21 ulf Exp $';
|
||||||
|
|
||||||
|
use strict;
|
||||||
|
use IO::Handle;
|
||||||
|
use Getopt::Std;
|
||||||
|
use File::Basename;
|
||||||
|
use WWW::Curl::easy;
|
||||||
|
|
||||||
|
use vars qw(%options);
|
||||||
|
|
||||||
|
# Callback for reading the body.
|
||||||
|
sub read_body {
|
||||||
|
my ($maxlength, $state) = @_;
|
||||||
|
my $return_data = "";
|
||||||
|
my $data_len = length ${$state->{data}};
|
||||||
|
if ($state->{bytes} < $data_len) {
|
||||||
|
$data_len = $data_len - $state->{bytes};
|
||||||
|
$data_len = $maxlength if $data_len > $maxlength;
|
||||||
|
$return_data = substr ${$state->{data}}, $state->{bytes}, $data_len;
|
||||||
|
$state->{bytes} += $data_len;
|
||||||
|
}
|
||||||
|
return $return_data;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Callback for writing the body into a variable.
|
||||||
|
sub write_body {
|
||||||
|
my ($data, $pointer) = @_;
|
||||||
|
${$pointer} .= $data;
|
||||||
|
return length($data);
|
||||||
|
}
|
||||||
|
|
||||||
|
# Initialise a new Curl object.
|
||||||
|
sub create_curl {
|
||||||
|
my $url = shift;
|
||||||
|
|
||||||
|
# Create Curl object.
|
||||||
|
my $curl = WWW::Curl::easy::new();
|
||||||
|
|
||||||
|
# Error-handling related options.
|
||||||
|
$curl->setopt(CURLOPT_VERBOSE, 1) if $options{d};
|
||||||
|
$curl->setopt(CURLOPT_FAILONERROR, 1);
|
||||||
|
$curl->setopt(CURLOPT_USERAGENT, "OpenTSA tsget.pl/" . (split / /, $::version)[2]);
|
||||||
|
|
||||||
|
# Options for POST method.
|
||||||
|
$curl->setopt(CURLOPT_UPLOAD, 1);
|
||||||
|
$curl->setopt(CURLOPT_CUSTOMREQUEST, "POST");
|
||||||
|
$curl->setopt(CURLOPT_HTTPHEADER,
|
||||||
|
["Content-Type: application/timestamp-query",
|
||||||
|
"Accept: application/timestamp-reply"]);
|
||||||
|
$curl->setopt(CURLOPT_READFUNCTION, \&read_body);
|
||||||
|
$curl->setopt(CURLOPT_HEADERFUNCTION, sub { return length($_[0]); });
|
||||||
|
|
||||||
|
# Options for getting the result.
|
||||||
|
$curl->setopt(CURLOPT_WRITEFUNCTION, \&write_body);
|
||||||
|
|
||||||
|
# SSL related options.
|
||||||
|
$curl->setopt(CURLOPT_SSLKEYTYPE, "PEM");
|
||||||
|
$curl->setopt(CURLOPT_SSL_VERIFYPEER, 1); # Verify server's certificate.
|
||||||
|
$curl->setopt(CURLOPT_SSL_VERIFYHOST, 2); # Check server's CN.
|
||||||
|
$curl->setopt(CURLOPT_SSLKEY, $options{k}) if defined($options{k});
|
||||||
|
$curl->setopt(CURLOPT_SSLKEYPASSWD, $options{p}) if defined($options{p});
|
||||||
|
$curl->setopt(CURLOPT_SSLCERT, $options{c}) if defined($options{c});
|
||||||
|
$curl->setopt(CURLOPT_CAINFO, $options{C}) if defined($options{C});
|
||||||
|
$curl->setopt(CURLOPT_CAPATH, $options{P}) if defined($options{P});
|
||||||
|
$curl->setopt(CURLOPT_RANDOM_FILE, $options{r}) if defined($options{r});
|
||||||
|
$curl->setopt(CURLOPT_EGDSOCKET, $options{g}) if defined($options{g});
|
||||||
|
|
||||||
|
# Setting destination.
|
||||||
|
$curl->setopt(CURLOPT_URL, $url);
|
||||||
|
|
||||||
|
return $curl;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Send a request and returns the body back.
|
||||||
|
sub get_timestamp {
|
||||||
|
my $curl = shift;
|
||||||
|
my $body = shift;
|
||||||
|
my $ts_body;
|
||||||
|
local $::error_buf;
|
||||||
|
|
||||||
|
# Error-handling related options.
|
||||||
|
$curl->setopt(CURLOPT_ERRORBUFFER, "::error_buf");
|
||||||
|
|
||||||
|
# Options for POST method.
|
||||||
|
$curl->setopt(CURLOPT_INFILE, {data => $body, bytes => 0});
|
||||||
|
$curl->setopt(CURLOPT_INFILESIZE, length(${$body}));
|
||||||
|
|
||||||
|
# Options for getting the result.
|
||||||
|
$curl->setopt(CURLOPT_FILE, \$ts_body);
|
||||||
|
|
||||||
|
# Send the request...
|
||||||
|
my $error_code = $curl->perform();
|
||||||
|
my $error_string;
|
||||||
|
if ($error_code != 0) {
|
||||||
|
my $http_code = $curl->getinfo(CURLINFO_HTTP_CODE);
|
||||||
|
$error_string = "could not get timestamp";
|
||||||
|
$error_string .= ", http code: $http_code" unless $http_code == 0;
|
||||||
|
$error_string .= ", curl code: $error_code";
|
||||||
|
$error_string .= " ($::error_buf)" if defined($::error_buf);
|
||||||
|
} else {
|
||||||
|
my $ct = $curl->getinfo(CURLINFO_CONTENT_TYPE);
|
||||||
|
if (lc($ct) ne "application/timestamp-reply") {
|
||||||
|
$error_string = "unexpected content type returned: $ct";
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return ($ts_body, $error_string);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
# Print usage information and exists.
|
||||||
|
sub usage {
|
||||||
|
|
||||||
|
print STDERR "usage: $0 -h <server_url> [-e <extension>] [-o <output>] ";
|
||||||
|
print STDERR "[-v] [-d] [-k <private_key.pem>] [-p <key_password>] ";
|
||||||
|
print STDERR "[-c <client_cert.pem>] [-C <CA_certs.pem>] [-P <CA_path>] ";
|
||||||
|
print STDERR "[-r <file:file...>] [-g <EGD_socket>] [<request>]...\n";
|
||||||
|
exit 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
# ----------------------------------------------------------------------
|
||||||
|
# Main program
|
||||||
|
# ----------------------------------------------------------------------
|
||||||
|
|
||||||
|
# Getting command-line options (default comes from TSGET environment variable).
|
||||||
|
my $getopt_arg = "h:e:o:vdk:p:c:C:P:r:g:";
|
||||||
|
if (exists $ENV{TSGET}) {
|
||||||
|
my @old_argv = @ARGV;
|
||||||
|
@ARGV = split /\s+/, $ENV{TSGET};
|
||||||
|
getopts($getopt_arg, \%options) or usage;
|
||||||
|
@ARGV = @old_argv;
|
||||||
|
}
|
||||||
|
getopts($getopt_arg, \%options) or usage;
|
||||||
|
|
||||||
|
# Checking argument consistency.
|
||||||
|
if (!exists($options{h}) || (@ARGV == 0 && !exists($options{o}))
|
||||||
|
|| (@ARGV > 1 && exists($options{o}))) {
|
||||||
|
print STDERR "Inconsistent command line options.\n";
|
||||||
|
usage;
|
||||||
|
}
|
||||||
|
# Setting defaults.
|
||||||
|
@ARGV = ("-") unless @ARGV != 0;
|
||||||
|
$options{e} = ".tsr" unless defined($options{e});
|
||||||
|
|
||||||
|
# Processing requests.
|
||||||
|
my $curl = create_curl $options{h};
|
||||||
|
undef $/; # For reading whole files.
|
||||||
|
REQUEST: foreach (@ARGV) {
|
||||||
|
my $input = $_;
|
||||||
|
my ($base, $path) = fileparse($input, '\.[^.]*');
|
||||||
|
my $output_base = $base . $options{e};
|
||||||
|
my $output = defined($options{o}) ? $options{o} : $path . $output_base;
|
||||||
|
|
||||||
|
STDERR->printflush("$input: ") if $options{v};
|
||||||
|
# Read request.
|
||||||
|
my $body;
|
||||||
|
if ($input eq "-") {
|
||||||
|
# Read the request from STDIN;
|
||||||
|
$body = <STDIN>;
|
||||||
|
} else {
|
||||||
|
# Read the request from file.
|
||||||
|
open INPUT, "<" . $input
|
||||||
|
or warn("$input: could not open input file: $!\n"), next REQUEST;
|
||||||
|
$body = <INPUT>;
|
||||||
|
close INPUT
|
||||||
|
or warn("$input: could not close input file: $!\n"), next REQUEST;
|
||||||
|
}
|
||||||
|
|
||||||
|
# Send request.
|
||||||
|
STDERR->printflush("sending request") if $options{v};
|
||||||
|
|
||||||
|
my ($ts_body, $error) = get_timestamp $curl, \$body;
|
||||||
|
if (defined($error)) {
|
||||||
|
die "$input: fatal error: $error\n";
|
||||||
|
}
|
||||||
|
STDERR->printflush(", reply received") if $options{v};
|
||||||
|
|
||||||
|
# Write response.
|
||||||
|
if ($output eq "-") {
|
||||||
|
# Write to STDOUT.
|
||||||
|
print $ts_body;
|
||||||
|
} else {
|
||||||
|
# Write to file.
|
||||||
|
open OUTPUT, ">", $output
|
||||||
|
or warn("$output: could not open output file: $!\n"), next REQUEST;
|
||||||
|
print OUTPUT $ts_body;
|
||||||
|
close OUTPUT
|
||||||
|
or warn("$output: could not close output file: $!\n"), next REQUEST;
|
||||||
|
}
|
||||||
|
STDERR->printflush(", $output written.\n") if $options{v};
|
||||||
|
}
|
||||||
|
$curl->cleanup();
|
||||||
|
WWW::Curl::easy::global_cleanup();
|
||||||
@@ -266,7 +266,7 @@ static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X
|
|||||||
|
|
||||||
ret=0;
|
ret=0;
|
||||||
end:
|
end:
|
||||||
if (i)
|
if (i > 0)
|
||||||
{
|
{
|
||||||
fprintf(stdout,"OK\n");
|
fprintf(stdout,"OK\n");
|
||||||
ret=1;
|
ret=1;
|
||||||
@@ -367,4 +367,3 @@ static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
|
|||||||
ERR_clear_error();
|
ERR_clear_error();
|
||||||
return(ok);
|
return(ok);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -167,7 +167,7 @@ int MAIN(int argc, char **argv)
|
|||||||
date=version=cflags=options=platform=dir=1;
|
date=version=cflags=options=platform=dir=1;
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"usage:version -[avbofp]\n");
|
BIO_printf(bio_err,"usage:version -[avbofpd]\n");
|
||||||
ret=1;
|
ret=1;
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|||||||
66
apps/x509.c
66
apps/x509.c
@@ -114,7 +114,7 @@ static const char *x509_usage[]={
|
|||||||
" -alias - output certificate alias\n",
|
" -alias - output certificate alias\n",
|
||||||
" -noout - no certificate output\n",
|
" -noout - no certificate output\n",
|
||||||
" -ocspid - print OCSP hash values for the subject name and public key\n",
|
" -ocspid - print OCSP hash values for the subject name and public key\n",
|
||||||
" -ocspurl - print OCSP Responder URL(s)\n",
|
" -ocsp_uri - print OCSP Responder URL(s)\n",
|
||||||
" -trustout - output a \"trusted\" certificate\n",
|
" -trustout - output a \"trusted\" certificate\n",
|
||||||
" -clrtrust - clear all trusted purposes\n",
|
" -clrtrust - clear all trusted purposes\n",
|
||||||
" -clrreject - clear all rejected purposes\n",
|
" -clrreject - clear all rejected purposes\n",
|
||||||
@@ -190,7 +190,7 @@ int MAIN(int argc, char **argv)
|
|||||||
X509_REQ *rq=NULL;
|
X509_REQ *rq=NULL;
|
||||||
int fingerprint=0;
|
int fingerprint=0;
|
||||||
char buf[256];
|
char buf[256];
|
||||||
const EVP_MD *md_alg,*digest=EVP_sha1();
|
const EVP_MD *md_alg,*digest=NULL;
|
||||||
CONF *extconf = NULL;
|
CONF *extconf = NULL;
|
||||||
char *extsect = NULL, *extfile = NULL, *passin = NULL, *passargin = NULL;
|
char *extsect = NULL, *extfile = NULL, *passin = NULL, *passargin = NULL;
|
||||||
int need_rand = 0;
|
int need_rand = 0;
|
||||||
@@ -626,7 +626,7 @@ bad:
|
|||||||
if (!X509_set_subject_name(x,req->req_info->subject)) goto end;
|
if (!X509_set_subject_name(x,req->req_info->subject)) goto end;
|
||||||
|
|
||||||
X509_gmtime_adj(X509_get_notBefore(x),0);
|
X509_gmtime_adj(X509_get_notBefore(x),0);
|
||||||
X509_gmtime_adj(X509_get_notAfter(x),(long)60*60*24*days);
|
X509_time_adj_ex(X509_get_notAfter(x),days, 0, NULL);
|
||||||
|
|
||||||
pkey = X509_REQ_get_pubkey(req);
|
pkey = X509_REQ_get_pubkey(req);
|
||||||
X509_set_pubkey(x,pkey);
|
X509_set_pubkey(x,pkey);
|
||||||
@@ -738,13 +738,14 @@ bad:
|
|||||||
else if ((email == i) || (ocsp_uri == i))
|
else if ((email == i) || (ocsp_uri == i))
|
||||||
{
|
{
|
||||||
int j;
|
int j;
|
||||||
STACK *emlst;
|
STACK_OF(STRING) *emlst;
|
||||||
if (email == i)
|
if (email == i)
|
||||||
emlst = X509_get1_email(x);
|
emlst = X509_get1_email(x);
|
||||||
else
|
else
|
||||||
emlst = X509_get1_ocsp(x);
|
emlst = X509_get1_ocsp(x);
|
||||||
for (j = 0; j < sk_num(emlst); j++)
|
for (j = 0; j < sk_STRING_num(emlst); j++)
|
||||||
BIO_printf(STDout, "%s\n", sk_value(emlst, j));
|
BIO_printf(STDout, "%s\n",
|
||||||
|
sk_STRING_value(emlst, j));
|
||||||
X509_email_free(emlst);
|
X509_email_free(emlst);
|
||||||
}
|
}
|
||||||
else if (aliasout == i)
|
else if (aliasout == i)
|
||||||
@@ -892,14 +893,18 @@ bad:
|
|||||||
int j;
|
int j;
|
||||||
unsigned int n;
|
unsigned int n;
|
||||||
unsigned char md[EVP_MAX_MD_SIZE];
|
unsigned char md[EVP_MAX_MD_SIZE];
|
||||||
|
const EVP_MD *fdig = digest;
|
||||||
|
|
||||||
if (!X509_digest(x,digest,md,&n))
|
if (!fdig)
|
||||||
|
fdig = EVP_sha1();
|
||||||
|
|
||||||
|
if (!X509_digest(x,fdig,md,&n))
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err,"out of memory\n");
|
BIO_printf(bio_err,"out of memory\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
BIO_printf(STDout,"%s Fingerprint=",
|
BIO_printf(STDout,"%s Fingerprint=",
|
||||||
OBJ_nid2sn(EVP_MD_type(digest)));
|
OBJ_nid2sn(EVP_MD_type(fdig)));
|
||||||
for (j=0; j<(int)n; j++)
|
for (j=0; j<(int)n; j++)
|
||||||
{
|
{
|
||||||
BIO_printf(STDout,"%02X%c",md[j],
|
BIO_printf(STDout,"%02X%c",md[j],
|
||||||
@@ -919,14 +924,6 @@ bad:
|
|||||||
passin, e, "Private key");
|
passin, e, "Private key");
|
||||||
if (Upkey == NULL) goto end;
|
if (Upkey == NULL) goto end;
|
||||||
}
|
}
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (Upkey->type == EVP_PKEY_DSA)
|
|
||||||
digest=EVP_dss1();
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (Upkey->type == EVP_PKEY_EC)
|
|
||||||
digest=EVP_ecdsa();
|
|
||||||
#endif
|
|
||||||
|
|
||||||
assert(need_rand);
|
assert(need_rand);
|
||||||
if (!sign(x,Upkey,days,clrext,digest,
|
if (!sign(x,Upkey,days,clrext,digest,
|
||||||
@@ -943,14 +940,6 @@ bad:
|
|||||||
"CA Private Key");
|
"CA Private Key");
|
||||||
if (CApkey == NULL) goto end;
|
if (CApkey == NULL) goto end;
|
||||||
}
|
}
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (CApkey->type == EVP_PKEY_DSA)
|
|
||||||
digest=EVP_dss1();
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (CApkey->type == EVP_PKEY_EC)
|
|
||||||
digest = EVP_ecdsa();
|
|
||||||
#endif
|
|
||||||
|
|
||||||
assert(need_rand);
|
assert(need_rand);
|
||||||
if (!x509_certify(ctx,CAfile,digest,x,xca,
|
if (!x509_certify(ctx,CAfile,digest,x,xca,
|
||||||
@@ -978,15 +967,6 @@ bad:
|
|||||||
|
|
||||||
BIO_printf(bio_err,"Generating certificate request\n");
|
BIO_printf(bio_err,"Generating certificate request\n");
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
|
||||||
if (pk->type == EVP_PKEY_DSA)
|
|
||||||
digest=EVP_dss1();
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_ECDSA
|
|
||||||
if (pk->type == EVP_PKEY_EC)
|
|
||||||
digest=EVP_ecdsa();
|
|
||||||
#endif
|
|
||||||
|
|
||||||
rq=X509_to_X509_REQ(x,pk,digest);
|
rq=X509_to_X509_REQ(x,pk,digest);
|
||||||
EVP_PKEY_free(pk);
|
EVP_PKEY_free(pk);
|
||||||
if (rq == NULL)
|
if (rq == NULL)
|
||||||
@@ -1040,16 +1020,15 @@ bad:
|
|||||||
}
|
}
|
||||||
else if (outformat == FORMAT_NETSCAPE)
|
else if (outformat == FORMAT_NETSCAPE)
|
||||||
{
|
{
|
||||||
ASN1_HEADER ah;
|
NETSCAPE_X509 nx;
|
||||||
ASN1_OCTET_STRING os;
|
ASN1_OCTET_STRING hdr;
|
||||||
|
|
||||||
os.data=(unsigned char *)NETSCAPE_CERT_HDR;
|
hdr.data=(unsigned char *)NETSCAPE_CERT_HDR;
|
||||||
os.length=strlen(NETSCAPE_CERT_HDR);
|
hdr.length=strlen(NETSCAPE_CERT_HDR);
|
||||||
ah.header= &os;
|
nx.header= &hdr;
|
||||||
ah.data=(char *)x;
|
nx.cert=x;
|
||||||
ah.meth=X509_asn1_meth();
|
|
||||||
|
|
||||||
i=ASN1_i2d_bio_of(ASN1_HEADER,i2d_ASN1_HEADER,out,&ah);
|
i=ASN1_item_i2d_bio(ASN1_ITEM_rptr(NETSCAPE_X509),out,&nx);
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
||||||
@@ -1151,7 +1130,8 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
|
|||||||
/* NOTE: this certificate can/should be self signed, unless it was
|
/* NOTE: this certificate can/should be self signed, unless it was
|
||||||
* a certificate request in which case it is not. */
|
* a certificate request in which case it is not. */
|
||||||
X509_STORE_CTX_set_cert(&xsc,x);
|
X509_STORE_CTX_set_cert(&xsc,x);
|
||||||
if (!reqfile && !X509_verify_cert(&xsc))
|
X509_STORE_CTX_set_flags(&xsc, X509_V_FLAG_CHECK_SS_SIGNATURE);
|
||||||
|
if (!reqfile && X509_verify_cert(&xsc) <= 0)
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
if (!X509_check_private_key(xca,pkey))
|
if (!X509_check_private_key(xca,pkey))
|
||||||
@@ -1167,7 +1147,7 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
|
|||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
/* hardwired expired */
|
/* hardwired expired */
|
||||||
if (X509_gmtime_adj(X509_get_notAfter(x),(long)60*60*24*days) == NULL)
|
if (X509_time_adj_ex(X509_get_notAfter(x),days, 0, NULL) == NULL)
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
if (clrext)
|
if (clrext)
|
||||||
|
|||||||
135
config
135
config
@@ -122,6 +122,14 @@ case "${SYSTEM}:${RELEASE}:${VERSION}:${MACHINE}" in
|
|||||||
echo "${MACHINE}-ibm-aix3"; exit 0
|
echo "${MACHINE}-ibm-aix3"; exit 0
|
||||||
;;
|
;;
|
||||||
|
|
||||||
|
BeOS:*:BePC)
|
||||||
|
if [ -e /boot/develop/headers/be/bone ]; then
|
||||||
|
echo "beos-x86-bone"; exit 0
|
||||||
|
else
|
||||||
|
echo "beos-x86-r5"; exit 0
|
||||||
|
fi
|
||||||
|
;;
|
||||||
|
|
||||||
dgux:*)
|
dgux:*)
|
||||||
echo "${MACHINE}-dg-dgux"; exit 0
|
echo "${MACHINE}-dg-dgux"; exit 0
|
||||||
;;
|
;;
|
||||||
@@ -270,7 +278,7 @@ case "${SYSTEM}:${RELEASE}:${VERSION}:${MACHINE}" in
|
|||||||
echo "ppc-apple-darwin${VERSION}"
|
echo "ppc-apple-darwin${VERSION}"
|
||||||
;;
|
;;
|
||||||
*)
|
*)
|
||||||
echo "i386-apple-darwin${VERSION}"
|
echo "i686-apple-darwin${VERSION}"
|
||||||
;;
|
;;
|
||||||
esac
|
esac
|
||||||
exit 0
|
exit 0
|
||||||
@@ -399,11 +407,8 @@ exit 0
|
|||||||
# this is where the translation occurs into SSLeay terms
|
# this is where the translation occurs into SSLeay terms
|
||||||
# ---------------------------------------------------------------------------
|
# ---------------------------------------------------------------------------
|
||||||
|
|
||||||
# figure out if gcc is available and if so we use it otherwise
|
|
||||||
# we fallback to whatever cc does on the system
|
|
||||||
GCCVER=`(gcc -dumpversion) 2>/dev/null`
|
GCCVER=`(gcc -dumpversion) 2>/dev/null`
|
||||||
if [ "$GCCVER" != "" ]; then
|
if [ "$GCCVER" != "" ]; then
|
||||||
CC=gcc
|
|
||||||
# then strip off whatever prefix egcs prepends the number with...
|
# then strip off whatever prefix egcs prepends the number with...
|
||||||
# Hopefully, this will work for any future prefixes as well.
|
# Hopefully, this will work for any future prefixes as well.
|
||||||
GCCVER=`echo $GCCVER | LC_ALL=C sed 's/^[a-zA-Z]*\-//'`
|
GCCVER=`echo $GCCVER | LC_ALL=C sed 's/^[a-zA-Z]*\-//'`
|
||||||
@@ -412,9 +417,18 @@ if [ "$GCCVER" != "" ]; then
|
|||||||
# major and minor version numbers.
|
# major and minor version numbers.
|
||||||
# peak single digit before and after first dot, e.g. 2.95.1 gives 29
|
# peak single digit before and after first dot, e.g. 2.95.1 gives 29
|
||||||
GCCVER=`echo $GCCVER | sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/'`
|
GCCVER=`echo $GCCVER | sed 's/\([0-9]\)\.\([0-9]\).*/\1\2/'`
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Only set CC if not supplied already
|
||||||
|
if [ -z "$CC" ]; then
|
||||||
|
# figure out if gcc is available and if so we use it otherwise
|
||||||
|
# we fallback to whatever cc does on the system
|
||||||
|
if [ "$GCCVER" != "" ]; then
|
||||||
|
CC=gcc
|
||||||
else
|
else
|
||||||
CC=cc
|
CC=cc
|
||||||
fi
|
fi
|
||||||
|
fi
|
||||||
GCCVER=${GCCVER:-0}
|
GCCVER=${GCCVER:-0}
|
||||||
if [ "$SYSTEM" = "HP-UX" ];then
|
if [ "$SYSTEM" = "HP-UX" ];then
|
||||||
# By default gcc is a ILP32 compiler (with long long == 64).
|
# By default gcc is a ILP32 compiler (with long long == 64).
|
||||||
@@ -482,6 +496,12 @@ echo Operating system: $GUESSOS
|
|||||||
# script above so we end up with values in vars but that would take
|
# script above so we end up with values in vars but that would take
|
||||||
# more time that I want to waste at the moment
|
# more time that I want to waste at the moment
|
||||||
case "$GUESSOS" in
|
case "$GUESSOS" in
|
||||||
|
uClinux*64*)
|
||||||
|
OUT=uClinux-dist64
|
||||||
|
;;
|
||||||
|
uClinux*)
|
||||||
|
OUT=uClinux-dist
|
||||||
|
;;
|
||||||
mips2-sgi-irix)
|
mips2-sgi-irix)
|
||||||
CPU=`(hinv -t cpu) 2>/dev/null | head -1 | sed 's/^CPU:[^R]*R\([0-9]*\).*/\1/'`
|
CPU=`(hinv -t cpu) 2>/dev/null | head -1 | sed 's/^CPU:[^R]*R\([0-9]*\).*/\1/'`
|
||||||
CPU=${CPU:-0}
|
CPU=${CPU:-0}
|
||||||
@@ -501,11 +521,44 @@ case "$GUESSOS" in
|
|||||||
OUT="irix-mips3-$CC"
|
OUT="irix-mips3-$CC"
|
||||||
;;
|
;;
|
||||||
mips4-sgi-irix64)
|
mips4-sgi-irix64)
|
||||||
OUT="irix64-mips4-$CC"
|
echo "WARNING! If you wish to build 64-bit library, then you have to"
|
||||||
|
echo " invoke './Configure irix64-mips4-$CC' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have about 5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
|
#CPU=`(hinv -t cpu) 2>/dev/null | head -1 | sed 's/^CPU:[^R]*R\([0-9]*\).*/\1/'`
|
||||||
|
#CPU=${CPU:-0}
|
||||||
|
#if [ $CPU -ge 5000 ]; then
|
||||||
|
# options="$options -mips4"
|
||||||
|
#else
|
||||||
|
# options="$options -mips3"
|
||||||
|
#fi
|
||||||
|
OUT="irix-mips3-$CC"
|
||||||
;;
|
;;
|
||||||
ppc-apple-rhapsody) OUT="rhapsody-ppc-cc" ;;
|
ppc-apple-rhapsody) OUT="rhapsody-ppc-cc" ;;
|
||||||
ppc-apple-darwin*) OUT="darwin-ppc-cc" ;;
|
ppc-apple-darwin*)
|
||||||
i386-apple-darwin*) OUT="darwin-i386-cc" ;;
|
ISA64=`(sysctl -n hw.optional.64bitops) 2>/dev/null`
|
||||||
|
if [ "$ISA64" = "1" ]; then
|
||||||
|
echo "WARNING! If you wish to build 64-bit library, then you have to"
|
||||||
|
echo " invoke './Configure darwin64-ppc-cc' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have about 5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
OUT="darwin-ppc-cc" ;;
|
||||||
|
i?86-apple-darwin*)
|
||||||
|
ISA64=`(sysctl -n hw.optional.x86_64) 2>/dev/null`
|
||||||
|
if [ "$ISA64" = "1" ]; then
|
||||||
|
echo "WARNING! If you wish to build 64-bit library, then you have to"
|
||||||
|
echo " invoke './Configure darwin64-x86_64-cc' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have about 5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
OUT="darwin-i386-cc" ;;
|
||||||
alpha-*-linux2)
|
alpha-*-linux2)
|
||||||
ISA=`awk '/cpu model/{print$4;exit(0);}' /proc/cpuinfo`
|
ISA=`awk '/cpu model/{print$4;exit(0);}' /proc/cpuinfo`
|
||||||
case ${ISA:-generic} in
|
case ${ISA:-generic} in
|
||||||
@@ -521,12 +574,25 @@ case "$GUESSOS" in
|
|||||||
fi
|
fi
|
||||||
;;
|
;;
|
||||||
ppc64-*-linux2)
|
ppc64-*-linux2)
|
||||||
OUT="linux-ppc64"
|
echo "WARNING! If you wish to build 64-bit library, then you have to"
|
||||||
|
echo " invoke './Configure linux-ppc64' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have about 5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
|
OUT="linux-ppc"
|
||||||
;;
|
;;
|
||||||
ppc-*-linux2) OUT="linux-ppc" ;;
|
ppc-*-linux2) OUT="linux-ppc" ;;
|
||||||
ia64-*-linux?) OUT="linux-ia64" ;;
|
ia64-*-linux?) OUT="linux-ia64" ;;
|
||||||
sparc64-*-linux2)
|
sparc64-*-linux2)
|
||||||
OUT="linux64-sparcv9" ;;
|
echo "WARNING! If you *know* that your GNU C supports 64-bit/V9 ABI"
|
||||||
|
echo " and wish to build 64-bit library, then you have to"
|
||||||
|
echo " invoke './Configure linux64-sparcv9' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have about 5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
|
OUT="linux-sparcv9" ;;
|
||||||
sparc-*-linux2)
|
sparc-*-linux2)
|
||||||
KARCH=`awk '/^type/{print$3;exit(0);}' /proc/cpuinfo`
|
KARCH=`awk '/^type/{print$3;exit(0);}' /proc/cpuinfo`
|
||||||
case ${KARCH:-sun4} in
|
case ${KARCH:-sun4} in
|
||||||
@@ -557,12 +623,12 @@ case "$GUESSOS" in
|
|||||||
|
|
||||||
options="$options -DB_ENDIAN -mschedule=$CPUSCHEDULE -march=$CPUARCH"
|
options="$options -DB_ENDIAN -mschedule=$CPUSCHEDULE -march=$CPUARCH"
|
||||||
OUT="linux-generic32" ;;
|
OUT="linux-generic32" ;;
|
||||||
arm*b-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
|
armv[1-3]*-*-linux2) OUT="linux-generic32" ;;
|
||||||
arm*l-*-linux2) OUT="linux-generic32"; options="$options -DL_ENDIAN" ;;
|
arm*-*-linux2) OUT="linux-armv4" ;;
|
||||||
sh*b-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
|
sh*b-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
|
||||||
sh*-*-linux2) OUT="linux-generic32"; options="$options -DL_ENDIAN" ;;
|
sh*-*-linux2) OUT="linux-generic32"; options="$options -DL_ENDIAN" ;;
|
||||||
m68k*-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
|
m68k*-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
|
||||||
s390-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN -DNO_ASM" ;;
|
s390-*-linux2) OUT="linux-generic32"; options="$options -DB_ENDIAN" ;;
|
||||||
s390x-*-linux2) OUT="linux-s390x" ;;
|
s390x-*-linux2) OUT="linux-s390x" ;;
|
||||||
x86_64-*-linux?) OUT="linux-x86_64" ;;
|
x86_64-*-linux?) OUT="linux-x86_64" ;;
|
||||||
*86-*-linux2) OUT="linux-elf"
|
*86-*-linux2) OUT="linux-elf"
|
||||||
@@ -584,13 +650,32 @@ case "$GUESSOS" in
|
|||||||
ISA64=`(isalist) 2>/dev/null | grep sparcv9`
|
ISA64=`(isalist) 2>/dev/null | grep sparcv9`
|
||||||
if [ "$ISA64" != "" ]; then
|
if [ "$ISA64" != "" ]; then
|
||||||
if [ "$CC" = "cc" -a $CCVER -ge 50 ]; then
|
if [ "$CC" = "cc" -a $CCVER -ge 50 ]; then
|
||||||
OUT="solaris64-sparcv9-cc"
|
echo "WARNING! If you wish to build 64-bit library, then you have to"
|
||||||
|
echo " invoke './Configure solaris64-sparcv9-cc' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have about 5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
elif [ "$CC" = "gcc" -a "$GCC_ARCH" = "-m64" ]; then
|
elif [ "$CC" = "gcc" -a "$GCC_ARCH" = "-m64" ]; then
|
||||||
# $GCC_ARCH denotes default ABI chosen by compiler driver
|
# $GCC_ARCH denotes default ABI chosen by compiler driver
|
||||||
# (first one found on the $PATH). I assume that user
|
# (first one found on the $PATH). I assume that user
|
||||||
# expects certain consistency with the rest of his builds
|
# expects certain consistency with the rest of his builds
|
||||||
# and therefore switch over to 64-bit. <appro>
|
# and therefore switch over to 64-bit. <appro>
|
||||||
OUT="solaris64-sparcv9-gcc"
|
OUT="solaris64-sparcv9-gcc"
|
||||||
|
echo "WARNING! If you wish to build 32-bit library, then you have to"
|
||||||
|
echo " invoke './Configure solaris-sparcv9-gcc' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have about 5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
|
elif [ "$GCC_ARCH" = "-m32" ]; then
|
||||||
|
echo "NOTICE! If you *know* that your GNU C supports 64-bit/V9 ABI"
|
||||||
|
echo " and wish to build 64-bit library, then you have to"
|
||||||
|
echo " invoke './Configure solaris64-sparcv9-gcc' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have about 5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
;;
|
;;
|
||||||
@@ -657,11 +742,23 @@ case "$GUESSOS" in
|
|||||||
CPU_VERSION=${CPU_VERSION:-0}
|
CPU_VERSION=${CPU_VERSION:-0}
|
||||||
# See <sys/unistd.h> for further info on CPU_VERSION.
|
# See <sys/unistd.h> for further info on CPU_VERSION.
|
||||||
if [ $CPU_VERSION -ge 768 ]; then # IA-64 CPU
|
if [ $CPU_VERSION -ge 768 ]; then # IA-64 CPU
|
||||||
|
echo "WARNING! 64-bit ABI is the default configured ABI on HP-UXi."
|
||||||
|
echo " If you wish to build 32-bit library, the you have to"
|
||||||
|
echo " invoke './Configure hpux-ia64-cc' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have about 5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
OUT="hpux64-ia64-cc"
|
OUT="hpux64-ia64-cc"
|
||||||
elif [ $CPU_VERSION -ge 532 ]; then # PA-RISC 2.x CPU
|
elif [ $CPU_VERSION -ge 532 ]; then # PA-RISC 2.x CPU
|
||||||
OUT=${OUT:-"hpux-parisc2-${CC}"}
|
OUT=${OUT:-"hpux-parisc2-${CC}"}
|
||||||
if [ $KERNEL_BITS -eq 64 -a "$CC" = "cc" ]; then
|
if [ $KERNEL_BITS -eq 64 -a "$CC" = "cc" ]; then
|
||||||
OUT="hpux64-parisc2-${CC}"
|
echo "WARNING! If you wish to build 64-bit library then you have to"
|
||||||
|
echo " invoke './Configure hpux64-parisc2-cc' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have about 5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
elif [ $CPU_VERSION -ge 528 ]; then # PA-RISC 1.1+ CPU
|
elif [ $CPU_VERSION -ge 528 ]; then # PA-RISC 1.1+ CPU
|
||||||
OUT="hpux-parisc-${CC}"
|
OUT="hpux-parisc-${CC}"
|
||||||
@@ -684,7 +781,12 @@ case "$GUESSOS" in
|
|||||||
else
|
else
|
||||||
OUT="aix-cc"
|
OUT="aix-cc"
|
||||||
if [ $KERNEL_BITS -eq 64 ]; then
|
if [ $KERNEL_BITS -eq 64 ]; then
|
||||||
OUT="aix64-cc"
|
echo "WARNING! If you wish to build 64-bit kit, then you have to"
|
||||||
|
echo " invoke './Configure aix64-cc' *manually*."
|
||||||
|
if [ "$TEST" = "false" -a -t 1 ]; then
|
||||||
|
echo " You have ~5 seconds to press Ctrl-C to abort."
|
||||||
|
(trap "stty `stty -g`" 2 0; stty -icanon min 0 time 50; read waste) <&1
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
if (lsattr -E -O -l `lsdev -c processor|awk '{print$1;exit}'` | grep -i powerpc) >/dev/null 2>&1; then
|
if (lsattr -E -O -l `lsdev -c processor|awk '{print$1;exit}'` | grep -i powerpc) >/dev/null 2>&1; then
|
||||||
@@ -701,6 +803,9 @@ case "$GUESSOS" in
|
|||||||
t3e-cray-unicosmk) OUT="cray-t3e" ;;
|
t3e-cray-unicosmk) OUT="cray-t3e" ;;
|
||||||
j90-cray-unicos) OUT="cray-j90" ;;
|
j90-cray-unicos) OUT="cray-j90" ;;
|
||||||
nsr-tandem-nsk) OUT="tandem-c89" ;;
|
nsr-tandem-nsk) OUT="tandem-c89" ;;
|
||||||
|
beos-*) OUT="$GUESSOS" ;;
|
||||||
|
x86pc-*-qnx6) OUT="QNX6-i386" ;;
|
||||||
|
*-*-qnx6) OUT="QNX6" ;;
|
||||||
*) OUT=`echo $GUESSOS | awk -F- '{print $3}'`;;
|
*) OUT=`echo $GUESSOS | awk -F- '{print $3}'`;;
|
||||||
esac
|
esac
|
||||||
|
|
||||||
|
|||||||
@@ -4,3 +4,5 @@ opensslconf.h
|
|||||||
Makefile.save
|
Makefile.save
|
||||||
*.flc
|
*.flc
|
||||||
semantic.cache
|
semantic.cache
|
||||||
|
*cpuid.s
|
||||||
|
uplink-cof.s
|
||||||
|
|||||||
@@ -54,8 +54,6 @@ struct LP_dir_context_st
|
|||||||
|
|
||||||
const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
|
const char *LP_find_file(LP_DIR_CTX **ctx, const char *directory)
|
||||||
{
|
{
|
||||||
struct dirent *direntry = NULL;
|
|
||||||
|
|
||||||
if (ctx == NULL || directory == NULL)
|
if (ctx == NULL || directory == NULL)
|
||||||
{
|
{
|
||||||
errno = EINVAL;
|
errno = EINVAL;
|
||||||
|
|||||||
@@ -5,9 +5,9 @@
|
|||||||
DIR= crypto
|
DIR= crypto
|
||||||
TOP= ..
|
TOP= ..
|
||||||
CC= cc
|
CC= cc
|
||||||
INCLUDE= -I. -I$(TOP) -I../include
|
INCLUDE= -I. -I$(TOP) -I../include $(ZLIB_INCLUDE)
|
||||||
# INCLUDES targets sudbirs!
|
# INCLUDES targets sudbirs!
|
||||||
INCLUDES= -I.. -I../.. -I../../include
|
INCLUDES= -I.. -I../.. -I../asn1 -I../evp -I../../include $(ZLIB_INCLUDE)
|
||||||
CFLAG= -g
|
CFLAG= -g
|
||||||
MAKEDEPPROG= makedepend
|
MAKEDEPPROG= makedepend
|
||||||
MAKEDEPEND= $(TOP)/util/domd $(TOP) -MD $(MAKEDEPPROG)
|
MAKEDEPEND= $(TOP)/util/domd $(TOP) -MD $(MAKEDEPPROG)
|
||||||
@@ -17,7 +17,7 @@ AR= ar r
|
|||||||
|
|
||||||
RECURSIVE_MAKE= [ -n "$(SDIRS)" ] && for i in $(SDIRS) ; do \
|
RECURSIVE_MAKE= [ -n "$(SDIRS)" ] && for i in $(SDIRS) ; do \
|
||||||
(cd $$i && echo "making $$target in $(DIR)/$$i..." && \
|
(cd $$i && echo "making $$target in $(DIR)/$$i..." && \
|
||||||
$(MAKE) -e TOP=../.. DIR=$$i INCLUDES='${INCLUDES}' $$target ) || exit 1; \
|
$(MAKE) -e TOP=../.. DIR=$$i INCLUDES='$(INCLUDES)' $$target ) || exit 1; \
|
||||||
done;
|
done;
|
||||||
|
|
||||||
PEX_LIBS=
|
PEX_LIBS=
|
||||||
@@ -26,6 +26,7 @@ EX_LIBS=
|
|||||||
CFLAGS= $(INCLUDE) $(CFLAG)
|
CFLAGS= $(INCLUDE) $(CFLAG)
|
||||||
ASFLAGS= $(INCLUDE) $(ASFLAG)
|
ASFLAGS= $(INCLUDE) $(ASFLAG)
|
||||||
AFLAGS=$(ASFLAGS)
|
AFLAGS=$(ASFLAGS)
|
||||||
|
CPUID_OBJ=mem_clr.o
|
||||||
|
|
||||||
LIBS=
|
LIBS=
|
||||||
|
|
||||||
@@ -33,12 +34,12 @@ GENERAL=Makefile README crypto-lib.com install.com
|
|||||||
|
|
||||||
LIB= $(TOP)/libcrypto.a
|
LIB= $(TOP)/libcrypto.a
|
||||||
SHARED_LIB= libcrypto$(SHLIB_EXT)
|
SHARED_LIB= libcrypto$(SHLIB_EXT)
|
||||||
LIBSRC= cryptlib.c dyn_lck.c mem.c mem_clr.c mem_dbg.c cversion.c ex_data.c tmdiff.c cpt_err.c ebcdic.c uid.c o_time.c o_str.c o_dir.c o_init.c fips_err.c
|
LIBSRC= cryptlib.c mem.c mem_clr.c mem_dbg.c cversion.c ex_data.c cpt_err.c ebcdic.c uid.c o_time.c o_str.c o_dir.c
|
||||||
LIBOBJ= cryptlib.o dyn_lck.o mem.o mem_clr.o mem_dbg.o cversion.o ex_data.o tmdiff.o cpt_err.o ebcdic.o uid.o o_time.o o_str.o o_dir.o o_init.o fips_err.o $(CPUID_OBJ)
|
LIBOBJ= cryptlib.o mem.o mem_dbg.o cversion.o ex_data.o cpt_err.o ebcdic.o uid.o o_time.o o_str.o o_dir.o $(CPUID_OBJ)
|
||||||
|
|
||||||
SRC= $(LIBSRC)
|
SRC= $(LIBSRC)
|
||||||
|
|
||||||
EXHEADER= crypto.h tmdiff.h opensslv.h opensslconf.h ebcdic.h symhacks.h \
|
EXHEADER= crypto.h opensslv.h opensslconf.h ebcdic.h symhacks.h \
|
||||||
ossl_typ.h
|
ossl_typ.h
|
||||||
HEADER= cryptlib.h buildinf.h md32_common.h o_time.h o_str.h o_dir.h $(EXHEADER)
|
HEADER= cryptlib.h buildinf.h md32_common.h o_time.h o_str.h o_dir.h $(EXHEADER)
|
||||||
|
|
||||||
@@ -47,7 +48,7 @@ ALL= $(GENERAL) $(SRC) $(HEADER)
|
|||||||
top:
|
top:
|
||||||
@(cd ..; $(MAKE) DIRS=$(DIR) all)
|
@(cd ..; $(MAKE) DIRS=$(DIR) all)
|
||||||
|
|
||||||
all: lib
|
all: shared
|
||||||
|
|
||||||
buildinf.h: ../Makefile
|
buildinf.h: ../Makefile
|
||||||
( echo "#ifndef MK1MF_BUILD"; \
|
( echo "#ifndef MK1MF_BUILD"; \
|
||||||
@@ -57,26 +58,26 @@ buildinf.h: ../Makefile
|
|||||||
echo " #define DATE \"`LC_ALL=C LC_TIME=C date`\""; \
|
echo " #define DATE \"`LC_ALL=C LC_TIME=C date`\""; \
|
||||||
echo '#endif' ) >buildinf.h
|
echo '#endif' ) >buildinf.h
|
||||||
|
|
||||||
x86cpuid-elf.s: x86cpuid.pl perlasm/x86asm.pl
|
x86cpuid.s: x86cpuid.pl perlasm/x86asm.pl
|
||||||
$(PERL) x86cpuid.pl elf $(CFLAGS) $(PROCESSOR) > $@
|
$(PERL) x86cpuid.pl $(PERLASM_SCHEME) $(CFLAGS) $(PROCESSOR) > $@
|
||||||
x86cpuid-cof.s: x86cpuid.pl perlasm/x86asm.pl
|
|
||||||
$(PERL) x86cpuid.pl coff $(CFLAGS) $(PROCESSOR) > $@
|
|
||||||
x86cpuid-out.s: x86cpuid.pl perlasm/x86asm.pl
|
|
||||||
$(PERL) x86cpuid.pl a.out $(CFLAGS) $(PROCESSOR) > $@
|
|
||||||
|
|
||||||
uplink.o: ../ms/uplink.c
|
applink.o: $(TOP)/ms/applink.c
|
||||||
$(CC) $(CFLAGS) -c -o $@ ../ms/uplink.c
|
$(CC) $(CFLAGS) -c -o $@ $(TOP)/ms/applink.c
|
||||||
|
|
||||||
uplink-cof.s: ../ms/uplink.pl
|
uplink.o: $(TOP)/ms/uplink.c applink.o
|
||||||
$(PERL) ../ms/uplink.pl coff > $@
|
$(CC) $(CFLAGS) -c -o $@ $(TOP)/ms/uplink.c
|
||||||
|
|
||||||
|
uplink-cof.s: $(TOP)/ms/uplink.pl
|
||||||
|
$(PERL) $(TOP)/ms/uplink.pl coff > $@
|
||||||
|
|
||||||
x86_64cpuid.s: x86_64cpuid.pl
|
x86_64cpuid.s: x86_64cpuid.pl
|
||||||
$(PERL) x86_64cpuid.pl $@
|
$(PERL) x86_64cpuid.pl $(PERLASM_SCHEME) > $@
|
||||||
ia64cpuid.s: ia64cpuid.S
|
ia64cpuid.s: ia64cpuid.S
|
||||||
$(CC) $(CFLAGS) -E ia64cpuid.S > $@
|
$(CC) $(CFLAGS) -E ia64cpuid.S > $@
|
||||||
|
ppccpuid.s: ppccpuid.pl; $(PERL) ppccpuid.pl $(PERLASM_SCHEME) $@
|
||||||
|
|
||||||
testapps:
|
testapps:
|
||||||
[ -z "$(THIS)" ] || ( if echo ${SDIRS} | fgrep ' des '; \
|
[ -z "$(THIS)" ] || ( if echo $(SDIRS) | fgrep ' des '; \
|
||||||
then cd des && $(MAKE) -e des; fi )
|
then cd des && $(MAKE) -e des; fi )
|
||||||
[ -z "$(THIS)" ] || ( cd pkcs7 && $(MAKE) -e testapps );
|
[ -z "$(THIS)" ] || ( cd pkcs7 && $(MAKE) -e testapps );
|
||||||
@if [ -z "$(THIS)" ]; then $(MAKE) -f $(TOP)/Makefile reflect THIS=$@; fi
|
@if [ -z "$(THIS)" ]; then $(MAKE) -f $(TOP)/Makefile reflect THIS=$@; fi
|
||||||
@@ -94,11 +95,11 @@ links:
|
|||||||
@$(PERL) $(TOP)/util/mklink.pl ../apps $(APPS)
|
@$(PERL) $(TOP)/util/mklink.pl ../apps $(APPS)
|
||||||
@target=links; $(RECURSIVE_MAKE)
|
@target=links; $(RECURSIVE_MAKE)
|
||||||
|
|
||||||
# lib: and $(LIB): are splitted to avoid end-less loop
|
# lib: $(LIB): are splitted to avoid end-less loop
|
||||||
lib: buildinf.h $(LIB) subdirs
|
lib: $(LIB)
|
||||||
@touch lib
|
@touch lib
|
||||||
$(LIB): $(LIBOBJ)
|
$(LIB): $(LIBOBJ)
|
||||||
$(ARX) $(LIB) $(LIBOBJ)
|
$(AR) $(LIB) $(LIBOBJ)
|
||||||
$(RANLIB) $(LIB) || echo Never mind.
|
$(RANLIB) $(LIB) || echo Never mind.
|
||||||
|
|
||||||
shared: buildinf.h lib subdirs
|
shared: buildinf.h lib subdirs
|
||||||
@@ -135,6 +136,7 @@ clean:
|
|||||||
dclean:
|
dclean:
|
||||||
$(PERL) -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new
|
$(PERL) -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new
|
||||||
mv -f Makefile.new $(MAKEFILE)
|
mv -f Makefile.new $(MAKEFILE)
|
||||||
|
rm -f opensslconf.h
|
||||||
@target=dclean; $(RECURSIVE_MAKE)
|
@target=dclean; $(RECURSIVE_MAKE)
|
||||||
|
|
||||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
||||||
@@ -159,13 +161,6 @@ cversion.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
|||||||
cversion.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
|
cversion.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
|
||||||
cversion.o: ../include/openssl/stack.h ../include/openssl/symhacks.h buildinf.h
|
cversion.o: ../include/openssl/stack.h ../include/openssl/symhacks.h buildinf.h
|
||||||
cversion.o: cryptlib.h cversion.c
|
cversion.o: cryptlib.h cversion.c
|
||||||
dyn_lck.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
|
|
||||||
dyn_lck.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
|
||||||
dyn_lck.o: ../include/openssl/err.h ../include/openssl/lhash.h
|
|
||||||
dyn_lck.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
|
||||||
dyn_lck.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
|
|
||||||
dyn_lck.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
|
|
||||||
dyn_lck.o: dyn_lck.c
|
|
||||||
ebcdic.o: ../include/openssl/e_os2.h ../include/openssl/opensslconf.h ebcdic.c
|
ebcdic.o: ../include/openssl/e_os2.h ../include/openssl/opensslconf.h ebcdic.c
|
||||||
ex_data.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
|
ex_data.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
|
||||||
ex_data.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
ex_data.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
@@ -174,13 +169,6 @@ ex_data.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
|||||||
ex_data.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
|
ex_data.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
|
||||||
ex_data.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
|
ex_data.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
|
||||||
ex_data.o: ex_data.c
|
ex_data.o: ex_data.c
|
||||||
fips_err.o: ../include/openssl/bio.h ../include/openssl/crypto.h
|
|
||||||
fips_err.o: ../include/openssl/e_os2.h ../include/openssl/err.h
|
|
||||||
fips_err.o: ../include/openssl/fips.h ../include/openssl/lhash.h
|
|
||||||
fips_err.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
|
||||||
fips_err.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
|
|
||||||
fips_err.o: ../include/openssl/stack.h ../include/openssl/symhacks.h fips_err.c
|
|
||||||
fips_err.o: fips_err.h
|
|
||||||
mem.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
|
mem.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
|
||||||
mem.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
mem.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
mem.o: ../include/openssl/err.h ../include/openssl/lhash.h
|
mem.o: ../include/openssl/err.h ../include/openssl/lhash.h
|
||||||
@@ -201,23 +189,10 @@ mem_dbg.o: ../include/openssl/stack.h ../include/openssl/symhacks.h cryptlib.h
|
|||||||
mem_dbg.o: mem_dbg.c
|
mem_dbg.o: mem_dbg.c
|
||||||
o_dir.o: ../e_os.h ../include/openssl/e_os2.h ../include/openssl/opensslconf.h
|
o_dir.o: ../e_os.h ../include/openssl/e_os2.h ../include/openssl/opensslconf.h
|
||||||
o_dir.o: LPdir_unix.c o_dir.c o_dir.h
|
o_dir.o: LPdir_unix.c o_dir.c o_dir.h
|
||||||
o_init.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/crypto.h
|
|
||||||
o_init.o: ../include/openssl/e_os2.h ../include/openssl/err.h
|
|
||||||
o_init.o: ../include/openssl/lhash.h ../include/openssl/opensslconf.h
|
|
||||||
o_init.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
|
|
||||||
o_init.o: ../include/openssl/safestack.h ../include/openssl/stack.h
|
|
||||||
o_init.o: ../include/openssl/symhacks.h o_init.c
|
|
||||||
o_str.o: ../e_os.h ../include/openssl/e_os2.h ../include/openssl/opensslconf.h
|
o_str.o: ../e_os.h ../include/openssl/e_os2.h ../include/openssl/opensslconf.h
|
||||||
o_str.o: o_str.c o_str.h
|
o_str.o: o_str.c o_str.h
|
||||||
o_time.o: ../include/openssl/e_os2.h ../include/openssl/opensslconf.h o_time.c
|
o_time.o: ../include/openssl/e_os2.h ../include/openssl/opensslconf.h o_time.c
|
||||||
o_time.o: o_time.h
|
o_time.o: o_time.h
|
||||||
tmdiff.o: ../e_os.h ../include/openssl/bio.h ../include/openssl/buffer.h
|
|
||||||
tmdiff.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
|
||||||
tmdiff.o: ../include/openssl/err.h ../include/openssl/lhash.h
|
|
||||||
tmdiff.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
|
||||||
tmdiff.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
|
|
||||||
tmdiff.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
|
|
||||||
tmdiff.o: ../include/openssl/tmdiff.h cryptlib.h tmdiff.c
|
|
||||||
uid.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
uid.o: ../include/openssl/crypto.h ../include/openssl/e_os2.h
|
||||||
uid.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
uid.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
|
||||||
uid.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
|
uid.o: ../include/openssl/ossl_typ.h ../include/openssl/safestack.h
|
||||||
|
|||||||
@@ -2,4 +2,4 @@ lib
|
|||||||
Makefile.save
|
Makefile.save
|
||||||
*.flc
|
*.flc
|
||||||
semantic.cache
|
semantic.cache
|
||||||
ax86-elf.s
|
aes-*.s
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ CFLAG=-g
|
|||||||
MAKEFILE= Makefile
|
MAKEFILE= Makefile
|
||||||
AR= ar r
|
AR= ar r
|
||||||
|
|
||||||
AES_ASM_OBJ=aes_core.o aes_cbc.o
|
AES_ENC=aes_core.o aes_cbc.o
|
||||||
|
|
||||||
CFLAGS= $(INCLUDES) $(CFLAG)
|
CFLAGS= $(INCLUDES) $(CFLAG)
|
||||||
ASFLAGS= $(INCLUDES) $(ASFLAG)
|
ASFLAGS= $(INCLUDES) $(ASFLAG)
|
||||||
@@ -26,7 +26,7 @@ LIB=$(TOP)/libcrypto.a
|
|||||||
LIBSRC=aes_core.c aes_misc.c aes_ecb.c aes_cbc.c aes_cfb.c aes_ofb.c \
|
LIBSRC=aes_core.c aes_misc.c aes_ecb.c aes_cbc.c aes_cfb.c aes_ofb.c \
|
||||||
aes_ctr.c aes_ige.c aes_wrap.c
|
aes_ctr.c aes_ige.c aes_wrap.c
|
||||||
LIBOBJ=aes_misc.o aes_ecb.o aes_cfb.o aes_ofb.o aes_ctr.o aes_ige.o aes_wrap.o \
|
LIBOBJ=aes_misc.o aes_ecb.o aes_cfb.o aes_ofb.o aes_ctr.o aes_ige.o aes_wrap.o \
|
||||||
$(AES_ASM_OBJ)
|
$(AES_ENC)
|
||||||
|
|
||||||
SRC= $(LIBSRC)
|
SRC= $(LIBSRC)
|
||||||
|
|
||||||
@@ -41,24 +41,25 @@ top:
|
|||||||
all: lib
|
all: lib
|
||||||
|
|
||||||
lib: $(LIBOBJ)
|
lib: $(LIBOBJ)
|
||||||
$(ARX) $(LIB) $(LIBOBJ)
|
$(AR) $(LIB) $(LIBOBJ)
|
||||||
$(RANLIB) $(LIB) || echo Never mind.
|
$(RANLIB) $(LIB) || echo Never mind.
|
||||||
@touch lib
|
@touch lib
|
||||||
|
|
||||||
$(LIBOBJ): $(LIBSRC)
|
|
||||||
|
|
||||||
aes-ia64.s: asm/aes-ia64.S
|
aes-ia64.s: asm/aes-ia64.S
|
||||||
$(CC) $(CFLAGS) -E asm/aes-ia64.S > $@
|
$(CC) $(CFLAGS) -E asm/aes-ia64.S > $@
|
||||||
|
|
||||||
ax86-elf.s: asm/aes-586.pl ../perlasm/x86asm.pl
|
aes-586.s: asm/aes-586.pl ../perlasm/x86asm.pl
|
||||||
(cd asm; $(PERL) aes-586.pl elf $(CFLAGS) $(PROCESSOR) > ../$@)
|
$(PERL) asm/aes-586.pl $(PERLASM_SCHEME) $(CFLAGS) $(PROCESSOR) > $@
|
||||||
ax86-cof.s: asm/aes-586.pl ../perlasm/x86asm.pl
|
|
||||||
(cd asm; $(PERL) aes-586.pl coff $(CFLAGS) $(PROCESSOR) > ../$@)
|
|
||||||
ax86-out.s: asm/aes-586.pl ../perlasm/x86asm.pl
|
|
||||||
(cd asm; $(PERL) aes-586.pl a.out $(CFLAGS) $(PROCESSOR) > ../$@)
|
|
||||||
|
|
||||||
aes-x86_64.s: asm/aes-x86_64.pl
|
aes-x86_64.s: asm/aes-x86_64.pl
|
||||||
$(PERL) asm/aes-x86_64.pl $@
|
$(PERL) asm/aes-x86_64.pl $(PERLASM_SCHEME) > $@
|
||||||
|
|
||||||
|
aes-sparcv9.s: asm/aes-sparcv9.pl
|
||||||
|
$(PERL) asm/aes-sparcv9.pl $(CFLAGS) > $@
|
||||||
|
|
||||||
|
aes-ppc.s: asm/aes-ppc.pl
|
||||||
|
$(PERL) asm/aes-ppc.pl $(PERLASM_SCHEME) $@
|
||||||
|
|
||||||
# GNU make "catch all"
|
# GNU make "catch all"
|
||||||
aes-%.s: asm/aes-%.pl; $(PERL) $< $(CFLAGS) > $@
|
aes-%.s: asm/aes-%.pl; $(PERL) $< $(CFLAGS) > $@
|
||||||
|
|
||||||
@@ -99,15 +100,14 @@ clean:
|
|||||||
|
|
||||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
||||||
|
|
||||||
aes_cbc.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
|
aes_cbc.o: ../../include/openssl/aes.h ../../include/openssl/modes.h
|
||||||
aes_cbc.o: ../../include/openssl/opensslconf.h aes_cbc.c aes_locl.h
|
aes_cbc.o: ../../include/openssl/opensslconf.h aes_cbc.c
|
||||||
aes_cfb.o: ../../e_os.h ../../include/openssl/aes.h
|
aes_cfb.o: ../../include/openssl/aes.h ../../include/openssl/modes.h
|
||||||
aes_cfb.o: ../../include/openssl/e_os2.h ../../include/openssl/opensslconf.h
|
aes_cfb.o: ../../include/openssl/opensslconf.h aes_cfb.c
|
||||||
aes_cfb.o: aes_cfb.c aes_locl.h
|
|
||||||
aes_core.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
|
aes_core.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
|
||||||
aes_core.o: ../../include/openssl/opensslconf.h aes_core.c aes_locl.h
|
aes_core.o: ../../include/openssl/opensslconf.h aes_core.c aes_locl.h
|
||||||
aes_ctr.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
|
aes_ctr.o: ../../include/openssl/aes.h ../../include/openssl/modes.h
|
||||||
aes_ctr.o: ../../include/openssl/opensslconf.h aes_ctr.c aes_locl.h
|
aes_ctr.o: ../../include/openssl/opensslconf.h aes_ctr.c
|
||||||
aes_ecb.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
|
aes_ecb.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
|
||||||
aes_ecb.o: ../../include/openssl/opensslconf.h aes_ecb.c aes_locl.h
|
aes_ecb.o: ../../include/openssl/opensslconf.h aes_ecb.c aes_locl.h
|
||||||
aes_ige.o: ../../e_os.h ../../include/openssl/aes.h ../../include/openssl/bio.h
|
aes_ige.o: ../../e_os.h ../../include/openssl/aes.h ../../include/openssl/bio.h
|
||||||
@@ -120,5 +120,13 @@ aes_ige.o: ../../include/openssl/symhacks.h ../cryptlib.h aes_ige.c aes_locl.h
|
|||||||
aes_misc.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
|
aes_misc.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
|
||||||
aes_misc.o: ../../include/openssl/opensslconf.h
|
aes_misc.o: ../../include/openssl/opensslconf.h
|
||||||
aes_misc.o: ../../include/openssl/opensslv.h aes_locl.h aes_misc.c
|
aes_misc.o: ../../include/openssl/opensslv.h aes_locl.h aes_misc.c
|
||||||
aes_ofb.o: ../../include/openssl/aes.h ../../include/openssl/e_os2.h
|
aes_ofb.o: ../../include/openssl/aes.h ../../include/openssl/modes.h
|
||||||
aes_ofb.o: ../../include/openssl/opensslconf.h aes_locl.h aes_ofb.c
|
aes_ofb.o: ../../include/openssl/opensslconf.h aes_ofb.c
|
||||||
|
aes_wrap.o: ../../e_os.h ../../include/openssl/aes.h
|
||||||
|
aes_wrap.o: ../../include/openssl/bio.h ../../include/openssl/buffer.h
|
||||||
|
aes_wrap.o: ../../include/openssl/crypto.h ../../include/openssl/e_os2.h
|
||||||
|
aes_wrap.o: ../../include/openssl/err.h ../../include/openssl/lhash.h
|
||||||
|
aes_wrap.o: ../../include/openssl/opensslconf.h
|
||||||
|
aes_wrap.o: ../../include/openssl/opensslv.h ../../include/openssl/ossl_typ.h
|
||||||
|
aes_wrap.o: ../../include/openssl/safestack.h ../../include/openssl/stack.h
|
||||||
|
aes_wrap.o: ../../include/openssl/symhacks.h ../cryptlib.h aes_wrap.c
|
||||||
|
|||||||
@@ -58,6 +58,8 @@
|
|||||||
#error AES is disabled.
|
#error AES is disabled.
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
#include <stddef.h>
|
||||||
|
|
||||||
#define AES_ENCRYPT 1
|
#define AES_ENCRYPT 1
|
||||||
#define AES_DECRYPT 0
|
#define AES_DECRYPT 0
|
||||||
|
|
||||||
@@ -66,10 +68,6 @@
|
|||||||
#define AES_MAXNR 14
|
#define AES_MAXNR 14
|
||||||
#define AES_BLOCK_SIZE 16
|
#define AES_BLOCK_SIZE 16
|
||||||
|
|
||||||
#ifdef OPENSSL_FIPS
|
|
||||||
#define FIPS_AES_SIZE_T int
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
@@ -100,37 +98,32 @@ void AES_decrypt(const unsigned char *in, unsigned char *out,
|
|||||||
void AES_ecb_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_ecb_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const AES_KEY *key, const int enc);
|
const AES_KEY *key, const int enc);
|
||||||
void AES_cbc_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_cbc_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, const int enc);
|
unsigned char *ivec, const int enc);
|
||||||
void AES_cfb128_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_cfb128_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, int *num, const int enc);
|
unsigned char *ivec, int *num, const int enc);
|
||||||
void AES_cfb1_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_cfb1_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, int *num, const int enc);
|
unsigned char *ivec, int *num, const int enc);
|
||||||
void AES_cfb8_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_cfb8_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, int *num, const int enc);
|
unsigned char *ivec, int *num, const int enc);
|
||||||
void AES_cfbr_encrypt_block(const unsigned char *in,unsigned char *out,
|
|
||||||
const int nbits,const AES_KEY *key,
|
|
||||||
unsigned char *ivec,const int enc);
|
|
||||||
void AES_ofb128_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_ofb128_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, int *num);
|
unsigned char *ivec, int *num);
|
||||||
void AES_ctr128_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_ctr128_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char ivec[AES_BLOCK_SIZE],
|
unsigned char ivec[AES_BLOCK_SIZE],
|
||||||
unsigned char ecount_buf[AES_BLOCK_SIZE],
|
unsigned char ecount_buf[AES_BLOCK_SIZE],
|
||||||
unsigned int *num);
|
unsigned int *num);
|
||||||
|
|
||||||
/* For IGE, see also http://www.links.org/files/openssl-ige.pdf */
|
|
||||||
/* NB: the IV is _two_ blocks long */
|
/* NB: the IV is _two_ blocks long */
|
||||||
void AES_ige_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_ige_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, const int enc);
|
unsigned char *ivec, const int enc);
|
||||||
/* NB: the IV is _four_ blocks long */
|
/* NB: the IV is _four_ blocks long */
|
||||||
void AES_bi_ige_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_bi_ige_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
const AES_KEY *key2, const unsigned char *ivec,
|
const AES_KEY *key2, const unsigned char *ivec,
|
||||||
const int enc);
|
const int enc);
|
||||||
|
|
||||||
@@ -141,6 +134,7 @@ int AES_unwrap_key(AES_KEY *key, const unsigned char *iv,
|
|||||||
unsigned char *out,
|
unsigned char *out,
|
||||||
const unsigned char *in, unsigned int inlen);
|
const unsigned char *in, unsigned int inlen);
|
||||||
|
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -49,85 +49,15 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#ifndef AES_DEBUG
|
|
||||||
# ifndef NDEBUG
|
|
||||||
# define NDEBUG
|
|
||||||
# endif
|
|
||||||
#endif
|
|
||||||
#include <assert.h>
|
|
||||||
|
|
||||||
#include <openssl/aes.h>
|
#include <openssl/aes.h>
|
||||||
#include "aes_locl.h"
|
#include <openssl/modes.h>
|
||||||
|
|
||||||
#if !defined(OPENSSL_FIPS_AES_ASM)
|
|
||||||
void AES_cbc_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_cbc_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t len, const AES_KEY *key,
|
||||||
unsigned char *ivec, const int enc) {
|
unsigned char *ivec, const int enc) {
|
||||||
|
|
||||||
unsigned long n;
|
if (enc)
|
||||||
unsigned long len = length;
|
CRYPTO_cbc128_encrypt(in,out,len,key,ivec,(block128_f)AES_encrypt);
|
||||||
unsigned char tmp[AES_BLOCK_SIZE];
|
else
|
||||||
const unsigned char *iv = ivec;
|
CRYPTO_cbc128_decrypt(in,out,len,key,ivec,(block128_f)AES_decrypt);
|
||||||
|
|
||||||
assert(in && out && key && ivec);
|
|
||||||
assert((AES_ENCRYPT == enc)||(AES_DECRYPT == enc));
|
|
||||||
|
|
||||||
if (AES_ENCRYPT == enc) {
|
|
||||||
while (len >= AES_BLOCK_SIZE) {
|
|
||||||
for(n=0; n < AES_BLOCK_SIZE; ++n)
|
|
||||||
out[n] = in[n] ^ iv[n];
|
|
||||||
AES_encrypt(out, out, key);
|
|
||||||
iv = out;
|
|
||||||
len -= AES_BLOCK_SIZE;
|
|
||||||
in += AES_BLOCK_SIZE;
|
|
||||||
out += AES_BLOCK_SIZE;
|
|
||||||
}
|
}
|
||||||
if (len) {
|
|
||||||
for(n=0; n < len; ++n)
|
|
||||||
out[n] = in[n] ^ iv[n];
|
|
||||||
for(n=len; n < AES_BLOCK_SIZE; ++n)
|
|
||||||
out[n] = iv[n];
|
|
||||||
AES_encrypt(out, out, key);
|
|
||||||
iv = out;
|
|
||||||
}
|
|
||||||
memcpy(ivec,iv,AES_BLOCK_SIZE);
|
|
||||||
} else if (in != out) {
|
|
||||||
while (len >= AES_BLOCK_SIZE) {
|
|
||||||
AES_decrypt(in, out, key);
|
|
||||||
for(n=0; n < AES_BLOCK_SIZE; ++n)
|
|
||||||
out[n] ^= iv[n];
|
|
||||||
iv = in;
|
|
||||||
len -= AES_BLOCK_SIZE;
|
|
||||||
in += AES_BLOCK_SIZE;
|
|
||||||
out += AES_BLOCK_SIZE;
|
|
||||||
}
|
|
||||||
if (len) {
|
|
||||||
AES_decrypt(in,tmp,key);
|
|
||||||
for(n=0; n < len; ++n)
|
|
||||||
out[n] = tmp[n] ^ iv[n];
|
|
||||||
iv = in;
|
|
||||||
}
|
|
||||||
memcpy(ivec,iv,AES_BLOCK_SIZE);
|
|
||||||
} else {
|
|
||||||
while (len >= AES_BLOCK_SIZE) {
|
|
||||||
memcpy(tmp, in, AES_BLOCK_SIZE);
|
|
||||||
AES_decrypt(in, out, key);
|
|
||||||
for(n=0; n < AES_BLOCK_SIZE; ++n)
|
|
||||||
out[n] ^= ivec[n];
|
|
||||||
memcpy(ivec, tmp, AES_BLOCK_SIZE);
|
|
||||||
len -= AES_BLOCK_SIZE;
|
|
||||||
in += AES_BLOCK_SIZE;
|
|
||||||
out += AES_BLOCK_SIZE;
|
|
||||||
}
|
|
||||||
if (len) {
|
|
||||||
memcpy(tmp, in, AES_BLOCK_SIZE);
|
|
||||||
AES_decrypt(tmp, out, key);
|
|
||||||
for(n=0; n < len; ++n)
|
|
||||||
out[n] ^= ivec[n];
|
|
||||||
for(n=len; n < AES_BLOCK_SIZE; ++n)
|
|
||||||
out[n] = tmp[n];
|
|
||||||
memcpy(ivec, tmp, AES_BLOCK_SIZE);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
/* crypto/aes/aes_cfb.c -*- mode:C; c-file-style: "eay" -*- */
|
/* crypto/aes/aes_cfb.c -*- mode:C; c-file-style: "eay" -*- */
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 2002-2006 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
@@ -48,73 +48,9 @@
|
|||||||
* ====================================================================
|
* ====================================================================
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
|
||||||
* All rights reserved.
|
|
||||||
*
|
|
||||||
* This package is an SSL implementation written
|
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
|
||||||
*
|
|
||||||
* This library is free for commercial and non-commercial use as long as
|
|
||||||
* the following conditions are aheared to. The following conditions
|
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
|
||||||
* included with this distribution is covered by the same copyright terms
|
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
|
||||||
*
|
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
|
||||||
* the code are not to be removed.
|
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
|
||||||
* as the author of the parts of the library used.
|
|
||||||
* This can be in the form of a textual message at program startup or
|
|
||||||
* in documentation (online or textual) provided with the package.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
* 1. Redistributions of source code must retain the copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in the
|
|
||||||
* documentation and/or other materials provided with the distribution.
|
|
||||||
* 3. All advertising materials mentioning features or use of this software
|
|
||||||
* must display the following acknowledgement:
|
|
||||||
* "This product includes cryptographic software written by
|
|
||||||
* Eric Young (eay@cryptsoft.com)"
|
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
|
||||||
* being used are not cryptographic related :-).
|
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
||||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
||||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
||||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
||||||
* SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
* The licence and distribution terms for any publically available version or
|
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
|
||||||
* copied and put under another distribution licence
|
|
||||||
* [including the GNU Public Licence.]
|
|
||||||
*/
|
|
||||||
|
|
||||||
#ifndef AES_DEBUG
|
|
||||||
# ifndef NDEBUG
|
|
||||||
# define NDEBUG
|
|
||||||
# endif
|
|
||||||
#endif
|
|
||||||
#include <assert.h>
|
|
||||||
|
|
||||||
#include <openssl/aes.h>
|
#include <openssl/aes.h>
|
||||||
#include "aes_locl.h"
|
#include <openssl/modes.h>
|
||||||
#include "e_os.h"
|
|
||||||
|
|
||||||
/* The input and output encrypted as though 128bit cfb mode is being
|
/* The input and output encrypted as though 128bit cfb mode is being
|
||||||
* used. The extra state information to record how much of the
|
* used. The extra state information to record how much of the
|
||||||
@@ -122,104 +58,24 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
void AES_cfb128_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_cfb128_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, int *num, const int enc) {
|
unsigned char *ivec, int *num, const int enc) {
|
||||||
|
|
||||||
unsigned int n;
|
CRYPTO_cfb128_encrypt(in,out,length,key,ivec,num,enc,(block128_f)AES_encrypt);
|
||||||
unsigned long l = length;
|
|
||||||
unsigned char c;
|
|
||||||
|
|
||||||
assert(in && out && key && ivec && num);
|
|
||||||
|
|
||||||
n = *num;
|
|
||||||
|
|
||||||
if (enc) {
|
|
||||||
while (l--) {
|
|
||||||
if (n == 0) {
|
|
||||||
AES_encrypt(ivec, ivec, key);
|
|
||||||
}
|
|
||||||
ivec[n] = *(out++) = *(in++) ^ ivec[n];
|
|
||||||
n = (n+1) % AES_BLOCK_SIZE;
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
while (l--) {
|
|
||||||
if (n == 0) {
|
|
||||||
AES_encrypt(ivec, ivec, key);
|
|
||||||
}
|
|
||||||
c = *(in);
|
|
||||||
*(out++) = *(in++) ^ ivec[n];
|
|
||||||
ivec[n] = c;
|
|
||||||
n = (n+1) % AES_BLOCK_SIZE;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
*num=n;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* This expects a single block of size nbits for both in and out. Note that
|
|
||||||
it corrupts any extra bits in the last byte of out */
|
|
||||||
void AES_cfbr_encrypt_block(const unsigned char *in,unsigned char *out,
|
|
||||||
const int nbits,const AES_KEY *key,
|
|
||||||
unsigned char *ivec,const int enc)
|
|
||||||
{
|
|
||||||
int n,rem,num;
|
|
||||||
unsigned char ovec[AES_BLOCK_SIZE*2];
|
|
||||||
|
|
||||||
if (nbits<=0 || nbits>128) return;
|
|
||||||
|
|
||||||
/* fill in the first half of the new IV with the current IV */
|
|
||||||
memcpy(ovec,ivec,AES_BLOCK_SIZE);
|
|
||||||
/* construct the new IV */
|
|
||||||
AES_encrypt(ivec,ivec,key);
|
|
||||||
num = (nbits+7)/8;
|
|
||||||
if (enc) /* encrypt the input */
|
|
||||||
for(n=0 ; n < num ; ++n)
|
|
||||||
out[n] = (ovec[AES_BLOCK_SIZE+n] = in[n] ^ ivec[n]);
|
|
||||||
else /* decrypt the input */
|
|
||||||
for(n=0 ; n < num ; ++n)
|
|
||||||
out[n] = (ovec[AES_BLOCK_SIZE+n] = in[n]) ^ ivec[n];
|
|
||||||
/* shift ovec left... */
|
|
||||||
rem = nbits%8;
|
|
||||||
num = nbits/8;
|
|
||||||
if(rem==0)
|
|
||||||
memcpy(ivec,ovec+num,AES_BLOCK_SIZE);
|
|
||||||
else
|
|
||||||
for(n=0 ; n < AES_BLOCK_SIZE ; ++n)
|
|
||||||
ivec[n] = ovec[n+num]<<rem | ovec[n+num+1]>>(8-rem);
|
|
||||||
|
|
||||||
/* it is not necessary to cleanse ovec, since the IV is not secret */
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/* N.B. This expects the input to be packed, MS bit first */
|
/* N.B. This expects the input to be packed, MS bit first */
|
||||||
void AES_cfb1_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_cfb1_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, int *num, const int enc)
|
unsigned char *ivec, int *num, const int enc)
|
||||||
{
|
{
|
||||||
unsigned int n;
|
CRYPTO_cfb128_1_encrypt(in,out,length,key,ivec,num,enc,(block128_f)AES_encrypt);
|
||||||
unsigned char c[1],d[1];
|
|
||||||
|
|
||||||
assert(in && out && key && ivec && num);
|
|
||||||
assert(*num == 0);
|
|
||||||
|
|
||||||
memset(out,0,(length+7)/8);
|
|
||||||
for(n=0 ; n < length ; ++n)
|
|
||||||
{
|
|
||||||
c[0]=(in[n/8]&(1 << (7-n%8))) ? 0x80 : 0;
|
|
||||||
AES_cfbr_encrypt_block(c,d,1,key,ivec,enc);
|
|
||||||
out[n/8]=(out[n/8]&~(1 << (7-n%8)))|((d[0]&0x80) >> (n%8));
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
void AES_cfb8_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_cfb8_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, int *num, const int enc)
|
unsigned char *ivec, int *num, const int enc)
|
||||||
{
|
{
|
||||||
unsigned int n;
|
CRYPTO_cfb128_8_encrypt(in,out,length,key,ivec,num,enc,(block128_f)AES_encrypt);
|
||||||
|
|
||||||
assert(in && out && key && ivec && num);
|
|
||||||
assert(*num == 0);
|
|
||||||
|
|
||||||
for(n=0 ; n < length ; ++n)
|
|
||||||
AES_cfbr_encrypt_block(&in[n],&out[n],8,key,ivec,enc);
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -37,12 +37,9 @@
|
|||||||
|
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <openssl/aes.h>
|
#include <openssl/aes.h>
|
||||||
#ifdef OPENSSL_FIPS
|
|
||||||
#include <openssl/fips.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#include "aes_locl.h"
|
#include "aes_locl.h"
|
||||||
|
|
||||||
|
#ifndef AES_ASM
|
||||||
/*
|
/*
|
||||||
Te0[x] = S [x].[02, 01, 01, 03];
|
Te0[x] = S [x].[02, 01, 01, 03];
|
||||||
Te1[x] = S [x].[03, 02, 01, 01];
|
Te1[x] = S [x].[03, 02, 01, 01];
|
||||||
@@ -635,10 +632,6 @@ int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
|
|||||||
int i = 0;
|
int i = 0;
|
||||||
u32 temp;
|
u32 temp;
|
||||||
|
|
||||||
#ifdef OPENSSL_FIPS
|
|
||||||
FIPS_selftest_check();
|
|
||||||
#endif
|
|
||||||
|
|
||||||
if (!userKey || !key)
|
if (!userKey || !key)
|
||||||
return -1;
|
return -1;
|
||||||
if (bits != 128 && bits != 192 && bits != 256)
|
if (bits != 128 && bits != 192 && bits != 256)
|
||||||
@@ -781,7 +774,6 @@ int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef AES_ASM
|
|
||||||
/*
|
/*
|
||||||
* Encrypt a single block
|
* Encrypt a single block
|
||||||
* in and out can overlap
|
* in and out can overlap
|
||||||
@@ -1164,4 +1156,203 @@ void AES_decrypt(const unsigned char *in, unsigned char *out,
|
|||||||
PUTU32(out + 12, s3);
|
PUTU32(out + 12, s3);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#else /* AES_ASM */
|
||||||
|
|
||||||
|
static const u8 Te4[256] = {
|
||||||
|
0x63U, 0x7cU, 0x77U, 0x7bU, 0xf2U, 0x6bU, 0x6fU, 0xc5U,
|
||||||
|
0x30U, 0x01U, 0x67U, 0x2bU, 0xfeU, 0xd7U, 0xabU, 0x76U,
|
||||||
|
0xcaU, 0x82U, 0xc9U, 0x7dU, 0xfaU, 0x59U, 0x47U, 0xf0U,
|
||||||
|
0xadU, 0xd4U, 0xa2U, 0xafU, 0x9cU, 0xa4U, 0x72U, 0xc0U,
|
||||||
|
0xb7U, 0xfdU, 0x93U, 0x26U, 0x36U, 0x3fU, 0xf7U, 0xccU,
|
||||||
|
0x34U, 0xa5U, 0xe5U, 0xf1U, 0x71U, 0xd8U, 0x31U, 0x15U,
|
||||||
|
0x04U, 0xc7U, 0x23U, 0xc3U, 0x18U, 0x96U, 0x05U, 0x9aU,
|
||||||
|
0x07U, 0x12U, 0x80U, 0xe2U, 0xebU, 0x27U, 0xb2U, 0x75U,
|
||||||
|
0x09U, 0x83U, 0x2cU, 0x1aU, 0x1bU, 0x6eU, 0x5aU, 0xa0U,
|
||||||
|
0x52U, 0x3bU, 0xd6U, 0xb3U, 0x29U, 0xe3U, 0x2fU, 0x84U,
|
||||||
|
0x53U, 0xd1U, 0x00U, 0xedU, 0x20U, 0xfcU, 0xb1U, 0x5bU,
|
||||||
|
0x6aU, 0xcbU, 0xbeU, 0x39U, 0x4aU, 0x4cU, 0x58U, 0xcfU,
|
||||||
|
0xd0U, 0xefU, 0xaaU, 0xfbU, 0x43U, 0x4dU, 0x33U, 0x85U,
|
||||||
|
0x45U, 0xf9U, 0x02U, 0x7fU, 0x50U, 0x3cU, 0x9fU, 0xa8U,
|
||||||
|
0x51U, 0xa3U, 0x40U, 0x8fU, 0x92U, 0x9dU, 0x38U, 0xf5U,
|
||||||
|
0xbcU, 0xb6U, 0xdaU, 0x21U, 0x10U, 0xffU, 0xf3U, 0xd2U,
|
||||||
|
0xcdU, 0x0cU, 0x13U, 0xecU, 0x5fU, 0x97U, 0x44U, 0x17U,
|
||||||
|
0xc4U, 0xa7U, 0x7eU, 0x3dU, 0x64U, 0x5dU, 0x19U, 0x73U,
|
||||||
|
0x60U, 0x81U, 0x4fU, 0xdcU, 0x22U, 0x2aU, 0x90U, 0x88U,
|
||||||
|
0x46U, 0xeeU, 0xb8U, 0x14U, 0xdeU, 0x5eU, 0x0bU, 0xdbU,
|
||||||
|
0xe0U, 0x32U, 0x3aU, 0x0aU, 0x49U, 0x06U, 0x24U, 0x5cU,
|
||||||
|
0xc2U, 0xd3U, 0xacU, 0x62U, 0x91U, 0x95U, 0xe4U, 0x79U,
|
||||||
|
0xe7U, 0xc8U, 0x37U, 0x6dU, 0x8dU, 0xd5U, 0x4eU, 0xa9U,
|
||||||
|
0x6cU, 0x56U, 0xf4U, 0xeaU, 0x65U, 0x7aU, 0xaeU, 0x08U,
|
||||||
|
0xbaU, 0x78U, 0x25U, 0x2eU, 0x1cU, 0xa6U, 0xb4U, 0xc6U,
|
||||||
|
0xe8U, 0xddU, 0x74U, 0x1fU, 0x4bU, 0xbdU, 0x8bU, 0x8aU,
|
||||||
|
0x70U, 0x3eU, 0xb5U, 0x66U, 0x48U, 0x03U, 0xf6U, 0x0eU,
|
||||||
|
0x61U, 0x35U, 0x57U, 0xb9U, 0x86U, 0xc1U, 0x1dU, 0x9eU,
|
||||||
|
0xe1U, 0xf8U, 0x98U, 0x11U, 0x69U, 0xd9U, 0x8eU, 0x94U,
|
||||||
|
0x9bU, 0x1eU, 0x87U, 0xe9U, 0xceU, 0x55U, 0x28U, 0xdfU,
|
||||||
|
0x8cU, 0xa1U, 0x89U, 0x0dU, 0xbfU, 0xe6U, 0x42U, 0x68U,
|
||||||
|
0x41U, 0x99U, 0x2dU, 0x0fU, 0xb0U, 0x54U, 0xbbU, 0x16U
|
||||||
|
};
|
||||||
|
static const u32 rcon[] = {
|
||||||
|
0x01000000, 0x02000000, 0x04000000, 0x08000000,
|
||||||
|
0x10000000, 0x20000000, 0x40000000, 0x80000000,
|
||||||
|
0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Expand the cipher key into the encryption key schedule.
|
||||||
|
*/
|
||||||
|
int AES_set_encrypt_key(const unsigned char *userKey, const int bits,
|
||||||
|
AES_KEY *key) {
|
||||||
|
u32 *rk;
|
||||||
|
int i = 0;
|
||||||
|
u32 temp;
|
||||||
|
|
||||||
|
if (!userKey || !key)
|
||||||
|
return -1;
|
||||||
|
if (bits != 128 && bits != 192 && bits != 256)
|
||||||
|
return -2;
|
||||||
|
|
||||||
|
rk = key->rd_key;
|
||||||
|
|
||||||
|
if (bits==128)
|
||||||
|
key->rounds = 10;
|
||||||
|
else if (bits==192)
|
||||||
|
key->rounds = 12;
|
||||||
|
else
|
||||||
|
key->rounds = 14;
|
||||||
|
|
||||||
|
rk[0] = GETU32(userKey );
|
||||||
|
rk[1] = GETU32(userKey + 4);
|
||||||
|
rk[2] = GETU32(userKey + 8);
|
||||||
|
rk[3] = GETU32(userKey + 12);
|
||||||
|
if (bits == 128) {
|
||||||
|
while (1) {
|
||||||
|
temp = rk[3];
|
||||||
|
rk[4] = rk[0] ^
|
||||||
|
(Te4[(temp >> 16) & 0xff] << 24) ^
|
||||||
|
(Te4[(temp >> 8) & 0xff] << 16) ^
|
||||||
|
(Te4[(temp ) & 0xff] << 8) ^
|
||||||
|
(Te4[(temp >> 24) ]) ^
|
||||||
|
rcon[i];
|
||||||
|
rk[5] = rk[1] ^ rk[4];
|
||||||
|
rk[6] = rk[2] ^ rk[5];
|
||||||
|
rk[7] = rk[3] ^ rk[6];
|
||||||
|
if (++i == 10) {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
rk += 4;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
rk[4] = GETU32(userKey + 16);
|
||||||
|
rk[5] = GETU32(userKey + 20);
|
||||||
|
if (bits == 192) {
|
||||||
|
while (1) {
|
||||||
|
temp = rk[ 5];
|
||||||
|
rk[ 6] = rk[ 0] ^
|
||||||
|
(Te4[(temp >> 16) & 0xff] << 24) ^
|
||||||
|
(Te4[(temp >> 8) & 0xff] << 16) ^
|
||||||
|
(Te4[(temp ) & 0xff] << 8) ^
|
||||||
|
(Te4[(temp >> 24) ]) ^
|
||||||
|
rcon[i];
|
||||||
|
rk[ 7] = rk[ 1] ^ rk[ 6];
|
||||||
|
rk[ 8] = rk[ 2] ^ rk[ 7];
|
||||||
|
rk[ 9] = rk[ 3] ^ rk[ 8];
|
||||||
|
if (++i == 8) {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
rk[10] = rk[ 4] ^ rk[ 9];
|
||||||
|
rk[11] = rk[ 5] ^ rk[10];
|
||||||
|
rk += 6;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
rk[6] = GETU32(userKey + 24);
|
||||||
|
rk[7] = GETU32(userKey + 28);
|
||||||
|
if (bits == 256) {
|
||||||
|
while (1) {
|
||||||
|
temp = rk[ 7];
|
||||||
|
rk[ 8] = rk[ 0] ^
|
||||||
|
(Te4[(temp >> 16) & 0xff] << 24) ^
|
||||||
|
(Te4[(temp >> 8) & 0xff] << 16) ^
|
||||||
|
(Te4[(temp ) & 0xff] << 8) ^
|
||||||
|
(Te4[(temp >> 24) ]) ^
|
||||||
|
rcon[i];
|
||||||
|
rk[ 9] = rk[ 1] ^ rk[ 8];
|
||||||
|
rk[10] = rk[ 2] ^ rk[ 9];
|
||||||
|
rk[11] = rk[ 3] ^ rk[10];
|
||||||
|
if (++i == 7) {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
temp = rk[11];
|
||||||
|
rk[12] = rk[ 4] ^
|
||||||
|
(Te4[(temp >> 24) ] << 24) ^
|
||||||
|
(Te4[(temp >> 16) & 0xff] << 16) ^
|
||||||
|
(Te4[(temp >> 8) & 0xff] << 8) ^
|
||||||
|
(Te4[(temp ) & 0xff]);
|
||||||
|
rk[13] = rk[ 5] ^ rk[12];
|
||||||
|
rk[14] = rk[ 6] ^ rk[13];
|
||||||
|
rk[15] = rk[ 7] ^ rk[14];
|
||||||
|
|
||||||
|
rk += 8;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Expand the cipher key into the decryption key schedule.
|
||||||
|
*/
|
||||||
|
int AES_set_decrypt_key(const unsigned char *userKey, const int bits,
|
||||||
|
AES_KEY *key) {
|
||||||
|
|
||||||
|
u32 *rk;
|
||||||
|
int i, j, status;
|
||||||
|
u32 temp;
|
||||||
|
|
||||||
|
/* first, start with an encryption schedule */
|
||||||
|
status = AES_set_encrypt_key(userKey, bits, key);
|
||||||
|
if (status < 0)
|
||||||
|
return status;
|
||||||
|
|
||||||
|
rk = key->rd_key;
|
||||||
|
|
||||||
|
/* invert the order of the round keys: */
|
||||||
|
for (i = 0, j = 4*(key->rounds); i < j; i += 4, j -= 4) {
|
||||||
|
temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp;
|
||||||
|
temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp;
|
||||||
|
temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp;
|
||||||
|
temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp;
|
||||||
|
}
|
||||||
|
/* apply the inverse MixColumn transform to all round keys but the first and the last: */
|
||||||
|
for (i = 1; i < (key->rounds); i++) {
|
||||||
|
rk += 4;
|
||||||
|
for (j = 0; j < 4; j++) {
|
||||||
|
u32 tp1, tp2, tp4, tp8, tp9, tpb, tpd, tpe, m;
|
||||||
|
|
||||||
|
tp1 = rk[j];
|
||||||
|
m = tp1 & 0x80808080;
|
||||||
|
tp2 = ((tp1 & 0x7f7f7f7f) << 1) ^
|
||||||
|
((m - (m >> 7)) & 0x1b1b1b1b);
|
||||||
|
m = tp2 & 0x80808080;
|
||||||
|
tp4 = ((tp2 & 0x7f7f7f7f) << 1) ^
|
||||||
|
((m - (m >> 7)) & 0x1b1b1b1b);
|
||||||
|
m = tp4 & 0x80808080;
|
||||||
|
tp8 = ((tp4 & 0x7f7f7f7f) << 1) ^
|
||||||
|
((m - (m >> 7)) & 0x1b1b1b1b);
|
||||||
|
tp9 = tp8 ^ tp1;
|
||||||
|
tpb = tp9 ^ tp2;
|
||||||
|
tpd = tp9 ^ tp4;
|
||||||
|
tpe = tp8 ^ tp4 ^ tp2;
|
||||||
|
#if defined(ROTATE)
|
||||||
|
rk[j] = tpe ^ ROTATE(tpd,16) ^
|
||||||
|
ROTATE(tp9,24) ^ ROTATE(tpb,8);
|
||||||
|
#else
|
||||||
|
rk[j] = tpe ^ (tpd >> 16) ^ (tpd << 16) ^
|
||||||
|
(tp9 >> 8) ^ (tp9 << 24) ^
|
||||||
|
(tpb >> 24) ^ (tpb << 8);
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
#endif /* AES_ASM */
|
#endif /* AES_ASM */
|
||||||
|
|||||||
@@ -49,91 +49,13 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#ifndef AES_DEBUG
|
|
||||||
# ifndef NDEBUG
|
|
||||||
# define NDEBUG
|
|
||||||
# endif
|
|
||||||
#endif
|
|
||||||
#include <assert.h>
|
|
||||||
|
|
||||||
#include <openssl/aes.h>
|
#include <openssl/aes.h>
|
||||||
#include "aes_locl.h"
|
#include <openssl/modes.h>
|
||||||
|
|
||||||
/* NOTE: the IV/counter CTR mode is big-endian. The rest of the AES code
|
|
||||||
* is endian-neutral. */
|
|
||||||
|
|
||||||
/* increment counter (128-bit int) by 1 */
|
|
||||||
static void AES_ctr128_inc(unsigned char *counter) {
|
|
||||||
unsigned long c;
|
|
||||||
|
|
||||||
/* Grab bottom dword of counter and increment */
|
|
||||||
c = GETU32(counter + 12);
|
|
||||||
c++; c &= 0xFFFFFFFF;
|
|
||||||
PUTU32(counter + 12, c);
|
|
||||||
|
|
||||||
/* if no overflow, we're done */
|
|
||||||
if (c)
|
|
||||||
return;
|
|
||||||
|
|
||||||
/* Grab 1st dword of counter and increment */
|
|
||||||
c = GETU32(counter + 8);
|
|
||||||
c++; c &= 0xFFFFFFFF;
|
|
||||||
PUTU32(counter + 8, c);
|
|
||||||
|
|
||||||
/* if no overflow, we're done */
|
|
||||||
if (c)
|
|
||||||
return;
|
|
||||||
|
|
||||||
/* Grab 2nd dword of counter and increment */
|
|
||||||
c = GETU32(counter + 4);
|
|
||||||
c++; c &= 0xFFFFFFFF;
|
|
||||||
PUTU32(counter + 4, c);
|
|
||||||
|
|
||||||
/* if no overflow, we're done */
|
|
||||||
if (c)
|
|
||||||
return;
|
|
||||||
|
|
||||||
/* Grab top dword of counter and increment */
|
|
||||||
c = GETU32(counter + 0);
|
|
||||||
c++; c &= 0xFFFFFFFF;
|
|
||||||
PUTU32(counter + 0, c);
|
|
||||||
}
|
|
||||||
|
|
||||||
/* The input encrypted as though 128bit counter mode is being
|
|
||||||
* used. The extra state information to record how much of the
|
|
||||||
* 128bit block we have used is contained in *num, and the
|
|
||||||
* encrypted counter is kept in ecount_buf. Both *num and
|
|
||||||
* ecount_buf must be initialised with zeros before the first
|
|
||||||
* call to AES_ctr128_encrypt().
|
|
||||||
*
|
|
||||||
* This algorithm assumes that the counter is in the x lower bits
|
|
||||||
* of the IV (ivec), and that the application has full control over
|
|
||||||
* overflow and the rest of the IV. This implementation takes NO
|
|
||||||
* responsability for checking that the counter doesn't overflow
|
|
||||||
* into the rest of the IV when incremented.
|
|
||||||
*/
|
|
||||||
void AES_ctr128_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_ctr128_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char ivec[AES_BLOCK_SIZE],
|
unsigned char ivec[AES_BLOCK_SIZE],
|
||||||
unsigned char ecount_buf[AES_BLOCK_SIZE],
|
unsigned char ecount_buf[AES_BLOCK_SIZE],
|
||||||
unsigned int *num) {
|
unsigned int *num) {
|
||||||
|
CRYPTO_ctr128_encrypt(in,out,length,key,ivec,ecount_buf,num,(block128_f)AES_encrypt);
|
||||||
unsigned int n;
|
|
||||||
unsigned long l=length;
|
|
||||||
|
|
||||||
assert(in && out && key && counter && num);
|
|
||||||
assert(*num < AES_BLOCK_SIZE);
|
|
||||||
|
|
||||||
n = *num;
|
|
||||||
|
|
||||||
while (l--) {
|
|
||||||
if (n == 0) {
|
|
||||||
AES_encrypt(ivec, ecount_buf, key);
|
|
||||||
AES_ctr128_inc(ivec);
|
|
||||||
}
|
|
||||||
*(out++) = *(in++) ^ ecount_buf[n];
|
|
||||||
n = (n+1) % AES_BLOCK_SIZE;
|
|
||||||
}
|
|
||||||
|
|
||||||
*num=n;
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -77,11 +77,11 @@ typedef struct {
|
|||||||
/* N.B. The IV for this mode is _twice_ the block size */
|
/* N.B. The IV for this mode is _twice_ the block size */
|
||||||
|
|
||||||
void AES_ige_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_ige_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, const int enc)
|
unsigned char *ivec, const int enc)
|
||||||
{
|
{
|
||||||
unsigned long n;
|
size_t n;
|
||||||
unsigned long len;
|
size_t len = length;
|
||||||
|
|
||||||
OPENSSL_assert(in && out && key && ivec);
|
OPENSSL_assert(in && out && key && ivec);
|
||||||
OPENSSL_assert((AES_ENCRYPT == enc)||(AES_DECRYPT == enc));
|
OPENSSL_assert((AES_ENCRYPT == enc)||(AES_DECRYPT == enc));
|
||||||
@@ -211,12 +211,12 @@ void AES_ige_encrypt(const unsigned char *in, unsigned char *out,
|
|||||||
/* N.B. The IV for this mode is _four times_ the block size */
|
/* N.B. The IV for this mode is _four times_ the block size */
|
||||||
|
|
||||||
void AES_bi_ige_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_bi_ige_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
const AES_KEY *key2, const unsigned char *ivec,
|
const AES_KEY *key2, const unsigned char *ivec,
|
||||||
const int enc)
|
const int enc)
|
||||||
{
|
{
|
||||||
unsigned long n;
|
size_t n;
|
||||||
unsigned long len = length;
|
size_t len = length;
|
||||||
unsigned char tmp[AES_BLOCK_SIZE];
|
unsigned char tmp[AES_BLOCK_SIZE];
|
||||||
unsigned char tmp2[AES_BLOCK_SIZE];
|
unsigned char tmp2[AES_BLOCK_SIZE];
|
||||||
unsigned char tmp3[AES_BLOCK_SIZE];
|
unsigned char tmp3[AES_BLOCK_SIZE];
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
/* crypto/aes/aes_ofb.c -*- mode:C; c-file-style: "eay" -*- */
|
/* crypto/aes/aes_ofb.c -*- mode:C; c-file-style: "eay" -*- */
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 2002-2006 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
@@ -48,95 +48,13 @@
|
|||||||
* ====================================================================
|
* ====================================================================
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
|
|
||||||
* All rights reserved.
|
|
||||||
*
|
|
||||||
* This package is an SSL implementation written
|
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
|
||||||
*
|
|
||||||
* This library is free for commercial and non-commercial use as long as
|
|
||||||
* the following conditions are aheared to. The following conditions
|
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
|
||||||
* included with this distribution is covered by the same copyright terms
|
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
|
||||||
*
|
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
|
||||||
* the code are not to be removed.
|
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
|
||||||
* as the author of the parts of the library used.
|
|
||||||
* This can be in the form of a textual message at program startup or
|
|
||||||
* in documentation (online or textual) provided with the package.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
* 1. Redistributions of source code must retain the copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in the
|
|
||||||
* documentation and/or other materials provided with the distribution.
|
|
||||||
* 3. All advertising materials mentioning features or use of this software
|
|
||||||
* must display the following acknowledgement:
|
|
||||||
* "This product includes cryptographic software written by
|
|
||||||
* Eric Young (eay@cryptsoft.com)"
|
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
|
||||||
* being used are not cryptographic related :-).
|
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
||||||
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
|
|
||||||
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
||||||
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
||||||
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
||||||
* SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
* The licence and distribution terms for any publically available version or
|
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
|
||||||
* copied and put under another distribution licence
|
|
||||||
* [including the GNU Public Licence.]
|
|
||||||
*/
|
|
||||||
|
|
||||||
#ifndef AES_DEBUG
|
|
||||||
# ifndef NDEBUG
|
|
||||||
# define NDEBUG
|
|
||||||
# endif
|
|
||||||
#endif
|
|
||||||
#include <assert.h>
|
|
||||||
|
|
||||||
#include <openssl/aes.h>
|
#include <openssl/aes.h>
|
||||||
#include "aes_locl.h"
|
#include <openssl/modes.h>
|
||||||
|
|
||||||
/* The input and output encrypted as though 128bit ofb mode is being
|
|
||||||
* used. The extra state information to record how much of the
|
|
||||||
* 128bit block we have used is contained in *num;
|
|
||||||
*/
|
|
||||||
void AES_ofb128_encrypt(const unsigned char *in, unsigned char *out,
|
void AES_ofb128_encrypt(const unsigned char *in, unsigned char *out,
|
||||||
const unsigned long length, const AES_KEY *key,
|
size_t length, const AES_KEY *key,
|
||||||
unsigned char *ivec, int *num) {
|
unsigned char *ivec, int *num)
|
||||||
|
{
|
||||||
unsigned int n;
|
CRYPTO_ofb128_encrypt(in,out,length,key,ivec,num,(block128_f)AES_encrypt);
|
||||||
unsigned long l=length;
|
|
||||||
|
|
||||||
assert(in && out && key && ivec && num);
|
|
||||||
|
|
||||||
n = *num;
|
|
||||||
|
|
||||||
while (l--) {
|
|
||||||
if (n == 0) {
|
|
||||||
AES_encrypt(ivec, ivec, key);
|
|
||||||
}
|
|
||||||
*(out++) = *(in++) ^ ivec[n];
|
|
||||||
n = (n+1) % AES_BLOCK_SIZE;
|
|
||||||
}
|
|
||||||
|
|
||||||
*num=n;
|
|
||||||
}
|
}
|
||||||
|
|||||||
1063
crypto/aes/aes_x86core.c
Normal file
1063
crypto/aes/aes_x86core.c
Normal file
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
1030
crypto/aes/asm/aes-armv4.pl
Normal file
1030
crypto/aes/asm/aes-armv4.pl
Normal file
File diff suppressed because it is too large
Load Diff
1176
crypto/aes/asm/aes-ppc.pl
Normal file
1176
crypto/aes/asm/aes-ppc.pl
Normal file
File diff suppressed because it is too large
Load Diff
File diff suppressed because it is too large
Load Diff
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user