Compare commits
2091 Commits
OpenSSL-fi
...
OpenSSL_0_
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
0823ddc56e | ||
|
|
ad6567965d | ||
|
|
582f1f41d4 | ||
|
|
fa57f74a39 | ||
|
|
92f9a8bf38 | ||
|
|
39bcfb129e | ||
|
|
50d3049930 | ||
|
|
8b4fd12b0d | ||
|
|
17689e7dc6 | ||
|
|
f803a417f7 | ||
|
|
9759ff0cd9 | ||
|
|
f9603f2673 | ||
|
|
467daf6b6e | ||
|
|
113d36a3fb | ||
|
|
f16093d2d6 | ||
|
|
aeff907218 | ||
|
|
f3b555a601 | ||
|
|
c0de854c9d | ||
|
|
155ca14ea9 | ||
|
|
303845a3b5 | ||
|
|
1a38987de0 | ||
|
|
5d28381ae4 | ||
|
|
eeda966123 | ||
|
|
c5b0f5c463 | ||
|
|
32fbe9149e | ||
|
|
246b35a96e | ||
|
|
79cc5417a4 | ||
|
|
db8334be06 | ||
|
|
fcc5e899aa | ||
|
|
b78c9e4a2b | ||
|
|
c380bff888 | ||
|
|
6655ac4e45 | ||
|
|
c7395fb999 | ||
|
|
d53f920365 | ||
|
|
65c588c140 | ||
|
|
544e3e3b69 | ||
|
|
497d0b00dc | ||
|
|
674341f1b0 | ||
|
|
c58f4f73bd | ||
|
|
c85c1e08ce | ||
|
|
c2f5de13cd | ||
|
|
01320ad3b9 | ||
|
|
a065737afb | ||
|
|
241cff623e | ||
|
|
8a8ba07167 | ||
|
|
1b4a8df38f | ||
|
|
6d4655c27e | ||
|
|
9eca2cbc16 | ||
|
|
d7efe7ea18 | ||
|
|
49fa6b6c2d | ||
|
|
d64a227f1f | ||
|
|
6844c12968 | ||
|
|
ead95e760c | ||
|
|
02f0c26cea | ||
|
|
6f1f3c6653 | ||
|
|
40720ce3ca | ||
|
|
9d03aabea3 | ||
|
|
117e79dd88 | ||
|
|
bc91221636 | ||
|
|
b9006da5d7 | ||
|
|
d26667b28f | ||
|
|
13270477f4 | ||
|
|
3600d5a744 | ||
|
|
2b2f5ac045 | ||
|
|
7d3081c5ae | ||
|
|
9a5d775320 | ||
|
|
e29126f99a | ||
|
|
175af9de89 | ||
|
|
53d6e678dc | ||
|
|
4191a11f36 | ||
|
|
f6e4701f2a | ||
|
|
86183798f3 | ||
|
|
b527959318 | ||
|
|
25ca15e9a3 | ||
|
|
d1d4b4f398 | ||
|
|
2a3e745a17 | ||
|
|
c7c7a432df | ||
|
|
5ba9d5bb3b | ||
|
|
883a4d55c2 | ||
|
|
b4f1dbdc4b | ||
|
|
5741067dea | ||
|
|
dd7ad2c53d | ||
|
|
366b193f89 | ||
|
|
402eec1ae5 | ||
|
|
44759a0d9e | ||
|
|
9b8089bfea | ||
|
|
4fd2e6b032 | ||
|
|
a2a2bbafde | ||
|
|
b0727cd549 | ||
|
|
d808ebd379 | ||
|
|
23f5f5b9bb | ||
|
|
5e121092ab | ||
|
|
7ef6c2b9d2 | ||
|
|
00ea17f9d7 | ||
|
|
3e8042c38f | ||
|
|
564ccc55d6 | ||
|
|
b558c8d597 | ||
|
|
ba442a7e1b | ||
|
|
e8ccaee31c | ||
|
|
60431d0db3 | ||
|
|
346a46f074 | ||
|
|
56abaa14e0 | ||
|
|
8b8a48d099 | ||
|
|
09caf4ffcd | ||
|
|
9793a0713f | ||
|
|
aa9296e331 | ||
|
|
bc253b0902 | ||
|
|
b873409efe | ||
|
|
f89250f2f2 | ||
|
|
1dc6a5441a | ||
|
|
a4aa188799 | ||
|
|
50befdb659 | ||
|
|
46bf0ba876 | ||
|
|
4b4c0a1921 | ||
|
|
df70302441 | ||
|
|
9c6c664041 | ||
|
|
11f719da38 | ||
|
|
72f1815391 | ||
|
|
e42a2abadc | ||
|
|
ec2fede946 | ||
|
|
63f3c9e715 | ||
|
|
c22e2dd6e5 | ||
|
|
7fae32f6d6 | ||
|
|
5260f1a483 | ||
|
|
1cb10d9c7d | ||
|
|
62abc80540 | ||
|
|
722fa14271 | ||
|
|
a2ca66f37c | ||
|
|
6a04b0d5a4 | ||
|
|
1acca28263 | ||
|
|
d510c6489e | ||
|
|
b82924741b | ||
|
|
cbb6ccabb0 | ||
|
|
e369af3600 | ||
|
|
15b7f5bf88 | ||
|
|
9880f63038 | ||
|
|
af32df0a8e | ||
|
|
bfb7bf1a28 | ||
|
|
f33636faf7 | ||
|
|
94f735cade | ||
|
|
36216218ca | ||
|
|
115eaf4886 | ||
|
|
53ce5647d4 | ||
|
|
4d2efa29f6 | ||
|
|
cd332a0750 | ||
|
|
2ed80d14d7 | ||
|
|
d286606301 | ||
|
|
3f4d81e88b | ||
|
|
dc5dfe431c | ||
|
|
c6a876473c | ||
|
|
5a7fc89394 | ||
|
|
116fd3732a | ||
|
|
1bb01b1b5f | ||
|
|
699d78ce98 | ||
|
|
43d613ec18 | ||
|
|
96e1015eec | ||
|
|
cf4b01a766 | ||
|
|
45d129511f | ||
|
|
0976adac8f | ||
|
|
db5b0d9309 | ||
|
|
aeeedc8acc | ||
|
|
c903866420 | ||
|
|
9b208659aa | ||
|
|
f54fab0fef | ||
|
|
b30aaafbe5 | ||
|
|
fee8d86d7a | ||
|
|
bf3e53a7fa | ||
|
|
44a8fced97 | ||
|
|
4ff07f4c71 | ||
|
|
1c5f396d36 | ||
|
|
9fcaaef34f | ||
|
|
b9a73f5481 | ||
|
|
bff5319d90 | ||
|
|
fc4bd2f287 | ||
|
|
4c836c96c4 | ||
|
|
6e14e7fc19 | ||
|
|
fc15c44049 | ||
|
|
445598b35e | ||
|
|
338a5e7e54 | ||
|
|
6a431cd293 | ||
|
|
1b7024fb69 | ||
|
|
5021f6314e | ||
|
|
21d24dd38a | ||
|
|
681d11b6fd | ||
|
|
8c387e62b2 | ||
|
|
a117329c5a | ||
|
|
f39dbff498 | ||
|
|
f6fefb0cb6 | ||
|
|
febfaa53f4 | ||
|
|
cfed221c2d | ||
|
|
c2014ae252 | ||
|
|
c3d317b4de | ||
|
|
a214feb26b | ||
|
|
7a3a82dbbd | ||
|
|
02fef91630 | ||
|
|
0b8cd5acd6 | ||
|
|
97f4e235a1 | ||
|
|
cfd2aeeb7c | ||
|
|
a0fdc4c6d6 | ||
|
|
b5def0243e | ||
|
|
357f6d8add | ||
|
|
19a71e8c16 | ||
|
|
7faa66433f | ||
|
|
1a0498769f | ||
|
|
a4dde82423 | ||
|
|
eba0aa995d | ||
|
|
c9e6fffa53 | ||
|
|
85dcce7c63 | ||
|
|
2ed29615cb | ||
|
|
d7080d624b | ||
|
|
5d7c8a48db | ||
|
|
00e86a74bd | ||
|
|
9e6857a358 | ||
|
|
715258486c | ||
|
|
2daec41e25 | ||
|
|
8519635923 | ||
|
|
d0bdfdd830 | ||
|
|
4b98488eb0 | ||
|
|
0e2458e187 | ||
|
|
326de18955 | ||
|
|
1fcfd61ee7 | ||
|
|
121f386ec7 | ||
|
|
9fb10cfe6b | ||
|
|
a20a6366c8 | ||
|
|
54985b5061 | ||
|
|
b09db677d5 | ||
|
|
cdc596567d | ||
|
|
70d923fb03 | ||
|
|
def1490717 | ||
|
|
7697d9b587 | ||
|
|
0345354fe0 | ||
|
|
90aef4431b | ||
|
|
602689074a | ||
|
|
810d2c7f6e | ||
|
|
0a9b8dd1b4 | ||
|
|
bfce4e5d6e | ||
|
|
4a1190beca | ||
|
|
047ec5d196 | ||
|
|
bb59889305 | ||
|
|
141a5482fd | ||
|
|
de2422affb | ||
|
|
897169fdf0 | ||
|
|
410a49a4fa | ||
|
|
82ba68c42d | ||
|
|
4b258e73ae | ||
|
|
6ac2f67882 | ||
|
|
bea1d1cbd8 | ||
|
|
61e6e80fe5 | ||
|
|
2ce540743e | ||
|
|
8e928aab02 | ||
|
|
105e52bf23 | ||
|
|
492a5010a4 | ||
|
|
53b0b0a330 | ||
|
|
677c117419 | ||
|
|
bb50d30f35 | ||
|
|
8323996d99 | ||
|
|
ee14e33c35 | ||
|
|
1bcb94a721 | ||
|
|
9658c634a2 | ||
|
|
7ee8b27267 | ||
|
|
e4ea6f0c76 | ||
|
|
a2c00fb210 | ||
|
|
d06ae0fff7 | ||
|
|
afa2ea204e | ||
|
|
0b6394c738 | ||
|
|
70ddf8ecca | ||
|
|
9febee0272 | ||
|
|
a721216f0f | ||
|
|
47f689ac09 | ||
|
|
f51f374199 | ||
|
|
3c1128f43f | ||
|
|
8185c9457e | ||
|
|
c61f0cbffb | ||
|
|
d90605dd00 | ||
|
|
e56334998c | ||
|
|
9ad5c5e4f9 | ||
|
|
4bc24cf01d | ||
|
|
79f57768ff | ||
|
|
d79eb9299a | ||
|
|
fff69a7d8c | ||
|
|
a375025e4d | ||
|
|
d471adf351 | ||
|
|
2fb8642eea | ||
|
|
c44d95c1a7 | ||
|
|
0da40f0ffc | ||
|
|
7f722c95f8 | ||
|
|
4268216005 | ||
|
|
17540b77e0 | ||
|
|
b70e4d3e90 | ||
|
|
d9519a4032 | ||
|
|
5ac9786807 | ||
|
|
0b05204c4e | ||
|
|
a4bfeff254 | ||
|
|
43433b3852 | ||
|
|
020a4782bd | ||
|
|
cadbbd51c8 | ||
|
|
ff7b021040 | ||
|
|
e7e4d506d6 | ||
|
|
9204e7ef0d | ||
|
|
257df40f00 | ||
|
|
a44c9b9c33 | ||
|
|
1cbd7456aa | ||
|
|
e1e39a2451 | ||
|
|
01de6e21cc | ||
|
|
05689a132c | ||
|
|
1643edc63c | ||
|
|
1546fb780b | ||
|
|
b7d222c519 | ||
|
|
a93cc7c573 | ||
|
|
8988407a0b | ||
|
|
b2afc0a9dc | ||
|
|
a8655eb21a | ||
|
|
f751dc4759 | ||
|
|
fbe621d08f | ||
|
|
2e9fd4301f | ||
|
|
1638ce7212 | ||
|
|
7ecd974f5f | ||
|
|
db731da802 | ||
|
|
5864fd2061 | ||
|
|
ff58eaa4b6 | ||
|
|
76c61a5d1a | ||
|
|
4ea7019165 | ||
|
|
59b1129e0a | ||
|
|
fb092ef4fc | ||
|
|
6351adecb4 | ||
|
|
8964efc413 | ||
|
|
430b637bd5 | ||
|
|
ca3b81c858 | ||
|
|
031cbecf86 | ||
|
|
1213e6c3c2 | ||
|
|
32619893b4 | ||
|
|
40e0de0395 | ||
|
|
5f9345a2f0 | ||
|
|
33ccde59a1 | ||
|
|
1909df070f | ||
|
|
c23a745820 | ||
|
|
924b117422 | ||
|
|
24b2806097 | ||
|
|
99f5093347 | ||
|
|
be88529753 | ||
|
|
b3a959a337 | ||
|
|
2928cb4c82 | ||
|
|
a33e6702a0 | ||
|
|
35a65e814b | ||
|
|
7ad132b133 | ||
|
|
2708813166 | ||
|
|
affe98998a | ||
|
|
66e8211c0b | ||
|
|
dd2dee60f3 | ||
|
|
6495179af6 | ||
|
|
61b8c79d15 | ||
|
|
42aa3ec4f2 | ||
|
|
bb152dae8f | ||
|
|
c42ab44087 | ||
|
|
42e10c3fd6 | ||
|
|
c571a3e984 | ||
|
|
e55988bb60 | ||
|
|
34b5ba3b60 | ||
|
|
629ac4b4ca | ||
|
|
75f0bc4f44 | ||
|
|
71a2440ee5 | ||
|
|
04e40739f7 | ||
|
|
48bcdad0d5 | ||
|
|
f7d2402cab | ||
|
|
808f55351a | ||
|
|
c06271bc35 | ||
|
|
92e5882aca | ||
|
|
afa0580cd5 | ||
|
|
4baee3031c | ||
|
|
db7a72b224 | ||
|
|
b71e69ad8e | ||
|
|
f856173c43 | ||
|
|
d742f9ebbd | ||
|
|
36dd4cba3d | ||
|
|
3978429ad5 | ||
|
|
885945d6e1 | ||
|
|
e22e770147 | ||
|
|
e0c0203341 | ||
|
|
e1eec61e26 | ||
|
|
296fa128c9 | ||
|
|
6dde222aae | ||
|
|
391ac37018 | ||
|
|
8d038a08fb | ||
|
|
747c6ffda4 | ||
|
|
d4cddc54f0 | ||
|
|
eb7112c18e | ||
|
|
fef9e07930 | ||
|
|
8ab27e6ef7 | ||
|
|
6415055590 | ||
|
|
556e27b14f | ||
|
|
af0c009d70 | ||
|
|
0b1cf4a139 | ||
|
|
a9101cdcaa | ||
|
|
e351e2a7cf | ||
|
|
215276243d | ||
|
|
ddb7832852 | ||
|
|
2fad41d155 | ||
|
|
b9c3d9168f | ||
|
|
4f2fc3c2dd | ||
|
|
48819f4d54 | ||
|
|
b0cbdd3eba | ||
|
|
5016107550 | ||
|
|
25d5d15fd5 | ||
|
|
725713f74a | ||
|
|
73eb0972cf | ||
|
|
6720779c7e | ||
|
|
b2a2c6af2a | ||
|
|
272993bac4 | ||
|
|
58532ae047 | ||
|
|
4e7f6d380d | ||
|
|
f0be325f88 | ||
|
|
b66af23aa9 | ||
|
|
29d0c13e97 | ||
|
|
8a4e81a269 | ||
|
|
843fc7b681 | ||
|
|
6dcb6bf1c1 | ||
|
|
1061c3cb3c | ||
|
|
0d0f15d8d1 | ||
|
|
a72ce94213 | ||
|
|
f71d59c70e | ||
|
|
3309f8313c | ||
|
|
6cc5f194a7 | ||
|
|
096327a99a | ||
|
|
cc10bcf25e | ||
|
|
875ac0ec00 | ||
|
|
bf240f063a | ||
|
|
dd016b0570 | ||
|
|
244788464a | ||
|
|
a95808334e | ||
|
|
b3cebd5acf | ||
|
|
7b775145e4 | ||
|
|
7183aa6b9d | ||
|
|
eebefe35e7 | ||
|
|
1db0bbdc76 | ||
|
|
e643112dd8 | ||
|
|
21c4b25959 | ||
|
|
41cf2c3aef | ||
|
|
0e3a930fb4 | ||
|
|
0c214e0153 | ||
|
|
6c61cfbe03 | ||
|
|
2ee77d36a0 | ||
|
|
24f441e0bb | ||
|
|
740da44f20 | ||
|
|
72033fde7b | ||
|
|
9adf3fcf9a | ||
|
|
65f7456652 | ||
|
|
8794569a08 | ||
|
|
f8731bc2fd | ||
|
|
195d6bf760 | ||
|
|
dacd94b9c8 | ||
|
|
8070cb5f87 | ||
|
|
f7d514f449 | ||
|
|
6d50bce79f | ||
|
|
3cf0a38b3e | ||
|
|
91a1d08a4c | ||
|
|
85e776885b | ||
|
|
fc4015329f | ||
|
|
6ec9ff83f3 | ||
|
|
db45308477 | ||
|
|
1c7c69a8a5 | ||
|
|
24ad061037 | ||
|
|
92f96fa721 | ||
|
|
0d1e362363 | ||
|
|
a0bf2c86ab | ||
|
|
6a662a45f3 | ||
|
|
24d0524f31 | ||
|
|
c081817c95 | ||
|
|
46a1f2487e | ||
|
|
ac02a4b68a | ||
|
|
4ba063d3c5 | ||
|
|
e0e0818e4b | ||
|
|
82a5049f6a | ||
|
|
d027b75b73 | ||
|
|
87421d3fc5 | ||
|
|
87d14a3625 | ||
|
|
cc0931e36b | ||
|
|
22152d6885 | ||
|
|
102bcbce8d | ||
|
|
8655de423d | ||
|
|
c4b2eb24b3 | ||
|
|
03e3fbb702 | ||
|
|
bc7ee385f5 | ||
|
|
1e368ab08f | ||
|
|
2c77c5c8db | ||
|
|
1eb38c563f | ||
|
|
fa657871ed | ||
|
|
09dac71a45 | ||
|
|
be70b3adce | ||
|
|
6d12b1f82b | ||
|
|
7116a41129 | ||
|
|
7143acab25 | ||
|
|
11d4086d8e | ||
|
|
32cd1da62e | ||
|
|
d430f56de6 | ||
|
|
957ebe98fb | ||
|
|
9d09fc8485 | ||
|
|
8ea4531718 | ||
|
|
881611678e | ||
|
|
a3dc628d86 | ||
|
|
3c159fc1a5 | ||
|
|
6056afd223 | ||
|
|
54db796991 | ||
|
|
119e912a83 | ||
|
|
f4a4a0fdc7 | ||
|
|
9ad765173f | ||
|
|
c8e3c1a9b5 | ||
|
|
ae378b769a | ||
|
|
4de4e35459 | ||
|
|
5537a83e56 | ||
|
|
c850d322a6 | ||
|
|
b8be571868 | ||
|
|
acd43bf38c | ||
|
|
5eaf173647 | ||
|
|
7890b562bc | ||
|
|
7258d33794 | ||
|
|
263979a2a3 | ||
|
|
2c6d83354d | ||
|
|
a188fc01fe | ||
|
|
1948f9e042 | ||
|
|
f7ffc3a6c9 | ||
|
|
4d6af5c5d2 | ||
|
|
efed63d783 | ||
|
|
7e351bb560 | ||
|
|
0067580321 | ||
|
|
82e0073624 | ||
|
|
7e541b1a7f | ||
|
|
2ae47ddbc2 | ||
|
|
3e8b8b8990 | ||
|
|
05bbbe9204 | ||
|
|
a073129293 | ||
|
|
93fc0e0e40 | ||
|
|
84f1c14396 | ||
|
|
f10986bab4 | ||
|
|
6cb5746b65 | ||
|
|
0061aa9f32 | ||
|
|
3926bbcf6d | ||
|
|
b5cee977c2 | ||
|
|
ae3b60ba99 | ||
|
|
d4ba6424a1 | ||
|
|
92a97e52a0 | ||
|
|
78dcaa0609 | ||
|
|
65b4c34d86 | ||
|
|
d8486c312c | ||
|
|
8d4baaf2f0 | ||
|
|
50fb940f05 | ||
|
|
63e3676e68 | ||
|
|
1dac2cae68 | ||
|
|
d886975835 | ||
|
|
22872a5363 | ||
|
|
82b6b541b1 | ||
|
|
60a989a76e | ||
|
|
18394ed50f | ||
|
|
3416d11926 | ||
|
|
c1f1a03d0c | ||
|
|
278a447ee8 | ||
|
|
8ceee689c7 | ||
|
|
356f164f52 | ||
|
|
203ef9988c | ||
|
|
9f51bdae00 | ||
|
|
59c4f46f0f | ||
|
|
f9ab6255e7 | ||
|
|
a89b665b9b | ||
|
|
a7949b8da3 | ||
|
|
b0b4adc3af | ||
|
|
6e19895972 | ||
|
|
d24f1cbf35 | ||
|
|
b8febed96a | ||
|
|
82687bb4c3 | ||
|
|
6506b7754a | ||
|
|
2eb8e5e62a | ||
|
|
c713a4c04d | ||
|
|
0cefa0f942 | ||
|
|
834c85ef0c | ||
|
|
0c8c8eab58 | ||
|
|
bc06baca76 | ||
|
|
9eeb779e8f | ||
|
|
fe171f9c3e | ||
|
|
5e613d5411 | ||
|
|
56e930eb03 | ||
|
|
4a052f0bb9 | ||
|
|
f34e79f27b | ||
|
|
ef1fe9094c | ||
|
|
c25e8ee9b3 | ||
|
|
4525a048ec | ||
|
|
f421a52f56 | ||
|
|
17a79eec0c | ||
|
|
1eda14b44f | ||
|
|
aa9b502619 | ||
|
|
aaf45e6464 | ||
|
|
be83c31cdd | ||
|
|
76a41eec2b | ||
|
|
ab9c0ec9fc | ||
|
|
cf6a1dea19 | ||
|
|
ea5b3f5e62 | ||
|
|
c3c658e1c0 | ||
|
|
5d013b6b32 | ||
|
|
ee91323f52 | ||
|
|
4fae868811 | ||
|
|
354f92d66a | ||
|
|
c3484e0268 | ||
|
|
6b0be9c73d | ||
|
|
02312a91ca | ||
|
|
744f6b648e | ||
|
|
f1502a491e | ||
|
|
b70871b675 | ||
|
|
9de450b545 | ||
|
|
cc53036744 | ||
|
|
4610d8dc00 | ||
|
|
5d7dfefe82 | ||
|
|
5e8e7054f7 | ||
|
|
9a542ea01d | ||
|
|
1939f83709 | ||
|
|
b7c114f044 | ||
|
|
ede1351997 | ||
|
|
7786ed6a64 | ||
|
|
bdd08277b8 | ||
|
|
2bf4faa7e4 | ||
|
|
2e5e604b0c | ||
|
|
ed4cd027f3 | ||
|
|
bab19a2ac2 | ||
|
|
582eb96d15 | ||
|
|
2649ce1ebc | ||
|
|
7070cdba4e | ||
|
|
e885de28b1 | ||
|
|
3038649ab2 | ||
|
|
3e4da3f7cb | ||
|
|
53b5d04715 | ||
|
|
defede6080 | ||
|
|
1472f1427e | ||
|
|
00d1ecb1da | ||
|
|
739e0e934a | ||
|
|
6ae9770d34 | ||
|
|
bec7184768 | ||
|
|
442ac8d259 | ||
|
|
657b02d0cf | ||
|
|
b50ef8b216 | ||
|
|
1b690c1a8b | ||
|
|
2873a53f5f | ||
|
|
04a781e844 | ||
|
|
68be98d1a6 | ||
|
|
0bbbadf3f5 | ||
|
|
c0c1ce125a | ||
|
|
105861186f | ||
|
|
4a9d335bb4 | ||
|
|
162f1e08f8 | ||
|
|
0484ff5ec1 | ||
|
|
4acc2fed6c | ||
|
|
0369804ffa | ||
|
|
33d7b5ec07 | ||
|
|
4b38f35e72 | ||
|
|
82c2773423 | ||
|
|
ded27f709c | ||
|
|
30dc3e112b | ||
|
|
371b262f96 | ||
|
|
b3fb2492d5 | ||
|
|
93b810637b | ||
|
|
cc62974182 | ||
|
|
9413788571 | ||
|
|
e8387db0c4 | ||
|
|
81f28ca567 | ||
|
|
1b32943215 | ||
|
|
a231d99d4c | ||
|
|
714044cc03 | ||
|
|
5598b99fb3 | ||
|
|
6899d9bbf6 | ||
|
|
cf876a9893 | ||
|
|
8b8a2928af | ||
|
|
031774468c | ||
|
|
dd28d12add | ||
|
|
6c61ee8fe3 | ||
|
|
b86ebb55ff | ||
|
|
66956eaba3 | ||
|
|
444ff35029 | ||
|
|
ff2549be1d | ||
|
|
2557c6a812 | ||
|
|
aae48de0f7 | ||
|
|
766708f24b | ||
|
|
fbeb4a9d15 | ||
|
|
24fc4f656c | ||
|
|
c3c3b28818 | ||
|
|
06e2670a57 | ||
|
|
3798a4d059 | ||
|
|
5b8246d6eb | ||
|
|
2e24bc421d | ||
|
|
f244ed3ed2 | ||
|
|
50a095ed16 | ||
|
|
37aff2199e | ||
|
|
309aa5fbf3 | ||
|
|
5f40948714 | ||
|
|
c22050be29 | ||
|
|
54ca55fd81 | ||
|
|
d0e79d7e2c | ||
|
|
c1003dfd15 | ||
|
|
98809a1458 | ||
|
|
ccc3df8c33 | ||
|
|
593a6dbe19 | ||
|
|
efbe446f1a | ||
|
|
725745d105 | ||
|
|
c0e94f8292 | ||
|
|
ef4bd0167c | ||
|
|
7a8a3ef4f6 | ||
|
|
98c7b0367d | ||
|
|
9e5dea0ffd | ||
|
|
cb4823fdd6 | ||
|
|
17bb051628 | ||
|
|
59f44e810b | ||
|
|
7a014dceb6 | ||
|
|
1ff44a99a4 | ||
|
|
6cf61614e4 | ||
|
|
82e448b92b | ||
|
|
b172352b52 | ||
|
|
95b14fd803 | ||
|
|
553d2e3280 | ||
|
|
82fb4ee89d | ||
|
|
389fef6c9c | ||
|
|
b6622f9623 | ||
|
|
7f5448e3a8 | ||
|
|
5d965f0783 | ||
|
|
b14713c231 | ||
|
|
637e0ba420 | ||
|
|
9ac37cb018 | ||
|
|
fb7751b44f | ||
|
|
e333a8d673 | ||
|
|
89a6daac00 | ||
|
|
7e42945918 | ||
|
|
b61a87b26c | ||
|
|
2c6b141931 | ||
|
|
af13c50d51 | ||
|
|
65c2397fce | ||
|
|
16e7efe3c8 | ||
|
|
c2b78c31d6 | ||
|
|
a1dc0336dd | ||
|
|
d99a35f275 | ||
|
|
949fbf073a | ||
|
|
6156be4da3 | ||
|
|
d7d4325655 | ||
|
|
9f81ffe433 | ||
|
|
8164930816 | ||
|
|
2a8834cf89 | ||
|
|
e6e11f4ec3 | ||
|
|
452e41562c | ||
|
|
8c6dd96aed | ||
|
|
23a4ccd178 | ||
|
|
2b4d877a27 | ||
|
|
d916f92d6f | ||
|
|
b9b5134e19 | ||
|
|
9ef6fdab63 | ||
|
|
3a0b6de4d0 | ||
|
|
08896dc0bd | ||
|
|
ef62799783 | ||
|
|
8196257f00 | ||
|
|
ac923d3377 | ||
|
|
0ec529ac82 | ||
|
|
d5b0c872d8 | ||
|
|
2e8026b65a | ||
|
|
381a9f04a0 | ||
|
|
d7050b4424 | ||
|
|
91ca332058 | ||
|
|
ff095a8ac8 | ||
|
|
ae37f9f3a2 | ||
|
|
95d66bd867 | ||
|
|
6d73e9d8e8 | ||
|
|
fb5a4bbaa7 | ||
|
|
d402f6b66f | ||
|
|
36a38a7a27 | ||
|
|
2a4dc7e505 | ||
|
|
4e92353d23 | ||
|
|
0badc909ae | ||
|
|
3cc52ee97a | ||
|
|
822da9ccc3 | ||
|
|
96e20179e4 | ||
|
|
1dfa26bd84 | ||
|
|
9e6c97703c | ||
|
|
a0f6e0c1e7 | ||
|
|
edaa7a599a | ||
|
|
3b95629db1 | ||
|
|
afff063a14 | ||
|
|
e1246e1ad7 | ||
|
|
df0b451d91 | ||
|
|
07cb0a82d1 | ||
|
|
f2671f8ac4 | ||
|
|
43e9e1a160 | ||
|
|
d0969d24cf | ||
|
|
cf51a0dccb | ||
|
|
48b30bf0e2 | ||
|
|
17b08b6a64 | ||
|
|
197ab47bdd | ||
|
|
e8cce0babe | ||
|
|
11d655ef40 | ||
|
|
1da61e8051 | ||
|
|
da6ce18279 | ||
|
|
98f43a173b | ||
|
|
c202eda634 | ||
|
|
f78bcb8945 | ||
|
|
2a918d4cc0 | ||
|
|
2c83b24cad | ||
|
|
e75445f688 | ||
|
|
df51d79ec4 | ||
|
|
c21a427a14 | ||
|
|
c6e4ef2c6e | ||
|
|
6450908a35 | ||
|
|
a91cb2103d | ||
|
|
3acd3158e9 | ||
|
|
8a04c6f894 | ||
|
|
745565c69f | ||
|
|
fbc4a24633 | ||
|
|
4775a89760 | ||
|
|
3008a7d819 | ||
|
|
233f758523 | ||
|
|
3af16cf694 | ||
|
|
985b5ee735 | ||
|
|
4df7ade829 | ||
|
|
932858d5f9 | ||
|
|
c4b3503b4b | ||
|
|
f871545f7f | ||
|
|
136b5dc7c7 | ||
|
|
759b287f15 | ||
|
|
5fffb5b3d9 | ||
|
|
17620eec4c | ||
|
|
059230b320 | ||
|
|
19dac35e5f | ||
|
|
f5fe2a9f6c | ||
|
|
d36e9d160b | ||
|
|
e58e78cab2 | ||
|
|
b0080e3817 | ||
|
|
4d67d79273 | ||
|
|
83ece9f028 | ||
|
|
cec136c30d | ||
|
|
ded8aff2c8 | ||
|
|
76a268a43f | ||
|
|
6563b02980 | ||
|
|
32d4496c1e | ||
|
|
0b26e53c59 | ||
|
|
7cf69ed544 | ||
|
|
8b634ba029 | ||
|
|
526228b78e | ||
|
|
34d01a3b20 | ||
|
|
856f3005de | ||
|
|
6e2a14002e | ||
|
|
7852c6b075 | ||
|
|
2c5f3606d1 | ||
|
|
1649489834 | ||
|
|
b51291cba8 | ||
|
|
b29b576957 | ||
|
|
abe389fd28 | ||
|
|
e7e7f5de4b | ||
|
|
3dfa7416cd | ||
|
|
d733ef7a69 | ||
|
|
17e01d24bb | ||
|
|
f67f815624 | ||
|
|
ab8fe43fa2 | ||
|
|
5e4c2225ed | ||
|
|
167d2a1411 | ||
|
|
3f4802a14e | ||
|
|
9aecc3e5ff | ||
|
|
b8a4a5bcba | ||
|
|
6daac534d7 | ||
|
|
79649d380e | ||
|
|
51ebaa9f82 | ||
|
|
efaa569c3b | ||
|
|
15684f58c2 | ||
|
|
0e6c24ae4b | ||
|
|
0dc1b3c1fb | ||
|
|
1e53b797f6 | ||
|
|
1ddf691244 | ||
|
|
78074baadd | ||
|
|
7457642b8c | ||
|
|
d1e107702b | ||
|
|
19503ca653 | ||
|
|
14089b1d0f | ||
|
|
0b8eca58b9 | ||
|
|
c2f425a06a | ||
|
|
4930f8bbd9 | ||
|
|
a5668db68b | ||
|
|
996b80f990 | ||
|
|
1998f60546 | ||
|
|
13a4808ca4 | ||
|
|
a176be48a2 | ||
|
|
f47bce27e3 | ||
|
|
f86d65110d | ||
|
|
4730ea8a38 | ||
|
|
3e82dfdf2d | ||
|
|
b7d0d35a13 | ||
|
|
e12ceb2c92 | ||
|
|
e8d23950a0 | ||
|
|
d7c86198d9 | ||
|
|
76428da729 | ||
|
|
6bf4ca0840 | ||
|
|
efa59b8d59 | ||
|
|
e1a2bfaaa6 | ||
|
|
48f48d96ce | ||
|
|
085cb7cac0 | ||
|
|
9874ff33c3 | ||
|
|
73cfd9cce9 | ||
|
|
3166d16f06 | ||
|
|
26b82246b1 | ||
|
|
277ba3ebd2 | ||
|
|
3e9b2042d9 | ||
|
|
5d577d7eb0 | ||
|
|
05ee0523c1 | ||
|
|
43f392c9a1 | ||
|
|
01cb2049e3 | ||
|
|
a224fe14e9 | ||
|
|
00d5a5ff55 | ||
|
|
420312cec5 | ||
|
|
3c17fa3325 | ||
|
|
e3424084a0 | ||
|
|
d9a55422c7 | ||
|
|
374941f727 | ||
|
|
caeb429055 | ||
|
|
b00c36e366 | ||
|
|
1f9a128519 | ||
|
|
18df6b30b1 | ||
|
|
0d399f97dd | ||
|
|
3fdc2c906d | ||
|
|
a78ded0b61 | ||
|
|
0a629ddbd6 | ||
|
|
353cb367e4 | ||
|
|
6252f3bc7c | ||
|
|
4e319926d7 | ||
|
|
e4f456918f | ||
|
|
c342341ea1 | ||
|
|
9d396bee8e | ||
|
|
a9427c2536 | ||
|
|
7a746ecf3e | ||
|
|
aca8bf43ce | ||
|
|
7de0df694f | ||
|
|
15d3cd4680 | ||
|
|
da4fb3cb39 | ||
|
|
e10051ef3f | ||
|
|
c60dca1f95 | ||
|
|
188abf7e2a | ||
|
|
f021b7cca6 | ||
|
|
c126b73a4a | ||
|
|
3f03b3569d | ||
|
|
07dd3bfcd4 | ||
|
|
37afdc953e | ||
|
|
044855e146 | ||
|
|
12379c82ba | ||
|
|
be98d6b9ad | ||
|
|
910b484975 | ||
|
|
1fde5b65c6 | ||
|
|
c40bc0b11f | ||
|
|
7a0c01b41a | ||
|
|
6fe9c925d2 | ||
|
|
1ebdc48d5a | ||
|
|
395a6c69bd | ||
|
|
0d658ddf25 | ||
|
|
cefa7ce284 | ||
|
|
ee4041b8bd | ||
|
|
a17f351b56 | ||
|
|
4fcf8d8b07 | ||
|
|
b7650eb21e | ||
|
|
69120ad199 | ||
|
|
1eee8a4226 | ||
|
|
98448a53c8 | ||
|
|
241d088156 | ||
|
|
a22a8dd7dd | ||
|
|
e26ad0c4fd | ||
|
|
6e7559ac7f | ||
|
|
9feda63955 | ||
|
|
1ed81ff731 | ||
|
|
b2dc2e6dac | ||
|
|
1b787fc04c | ||
|
|
9a6401acdf | ||
|
|
c40fcc1e40 | ||
|
|
f908ca4db4 | ||
|
|
72f6453c48 | ||
|
|
eca7b90771 | ||
|
|
7eb90ccefb | ||
|
|
6ed534782f | ||
|
|
1ee27238f7 | ||
|
|
59689735a6 | ||
|
|
1be16287ee | ||
|
|
9fe4b73d97 | ||
|
|
73cb37295d | ||
|
|
1f35508ae6 | ||
|
|
3e2a74c294 | ||
|
|
a34922c476 | ||
|
|
84be7091fd | ||
|
|
f82c1f0dd8 | ||
|
|
dc0cb7e74f | ||
|
|
ab31dbc482 | ||
|
|
36e9d3ee91 | ||
|
|
cc8c0f6b46 | ||
|
|
3eac70a356 | ||
|
|
5f3ad8f82c | ||
|
|
367316c723 | ||
|
|
d34353cc91 | ||
|
|
6287fa5396 | ||
|
|
a00c3c4019 | ||
|
|
f4677b7960 | ||
|
|
92308905dd | ||
|
|
6f32fc5c4e | ||
|
|
e607e731eb | ||
|
|
f17c45611e | ||
|
|
1ff7b6492b | ||
|
|
20900d6801 | ||
|
|
4b253d904d | ||
|
|
a51c8c64e0 | ||
|
|
c153422388 | ||
|
|
7f065cfdbd | ||
|
|
667fbc0847 | ||
|
|
6ba7bd5697 | ||
|
|
2cad035c01 | ||
|
|
2a76c68842 | ||
|
|
1b00f4bc37 | ||
|
|
be62eb6d93 | ||
|
|
5f3878f1e3 | ||
|
|
a523e997d3 | ||
|
|
fe43caa4a4 | ||
|
|
792e614144 | ||
|
|
ce2b87d88a | ||
|
|
f092a073a7 | ||
|
|
6fa4cd7136 | ||
|
|
505ed2b076 | ||
|
|
cef3e62d2b | ||
|
|
40ea9ff9e8 | ||
|
|
a97a6b03bc | ||
|
|
516f76fd2c | ||
|
|
5a02ac6e5b | ||
|
|
14d4074ee1 | ||
|
|
d9f16c405c | ||
|
|
bfc6482a7a | ||
|
|
5aa032033e | ||
|
|
2d59f9938f | ||
|
|
c0ce8fe755 | ||
|
|
55eff40084 | ||
|
|
e5a251843d | ||
|
|
fe46b0de29 | ||
|
|
a581439bb1 | ||
|
|
a43337e8c4 | ||
|
|
33c51ec143 | ||
|
|
448da15fbf | ||
|
|
a1bb2d6c2f | ||
|
|
81dde5e8fe | ||
|
|
b84e441861 | ||
|
|
08e012bbec | ||
|
|
b46acc392b | ||
|
|
28af6367b8 | ||
|
|
2c17b493b1 | ||
|
|
ea725a66c9 | ||
|
|
1532493dab | ||
|
|
3795297af8 | ||
|
|
33fd33d423 | ||
|
|
4e98f8863f | ||
|
|
582ef3dbdb | ||
|
|
6a933782fa | ||
|
|
d1c2778e93 | ||
|
|
8d64abacc6 | ||
|
|
9af6802943 | ||
|
|
c10f53a897 | ||
|
|
2124e869a8 | ||
|
|
3b668eedda | ||
|
|
7471431322 | ||
|
|
1542de4eed | ||
|
|
b6c2bffbdf | ||
|
|
ff09931e22 | ||
|
|
155c70b882 | ||
|
|
7c49452973 | ||
|
|
312539ae9f | ||
|
|
cc40dcce58 | ||
|
|
5790921aea | ||
|
|
df84c11407 | ||
|
|
b76306c983 | ||
|
|
cdffc716c9 | ||
|
|
5dffc13f55 | ||
|
|
a5873a8d3d | ||
|
|
4db3e88459 | ||
|
|
ab073bad4f | ||
|
|
cfe04f607d | ||
|
|
c0e9f540e0 | ||
|
|
7c97aacbe8 | ||
|
|
36b8f87566 | ||
|
|
d875413a0b | ||
|
|
155ad6d219 | ||
|
|
138f20433e | ||
|
|
7747c67861 | ||
|
|
237a6f06b6 | ||
|
|
fe99beb82a | ||
|
|
736a77f275 | ||
|
|
94539213a1 | ||
|
|
c5c4246319 | ||
|
|
2e6d8a8991 | ||
|
|
e852835da6 | ||
|
|
d245c32529 | ||
|
|
964d58bcb0 | ||
|
|
52702f6f92 | ||
|
|
05794d983f | ||
|
|
364f36f851 | ||
|
|
9b809d6278 | ||
|
|
bbefea3387 | ||
|
|
d83dde6180 | ||
|
|
63e1319d0f | ||
|
|
8067d34b3a | ||
|
|
e3f2860e73 | ||
|
|
92eb44d238 | ||
|
|
f4179bead4 | ||
|
|
fced277486 | ||
|
|
3d1be455ce | ||
|
|
dee4d129cb | ||
|
|
0067bd77a8 | ||
|
|
d98904e5a7 | ||
|
|
96a259e81e | ||
|
|
59f3477b82 | ||
|
|
f947b818bf | ||
|
|
3fa1a444ce | ||
|
|
a2dc9b6be2 | ||
|
|
16349eeceb | ||
|
|
aecf1c1f96 | ||
|
|
4ea574fdf3 | ||
|
|
cf8115deb0 | ||
|
|
d25cbda074 | ||
|
|
5d582fd516 | ||
|
|
8ec86dcf04 | ||
|
|
6d3b70c8da | ||
|
|
0a4fda742b | ||
|
|
3745e57bf9 | ||
|
|
b7e7aa00de | ||
|
|
1098fd48ce | ||
|
|
393906d9be | ||
|
|
446881468c | ||
|
|
cfb95ba9f6 | ||
|
|
c198c26226 | ||
|
|
54d6ddba69 | ||
|
|
1af12ff1d1 | ||
|
|
bd72b8eca6 | ||
|
|
200d00c854 | ||
|
|
669b912dea | ||
|
|
36a4a67b2b | ||
|
|
3413424f01 | ||
|
|
80fc840d89 | ||
|
|
6455100f7a | ||
|
|
b7c8b4fc95 | ||
|
|
f58d0f70b6 | ||
|
|
8f59c61d1d | ||
|
|
fd43ae3fe4 | ||
|
|
cdd0f3b328 | ||
|
|
f9f6f0e9f0 | ||
|
|
405f382144 | ||
|
|
a750273546 | ||
|
|
ddc5f6f328 | ||
|
|
4231b356aa | ||
|
|
df1f7b4b02 | ||
|
|
0b7545b239 | ||
|
|
3a72137211 | ||
|
|
e5d289cc03 | ||
|
|
0ff3766b0e | ||
|
|
3562202306 | ||
|
|
2bf4b96aef | ||
|
|
811e08a2c5 | ||
|
|
dd6e90465d | ||
|
|
a86c626802 | ||
|
|
705c3dec2c | ||
|
|
4afcee8b4b | ||
|
|
9627017f9c | ||
|
|
e0f6c15418 | ||
|
|
ecc20b75f8 | ||
|
|
540e455e3a | ||
|
|
14748adb09 | ||
|
|
ff2ab9e6bb | ||
|
|
cc5cc3bb8f | ||
|
|
1f3206216b | ||
|
|
f113bb9f4e | ||
|
|
4681147bb3 | ||
|
|
52c3f232e4 | ||
|
|
3dc466424e | ||
|
|
353415cc81 | ||
|
|
1a12ce8ea5 | ||
|
|
0278e15fa3 | ||
|
|
f01f085cb9 | ||
|
|
bca68e90cc | ||
|
|
a3f67ec18d | ||
|
|
56ef1cbc40 | ||
|
|
a1411093f0 | ||
|
|
f35f7d9fbb | ||
|
|
dfbf646ac4 | ||
|
|
591371566e | ||
|
|
5799b72178 | ||
|
|
1cfe6842d5 | ||
|
|
f4c98a6a3d | ||
|
|
4aefb1dd98 | ||
|
|
aa03989791 | ||
|
|
a865b2c320 | ||
|
|
694ce314a8 | ||
|
|
94299a36a6 | ||
|
|
3aaeb5c1e5 | ||
|
|
80ec6cc806 | ||
|
|
3d83320279 | ||
|
|
4ab252d198 | ||
|
|
058ffd7623 | ||
|
|
0330a13aea | ||
|
|
467325b81d | ||
|
|
00f716bbe6 | ||
|
|
2f2f032497 | ||
|
|
feb200bbb3 | ||
|
|
3894667036 | ||
|
|
203ac694e3 | ||
|
|
bb592c75e7 | ||
|
|
777d717c40 | ||
|
|
143d84590f | ||
|
|
a29669d78d | ||
|
|
e5be1e1696 | ||
|
|
9e47c34729 | ||
|
|
cb896f8923 | ||
|
|
cec9bce126 | ||
|
|
3f79793b7e | ||
|
|
0d01d8a735 | ||
|
|
2c0fa03dc6 | ||
|
|
d3b3a6d389 | ||
|
|
fc260b09a1 | ||
|
|
b3c79a8a27 | ||
|
|
f0ecefc0c0 | ||
|
|
b0118409a9 | ||
|
|
5f23288692 | ||
|
|
45c58c7d10 | ||
|
|
112591be76 | ||
|
|
1b8daa3693 | ||
|
|
1cdbc755ee | ||
|
|
aa9c7e4b8c | ||
|
|
6be69a168f | ||
|
|
eaf76feeb6 | ||
|
|
03e79ed05e | ||
|
|
56bef2df4f | ||
|
|
10d3886c51 | ||
|
|
f1c0cf5b70 | ||
|
|
2a7ac69ee4 | ||
|
|
d13ea8e184 | ||
|
|
1820b04bb2 | ||
|
|
439b7ef463 | ||
|
|
a25fb95bd6 | ||
|
|
6168067160 | ||
|
|
c3031a4610 | ||
|
|
1099a94063 | ||
|
|
812d8a176c | ||
|
|
db533c96e3 | ||
|
|
8831eb7624 | ||
|
|
3c8f315021 | ||
|
|
0f2e636602 | ||
|
|
98bd148b1a | ||
|
|
292248b8c2 | ||
|
|
d3eef3e5af | ||
|
|
c5fbf8c1ba | ||
|
|
1ed2d8f512 | ||
|
|
d140890259 | ||
|
|
eb492df2bb | ||
|
|
2c16e78400 | ||
|
|
bf2b87aea3 | ||
|
|
1dff425999 | ||
|
|
501af5ba89 | ||
|
|
31d6e7b7ba | ||
|
|
b983322bfb | ||
|
|
339654e163 | ||
|
|
5ca48cc853 | ||
|
|
79996e3335 | ||
|
|
173acc185c | ||
|
|
a985ecdd17 | ||
|
|
fb4c24b6e7 | ||
|
|
1366f6b9bd | ||
|
|
e13546f739 | ||
|
|
d6c813daff | ||
|
|
e3818a4c4b | ||
|
|
415fe2abe9 | ||
|
|
5bbdaaf4b7 | ||
|
|
bf1f1a5759 | ||
|
|
8e42429c9d | ||
|
|
c43c2285f6 | ||
|
|
94b2c29f9d | ||
|
|
090f931a35 | ||
|
|
6b8be6da76 | ||
|
|
7ec2d392e7 | ||
|
|
e88f66bb49 | ||
|
|
28a2759ab8 | ||
|
|
3edad44d6e | ||
|
|
9e7459fc5d | ||
|
|
b98f5ef42b | ||
|
|
a6d4f79f24 | ||
|
|
efcb7a75fc | ||
|
|
30aa23fea2 | ||
|
|
c9e045041e | ||
|
|
fd6fa9c0b2 | ||
|
|
9f70d09275 | ||
|
|
3fb0f01001 | ||
|
|
216ac24bd3 | ||
|
|
2035af2091 | ||
|
|
19398a175a | ||
|
|
fa369ddbe7 | ||
|
|
294ba3c282 | ||
|
|
2923e91a98 | ||
|
|
7c52b7706f | ||
|
|
ddec587581 | ||
|
|
4f466f8e81 | ||
|
|
1502cda142 | ||
|
|
ce2b5d7574 | ||
|
|
f1c65db80b | ||
|
|
496970b233 | ||
|
|
3b0e61a812 | ||
|
|
e84b0d709b | ||
|
|
16241f0ea4 | ||
|
|
518af4e3ae | ||
|
|
fe01f90a1c | ||
|
|
99a376df16 | ||
|
|
831ffcb705 | ||
|
|
5f297c4504 | ||
|
|
d7623ff9f3 | ||
|
|
df9b5405e8 | ||
|
|
180eb5b3c2 | ||
|
|
af7d49aaff | ||
|
|
187b655bc2 | ||
|
|
8612cb9239 | ||
|
|
b2f3fafa6a | ||
|
|
483dab147d | ||
|
|
f39b8e697c | ||
|
|
7d610299c9 | ||
|
|
25550b2dd4 | ||
|
|
5c676c47cd | ||
|
|
e77f9d5e78 | ||
|
|
9c04747623 | ||
|
|
e66deb6817 | ||
|
|
cc9a645a02 | ||
|
|
18fb9d807e | ||
|
|
a1cc568288 | ||
|
|
2ea3cd8abc | ||
|
|
095db72024 | ||
|
|
11eb172b6e | ||
|
|
4b60f4b175 | ||
|
|
0794f3a798 | ||
|
|
2b8e7b5061 | ||
|
|
6f57311da0 | ||
|
|
98b09d3949 | ||
|
|
231a737a82 | ||
|
|
236860735e | ||
|
|
ac1ef7ec72 | ||
|
|
5f761514e1 | ||
|
|
32f1f622f6 | ||
|
|
5f95651316 | ||
|
|
ccac657556 | ||
|
|
a9c23ea079 | ||
|
|
33ffe2a7f7 | ||
|
|
7c717aafc6 | ||
|
|
225aeb171e | ||
|
|
ffe181c366 | ||
|
|
fd4e79a9ed | ||
|
|
299e174d2d | ||
|
|
ce62fc6eae | ||
|
|
43490dfb89 | ||
|
|
a523276786 | ||
|
|
074471ab0c | ||
|
|
d761421e1d | ||
|
|
2339c5d722 | ||
|
|
dd00266757 | ||
|
|
bb99ce5f80 | ||
|
|
49f42ec0f6 | ||
|
|
91d509f0d9 | ||
|
|
d5e858c55f | ||
|
|
fb8fcce2ac | ||
|
|
d4736ae701 | ||
|
|
3e1158522a | ||
|
|
57191f86d9 | ||
|
|
0a89c575de | ||
|
|
4c860910df | ||
|
|
0fc3d51b7d | ||
|
|
c4b0d7879e | ||
|
|
aab1ec3f36 | ||
|
|
fbfa11fb29 | ||
|
|
284498fcef | ||
|
|
07d9808496 | ||
|
|
4ab0088bfe | ||
|
|
3bd1690bfb | ||
|
|
29f4b05954 | ||
|
|
48ca0c99b2 | ||
|
|
015052cf7b | ||
|
|
9ce3ee47ba | ||
|
|
2e3fd54337 | ||
|
|
625782f7ee | ||
|
|
1c90899eef | ||
|
|
4f2b7d48b1 | ||
|
|
458c3900e1 | ||
|
|
ba75b4e750 | ||
|
|
ab011d51be | ||
|
|
898d9b1a87 | ||
|
|
4f9a9d2b79 | ||
|
|
346f2f93e1 | ||
|
|
25b0e072dd | ||
|
|
dc13c882fb | ||
|
|
12a52467c8 | ||
|
|
22e6c73dcc | ||
|
|
53b9696f3f | ||
|
|
7e4fe4662b | ||
|
|
18fd413f37 | ||
|
|
80ed5f84de | ||
|
|
b48111df7c | ||
|
|
73e3edd70d | ||
|
|
d4cfbdf2c0 | ||
|
|
294f03a812 | ||
|
|
272f9f3d27 | ||
|
|
927a28ba3b | ||
|
|
a938c4284e | ||
|
|
7a44a0cee7 | ||
|
|
82430309ac | ||
|
|
c2079de880 | ||
|
|
967ead7269 | ||
|
|
c9255df519 | ||
|
|
27c824a1c9 | ||
|
|
5b96d1ccf9 | ||
|
|
29c0866b38 | ||
|
|
0214ea0dfe | ||
|
|
80355002a1 | ||
|
|
0e36825228 | ||
|
|
95a8f1469f | ||
|
|
afdbadc704 | ||
|
|
004cc26abf | ||
|
|
35a924c576 | ||
|
|
99279ac97a | ||
|
|
87605ca1e2 | ||
|
|
7cc586f117 | ||
|
|
c263a6092c | ||
|
|
f92fd85400 | ||
|
|
e71520ddd6 | ||
|
|
275f34b5d2 | ||
|
|
50fbb6ed36 | ||
|
|
34fdacbd35 | ||
|
|
77f2d20dbc | ||
|
|
0dbfbf26cb | ||
|
|
2863a6878f | ||
|
|
ae46e91e4d | ||
|
|
865a90eb4f | ||
|
|
0269c4507c | ||
|
|
a5d3574984 | ||
|
|
1040deb0c5 | ||
|
|
05ea800faf | ||
|
|
341f87862c | ||
|
|
f805d30769 | ||
|
|
4fb9472cc2 | ||
|
|
a8098740c6 | ||
|
|
e3af0d041e | ||
|
|
28cfda9f30 | ||
|
|
a313e23fff | ||
|
|
4d2a292e8a | ||
|
|
5a84b7fc2d | ||
|
|
d8e660a6dc | ||
|
|
761f3b403b | ||
|
|
4570d29404 | ||
|
|
14346b3456 | ||
|
|
769f58aaaa | ||
|
|
a166e96d16 | ||
|
|
8dd8ce1dc3 | ||
|
|
4c5979a107 | ||
|
|
649ab2dcfa | ||
|
|
71fc9b37ae | ||
|
|
283aedf498 | ||
|
|
1a56614af2 | ||
|
|
693c33e407 | ||
|
|
d9a9aa027d | ||
|
|
b22250bb67 | ||
|
|
d446120527 | ||
|
|
bb9d68489c | ||
|
|
affaea59fe | ||
|
|
81fc4c93ef | ||
|
|
8957121c14 | ||
|
|
50241bc84e | ||
|
|
e7f077f1ba | ||
|
|
c3b82c7610 | ||
|
|
2c12e7f6f5 | ||
|
|
8db10d9ac4 | ||
|
|
c3cc4662af | ||
|
|
22892f9803 | ||
|
|
27eb115fb6 | ||
|
|
51a596ef4f | ||
|
|
97de8bd1e0 | ||
|
|
1cb7e5be5b | ||
|
|
84dd04e761 | ||
|
|
2ac061e487 | ||
|
|
7cdb81582c | ||
|
|
8f33b40302 | ||
|
|
e600614ef5 | ||
|
|
02581dea1f | ||
|
|
40ad08bcc2 | ||
|
|
9c4456a13f | ||
|
|
f4d0392faa | ||
|
|
45ba6cfe03 | ||
|
|
4f23a0c797 | ||
|
|
f6c32bbf2b | ||
|
|
d040c951f0 | ||
|
|
69abfb0e33 | ||
|
|
9a1daf8482 | ||
|
|
9de6dc3af3 | ||
|
|
248834dcaa | ||
|
|
11a7da7c9f | ||
|
|
9fea0b9937 | ||
|
|
6fd3f3260d | ||
|
|
d9e262443c | ||
|
|
51c3bb3b98 | ||
|
|
7d608f9e32 | ||
|
|
295de18c8a | ||
|
|
3370b694b9 | ||
|
|
3380c52f15 | ||
|
|
1364e6f1ac | ||
|
|
c5ac2aa62c | ||
|
|
392a0345de | ||
|
|
5c2fc73e7b | ||
|
|
402b951804 | ||
|
|
5848d13fed | ||
|
|
5dd24ead57 | ||
|
|
d2cb94952a | ||
|
|
0615396d2d | ||
|
|
82877ea449 | ||
|
|
81fae49db9 | ||
|
|
74ff8dc975 | ||
|
|
ac319217d0 | ||
|
|
cdb13ae8d0 | ||
|
|
ab700807d9 | ||
|
|
744b91bb9f | ||
|
|
d69f85bf15 | ||
|
|
52ee969e29 | ||
|
|
55f0501201 | ||
|
|
b2710ee19a | ||
|
|
bbfcc4724d | ||
|
|
c31cc72d79 | ||
|
|
d1049ad93e | ||
|
|
5f4cc234fb | ||
|
|
d31a13953c | ||
|
|
28f5873179 | ||
|
|
8f813338f1 | ||
|
|
6555dfa486 | ||
|
|
5eee0253e5 | ||
|
|
594c723f98 | ||
|
|
f418265865 | ||
|
|
53707e2eec | ||
|
|
fde794e898 | ||
|
|
082f19b42d | ||
|
|
e31c620686 | ||
|
|
570253315f | ||
|
|
5dcdac6e4e | ||
|
|
eea3fce854 | ||
|
|
215c49d032 | ||
|
|
923df53e25 | ||
|
|
1a684d0020 | ||
|
|
dc3b721fa0 | ||
|
|
4479ce9c1c | ||
|
|
4a0d3530e0 | ||
|
|
9907d2992d | ||
|
|
9d9224f184 | ||
|
|
78d4d87e39 | ||
|
|
6211633273 | ||
|
|
3a4cf918bf | ||
|
|
e25eb309ec | ||
|
|
ffa2b2aa7d | ||
|
|
a77a95584d | ||
|
|
68bb98159f | ||
|
|
8e6905d238 | ||
|
|
1a8521ff24 | ||
|
|
9d5460d72d | ||
|
|
35e59297fc | ||
|
|
9b945233b1 | ||
|
|
b065dc2eee | ||
|
|
66c4bb1a70 | ||
|
|
36abe6fe61 | ||
|
|
3c786aa6c8 | ||
|
|
e5cce6d356 | ||
|
|
723b7d81e4 | ||
|
|
a3ddd7358b | ||
|
|
45c027f31f | ||
|
|
3b62e9eb0d | ||
|
|
34a8c7ec87 | ||
|
|
d4a6240005 | ||
|
|
5c6f76da0a | ||
|
|
4636341b05 | ||
|
|
be3b770d8f | ||
|
|
af32387b3f | ||
|
|
115fc340cb | ||
|
|
900f7a8776 | ||
|
|
4877e30504 | ||
|
|
4656ec3852 | ||
|
|
e336441197 | ||
|
|
20d6182f33 | ||
|
|
aa145866f9 | ||
|
|
fdff41e166 | ||
|
|
07b4bc3979 | ||
|
|
0c66d3ae37 | ||
|
|
bd869183d5 | ||
|
|
7e2bf83100 | ||
|
|
25e52a78fb | ||
|
|
47c4bb2ddf | ||
|
|
951dfbb13a | ||
|
|
81780a3b62 | ||
|
|
c574d0cdf2 | ||
|
|
c987c3f999 | ||
|
|
1a5e414863 | ||
|
|
ec3639385e | ||
|
|
f01cfca6a4 | ||
|
|
7d5af5e0fa | ||
|
|
8fdb296cbd | ||
|
|
879b30aaa3 | ||
|
|
40ddcb717a | ||
|
|
da1841a075 | ||
|
|
0a0a10d127 | ||
|
|
df20b6e79b | ||
|
|
f4f1dc39e0 | ||
|
|
340b4dd7df | ||
|
|
4b9dcd821f | ||
|
|
669c5c9380 | ||
|
|
7f9aa6c59b | ||
|
|
d9c06b56ca | ||
|
|
d045e1d77e | ||
|
|
6d14cc7ec1 | ||
|
|
eb499b2854 | ||
|
|
65a82ef6d7 | ||
|
|
616f581650 | ||
|
|
57e802656f | ||
|
|
5d7f15daf8 | ||
|
|
ec67e3b7e4 | ||
|
|
0d3ff3c073 | ||
|
|
325e48867c | ||
|
|
8de95bc05b | ||
|
|
5e3003bb52 | ||
|
|
e6e3f38bfa | ||
|
|
aa17ab7e57 | ||
|
|
35908bd040 | ||
|
|
4a9cfd763e | ||
|
|
0e73294e26 | ||
|
|
b610f46bae | ||
|
|
1921a1adb2 | ||
|
|
6d2cd23f40 | ||
|
|
14fb67f28a | ||
|
|
c552680473 | ||
|
|
edbf9f878d | ||
|
|
2745ddfc33 | ||
|
|
808606034a | ||
|
|
e18eef3d7a | ||
|
|
e78fc11a95 | ||
|
|
83231cb376 | ||
|
|
986ad56124 | ||
|
|
b723a7b11b | ||
|
|
1b6b67b17e | ||
|
|
1ee3236f72 | ||
|
|
b03a4917be | ||
|
|
84971b39f5 | ||
|
|
5ab3e743f3 | ||
|
|
1c5dc844e7 | ||
|
|
f871949efd | ||
|
|
eb2ec6bee9 | ||
|
|
df22f59f6e | ||
|
|
db0edc3273 | ||
|
|
6300c14248 | ||
|
|
d4426e79a7 | ||
|
|
b095418d20 | ||
|
|
d6fd880481 | ||
|
|
cbb0b734c7 | ||
|
|
f4bcd70f27 | ||
|
|
6e16b45d9d | ||
|
|
e09e7ab362 | ||
|
|
d5cc2f19cd | ||
|
|
b7a80146f4 | ||
|
|
5586a71a6e | ||
|
|
81418b7c77 | ||
|
|
8bd0c77ae3 | ||
|
|
e2217e7ed5 | ||
|
|
51b75ea7ef | ||
|
|
41d4d6721c | ||
|
|
9d01d50459 | ||
|
|
e27c67c5c5 | ||
|
|
e7decd5f4d | ||
|
|
38a3178185 | ||
|
|
58828ae573 | ||
|
|
6b5f5e3508 | ||
|
|
f0ec771933 | ||
|
|
22d1087e16 | ||
|
|
9f85fcefdc | ||
|
|
269d2575cd | ||
|
|
0b8ed5de2d | ||
|
|
c22684eac9 | ||
|
|
c42cd4b831 | ||
|
|
4d018f7067 | ||
|
|
46eaf3b0cc | ||
|
|
9df2a00b94 | ||
|
|
fbcf4bc1f2 | ||
|
|
ca08c064bb | ||
|
|
02df47d349 | ||
|
|
41c39e3366 | ||
|
|
45803988ce | ||
|
|
28251e7ff9 | ||
|
|
217382d584 | ||
|
|
82a2cb6f51 | ||
|
|
611ed5f312 | ||
|
|
27fbb5dbf4 | ||
|
|
db8d9b7cf1 | ||
|
|
60ec950517 | ||
|
|
2cd4ebc01f | ||
|
|
5f4dcaf781 | ||
|
|
c55d882fab | ||
|
|
8dc7450068 | ||
|
|
2e885232c2 | ||
|
|
970d9b3795 | ||
|
|
2f58af0d85 | ||
|
|
0ae50f19da | ||
|
|
c4ac37361e | ||
|
|
3152861e81 | ||
|
|
a14afd0804 | ||
|
|
25d5d1a60d | ||
|
|
6ff58b9240 | ||
|
|
99237262d4 | ||
|
|
29982dfd15 | ||
|
|
6c4da94687 | ||
|
|
6986d0e6eb | ||
|
|
bc9320452c | ||
|
|
23d43aae27 | ||
|
|
de71735e7c | ||
|
|
05decf3638 | ||
|
|
95bffa1a1f | ||
|
|
974d52fdb8 | ||
|
|
7614f0e55e | ||
|
|
0632284f79 | ||
|
|
ad4a89f070 | ||
|
|
6104c49f31 | ||
|
|
07fc760999 | ||
|
|
cf6bc84148 | ||
|
|
36d51bea93 | ||
|
|
fc12885b1b | ||
|
|
ec7033745e | ||
|
|
9e31e63147 | ||
|
|
feef17fd88 | ||
|
|
817f011191 | ||
|
|
98c045cf3a | ||
|
|
8860f3a82a | ||
|
|
43e9f4ca2f | ||
|
|
586f843c76 | ||
|
|
7cfc9e6d8c | ||
|
|
4952ed0fa4 | ||
|
|
a084185d76 | ||
|
|
914b80d276 | ||
|
|
282557da52 | ||
|
|
5f649d583c | ||
|
|
b98225ebf5 | ||
|
|
abb0c2bba4 | ||
|
|
b3bdb474a9 | ||
|
|
d796e6acb7 | ||
|
|
d3afc92bc9 | ||
|
|
35a97b4b7b | ||
|
|
f59463aad3 | ||
|
|
ed656499c4 | ||
|
|
63533e9a22 | ||
|
|
20f7053254 | ||
|
|
8b8ef74d39 | ||
|
|
3bfe024d8d | ||
|
|
063333e03d | ||
|
|
0a0918ff38 | ||
|
|
802c014656 | ||
|
|
860841794d | ||
|
|
2a87c31237 | ||
|
|
da5f7fdcee | ||
|
|
d8b408b1de | ||
|
|
64932f9e4a | ||
|
|
5a20efcf17 | ||
|
|
2a2857bbc8 | ||
|
|
1bef284ab1 | ||
|
|
d8d0b6434f | ||
|
|
416b6fd115 | ||
|
|
f685cf920b | ||
|
|
54f51116b2 | ||
|
|
b0d90958fc | ||
|
|
049ced2c2f | ||
|
|
844b0e603b | ||
|
|
75ef751e23 | ||
|
|
c4f6e56fca | ||
|
|
ff86d3d894 | ||
|
|
85b4c03e33 | ||
|
|
efaf159af6 | ||
|
|
daa657fb78 | ||
|
|
4685663d73 | ||
|
|
ed1f716022 | ||
|
|
d3205a4898 | ||
|
|
86731ce2c6 | ||
|
|
1399309624 | ||
|
|
cb59297438 | ||
|
|
5824f6bc06 | ||
|
|
5ce7090d54 | ||
|
|
7306ab29bc | ||
|
|
3a8b42f291 | ||
|
|
e4c25383f2 | ||
|
|
e734dcc2c7 | ||
|
|
0fce007b8e | ||
|
|
5a053a3a07 | ||
|
|
3b2ba5f7fb | ||
|
|
7f622f6c04 | ||
|
|
801136bcc2 | ||
|
|
3c0e39c539 | ||
|
|
19fddebf0e | ||
|
|
9eaf7e14c7 | ||
|
|
0e441bc103 | ||
|
|
cd9911fdf8 | ||
|
|
6086422193 | ||
|
|
9ddb11f11c | ||
|
|
7a20cabd03 | ||
|
|
9dc4ca4507 | ||
|
|
62fea98b4f | ||
|
|
7ae4eac5b6 | ||
|
|
fcf8ae5e2b | ||
|
|
55b9a7938b | ||
|
|
cf1546a60e | ||
|
|
e7eec05af0 | ||
|
|
98e986141b | ||
|
|
d7e35e0371 | ||
|
|
222f224664 | ||
|
|
62b6cd007f | ||
|
|
1682e8fb12 | ||
|
|
984aefe0e8 | ||
|
|
2d54cc69c9 | ||
|
|
2dd8278de8 | ||
|
|
e0d8ac972e | ||
|
|
ec03812fb0 | ||
|
|
93cf2b17bf | ||
|
|
77ef1a989d | ||
|
|
423c7ac6c6 | ||
|
|
2c368ef148 | ||
|
|
b3c7162fd0 | ||
|
|
67865069eb | ||
|
|
1896a9be60 | ||
|
|
b5b2c037c1 | ||
|
|
1957924d51 | ||
|
|
104a66f256 | ||
|
|
3de6d65ea3 | ||
|
|
fdb0a6e004 | ||
|
|
87b857b6bf | ||
|
|
b18165301d | ||
|
|
097e65944a | ||
|
|
0cdd29ea78 | ||
|
|
7dec24688f | ||
|
|
e62fa54811 | ||
|
|
1614174e79 | ||
|
|
f95d097359 | ||
|
|
3c6ab9aad9 | ||
|
|
4913b88f70 | ||
|
|
273157153c | ||
|
|
fb5156ff38 | ||
|
|
2a824402f3 | ||
|
|
86a249fe4f | ||
|
|
6cae8221c9 | ||
|
|
750cb3d248 | ||
|
|
f254b540b8 | ||
|
|
11024f252e | ||
|
|
9d5cba17ba | ||
|
|
1d01c9d43d | ||
|
|
e32ea81876 | ||
|
|
ef8a18f49b | ||
|
|
b914049c53 | ||
|
|
dabaea8048 | ||
|
|
09c1a425a9 | ||
|
|
8c6fed007f | ||
|
|
2e39604021 | ||
|
|
fbfb947b21 | ||
|
|
8b963f4ba4 | ||
|
|
9152f07eaf | ||
|
|
35f70c09f5 | ||
|
|
cc4cba7b5d | ||
|
|
6b695fefd0 | ||
|
|
910d193029 | ||
|
|
f18dd687c8 | ||
|
|
50d5376698 | ||
|
|
5b9b62a7db | ||
|
|
c0e29e5b01 | ||
|
|
2f03129d46 | ||
|
|
b44e2d3416 | ||
|
|
564915681c | ||
|
|
a24b7eeb87 | ||
|
|
0215c01861 | ||
|
|
beae6324e5 | ||
|
|
71a61c573e | ||
|
|
6b3b632767 | ||
|
|
2a2fa04b7b | ||
|
|
79b81d194b | ||
|
|
ef04c9aff8 | ||
|
|
7f85197c10 | ||
|
|
ff0bfe64af | ||
|
|
44b3a3a5e6 | ||
|
|
7e3033aa93 | ||
|
|
8bdbf50772 | ||
|
|
ec33a76641 | ||
|
|
00ce9376c7 | ||
|
|
46e7a9797e | ||
|
|
7006c4ac88 | ||
|
|
a50a2126cf | ||
|
|
07f7b4b470 | ||
|
|
7e726e42f4 | ||
|
|
40ba0257de | ||
|
|
3fbd5f9fea | ||
|
|
57b2246d35 | ||
|
|
2a5b22d6f9 | ||
|
|
f247dc7522 | ||
|
|
e6531253e2 | ||
|
|
c938babf00 | ||
|
|
bf3900020f | ||
|
|
586df3bb7f | ||
|
|
c4b13b0268 | ||
|
|
daef72316f | ||
|
|
1f93c96e63 | ||
|
|
8aa9c79276 | ||
|
|
09a7f2e734 | ||
|
|
b2d27e376d | ||
|
|
644c4af11e | ||
|
|
ca3dc3a0a0 | ||
|
|
2b975dfd5b | ||
|
|
0932892278 | ||
|
|
fe0b3d98c2 | ||
|
|
8d56c8b51c | ||
|
|
d8e6409336 | ||
|
|
a4ae746656 | ||
|
|
331a0a7b9b | ||
|
|
c630a3e8d6 | ||
|
|
7435d89edf | ||
|
|
14557c8be4 | ||
|
|
98b4995bad | ||
|
|
3000bdcc3a | ||
|
|
cbe77a6753 | ||
|
|
c58a1f76f8 | ||
|
|
ecf2875ebf | ||
|
|
ce2c19e357 | ||
|
|
1b1081a3ed | ||
|
|
37b200389a | ||
|
|
6b5a8f3a22 | ||
|
|
0b18d8b0c7 | ||
|
|
3d187ede47 | ||
|
|
f3b9c34515 | ||
|
|
c923394924 | ||
|
|
d9dbd24db5 | ||
|
|
b135819d71 | ||
|
|
cbcbd07da2 | ||
|
|
24f6ab73a7 | ||
|
|
5e88347e1b | ||
|
|
cac0d4ee6f | ||
|
|
428759b3d4 | ||
|
|
898d3ecce0 | ||
|
|
004f16f6c4 | ||
|
|
4e2a0e58f2 | ||
|
|
39d29195a7 | ||
|
|
727c9b8027 | ||
|
|
bd4e9b0512 | ||
|
|
7844ff735f | ||
|
|
49e96badcf | ||
|
|
eb6a81bacc | ||
|
|
6687f12988 | ||
|
|
fcd12fc0f1 | ||
|
|
0fb4d54068 | ||
|
|
830a468a23 | ||
|
|
af3ca7b4a9 | ||
|
|
7a6bb17255 | ||
|
|
bc6d459a6e | ||
|
|
ff7f34e353 | ||
|
|
2e3d79aaec | ||
|
|
8a41bcc934 | ||
|
|
e2414b41ad | ||
|
|
266958bce7 | ||
|
|
bc5354cbf0 | ||
|
|
cc4997843e | ||
|
|
ab95eac286 | ||
|
|
1cd76233d1 | ||
|
|
3d5afc8b83 | ||
|
|
d28b7799dd | ||
|
|
b0fb889c29 | ||
|
|
460e80bd1d | ||
|
|
bc1e96e942 | ||
|
|
7ea61df414 | ||
|
|
431712293d | ||
|
|
335ed97263 | ||
|
|
e00b165e9b | ||
|
|
5467ddf0e1 | ||
|
|
7a37dd92ed | ||
|
|
d0c11e9d72 | ||
|
|
5ec52fee2c | ||
|
|
5026bc13bb | ||
|
|
c7d27e5247 | ||
|
|
b7d7af7ea9 | ||
|
|
39663d2c40 | ||
|
|
000299a0e6 | ||
|
|
0a47d82b9b | ||
|
|
198bcece58 | ||
|
|
053677d124 | ||
|
|
804072f014 | ||
|
|
e9429b43ce | ||
|
|
3d37d5e24a | ||
|
|
2728a1b4f3 | ||
|
|
adb040d4cb | ||
|
|
479d7934c0 | ||
|
|
22d1acd5ac | ||
|
|
b257c152c6 | ||
|
|
77b97ee0d7 | ||
|
|
e2ac4732cd | ||
|
|
e8f665b495 | ||
|
|
55f3ef29ea | ||
|
|
c2d78c9623 | ||
|
|
a4578a5413 | ||
|
|
e884fcf785 | ||
|
|
e96025755d | ||
|
|
c9028b0ab5 | ||
|
|
b4d2858f95 | ||
|
|
dea446d995 | ||
|
|
5cd94f9e9d | ||
|
|
cad811fc41 | ||
|
|
69f6a9f007 | ||
|
|
4eeee0c59f | ||
|
|
a5afa6c95f | ||
|
|
625dacb93d | ||
|
|
62e9c2e091 | ||
|
|
e4106a4e24 | ||
|
|
a506b8c7dd | ||
|
|
e5cd536894 | ||
|
|
629ea39a88 | ||
|
|
7d9e1321c7 | ||
|
|
83af7422a0 | ||
|
|
ce8945f35c | ||
|
|
dd890f0776 | ||
|
|
af4ac437ab | ||
|
|
607585fdaf | ||
|
|
2f596aeef5 | ||
|
|
69762c75fa | ||
|
|
36b29660ce | ||
|
|
4976983f30 | ||
|
|
31e4ad25ba | ||
|
|
225f4daf15 | ||
|
|
b9927cfa2d | ||
|
|
af6cafc603 | ||
|
|
15da07d436 | ||
|
|
886ed3544b | ||
|
|
aff2922f9a | ||
|
|
f32e0035a3 | ||
|
|
7b1e7706d8 | ||
|
|
cd74dda72a | ||
|
|
032bb2a2c5 | ||
|
|
fa96ed06d2 | ||
|
|
43133041c9 | ||
|
|
e0ee5ea962 | ||
|
|
f5634286a3 | ||
|
|
97d37c1c1e | ||
|
|
739b139cb2 | ||
|
|
0bc9920ad4 | ||
|
|
3f516ce837 | ||
|
|
9f197f9da5 | ||
|
|
3dc2cc36e9 | ||
|
|
ca3e683747 | ||
|
|
38a1757168 | ||
|
|
4104a57107 | ||
|
|
b0c0f20071 | ||
|
|
7870774162 | ||
|
|
4213cdaf5d | ||
|
|
39b4c974ee | ||
|
|
508f56f17c | ||
|
|
48665b7c99 | ||
|
|
51971f7293 | ||
|
|
3d3addb252 | ||
|
|
3f8bdd1fdb | ||
|
|
6181fd949f | ||
|
|
afd61c63c2 | ||
|
|
9a2073b4cd | ||
|
|
f28468188b | ||
|
|
8871d87512 | ||
|
|
a2b81188be | ||
|
|
f91f6cd5e4 | ||
|
|
bd923a7bac | ||
|
|
373c88faef | ||
|
|
14813d8123 | ||
|
|
92f2437f48 | ||
|
|
da959761ff | ||
|
|
d8cd25aa0d | ||
|
|
d63d4f46fc | ||
|
|
52161e090d | ||
|
|
9e55e06501 | ||
|
|
0b6df67fb1 | ||
|
|
bf087e1ea1 | ||
|
|
885818fb7c | ||
|
|
2f370048cb | ||
|
|
28dc02a9d8 | ||
|
|
54ebaca535 | ||
|
|
4fedc91a4a | ||
|
|
f734aaa413 | ||
|
|
a575d4b9ee | ||
|
|
77a87ded3a | ||
|
|
b958d2c298 | ||
|
|
dc72a195c2 | ||
|
|
e2812ff61f | ||
|
|
8c2e34e27f | ||
|
|
31f3950fbf | ||
|
|
75b3654d18 | ||
|
|
418f9ac5e3 | ||
|
|
ad4afe4edf | ||
|
|
c844b971cb | ||
|
|
ca9b1c47af | ||
|
|
86039d2751 | ||
|
|
420a692f04 | ||
|
|
1d2a464fe0 | ||
|
|
7735dd0750 | ||
|
|
bf7b075f0c |
@@ -1,8 +1,8 @@
|
|||||||
openssl.pc
|
openssl.pc
|
||||||
libcrypto.pc
|
|
||||||
libssl.pc
|
|
||||||
MINFO
|
MINFO
|
||||||
makefile.one
|
makefile.one
|
||||||
|
tmp
|
||||||
|
out
|
||||||
outinc
|
outinc
|
||||||
rehash.time
|
rehash.time
|
||||||
testlog
|
testlog
|
||||||
@@ -14,7 +14,7 @@ cctest.a
|
|||||||
*.flc
|
*.flc
|
||||||
semantic.cache
|
semantic.cache
|
||||||
Makefile
|
Makefile
|
||||||
*.dll*
|
|
||||||
*.so*
|
*.so*
|
||||||
|
*.dll*
|
||||||
*.sl*
|
*.sl*
|
||||||
*.dylib*
|
*.dylib*
|
||||||
|
|||||||
107
.gitignore
vendored
Normal file
107
.gitignore
vendored
Normal file
@@ -0,0 +1,107 @@
|
|||||||
|
# Object files
|
||||||
|
*.o
|
||||||
|
*.obj
|
||||||
|
|
||||||
|
# editor artefacts
|
||||||
|
*.swp
|
||||||
|
.#*
|
||||||
|
#*#
|
||||||
|
*~
|
||||||
|
|
||||||
|
# Top level excludes
|
||||||
|
/Makefile.bak
|
||||||
|
/Makefile
|
||||||
|
/*.a
|
||||||
|
/include
|
||||||
|
/*.pc
|
||||||
|
/rehash.time
|
||||||
|
|
||||||
|
# Most *.c files under test/ are symlinks
|
||||||
|
/test/*.c
|
||||||
|
# Apart from these
|
||||||
|
!/test/asn1test.c
|
||||||
|
!/test/methtest.c
|
||||||
|
!/test/dummytest.c
|
||||||
|
!/test/igetest.c
|
||||||
|
!/test/r160test.c
|
||||||
|
!/test/fips_algvs.c
|
||||||
|
|
||||||
|
/test/*.ss
|
||||||
|
/test/*.srl
|
||||||
|
/test/.rnd
|
||||||
|
/test/test*.pem
|
||||||
|
/test/newkey.pem
|
||||||
|
|
||||||
|
# Certificate symbolic links
|
||||||
|
*.0
|
||||||
|
|
||||||
|
# Links under apps
|
||||||
|
/apps/CA.pl
|
||||||
|
/apps/md4.c
|
||||||
|
|
||||||
|
|
||||||
|
# Auto generated headers
|
||||||
|
/crypto/buildinf.h
|
||||||
|
/crypto/opensslconf.h
|
||||||
|
|
||||||
|
# Auto generated assembly language source files
|
||||||
|
*.s
|
||||||
|
!/crypto/bn/asm/pa-risc2.s
|
||||||
|
!/crypto/bn/asm/pa-risc2W.s
|
||||||
|
crypto/aes/asm/a_win32.asm
|
||||||
|
crypto/bf/asm/b_win32.asm
|
||||||
|
crypto/bn/asm/bn_win32.asm
|
||||||
|
crypto/bn/asm/co_win32.asm
|
||||||
|
crypto/bn/asm/mt_win32.asm
|
||||||
|
crypto/cast/asm/c_win32.asm
|
||||||
|
crypto/cpu_win32.asm
|
||||||
|
crypto/des/asm/d_win32.asm
|
||||||
|
crypto/des/asm/y_win32.asm
|
||||||
|
crypto/md5/asm/m5_win32.asm
|
||||||
|
crypto/rc4/asm/r4_win32.asm
|
||||||
|
crypto/rc5/asm/r5_win32.asm
|
||||||
|
crypto/ripemd/asm/rm_win32.asm
|
||||||
|
crypto/sha/asm/s1_win32.asm
|
||||||
|
crypto/sha/asm/sha512-sse2.asm
|
||||||
|
|
||||||
|
# Executables
|
||||||
|
/apps/openssl
|
||||||
|
/test/sha256t
|
||||||
|
/test/sha512t
|
||||||
|
/test/*test
|
||||||
|
/test/fips_aesavs
|
||||||
|
/test/fips_desmovs
|
||||||
|
/test/fips_dhvs
|
||||||
|
/test/fips_drbgvs
|
||||||
|
/test/fips_dssvs
|
||||||
|
/test/fips_ecdhvs
|
||||||
|
/test/fips_ecdsavs
|
||||||
|
/test/fips_rngvs
|
||||||
|
/test/fips_test_suite
|
||||||
|
*.so*
|
||||||
|
*.dylib*
|
||||||
|
*.dll*
|
||||||
|
# Exceptions
|
||||||
|
!/test/bctest
|
||||||
|
!/crypto/des/times/486-50.sol
|
||||||
|
|
||||||
|
# Misc auto generated files
|
||||||
|
/tools/c_rehash
|
||||||
|
/test/evptests.txt
|
||||||
|
lib
|
||||||
|
Makefile.save
|
||||||
|
*.bak
|
||||||
|
|
||||||
|
# Windows
|
||||||
|
/tmp32dll
|
||||||
|
/tmp32dll.dbg
|
||||||
|
/out32dll
|
||||||
|
/out32dll.dbg
|
||||||
|
/inc32
|
||||||
|
/MINFO
|
||||||
|
ms/bcb.mak
|
||||||
|
ms/libeay32.def
|
||||||
|
ms/nt.mak
|
||||||
|
ms/ntdll.mak
|
||||||
|
ms/ssleay32.def
|
||||||
|
ms/version32.rc
|
||||||
@@ -10,13 +10,18 @@ OpenSSL project.
|
|||||||
We would like to identify and thank the following such sponsors for their past
|
We would like to identify and thank the following such sponsors for their past
|
||||||
or current significant support of the OpenSSL project:
|
or current significant support of the OpenSSL project:
|
||||||
|
|
||||||
|
Major support:
|
||||||
|
|
||||||
|
Qualys http://www.qualys.com/
|
||||||
|
|
||||||
Very significant support:
|
Very significant support:
|
||||||
|
|
||||||
OpenGear: www.opengear.com
|
OpenGear: http://www.opengear.com/
|
||||||
|
|
||||||
Significant support:
|
Significant support:
|
||||||
|
|
||||||
PSW Group: www.psw.net
|
PSW Group: http://www.psw.net/
|
||||||
|
Acano Ltd. http://acano.com/
|
||||||
|
|
||||||
Please note that we ask permission to identify sponsors and that some sponsors
|
Please note that we ask permission to identify sponsors and that some sponsors
|
||||||
we consider eligible for inclusion here have requested to remain anonymous.
|
we consider eligible for inclusion here have requested to remain anonymous.
|
||||||
|
|||||||
@@ -148,7 +148,7 @@ eric (about to go bushwalking for the 4 day easter break :-)
|
|||||||
This would tend to cause memory overwrites since SSLv3 has
|
This would tend to cause memory overwrites since SSLv3 has
|
||||||
a maximum packet size of 16k. If your program uses
|
a maximum packet size of 16k. If your program uses
|
||||||
buffers <= 16k, you would probably never see this problem.
|
buffers <= 16k, you would probably never see this problem.
|
||||||
- Fixed a few errors that were cause by malloc() not returning
|
- Fixed a new errors that were cause by malloc() not returning
|
||||||
0 initialised memory..
|
0 initialised memory..
|
||||||
- SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using
|
- SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using
|
||||||
SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing
|
SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing
|
||||||
|
|||||||
32
FAQ
32
FAQ
@@ -10,6 +10,7 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Why aren't tools like 'autoconf' and 'libtool' used?
|
* Why aren't tools like 'autoconf' and 'libtool' used?
|
||||||
* What is an 'engine' version?
|
* What is an 'engine' version?
|
||||||
* How do I check the authenticity of the OpenSSL distribution?
|
* How do I check the authenticity of the OpenSSL distribution?
|
||||||
|
* How does the versioning scheme work?
|
||||||
|
|
||||||
[LEGAL] Legal questions
|
[LEGAL] Legal questions
|
||||||
|
|
||||||
@@ -82,11 +83,11 @@ OpenSSL - Frequently Asked Questions
|
|||||||
* Which is the current version of OpenSSL?
|
* Which is the current version of OpenSSL?
|
||||||
|
|
||||||
The current version is available from <URL: http://www.openssl.org>.
|
The current version is available from <URL: http://www.openssl.org>.
|
||||||
OpenSSL 1.0.0e was released on Sep 6th, 2011.
|
OpenSSL 1.0.1d was released on Feb 5th, 2013.
|
||||||
|
|
||||||
In addition to the current stable release, you can also access daily
|
In addition to the current stable release, you can also access daily
|
||||||
snapshots of the OpenSSL development version at <URL:
|
snapshots of the OpenSSL development version at <URL:
|
||||||
ftp://ftp.openssl.org/snapshot/>, or get it by anonymous CVS access.
|
ftp://ftp.openssl.org/snapshot/>, or get it by anonymous Git access.
|
||||||
|
|
||||||
|
|
||||||
* Where is the documentation?
|
* Where is the documentation?
|
||||||
@@ -108,12 +109,9 @@ In addition, you can read the most current versions at
|
|||||||
<URL: http://www.openssl.org/docs/>. Note that the online documents refer
|
<URL: http://www.openssl.org/docs/>. Note that the online documents refer
|
||||||
to the very latest development versions of OpenSSL and may include features
|
to the very latest development versions of OpenSSL and may include features
|
||||||
not present in released versions. If in doubt refer to the documentation
|
not present in released versions. If in doubt refer to the documentation
|
||||||
that came with the version of OpenSSL you are using.
|
that came with the version of OpenSSL you are using. The pod format
|
||||||
|
documentation is included in each OpenSSL distribution under the docs
|
||||||
For information on parts of libcrypto that are not yet documented, you
|
directory.
|
||||||
might want to read Ariel Glenn's documentation on SSLeay 0.9, OpenSSL's
|
|
||||||
predecessor, at <URL: http://www.columbia.edu/~ariel/ssleay/>. Much
|
|
||||||
of this still applies to OpenSSL.
|
|
||||||
|
|
||||||
There is some documentation about certificate extensions and PKCS#12
|
There is some documentation about certificate extensions and PKCS#12
|
||||||
in doc/openssl.txt
|
in doc/openssl.txt
|
||||||
@@ -173,6 +171,19 @@ just do:
|
|||||||
|
|
||||||
pgp TARBALL.asc
|
pgp TARBALL.asc
|
||||||
|
|
||||||
|
* How does the versioning scheme work?
|
||||||
|
|
||||||
|
After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter
|
||||||
|
releases (e.g. 1.0.1a) can only contain bug and security fixes and no
|
||||||
|
new features. Minor releases change the last number (e.g. 1.0.2) and
|
||||||
|
can contain new features that retain binary compatibility. Changes to
|
||||||
|
the middle number are considered major releases and neither source nor
|
||||||
|
binary compatibility is guaranteed.
|
||||||
|
|
||||||
|
Therefore the answer to the common question "when will feature X be
|
||||||
|
backported to OpenSSL 1.0.0/0.9.8?" is "never" but it could appear
|
||||||
|
in the next minor release.
|
||||||
|
|
||||||
[LEGAL] =======================================================================
|
[LEGAL] =======================================================================
|
||||||
|
|
||||||
* Do I need patent licenses to use OpenSSL?
|
* Do I need patent licenses to use OpenSSL?
|
||||||
@@ -284,7 +295,7 @@ current directory in this case, but this has changed with 0.9.6a.)
|
|||||||
Check out the CA.pl(1) manual page. This provides a simple wrapper round
|
Check out the CA.pl(1) manual page. This provides a simple wrapper round
|
||||||
the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
|
the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
|
||||||
out the manual pages for the individual utilities and the certificate
|
out the manual pages for the individual utilities and the certificate
|
||||||
extensions documentation (currently in doc/openssl.txt).
|
extensions documentation (in ca(1), req(1), x509v3_config(5) )
|
||||||
|
|
||||||
|
|
||||||
* Why can't I create certificate requests?
|
* Why can't I create certificate requests?
|
||||||
@@ -752,6 +763,9 @@ openssl-security@openssl.org if you don't get a prompt reply at least
|
|||||||
acknowledging receipt then resend or mail it directly to one of the
|
acknowledging receipt then resend or mail it directly to one of the
|
||||||
more active team members (e.g. Steve).
|
more active team members (e.g. Steve).
|
||||||
|
|
||||||
|
Note that bugs only present in the openssl utility are not in general
|
||||||
|
considered to be security issues.
|
||||||
|
|
||||||
[PROG] ========================================================================
|
[PROG] ========================================================================
|
||||||
|
|
||||||
* Is OpenSSL thread-safe?
|
* Is OpenSSL thread-safe?
|
||||||
|
|||||||
6
INSTALL
6
INSTALL
@@ -98,7 +98,7 @@
|
|||||||
The crypto/<cipher> directory can be removed after running
|
The crypto/<cipher> directory can be removed after running
|
||||||
"make depend".
|
"make depend".
|
||||||
|
|
||||||
-Dxxx, -lxxx, -Lxxx, -fxxx, -mXXX, -Kxxx These system specific options will
|
-Dxxx, -lxxx, -Lxxx, -fxxx, -mxxx, -Kxxx These system specific options will
|
||||||
be passed through to the compiler to allow you to
|
be passed through to the compiler to allow you to
|
||||||
define preprocessor symbols, specify additional libraries,
|
define preprocessor symbols, specify additional libraries,
|
||||||
library directories or other compiler options.
|
library directories or other compiler options.
|
||||||
@@ -206,10 +206,6 @@
|
|||||||
compile programs with libcrypto or libssl.
|
compile programs with libcrypto or libssl.
|
||||||
lib Contains the OpenSSL library files themselves.
|
lib Contains the OpenSSL library files themselves.
|
||||||
|
|
||||||
Use "make install_sw" to install the software without documentation,
|
|
||||||
and "install_docs_html" to install HTML renditions of the manual
|
|
||||||
pages.
|
|
||||||
|
|
||||||
Package builders who want to configure the library for standard
|
Package builders who want to configure the library for standard
|
||||||
locations, but have the package installed somewhere else so that
|
locations, but have the package installed somewhere else so that
|
||||||
it can easily be packaged, can use
|
it can easily be packaged, can use
|
||||||
|
|||||||
52
INSTALL.VMS
52
INSTALL.VMS
@@ -71,7 +71,7 @@ the top to understand how to use them. However, if you want to
|
|||||||
compile all you can get, the simplest is to use MAKEVMS.COM in the top
|
compile all you can get, the simplest is to use MAKEVMS.COM in the top
|
||||||
directory. The syntax is the following:
|
directory. The syntax is the following:
|
||||||
|
|
||||||
@MAKEVMS <option> <bits> <debug-p> [<compiler>]
|
@MAKEVMS <option> <rsaref-p> <debug-p> [<compiler>]
|
||||||
|
|
||||||
<option> must be one of the following:
|
<option> must be one of the following:
|
||||||
|
|
||||||
@@ -87,11 +87,24 @@ directory. The syntax is the following:
|
|||||||
TEST Just build the "[.xxx.EXE.TEST]" test programs for OpenSSL.
|
TEST Just build the "[.xxx.EXE.TEST]" test programs for OpenSSL.
|
||||||
APPS Just build the "[.xxx.EXE.APPS]" application programs for OpenSSL.
|
APPS Just build the "[.xxx.EXE.APPS]" application programs for OpenSSL.
|
||||||
|
|
||||||
<bits> must be one of the following:
|
<rsaref-p> must be one of the following:
|
||||||
|
|
||||||
"" compile using default pointer size
|
RSAREF compile using the RSAREF Library
|
||||||
32 compile using 32 bit pointer size
|
NORSAREF compile without using RSAREF
|
||||||
64 compile using 64 bit pointer size
|
|
||||||
|
Note 0: The RSAREF library IS NO LONGER NEEDED. The RSA patent
|
||||||
|
expires September 20, 2000, and RSA Security chose to make
|
||||||
|
the algorithm public domain two weeks before that.
|
||||||
|
|
||||||
|
Note 1: If you still want to use RSAREF, the library is NOT INCLUDED
|
||||||
|
and you have to download it. RSA Security doesn't carry it
|
||||||
|
any more, but there are a number of places where you can find
|
||||||
|
it. You have to get the ".tar-Z" file as the ".zip" file
|
||||||
|
doesn't have the directory structure stored. You have to
|
||||||
|
extract the file into the [.RSAREF] directory as that is where
|
||||||
|
the scripts will look for the files.
|
||||||
|
|
||||||
|
Note 2: I have never done this, so I've no idea if it works or not.
|
||||||
|
|
||||||
<debug-p> must be one of the following:
|
<debug-p> must be one of the following:
|
||||||
|
|
||||||
@@ -104,13 +117,12 @@ directory. The syntax is the following:
|
|||||||
GNUC For GNU C.
|
GNUC For GNU C.
|
||||||
|
|
||||||
|
|
||||||
You will find the crypto library in [.xxx.EXE.CRYPTO] (where xxx is VAX,
|
You will find the crypto library in [.xxx.EXE.CRYPTO], called LIBCRYPTO.OLB,
|
||||||
ALPHA or IA64), called SSL_LIBCRYPTO32.OLB or SSL_LIBCRYPTO.OLB depending
|
where xxx is VAX or AXP. You will find the SSL library in [.xxx.EXE.SSL],
|
||||||
on how it was built. You will find the SSL library in [.xxx.EXE.SSL],
|
named LIBSSL.OLB, and you will find a bunch of useful programs in
|
||||||
named SSL_LIBSSL32.OLB or SSL_LIBSSL.OLB, and you will find a bunch of
|
[.xxx.EXE.APPS]. However, these shouldn't be used right off unless it's
|
||||||
useful programs in [.xxx.EXE.APPS]. However, these shouldn't be used
|
just to test them. For production use, make sure you install first, see
|
||||||
right off unless it's just to test them. For production use, make sure
|
Installation below.
|
||||||
you install first, see Installation below.
|
|
||||||
|
|
||||||
Note 1: Some programs in this package require a TCP/IP library.
|
Note 1: Some programs in this package require a TCP/IP library.
|
||||||
|
|
||||||
@@ -158,14 +170,12 @@ Installation:
|
|||||||
|
|
||||||
Installation is easy, just do the following:
|
Installation is easy, just do the following:
|
||||||
|
|
||||||
@INSTALL <root> <bits>
|
@INSTALL <root>
|
||||||
|
|
||||||
<root> is the directory in which everything will be installed,
|
<root> is the directory in which everything will be installed,
|
||||||
subdirectories, libraries, header files, programs and startup command
|
subdirectories, libraries, header files, programs and startup command
|
||||||
procedures.
|
procedures.
|
||||||
|
|
||||||
<bits> works the same way as for MAKEVMS.COM
|
|
||||||
|
|
||||||
N.B.: INSTALL.COM builds a new directory structure, different from
|
N.B.: INSTALL.COM builds a new directory structure, different from
|
||||||
the directory tree where you have now build OpenSSL.
|
the directory tree where you have now build OpenSSL.
|
||||||
|
|
||||||
@@ -186,10 +196,6 @@ following command procedures:
|
|||||||
sets up the symbols to the applications. Should be called
|
sets up the symbols to the applications. Should be called
|
||||||
from for example SYS$MANAGER:SYLOGIN.COM
|
from for example SYS$MANAGER:SYLOGIN.COM
|
||||||
|
|
||||||
OPENSSL_UNDO.COM
|
|
||||||
|
|
||||||
deassigns the logical names created with OPENSSL_STARTUP.COM.
|
|
||||||
|
|
||||||
The logical names that are set up are the following:
|
The logical names that are set up are the following:
|
||||||
|
|
||||||
SSLROOT a dotted concealed logical name pointing at the
|
SSLROOT a dotted concealed logical name pointing at the
|
||||||
@@ -197,6 +203,7 @@ The logical names that are set up are the following:
|
|||||||
|
|
||||||
SSLCERTS Initially an empty directory, this is the default
|
SSLCERTS Initially an empty directory, this is the default
|
||||||
location for certificate files.
|
location for certificate files.
|
||||||
|
SSLMISC Various scripts.
|
||||||
SSLPRIVATE Initially an empty directory, this is the default
|
SSLPRIVATE Initially an empty directory, this is the default
|
||||||
location for private key files.
|
location for private key files.
|
||||||
|
|
||||||
@@ -204,9 +211,8 @@ The logical names that are set up are the following:
|
|||||||
programs.
|
programs.
|
||||||
SSLINCLUDE Contains the header files needed if you want to
|
SSLINCLUDE Contains the header files needed if you want to
|
||||||
compile programs with libcrypto or libssl.
|
compile programs with libcrypto or libssl.
|
||||||
SSLLIB Contains the OpenSSL library files themselves:
|
SSLLIB Contains the OpenSSL library files (LIBCRYPTO.OLB
|
||||||
- SSL_LIBCRYPTO32.OLB and SSL_LIBSSL32.OLB or
|
and LIBSSL.OLB) themselves.
|
||||||
- SSL_LIBCRYPTO.OLB and SSL_LIBSSL.OLB
|
|
||||||
|
|
||||||
OPENSSL Same as SSLINCLUDE. This is because the standard
|
OPENSSL Same as SSLINCLUDE. This is because the standard
|
||||||
way to include OpenSSL header files from version
|
way to include OpenSSL header files from version
|
||||||
@@ -290,4 +296,4 @@ have any ideas.
|
|||||||
|
|
||||||
--
|
--
|
||||||
Richard Levitte <richard@levitte.org>
|
Richard Levitte <richard@levitte.org>
|
||||||
2000-02-27, 2011-03-18
|
2000-02-27
|
||||||
|
|||||||
184
INSTALL.W32
184
INSTALL.W32
@@ -5,31 +5,20 @@
|
|||||||
[Instructions for building for Windows CE can be found in INSTALL.WCE]
|
[Instructions for building for Windows CE can be found in INSTALL.WCE]
|
||||||
[Instructions for building for Win64 can be found in INSTALL.W64]
|
[Instructions for building for Win64 can be found in INSTALL.W64]
|
||||||
|
|
||||||
Here are a few comments about building OpenSSL for Win32 environments,
|
Heres a few comments about building OpenSSL in Windows environments. Most
|
||||||
such as Windows NT and Windows 9x. It should be noted though that
|
of this is tested on Win32 but it may also work in Win 3.1 with some
|
||||||
Windows 9x are not ordinarily tested. Its mention merely means that we
|
modification.
|
||||||
attempt to maintain certain programming discipline and pay attention
|
|
||||||
to backward compatibility issues, in other words it's kind of expected
|
|
||||||
to work on Windows 9x, but no regression tests are actually performed.
|
|
||||||
|
|
||||||
On additional note newer OpenSSL versions are compiled and linked with
|
You need Perl for Win32. Unless you will build on Cygwin, you will need
|
||||||
Winsock 2. This means that minimum OS requirement was elevated to NT 4
|
ActiveState Perl, available from http://www.activestate.com/ActivePerl.
|
||||||
and Windows 98 [there is Winsock 2 update for Windows 95 though].
|
|
||||||
|
|
||||||
- you need Perl for Win32. Unless you will build on Cygwin, you will need
|
and one of the following C compilers:
|
||||||
ActiveState Perl, available from http://www.activestate.com/ActivePerl.
|
|
||||||
|
|
||||||
- one of the following C compilers:
|
|
||||||
|
|
||||||
* Visual C++
|
* Visual C++
|
||||||
* Borland C
|
* Borland C
|
||||||
* GNU C (Cygwin or MinGW)
|
* GNU C (Cygwin or MinGW)
|
||||||
|
|
||||||
- Netwide Assembler, a.k.a. NASM, available from http://nasm.sourceforge.net/
|
If you are compiling from a tarball or a Git snapshot then the Win32 files
|
||||||
is required if you intend to utilize assembler modules. Note that NASM
|
|
||||||
is now the only supported assembler.
|
|
||||||
|
|
||||||
If you are compiling from a tarball or a CVS snapshot then the Win32 files
|
|
||||||
may well be not up to date. This may mean that some "tweaking" is required to
|
may well be not up to date. This may mean that some "tweaking" is required to
|
||||||
get it all to work. See the trouble shooting section later on for if (when?)
|
get it all to work. See the trouble shooting section later on for if (when?)
|
||||||
it goes wrong.
|
it goes wrong.
|
||||||
@@ -37,18 +26,39 @@
|
|||||||
Visual C++
|
Visual C++
|
||||||
----------
|
----------
|
||||||
|
|
||||||
If you want to compile in the assembly language routines with Visual
|
If you want to compile in the assembly language routines with Visual C++ then
|
||||||
C++, then you will need already mentioned Netwide Assembler binary,
|
you will need an assembler. This is worth doing because it will result in
|
||||||
nasmw.exe or nasm.exe, to be available on your %PATH%.
|
faster code: for example it will typically result in a 2 times speedup in the
|
||||||
|
RSA routines. Currently the following assemblers are supported:
|
||||||
|
|
||||||
Firstly you should run Configure with platform VC-WIN32:
|
* Microsoft MASM (aka "ml")
|
||||||
|
* Free Netwide Assembler NASM.
|
||||||
|
|
||||||
> perl Configure VC-WIN32 --prefix=c:\some\openssl\dir
|
MASM is distributed with most versions of VC++. For the versions where it is
|
||||||
|
not included in VC++, it is also distributed with some Microsoft DDKs, for
|
||||||
|
example the Windows NT 4.0 DDK and the Windows 98 DDK. If you do not have
|
||||||
|
either of these DDKs then you can just download the binaries for the Windows
|
||||||
|
98 DDK and extract and rename the two files XXXXXml.exe and XXXXXml.err, to
|
||||||
|
ml.exe and ml.err and install somewhere on your PATH. Both DDKs can be
|
||||||
|
downloaded from the Microsoft developers site www.msdn.com.
|
||||||
|
|
||||||
Where the prefix argument specifies where OpenSSL will be installed to.
|
NASM is freely available. Version 0.98 was used during testing: other versions
|
||||||
|
may also work. It is available from many places, see for example:
|
||||||
|
http://www.kernel.org/pub/software/devel/nasm/binaries/win32/
|
||||||
|
The NASM binary nasmw.exe needs to be installed anywhere on your PATH.
|
||||||
|
|
||||||
Next you need to build the Makefiles and optionally the assembly
|
Firstly you should run Configure:
|
||||||
language files:
|
|
||||||
|
> perl Configure VC-WIN32 --prefix=c:/some/openssl/dir
|
||||||
|
|
||||||
|
Where the prefix argument specifies where OpenSSL will be installed to.
|
||||||
|
|
||||||
|
Next you need to build the Makefiles and optionally the assembly language
|
||||||
|
files:
|
||||||
|
|
||||||
|
- If you are using MASM then run:
|
||||||
|
|
||||||
|
> ms\do_masm
|
||||||
|
|
||||||
- If you are using NASM then run:
|
- If you are using NASM then run:
|
||||||
|
|
||||||
@@ -56,7 +66,6 @@
|
|||||||
|
|
||||||
- If you don't want to use the assembly language files at all then run:
|
- If you don't want to use the assembly language files at all then run:
|
||||||
|
|
||||||
> perl Configure VC-WIN32 no-asm --prefix=c:/some/openssl/dir
|
|
||||||
> ms\do_ms
|
> ms\do_ms
|
||||||
|
|
||||||
If you get errors about things not having numbers assigned then check the
|
If you get errors about things not having numbers assigned then check the
|
||||||
@@ -67,39 +76,42 @@
|
|||||||
|
|
||||||
> nmake -f ms\ntdll.mak
|
> nmake -f ms\ntdll.mak
|
||||||
|
|
||||||
If all is well it should compile and you will have some DLLs and
|
If all is well it should compile and you will have some DLLs and executables
|
||||||
executables in out32dll. If you want to try the tests then do:
|
in out32dll. If you want to try the tests then do:
|
||||||
|
|
||||||
> nmake -f ms\ntdll.mak test
|
> nmake -f ms\ntdll.mak test
|
||||||
|
|
||||||
|
|
||||||
To install OpenSSL to the specified location do:
|
To install OpenSSL to the specified location do:
|
||||||
|
|
||||||
> nmake -f ms\ntdll.mak install
|
> nmake -f ms\ntdll.mak install
|
||||||
|
|
||||||
Tweaks:
|
Tweaks:
|
||||||
|
|
||||||
There are various changes you can make to the Win32 compile
|
There are various changes you can make to the Win32 compile environment. By
|
||||||
environment. By default the library is not compiled with debugging
|
default the library is not compiled with debugging symbols. If you add 'debug'
|
||||||
symbols. If you use the platform debug-VC-WIN32 instead of VC-WIN32
|
to the mk1mf.pl lines in the do_* batch file then debugging symbols will be
|
||||||
then debugging symbols will be compiled in.
|
compiled in. Note that mk1mf.pl expects the platform to be the last argument
|
||||||
|
on the command line, so 'debug' must appear before that, as all other options.
|
||||||
|
|
||||||
By default in 1.0.0 OpenSSL will compile builtin ENGINES into the
|
|
||||||
separate shared librariesy. If you specify the "enable-static-engine"
|
By default in 0.9.8 OpenSSL will compile builtin ENGINES into the libeay32.dll
|
||||||
option on the command line to Configure the shared library build
|
shared library. If you specify the "no-static-engine" option on the command
|
||||||
(ms\ntdll.mak) will compile the engines into libeay32.dll instead.
|
line to Configure the shared library build (ms\ntdll.mak) will compile the
|
||||||
|
engines as separate DLLs.
|
||||||
|
|
||||||
The default Win32 environment is to leave out any Windows NT specific
|
The default Win32 environment is to leave out any Windows NT specific
|
||||||
features.
|
features.
|
||||||
|
|
||||||
If you want to enable the NT specific features of OpenSSL (currently
|
If you want to enable the NT specific features of OpenSSL (currently only the
|
||||||
only the logging BIO) follow the instructions above but call the batch
|
logging BIO) follow the instructions above but call the batch file do_nt.bat
|
||||||
file do_nt.bat instead of do_ms.bat.
|
instead of do_ms.bat.
|
||||||
|
|
||||||
You can also build a static version of the library using the Makefile
|
You can also build a static version of the library using the Makefile
|
||||||
ms\nt.mak
|
ms\nt.mak
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Borland C++ builder 5
|
Borland C++ builder 5
|
||||||
---------------------
|
---------------------
|
||||||
|
|
||||||
@@ -125,13 +137,17 @@
|
|||||||
GNU C (Cygwin)
|
GNU C (Cygwin)
|
||||||
--------------
|
--------------
|
||||||
|
|
||||||
Cygwin implements a Posix/Unix runtime system (cygwin1.dll) on top of
|
Cygwin provides a bash shell and GNU tools environment running
|
||||||
Win32 subsystem and provides a bash shell and GNU tools environment.
|
on NT 4.0, Windows 9x, Windows ME, Windows 2000, and Windows XP.
|
||||||
Consequently, a make of OpenSSL with Cygwin is virtually identical to
|
Consequently, a make of OpenSSL with Cygwin is closer to a GNU
|
||||||
Unix procedure. It is also possible to create Win32 binaries that only
|
bash environment such as Linux than to other the other Win32
|
||||||
use the Microsoft C runtime system (msvcrt.dll or crtdll.dll) using
|
makes.
|
||||||
MinGW. MinGW can be used in the Cygwin development environment or in a
|
|
||||||
standalone setup as described in the following section.
|
Cygwin implements a Posix/Unix runtime system (cygwin1.dll).
|
||||||
|
It is also possible to create Win32 binaries that only use the
|
||||||
|
Microsoft C runtime system (msvcrt.dll or crtdll.dll) using
|
||||||
|
MinGW. MinGW can be used in the Cygwin development environment
|
||||||
|
or in a standalone setup as described in the following section.
|
||||||
|
|
||||||
To build OpenSSL using Cygwin:
|
To build OpenSSL using Cygwin:
|
||||||
|
|
||||||
@@ -176,44 +192,35 @@
|
|||||||
non-fatal error in "make test" but is otherwise harmless. If
|
non-fatal error in "make test" but is otherwise harmless. If
|
||||||
desired and needed, GNU bc can be built with Cygwin without change.
|
desired and needed, GNU bc can be built with Cygwin without change.
|
||||||
|
|
||||||
GNU C (MinGW/MSYS)
|
GNU C (MinGW)
|
||||||
-------------
|
-------------
|
||||||
|
|
||||||
* Compiler and shell environment installation:
|
* Compiler installation:
|
||||||
|
|
||||||
MinGW and MSYS are available from http://www.mingw.org/, both are
|
MinGW is available from http://www.mingw.org. Run the installer and
|
||||||
required. Run the installers and do whatever magic they say it takes
|
set the MinGW bin directory to the PATH in "System Properties" or
|
||||||
to start MSYS bash shell with GNU tools on its PATH.
|
autoexec.bat.
|
||||||
|
|
||||||
N.B. Since source tar-ball can contain symbolic links, it's essential
|
|
||||||
that you use accompanying MSYS tar to unpack the source. It will
|
|
||||||
either handle them in one way or another or fail to extract them,
|
|
||||||
which does the trick too. Latter means that you may safely ignore all
|
|
||||||
"cannot create symlink" messages, as they will be "re-created" at
|
|
||||||
configure stage by copying corresponding files. Alternative programs
|
|
||||||
were observed to create empty files instead, which results in build
|
|
||||||
failure.
|
|
||||||
|
|
||||||
* Compile OpenSSL:
|
* Compile OpenSSL:
|
||||||
|
|
||||||
$ ./config
|
> ms\mingw32
|
||||||
[...]
|
|
||||||
$ make
|
|
||||||
[...]
|
|
||||||
$ make test
|
|
||||||
|
|
||||||
This will create the library and binaries in root source directory
|
This will create the library and binaries in out. In case any problems
|
||||||
and openssl.exe application in apps directory.
|
occur, try
|
||||||
|
> ms\mingw32 no-asm
|
||||||
It is also possible to cross-compile it on Linux by configuring
|
instead.
|
||||||
with './Configure --cross-compile-prefix=i386-mingw32- mingw ...'.
|
|
||||||
'make test' is naturally not applicable then.
|
|
||||||
|
|
||||||
libcrypto.a and libssl.a are the static libraries. To use the DLLs,
|
libcrypto.a and libssl.a are the static libraries. To use the DLLs,
|
||||||
link with libeay32.a and libssl32.a instead.
|
link with libeay32.a and libssl32.a instead.
|
||||||
|
|
||||||
See troubleshooting if you get error messages about functions not
|
See troubleshooting if you get error messages about functions not having
|
||||||
having a number assigned.
|
a number assigned.
|
||||||
|
|
||||||
|
* You can now try the tests:
|
||||||
|
|
||||||
|
> cd out
|
||||||
|
> ..\ms\test
|
||||||
|
|
||||||
|
|
||||||
Installation
|
Installation
|
||||||
------------
|
------------
|
||||||
@@ -257,7 +264,7 @@
|
|||||||
|
|
||||||
then ms\do_XXX should not give a warning any more. However the numbers that
|
then ms\do_XXX should not give a warning any more. However the numbers that
|
||||||
get assigned by this technique may not match those that eventually get
|
get assigned by this technique may not match those that eventually get
|
||||||
assigned in the CVS tree: so anything linked against this version of the
|
assigned in the Git tree: so anything linked against this version of the
|
||||||
library may need to be recompiled.
|
library may need to be recompiled.
|
||||||
|
|
||||||
If you get errors about unresolved symbols there are several possible
|
If you get errors about unresolved symbols there are several possible
|
||||||
@@ -300,24 +307,13 @@
|
|||||||
|
|
||||||
If you link with static OpenSSL libraries [those built with ms/nt.mak],
|
If you link with static OpenSSL libraries [those built with ms/nt.mak],
|
||||||
then you're expected to additionally link your application with
|
then you're expected to additionally link your application with
|
||||||
WS2_32.LIB, ADVAPI32.LIB, GDI32.LIB and USER32.LIB. Those developing
|
WSOCK32.LIB, ADVAPI32.LIB, GDI32.LIB and USER32.LIB. Those developing
|
||||||
non-interactive service applications might feel concerned about linking
|
non-interactive service applications might feel concerned about linking
|
||||||
with the latter two, as they are justly associated with interactive
|
with latter two, as they are justly associated with interactive desktop,
|
||||||
desktop, which is not available to service processes. The toolkit is
|
which is not available to service processes. The toolkit is designed
|
||||||
designed to detect in which context it's currently executed, GUI,
|
to detect in which context it's currently executed, GUI, console app
|
||||||
console app or service, and act accordingly, namely whether or not to
|
or service, and act accordingly, namely whether or not to actually make
|
||||||
actually make GUI calls. Additionally those who wish to
|
GUI calls.
|
||||||
/DELAYLOAD:GDI32.DLL and /DELAYLOAD:USER32.DLL and actually keep them
|
|
||||||
off service process should consider implementing and exporting from
|
|
||||||
.exe image in question own _OPENSSL_isservice not relying on USER32.DLL.
|
|
||||||
E.g., on Windows Vista and later you could:
|
|
||||||
|
|
||||||
__declspec(dllexport) __cdecl BOOL _OPENSSL_isservice(void)
|
|
||||||
{ DWORD sess;
|
|
||||||
if (ProcessIdToSessionId(GetCurrentProcessId(),&sess))
|
|
||||||
return sess==0;
|
|
||||||
return FALSE;
|
|
||||||
}
|
|
||||||
|
|
||||||
If you link with OpenSSL .DLLs, then you're expected to include into
|
If you link with OpenSSL .DLLs, then you're expected to include into
|
||||||
your application code small "shim" snippet, which provides glue between
|
your application code small "shim" snippet, which provides glue between
|
||||||
|
|||||||
77
INSTALL.WCE
77
INSTALL.WCE
@@ -4,36 +4,27 @@
|
|||||||
|
|
||||||
Building OpenSSL for Windows CE requires the following external tools:
|
Building OpenSSL for Windows CE requires the following external tools:
|
||||||
|
|
||||||
* Microsoft eMbedded Visual C++ 3.0 or later
|
* Microsoft eMbedded Visual C++ 3.0
|
||||||
* Appropriate SDK might be required
|
* wcecompat compatibility library (www.essemer.com.au)
|
||||||
* Perl for Win32 [commonly recommended ActiveState Perl is available
|
* Optionally ceutils for running automated tests (www.essemer.com.au)
|
||||||
from http://www.activestate.com/Products/ActivePerl/]
|
|
||||||
|
|
||||||
* wcecompat compatibility library available at
|
You also need Perl for Win32. You will need ActiveState Perl, available
|
||||||
http://www.essemer.com.au/windowsce/
|
from http://www.activestate.com/ActivePerl.
|
||||||
* Optionally ceutils for running automated tests (same location)
|
|
||||||
|
|
||||||
_or_
|
Windows CE support in OpenSSL relies on wcecompat and therefore it's
|
||||||
|
appropriate to check http://www.essemer.com.au/windowsce/ for updates in
|
||||||
|
case of compilation problems. As for the moment of this writing version
|
||||||
|
1.1 is available and actually required for WCE 4.2 and newer platforms.
|
||||||
|
All Windows CE specific issues should be directed to www.essemer.com.au.
|
||||||
|
|
||||||
* PocketConsole driver and PortSDK available at
|
The C Runtime Library implementation for Windows CE that is included with
|
||||||
http://www.symbolictools.de/public/pocketconsole/
|
Microsoft eMbedded Visual C++ 3.0 is incomplete and in some places
|
||||||
* CMD command interpreter (same location)
|
incorrect. wcecompat plugs the holes and tries to bring the Windows CE
|
||||||
|
CRT to a level that is more compatible with ANSI C. wcecompat goes further
|
||||||
As Windows CE support in OpenSSL relies on 3rd party compatibility
|
and provides low-level IO and stream IO support for stdin/stdout/stderr
|
||||||
library, it's appropriate to check corresponding URL for updates. For
|
(which Windows CE does not provide). This IO functionality is not needed
|
||||||
example if you choose wcecompat, note that as for the moment of this
|
by the OpenSSL library itself but is used for the tests and openssl.exe.
|
||||||
writing version 1.2 is available and actually required for WCE 4.2
|
More information is available at www.essemer.com.au.
|
||||||
and newer platforms. All wcecompat issues should be directed to
|
|
||||||
www.essemer.com.au.
|
|
||||||
|
|
||||||
Why compatibility library at all? The C Runtime Library implementation
|
|
||||||
for Windows CE that is included with Microsoft eMbedded Visual C++ is
|
|
||||||
incomplete and in some places incorrect. Compatibility library plugs
|
|
||||||
the holes and tries to bring the Windows CE CRT to [more] usable level.
|
|
||||||
Most gaping hole in CRT is support for stdin/stdout/stderr IO, which
|
|
||||||
proposed compatibility libraries solve in two different ways: wcecompat
|
|
||||||
redirects IO to active sync link, while PortSDK - to NT-like console
|
|
||||||
driver on the handheld itself.
|
|
||||||
|
|
||||||
Building
|
Building
|
||||||
--------
|
--------
|
||||||
@@ -43,21 +34,9 @@
|
|||||||
|
|
||||||
> "C:\Program Files\Microsoft eMbedded Tools\EVC\WCE300\BIN\WCEARM.BAT"
|
> "C:\Program Files\Microsoft eMbedded Tools\EVC\WCE300\BIN\WCEARM.BAT"
|
||||||
|
|
||||||
Next pick compatibility library according to your preferences.
|
Next indicate where wcecompat is located:
|
||||||
|
|
||||||
1. To choose wcecompat set up WCECOMPAT environment variable pointing
|
> set WCECOMPAT=C:\wcecompat
|
||||||
at the location of wcecompat tree "root":
|
|
||||||
|
|
||||||
> set WCECOMPAT=C:\wcecompat
|
|
||||||
> set PORTSDK_LIBPATH=
|
|
||||||
|
|
||||||
2. To choose PortSDK set up PORTSDK_LIBPATH to point at hardware-
|
|
||||||
specific location where your portlib.lib is installed:
|
|
||||||
|
|
||||||
> set PORTSDK_LIBPATH=C:\PortSDK\lib\ARM
|
|
||||||
> set WCECOMPAT=
|
|
||||||
|
|
||||||
Note that you may not set both variables.
|
|
||||||
|
|
||||||
Next you should run Configure:
|
Next you should run Configure:
|
||||||
|
|
||||||
@@ -73,16 +52,16 @@
|
|||||||
|
|
||||||
Then from the VC++ environment at a prompt do:
|
Then from the VC++ environment at a prompt do:
|
||||||
|
|
||||||
|
- to build static libraries:
|
||||||
|
|
||||||
|
> nmake -f ms\ce.mak
|
||||||
|
|
||||||
|
- or to build DLLs:
|
||||||
|
|
||||||
> nmake -f ms\cedll.mak
|
> nmake -f ms\cedll.mak
|
||||||
|
|
||||||
[note that static builds are not supported under CE]
|
If all is well it should compile and you will have some static libraries and
|
||||||
|
executables in out32, or some DLLs and executables in out32dll. If you want
|
||||||
If all is well it should compile and you will have some DLLs and executables
|
|
||||||
in out32dll*.
|
|
||||||
|
|
||||||
<<< everyting below needs revision in respect to wcecompat vs. PortSDK >>>
|
|
||||||
|
|
||||||
If you want
|
|
||||||
to try the tests then make sure the ceutils are in the path and do:
|
to try the tests then make sure the ceutils are in the path and do:
|
||||||
|
|
||||||
> cd out32
|
> cd out32
|
||||||
|
|||||||
62
MacOS/GUSI_Init.cpp
Normal file
62
MacOS/GUSI_Init.cpp
Normal file
@@ -0,0 +1,62 @@
|
|||||||
|
/**************** BEGIN GUSI CONFIGURATION ****************************
|
||||||
|
*
|
||||||
|
* GUSI Configuration section generated by GUSI Configurator
|
||||||
|
* last modified: Wed Jan 5 20:33:51 2000
|
||||||
|
*
|
||||||
|
* This section will be overwritten by the next run of Configurator.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#define GUSI_SOURCE
|
||||||
|
#include <GUSIConfig.h>
|
||||||
|
#include <sys/cdefs.h>
|
||||||
|
|
||||||
|
/* Declarations of Socket Factories */
|
||||||
|
|
||||||
|
__BEGIN_DECLS
|
||||||
|
void GUSIwithInetSockets();
|
||||||
|
void GUSIwithLocalSockets();
|
||||||
|
void GUSIwithMTInetSockets();
|
||||||
|
void GUSIwithMTTcpSockets();
|
||||||
|
void GUSIwithMTUdpSockets();
|
||||||
|
void GUSIwithOTInetSockets();
|
||||||
|
void GUSIwithOTTcpSockets();
|
||||||
|
void GUSIwithOTUdpSockets();
|
||||||
|
void GUSIwithPPCSockets();
|
||||||
|
void GUSISetupFactories();
|
||||||
|
__END_DECLS
|
||||||
|
|
||||||
|
/* Configure Socket Factories */
|
||||||
|
|
||||||
|
void GUSISetupFactories()
|
||||||
|
{
|
||||||
|
#ifdef GUSISetupFactories_BeginHook
|
||||||
|
GUSISetupFactories_BeginHook
|
||||||
|
#endif
|
||||||
|
GUSIwithInetSockets();
|
||||||
|
#ifdef GUSISetupFactories_EndHook
|
||||||
|
GUSISetupFactories_EndHook
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Declarations of File Devices */
|
||||||
|
|
||||||
|
__BEGIN_DECLS
|
||||||
|
void GUSIwithDConSockets();
|
||||||
|
void GUSIwithNullSockets();
|
||||||
|
void GUSISetupDevices();
|
||||||
|
__END_DECLS
|
||||||
|
|
||||||
|
/* Configure File Devices */
|
||||||
|
|
||||||
|
void GUSISetupDevices()
|
||||||
|
{
|
||||||
|
#ifdef GUSISetupDevices_BeginHook
|
||||||
|
GUSISetupDevices_BeginHook
|
||||||
|
#endif
|
||||||
|
GUSIwithNullSockets();
|
||||||
|
#ifdef GUSISetupDevices_EndHook
|
||||||
|
GUSISetupDevices_EndHook
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
/**************** END GUSI CONFIGURATION *************************/
|
||||||
2753
MacOS/GetHTTPS.src/CPStringUtils.cpp
Normal file
2753
MacOS/GetHTTPS.src/CPStringUtils.cpp
Normal file
File diff suppressed because it is too large
Load Diff
104
MacOS/GetHTTPS.src/CPStringUtils.hpp
Normal file
104
MacOS/GetHTTPS.src/CPStringUtils.hpp
Normal file
@@ -0,0 +1,104 @@
|
|||||||
|
#pragma once
|
||||||
|
|
||||||
|
#ifdef __cplusplus
|
||||||
|
extern "C" {
|
||||||
|
#endif
|
||||||
|
|
||||||
|
void CopyPStrToCStr(const unsigned char *thePStr,char *theCStr,const int maxCStrLength);
|
||||||
|
void CopyPStrToPStr(const unsigned char *theSrcPStr,unsigned char *theDstPStr,const int maxDstStrLength);
|
||||||
|
void CopyCStrToCStr(const char *theSrcCStr,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
void CopyCStrToPStr(const char *theSrcCStr,unsigned char *theDstPStr,const int maxDstStrLength);
|
||||||
|
void ConcatPStrToCStr(const unsigned char *thePStr,char *theCStr,const int maxCStrLength);
|
||||||
|
void ConcatPStrToPStr(const unsigned char *theSrcPStr,unsigned char *theDstPStr,const int maxDstStrLength);
|
||||||
|
void ConcatCStrToPStr(const char *theSrcCStr,unsigned char *theDstPStr,const int maxDstStrLength);
|
||||||
|
void ConcatCStrToCStr(const char *theSrcCStr,char *theDstCStr,const int maxCStrLength);
|
||||||
|
|
||||||
|
void ConcatCharToCStr(const char theChar,char *theDstCStr,const int maxCStrLength);
|
||||||
|
void ConcatCharToPStr(const char theChar,unsigned char *theDstPStr,const int maxPStrLength);
|
||||||
|
|
||||||
|
int ComparePStrs(const unsigned char *theFirstPStr,const unsigned char *theSecondPStr,const Boolean ignoreCase = true);
|
||||||
|
int CompareCStrs(const char *theFirstCStr,const char *theSecondCStr,const Boolean ignoreCase = true);
|
||||||
|
int CompareCStrToPStr(const char *theCStr,const unsigned char *thePStr,const Boolean ignoreCase = true);
|
||||||
|
|
||||||
|
Boolean CStrsAreEqual(const char *theFirstCStr,const char *theSecondCStr,const Boolean ignoreCase = true);
|
||||||
|
Boolean PStrsAreEqual(const unsigned char *theFirstCStr,const unsigned char *theSecondCStr,const Boolean ignoreCase = true);
|
||||||
|
|
||||||
|
void CopyLongIntToCStr(const long theNum,char *theCStr,const int maxCStrLength,const int numDigits = -1);
|
||||||
|
void CopyUnsignedLongIntToCStr(const unsigned long theNum,char *theCStr,const int maxCStrLength);
|
||||||
|
void ConcatLongIntToCStr(const long theNum,char *theCStr,const int maxCStrLength,const int numDigits = -1);
|
||||||
|
void CopyCStrAndConcatLongIntToCStr(const char *theSrcCStr,const long theNum,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
|
||||||
|
void CopyLongIntToPStr(const long theNum,unsigned char *thePStr,const int maxPStrLength,const int numDigits = -1);
|
||||||
|
void ConcatLongIntToPStr(const long theNum,unsigned char *thePStr,const int maxPStrLength,const int numDigits = -1);
|
||||||
|
|
||||||
|
long CStrLength(const char *theCString);
|
||||||
|
long PStrLength(const unsigned char *thePString);
|
||||||
|
|
||||||
|
OSErr CopyCStrToExistingHandle(const char *theCString,Handle theHandle);
|
||||||
|
OSErr CopyLongIntToExistingHandle(const long inTheLongInt,Handle theHandle);
|
||||||
|
|
||||||
|
OSErr CopyCStrToNewHandle(const char *theCString,Handle *theHandle);
|
||||||
|
OSErr CopyPStrToNewHandle(const unsigned char *thePString,Handle *theHandle);
|
||||||
|
OSErr CopyLongIntToNewHandle(const long inTheLongInt,Handle *theHandle);
|
||||||
|
|
||||||
|
OSErr AppendCStrToHandle(const char *theCString,Handle theHandle,long *currentLength = nil,long *maxLength = nil);
|
||||||
|
OSErr AppendCharsToHandle(const char *theChars,const int numChars,Handle theHandle,long *currentLength = nil,long *maxLength = nil);
|
||||||
|
OSErr AppendPStrToHandle(const unsigned char *thePString,Handle theHandle,long *currentLength = nil);
|
||||||
|
OSErr AppendLongIntToHandle(const long inTheLongInt,Handle theHandle,long *currentLength = nil);
|
||||||
|
|
||||||
|
void ZeroMem(void *theMemPtr,const unsigned long numBytes);
|
||||||
|
|
||||||
|
char *FindCharInCStr(const char theChar,const char *theCString);
|
||||||
|
long FindCharOffsetInCStr(const char theChar,const char *theCString,const Boolean inIgnoreCase = false);
|
||||||
|
long FindCStrOffsetInCStr(const char *theCSubstring,const char *theCString,const Boolean inIgnoreCase = false);
|
||||||
|
|
||||||
|
void CopyCSubstrToCStr(const char *theSrcCStr,const int maxCharsToCopy,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
void CopyCSubstrToPStr(const char *theSrcCStr,const int maxCharsToCopy,unsigned char *theDstPStr,const int maxDstStrLength);
|
||||||
|
|
||||||
|
void InsertCStrIntoCStr(const char *theSrcCStr,const int theInsertionOffset,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
void InsertPStrIntoCStr(const unsigned char *theSrcPStr,const int theInsertionOffset,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
OSErr InsertCStrIntoHandle(const char *theCString,Handle theHandle,const long inInsertOffset);
|
||||||
|
|
||||||
|
void CopyCStrAndInsertCStrIntoCStr(const char *theSrcCStr,const char *theInsertCStr,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
|
||||||
|
void CopyCStrAndInsertCStrsLongIntsIntoCStr(const char *theSrcCStr,const char **theInsertCStrs,const long *theLongInts,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
|
||||||
|
void CopyCStrAndInsert1LongIntIntoCStr(const char *theSrcCStr,const long theNum,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
void CopyCStrAndInsert2LongIntsIntoCStr(const char *theSrcCStr,const long long1,const long long2,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
void CopyCStrAndInsert3LongIntsIntoCStr(const char *theSrcCStr,const long long1,const long long2,const long long3,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
|
||||||
|
void CopyCStrAndInsertCStrLongIntIntoCStr(const char *theSrcCStr,const char *theInsertCStr,const long theNum,char *theDstCStr,const int maxDstStrLength);
|
||||||
|
OSErr CopyCStrAndInsertCStrLongIntIntoHandle(const char *theSrcCStr,const char *theInsertCStr,const long theNum,Handle *theHandle);
|
||||||
|
|
||||||
|
|
||||||
|
OSErr CopyIndexedWordToCStr(char *theSrcCStr,int whichWord,char *theDstCStr,int maxDstCStrLength);
|
||||||
|
OSErr CopyIndexedWordToNewHandle(char *theSrcCStr,int whichWord,Handle *outTheHandle);
|
||||||
|
|
||||||
|
OSErr CopyIndexedLineToCStr(const char *theSrcCStr,int inWhichLine,int *lineEndIndex,Boolean *gotLastLine,char *theDstCStr,const int maxDstCStrLength);
|
||||||
|
OSErr CopyIndexedLineToNewHandle(const char *theSrcCStr,int inWhichLine,Handle *outNewHandle);
|
||||||
|
|
||||||
|
OSErr ExtractIntFromCStr(const char *theSrcCStr,int *outInt,Boolean skipLeadingSpaces = true);
|
||||||
|
OSErr ExtractIntFromPStr(const unsigned char *theSrcPStr,int *outInt,Boolean skipLeadingSpaces = true);
|
||||||
|
|
||||||
|
|
||||||
|
void ConvertCStrToUpperCase(char *theSrcCStr);
|
||||||
|
|
||||||
|
|
||||||
|
int CountOccurencesOfCharInCStr(const char inChar,const char *inSrcCStr);
|
||||||
|
int CountWordsInCStr(const char *inSrcCStr);
|
||||||
|
|
||||||
|
OSErr CountDigits(const char *inCStr,int *outNumIntegerDigits,int *outNumFractDigits);
|
||||||
|
|
||||||
|
void ExtractCStrItemFromCStr(const char *inSrcCStr,const char inItemDelimiter,const int inItemNumber,Boolean *foundItem,char *outDstCharPtr,const int inDstCharPtrMaxLength,const Boolean inTreatMultipleDelimsAsSingleDelim = false);
|
||||||
|
OSErr ExtractCStrItemFromCStrIntoNewHandle(const char *inSrcCStr,const char inItemDelimiter,const int inItemNumber,Boolean *foundItem,Handle *outNewHandle,const Boolean inTreatMultipleDelimsAsSingleDelim = false);
|
||||||
|
|
||||||
|
|
||||||
|
OSErr ExtractFloatFromCStr(const char *inCString,extended80 *outFloat);
|
||||||
|
OSErr CopyFloatToCStr(const extended80 *theFloat,char *theCStr,const int maxCStrLength,const int inMaxNumIntDigits = -1,const int inMaxNumFractDigits = -1);
|
||||||
|
|
||||||
|
void SkipWhiteSpace(char **ioSrcCharPtr,const Boolean inStopAtEOL = false);
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef __cplusplus
|
||||||
|
}
|
||||||
|
#endif
|
||||||
@@ -1,5 +1,5 @@
|
|||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1998-1999 The OpenSSL Project. All rights reserved.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
@@ -51,7 +51,120 @@
|
|||||||
* Hudson (tjh@cryptsoft.com).
|
* Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
#include "ErrorHandling.hpp"
|
||||||
|
#include "CPStringUtils.hpp"
|
||||||
|
|
||||||
int add_signed_time(PKCS7_SIGNER_INFO *si);
|
#ifdef __EXCEPTIONS_ENABLED__
|
||||||
ASN1_UTCTIME *get_signed_time(PKCS7_SIGNER_INFO *si);
|
#include "CMyException.hpp"
|
||||||
int get_signed_seq2string(PKCS7_SIGNER_INFO *si, char **str1, char **str2);
|
#endif
|
||||||
|
|
||||||
|
|
||||||
|
static char gErrorMessageBuffer[512];
|
||||||
|
|
||||||
|
char *gErrorMessage = gErrorMessageBuffer;
|
||||||
|
int gErrorMessageMaxLength = sizeof(gErrorMessageBuffer);
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
void SetErrorMessage(const char *theErrorMessage)
|
||||||
|
{
|
||||||
|
if (theErrorMessage != nil)
|
||||||
|
{
|
||||||
|
CopyCStrToCStr(theErrorMessage,gErrorMessage,gErrorMessageMaxLength);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void SetErrorMessageAndAppendLongInt(const char *theErrorMessage,const long theLongInt)
|
||||||
|
{
|
||||||
|
if (theErrorMessage != nil)
|
||||||
|
{
|
||||||
|
CopyCStrAndConcatLongIntToCStr(theErrorMessage,theLongInt,gErrorMessage,gErrorMessageMaxLength);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
void SetErrorMessageAndCStrAndLongInt(const char *theErrorMessage,const char * theCStr,const long theLongInt)
|
||||||
|
{
|
||||||
|
if (theErrorMessage != nil)
|
||||||
|
{
|
||||||
|
CopyCStrAndInsertCStrLongIntIntoCStr(theErrorMessage,theCStr,theLongInt,gErrorMessage,gErrorMessageMaxLength);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
void SetErrorMessageAndCStr(const char *theErrorMessage,const char * theCStr)
|
||||||
|
{
|
||||||
|
if (theErrorMessage != nil)
|
||||||
|
{
|
||||||
|
CopyCStrAndInsertCStrLongIntIntoCStr(theErrorMessage,theCStr,-1,gErrorMessage,gErrorMessageMaxLength);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void AppendCStrToErrorMessage(const char *theErrorMessage)
|
||||||
|
{
|
||||||
|
if (theErrorMessage != nil)
|
||||||
|
{
|
||||||
|
ConcatCStrToCStr(theErrorMessage,gErrorMessage,gErrorMessageMaxLength);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void AppendLongIntToErrorMessage(const long theLongInt)
|
||||||
|
{
|
||||||
|
ConcatLongIntToCStr(theLongInt,gErrorMessage,gErrorMessageMaxLength);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
char *GetErrorMessage(void)
|
||||||
|
{
|
||||||
|
return gErrorMessage;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
OSErr GetErrorMessageInNewHandle(Handle *inoutHandle)
|
||||||
|
{
|
||||||
|
OSErr errCode;
|
||||||
|
|
||||||
|
|
||||||
|
errCode = CopyCStrToNewHandle(gErrorMessage,inoutHandle);
|
||||||
|
|
||||||
|
return(errCode);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
OSErr GetErrorMessageInExistingHandle(Handle inoutHandle)
|
||||||
|
{
|
||||||
|
OSErr errCode;
|
||||||
|
|
||||||
|
|
||||||
|
errCode = CopyCStrToExistingHandle(gErrorMessage,inoutHandle);
|
||||||
|
|
||||||
|
return(errCode);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
OSErr AppendErrorMessageToHandle(Handle inoutHandle)
|
||||||
|
{
|
||||||
|
OSErr errCode;
|
||||||
|
|
||||||
|
|
||||||
|
errCode = AppendCStrToHandle(gErrorMessage,inoutHandle,nil);
|
||||||
|
|
||||||
|
return(errCode);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef __EXCEPTIONS_ENABLED__
|
||||||
|
|
||||||
|
void ThrowErrorMessageException(void)
|
||||||
|
{
|
||||||
|
ThrowDescriptiveException(gErrorMessage);
|
||||||
|
}
|
||||||
|
|
||||||
|
#endif
|
||||||
147
MacOS/GetHTTPS.src/ErrorHandling.hpp
Normal file
147
MacOS/GetHTTPS.src/ErrorHandling.hpp
Normal file
@@ -0,0 +1,147 @@
|
|||||||
|
#ifdef __cplusplus
|
||||||
|
extern "C" {
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#ifndef kGenericError
|
||||||
|
#define kGenericError -1
|
||||||
|
#endif
|
||||||
|
|
||||||
|
extern char *gErrorMessage;
|
||||||
|
|
||||||
|
|
||||||
|
void SetErrorMessage(const char *theErrorMessage);
|
||||||
|
void SetErrorMessageAndAppendLongInt(const char *theErrorMessage,const long theLongInt);
|
||||||
|
void SetErrorMessageAndCStrAndLongInt(const char *theErrorMessage,const char * theCStr,const long theLongInt);
|
||||||
|
void SetErrorMessageAndCStr(const char *theErrorMessage,const char * theCStr);
|
||||||
|
void AppendCStrToErrorMessage(const char *theErrorMessage);
|
||||||
|
void AppendLongIntToErrorMessage(const long theLongInt);
|
||||||
|
|
||||||
|
|
||||||
|
char *GetErrorMessage(void);
|
||||||
|
OSErr GetErrorMessageInNewHandle(Handle *inoutHandle);
|
||||||
|
OSErr GetErrorMessageInExistingHandle(Handle inoutHandle);
|
||||||
|
OSErr AppendErrorMessageToHandle(Handle inoutHandle);
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef __EXCEPTIONS_ENABLED__
|
||||||
|
void ThrowErrorMessageException(void);
|
||||||
|
#endif
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
// A bunch of evil macros that would be unnecessary if I were always using C++ !
|
||||||
|
|
||||||
|
#define SetErrorMessageAndBailIfNil(theArg,theMessage) \
|
||||||
|
{ \
|
||||||
|
if (theArg == nil) \
|
||||||
|
{ \
|
||||||
|
SetErrorMessage(theMessage); \
|
||||||
|
errCode = kGenericError; \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
} \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define SetErrorMessageAndBail(theMessage) \
|
||||||
|
{ \
|
||||||
|
SetErrorMessage(theMessage); \
|
||||||
|
errCode = kGenericError; \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define SetErrorMessageAndLongIntAndBail(theMessage,theLongInt) \
|
||||||
|
{ \
|
||||||
|
SetErrorMessageAndAppendLongInt(theMessage,theLongInt); \
|
||||||
|
errCode = kGenericError; \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define SetErrorMessageAndLongIntAndBailIfError(theErrCode,theMessage,theLongInt) \
|
||||||
|
{ \
|
||||||
|
if (theErrCode != noErr) \
|
||||||
|
{ \
|
||||||
|
SetErrorMessageAndAppendLongInt(theMessage,theLongInt); \
|
||||||
|
errCode = theErrCode; \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
} \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define SetErrorMessageCStrLongIntAndBailIfError(theErrCode,theMessage,theCStr,theLongInt) \
|
||||||
|
{ \
|
||||||
|
if (theErrCode != noErr) \
|
||||||
|
{ \
|
||||||
|
SetErrorMessageAndCStrAndLongInt(theMessage,theCStr,theLongInt); \
|
||||||
|
errCode = theErrCode; \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
} \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define SetErrorMessageAndCStrAndBail(theMessage,theCStr) \
|
||||||
|
{ \
|
||||||
|
SetErrorMessageAndCStr(theMessage,theCStr); \
|
||||||
|
errCode = kGenericError; \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define SetErrorMessageAndBailIfError(theErrCode,theMessage) \
|
||||||
|
{ \
|
||||||
|
if (theErrCode != noErr) \
|
||||||
|
{ \
|
||||||
|
SetErrorMessage(theMessage); \
|
||||||
|
errCode = theErrCode; \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
} \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define SetErrorMessageAndLongIntAndBailIfNil(theArg,theMessage,theLongInt) \
|
||||||
|
{ \
|
||||||
|
if (theArg == nil) \
|
||||||
|
{ \
|
||||||
|
SetErrorMessageAndAppendLongInt(theMessage,theLongInt); \
|
||||||
|
errCode = kGenericError; \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
} \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define BailIfError(theErrCode) \
|
||||||
|
{ \
|
||||||
|
if ((theErrCode) != noErr) \
|
||||||
|
{ \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
} \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define SetErrCodeAndBail(theErrCode) \
|
||||||
|
{ \
|
||||||
|
errCode = theErrCode; \
|
||||||
|
\
|
||||||
|
goto EXITPOINT; \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define SetErrorCodeAndMessageAndBail(theErrCode,theMessage) \
|
||||||
|
{ \
|
||||||
|
SetErrorMessage(theMessage); \
|
||||||
|
errCode = theErrCode; \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#define BailNow() \
|
||||||
|
{ \
|
||||||
|
errCode = kGenericError; \
|
||||||
|
goto EXITPOINT; \
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef __cplusplus
|
||||||
|
}
|
||||||
|
#endif
|
||||||
209
MacOS/GetHTTPS.src/GetHTTPS.cpp
Normal file
209
MacOS/GetHTTPS.src/GetHTTPS.cpp
Normal file
@@ -0,0 +1,209 @@
|
|||||||
|
/*
|
||||||
|
* An demo illustrating how to retrieve a URI from a secure HTTP server.
|
||||||
|
*
|
||||||
|
* Author: Roy Wood
|
||||||
|
* Date: September 7, 1999
|
||||||
|
* Comments: This relies heavily on my MacSockets library.
|
||||||
|
* This project is also set up so that it expects the OpenSSL source folder (0.9.4 as I write this)
|
||||||
|
* to live in a folder called "OpenSSL-0.9.4" in this project's parent folder. For example:
|
||||||
|
*
|
||||||
|
* Macintosh HD:
|
||||||
|
* Development:
|
||||||
|
* OpenSSL-0.9.4:
|
||||||
|
* (OpenSSL sources here)
|
||||||
|
* OpenSSL Example:
|
||||||
|
* (OpenSSL example junk here)
|
||||||
|
*
|
||||||
|
*
|
||||||
|
* Also-- before attempting to compile this, make sure the aliases in "OpenSSL-0.9.4:include:openssl"
|
||||||
|
* are installed! Use the AppleScript applet in the "openssl-0.9.4" folder to do this!
|
||||||
|
*/
|
||||||
|
/* modified to seed the PRNG */
|
||||||
|
/* modified to use CRandomizer for seeding */
|
||||||
|
|
||||||
|
|
||||||
|
// Include some funky libs I've developed over time
|
||||||
|
|
||||||
|
#include "CPStringUtils.hpp"
|
||||||
|
#include "ErrorHandling.hpp"
|
||||||
|
#include "MacSocket.h"
|
||||||
|
#include "Randomizer.h"
|
||||||
|
|
||||||
|
// We use the OpenSSL implementation of SSL....
|
||||||
|
// This was a lot of work to finally get going, though you wouldn't know it by the results!
|
||||||
|
|
||||||
|
#include <openssl/ssl.h>
|
||||||
|
#include <openssl/err.h>
|
||||||
|
|
||||||
|
#include <timer.h>
|
||||||
|
|
||||||
|
// Let's try grabbing some data from here:
|
||||||
|
|
||||||
|
#define kHTTPS_DNS "www.apache-ssl.org"
|
||||||
|
#define kHTTPS_Port 443
|
||||||
|
#define kHTTPS_URI "/"
|
||||||
|
|
||||||
|
|
||||||
|
// Forward-declare this
|
||||||
|
|
||||||
|
OSErr MyMacSocket_IdleWaitCallback(void *inUserRefPtr);
|
||||||
|
|
||||||
|
// My idle-wait callback. Doesn't do much, does it? Silly cooperative multitasking.
|
||||||
|
|
||||||
|
OSErr MyMacSocket_IdleWaitCallback(void *inUserRefPtr)
|
||||||
|
{
|
||||||
|
#pragma unused(inUserRefPtr)
|
||||||
|
|
||||||
|
EventRecord theEvent;
|
||||||
|
::EventAvail(everyEvent,&theEvent);
|
||||||
|
|
||||||
|
CRandomizer *randomizer = (CRandomizer*)inUserRefPtr;
|
||||||
|
if (randomizer)
|
||||||
|
randomizer->PeriodicAction();
|
||||||
|
|
||||||
|
return(noErr);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
// Finally!
|
||||||
|
|
||||||
|
void main(void)
|
||||||
|
{
|
||||||
|
OSErr errCode;
|
||||||
|
int theSocket = -1;
|
||||||
|
int theTimeout = 30;
|
||||||
|
|
||||||
|
SSL_CTX *ssl_ctx = nil;
|
||||||
|
SSL *ssl = nil;
|
||||||
|
|
||||||
|
char tempString[256];
|
||||||
|
UnsignedWide microTickCount;
|
||||||
|
|
||||||
|
|
||||||
|
CRandomizer randomizer;
|
||||||
|
|
||||||
|
printf("OpenSSL Demo by Roy Wood, roy@centricsystems.ca\n\n");
|
||||||
|
|
||||||
|
BailIfError(errCode = MacSocket_Startup());
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
// Create a socket-like object
|
||||||
|
|
||||||
|
BailIfError(errCode = MacSocket_socket(&theSocket,false,theTimeout * 60,MyMacSocket_IdleWaitCallback,&randomizer));
|
||||||
|
|
||||||
|
|
||||||
|
// Set up the connect string and try to connect
|
||||||
|
|
||||||
|
CopyCStrAndInsertCStrLongIntIntoCStr("%s:%ld",kHTTPS_DNS,kHTTPS_Port,tempString,sizeof(tempString));
|
||||||
|
|
||||||
|
printf("Connecting to %s....\n",tempString);
|
||||||
|
|
||||||
|
BailIfError(errCode = MacSocket_connect(theSocket,tempString));
|
||||||
|
|
||||||
|
|
||||||
|
// Init SSL stuff
|
||||||
|
|
||||||
|
SSL_load_error_strings();
|
||||||
|
|
||||||
|
SSLeay_add_ssl_algorithms();
|
||||||
|
|
||||||
|
|
||||||
|
// Pick the SSL method
|
||||||
|
|
||||||
|
// ssl_ctx = SSL_CTX_new(SSLv2_client_method());
|
||||||
|
ssl_ctx = SSL_CTX_new(SSLv23_client_method());
|
||||||
|
// ssl_ctx = SSL_CTX_new(SSLv3_client_method());
|
||||||
|
|
||||||
|
|
||||||
|
// Create an SSL thingey and try to negotiate the connection
|
||||||
|
|
||||||
|
ssl = SSL_new(ssl_ctx);
|
||||||
|
|
||||||
|
SSL_set_fd(ssl,theSocket);
|
||||||
|
|
||||||
|
errCode = SSL_connect(ssl);
|
||||||
|
|
||||||
|
if (errCode < 0)
|
||||||
|
{
|
||||||
|
SetErrorMessageAndLongIntAndBail("OpenSSL: Can't initiate SSL connection, SSL_connect() = ",errCode);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Request the URI from the host
|
||||||
|
|
||||||
|
CopyCStrToCStr("GET ",tempString,sizeof(tempString));
|
||||||
|
ConcatCStrToCStr(kHTTPS_URI,tempString,sizeof(tempString));
|
||||||
|
ConcatCStrToCStr(" HTTP/1.0\r\n\r\n",tempString,sizeof(tempString));
|
||||||
|
|
||||||
|
|
||||||
|
errCode = SSL_write(ssl,tempString,CStrLength(tempString));
|
||||||
|
|
||||||
|
if (errCode < 0)
|
||||||
|
{
|
||||||
|
SetErrorMessageAndLongIntAndBail("OpenSSL: Error writing data via ssl, SSL_write() = ",errCode);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
for (;;)
|
||||||
|
{
|
||||||
|
char tempString[256];
|
||||||
|
int bytesRead;
|
||||||
|
|
||||||
|
|
||||||
|
// Read some bytes and dump them to the console
|
||||||
|
|
||||||
|
bytesRead = SSL_read(ssl,tempString,sizeof(tempString) - 1);
|
||||||
|
|
||||||
|
if (bytesRead == 0 && MacSocket_RemoteEndIsClosing(theSocket))
|
||||||
|
{
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
else if (bytesRead < 0)
|
||||||
|
{
|
||||||
|
SetErrorMessageAndLongIntAndBail("OpenSSL: Error reading data via ssl, SSL_read() = ",bytesRead);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
tempString[bytesRead] = '\0';
|
||||||
|
|
||||||
|
printf("%s", tempString);
|
||||||
|
}
|
||||||
|
|
||||||
|
printf("\n\n\n");
|
||||||
|
|
||||||
|
// All done!
|
||||||
|
|
||||||
|
errCode = noErr;
|
||||||
|
|
||||||
|
|
||||||
|
EXITPOINT:
|
||||||
|
|
||||||
|
// Clean up and go home
|
||||||
|
|
||||||
|
if (theSocket >= 0)
|
||||||
|
{
|
||||||
|
MacSocket_close(theSocket);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ssl != nil)
|
||||||
|
{
|
||||||
|
SSL_free(ssl);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (ssl_ctx != nil)
|
||||||
|
{
|
||||||
|
SSL_CTX_free(ssl_ctx);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
if (errCode != noErr)
|
||||||
|
{
|
||||||
|
printf("An error occurred:\n");
|
||||||
|
|
||||||
|
printf("%s",GetErrorMessage());
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
MacSocket_Shutdown();
|
||||||
|
}
|
||||||
1607
MacOS/GetHTTPS.src/MacSocket.cpp
Normal file
1607
MacOS/GetHTTPS.src/MacSocket.cpp
Normal file
File diff suppressed because it is too large
Load Diff
104
MacOS/GetHTTPS.src/MacSocket.h
Normal file
104
MacOS/GetHTTPS.src/MacSocket.h
Normal file
@@ -0,0 +1,104 @@
|
|||||||
|
#pragma once
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef __cplusplus
|
||||||
|
extern "C" {
|
||||||
|
#endif
|
||||||
|
|
||||||
|
enum {
|
||||||
|
kMacSocket_TimeoutErr = -2
|
||||||
|
};
|
||||||
|
|
||||||
|
// Since MacSocket does busy waiting, I do a callback while waiting
|
||||||
|
|
||||||
|
typedef OSErr(*MacSocket_IdleWaitCallback) (void *);
|
||||||
|
|
||||||
|
// Call this before anything else!
|
||||||
|
|
||||||
|
OSErr MacSocket_Startup(void);
|
||||||
|
|
||||||
|
// Call this to cleanup before quitting
|
||||||
|
|
||||||
|
OSErr MacSocket_Shutdown(void);
|
||||||
|
|
||||||
|
// Call this to allocate a "socket" (reference number is returned in
|
||||||
|
// outSocketNum)
|
||||||
|
// Note that inDoThreadSwitching is pretty much irrelevant right now, since I
|
||||||
|
// ignore it
|
||||||
|
// The inTimeoutTicks parameter is applied during reads/writes of data
|
||||||
|
// The inIdleWaitCallback parameter specifies a callback which is called
|
||||||
|
// during busy-waiting periods
|
||||||
|
// The inUserRefPtr parameter is passed back to the idle-wait callback
|
||||||
|
|
||||||
|
OSErr MacSocket_socket(int *outSocketNum, const Boolean inDoThreadSwitching,
|
||||||
|
const long inTimeoutTicks,
|
||||||
|
MacSocket_IdleWaitCallback inIdleWaitCallback,
|
||||||
|
void *inUserRefPtr);
|
||||||
|
|
||||||
|
// Call this to connect to an IP/DNS address
|
||||||
|
// Note that inTargetAddressAndPort is in "IP:port" format-- e.g.
|
||||||
|
// 10.1.1.1:123
|
||||||
|
|
||||||
|
OSErr MacSocket_connect(const int inSocketNum, char *inTargetAddressAndPort);
|
||||||
|
|
||||||
|
// Call this to listen on a port
|
||||||
|
// Since this a low-performance implementation, I allow a maximum of 1 (one!)
|
||||||
|
// incoming request when I listen
|
||||||
|
|
||||||
|
OSErr MacSocket_listen(const int inSocketNum, const int inPortNum);
|
||||||
|
|
||||||
|
// Call this to close a socket
|
||||||
|
|
||||||
|
OSErr MacSocket_close(const int inSocketNum);
|
||||||
|
|
||||||
|
// Call this to receive data on a socket
|
||||||
|
// Most parameters' purpose are obvious-- except maybe "inBlock" which
|
||||||
|
// controls whether I wait for data or return immediately
|
||||||
|
|
||||||
|
int MacSocket_recv(const int inSocketNum, void *outBuff, int outBuffLength,
|
||||||
|
const Boolean inBlock);
|
||||||
|
|
||||||
|
// Call this to send data on a socket
|
||||||
|
|
||||||
|
int MacSocket_send(const int inSocketNum, const void *inBuff,
|
||||||
|
int inBuffLength);
|
||||||
|
|
||||||
|
// If zero bytes were read in a call to MacSocket_recv(), it may be that the
|
||||||
|
// remote end has done a half-close
|
||||||
|
// This function will let you check whether that's true or not
|
||||||
|
|
||||||
|
Boolean MacSocket_RemoteEndIsClosing(const int inSocketNum);
|
||||||
|
|
||||||
|
// Call this to see if the listen has completed after a call to
|
||||||
|
// MacSocket_listen()
|
||||||
|
|
||||||
|
Boolean MacSocket_ListenCompleted(const int inSocketNum);
|
||||||
|
|
||||||
|
// These really aren't very useful anymore
|
||||||
|
|
||||||
|
Boolean MacSocket_LocalEndIsOpen(const int inSocketNum);
|
||||||
|
Boolean MacSocket_RemoteEndIsOpen(const int inSocketNum);
|
||||||
|
|
||||||
|
// You may wish to change the userRefPtr for a socket callback-- use this to
|
||||||
|
// do it
|
||||||
|
|
||||||
|
void MacSocket_SetUserRefPtr(const int inSocketNum, void *inNewRefPtr);
|
||||||
|
|
||||||
|
// Call these to get the socket's IP:port descriptor
|
||||||
|
|
||||||
|
void MacSocket_GetLocalIPAndPort(const int inSocketNum, char *outIPAndPort,
|
||||||
|
const int inIPAndPortLength);
|
||||||
|
void MacSocket_GetRemoteIPAndPort(const int inSocketNum, char *outIPAndPort,
|
||||||
|
const int inIPAndPortLength);
|
||||||
|
|
||||||
|
// Call this to get error info from a socket
|
||||||
|
|
||||||
|
void MacSocket_GetSocketErrorInfo(const int inSocketNum,
|
||||||
|
int *outSocketErrCode,
|
||||||
|
char *outSocketErrString,
|
||||||
|
const int inSocketErrStringMaxLength);
|
||||||
|
|
||||||
|
|
||||||
|
#ifdef __cplusplus
|
||||||
|
}
|
||||||
|
#endif
|
||||||
4940
MacOS/OpenSSL.mcp.hqx
Normal file
4940
MacOS/OpenSSL.mcp.hqx
Normal file
File diff suppressed because it is too large
Load Diff
476
MacOS/Randomizer.cpp
Normal file
476
MacOS/Randomizer.cpp
Normal file
@@ -0,0 +1,476 @@
|
|||||||
|
/*
|
||||||
|
------- Strong random data generation on a Macintosh (pre - OS X) ------
|
||||||
|
|
||||||
|
-- GENERAL: We aim to generate unpredictable bits without explicit
|
||||||
|
user interaction. A general review of the problem may be found
|
||||||
|
in RFC 1750, "Randomness Recommendations for Security", and some
|
||||||
|
more discussion, of general and Mac-specific issues has appeared
|
||||||
|
in "Using and Creating Cryptographic- Quality Random Numbers" by
|
||||||
|
Jon Callas (www.merrymeet.com/jon/usingrandom.html).
|
||||||
|
|
||||||
|
The data and entropy estimates provided below are based on my
|
||||||
|
limited experimentation and estimates, rather than by any
|
||||||
|
rigorous study, and the entropy estimates tend to be optimistic.
|
||||||
|
They should not be considered absolute.
|
||||||
|
|
||||||
|
Some of the information being collected may be correlated in
|
||||||
|
subtle ways. That includes mouse positions, timings, and disk
|
||||||
|
size measurements. Some obvious correlations will be eliminated
|
||||||
|
by the programmer, but other, weaker ones may remain. The
|
||||||
|
reliability of the code depends on such correlations being
|
||||||
|
poorly understood, both by us and by potential interceptors.
|
||||||
|
|
||||||
|
This package has been planned to be used with OpenSSL, v. 0.9.5.
|
||||||
|
It requires the OpenSSL function RAND_add.
|
||||||
|
|
||||||
|
-- OTHER WORK: Some source code and other details have been
|
||||||
|
published elsewhere, but I haven't found any to be satisfactory
|
||||||
|
for the Mac per se:
|
||||||
|
|
||||||
|
* The Linux random number generator (by Theodore Ts'o, in
|
||||||
|
drivers/char/random.c), is a carefully designed open-source
|
||||||
|
crypto random number package. It collects data from a variety
|
||||||
|
of sources, including mouse, keyboard and other interrupts.
|
||||||
|
One nice feature is that it explicitly estimates the entropy
|
||||||
|
of the data it collects. Some of its features (e.g. interrupt
|
||||||
|
timing) cannot be reliably exported to the Mac without using
|
||||||
|
undocumented APIs.
|
||||||
|
|
||||||
|
* Truerand by Don P. Mitchell and Matt Blaze uses variations
|
||||||
|
between different timing mechanisms on the same system. This
|
||||||
|
has not been tested on the Mac, but requires preemptive
|
||||||
|
multitasking, and is hardware-dependent, and can't be relied
|
||||||
|
on to work well if only one oscillator is present.
|
||||||
|
|
||||||
|
* Cryptlib's RNG for the Mac (RNDMAC.C by Peter Gutmann),
|
||||||
|
gathers a lot of information about the machine and system
|
||||||
|
environment. Unfortunately, much of it is constant from one
|
||||||
|
startup to the next. In other words, the random seed could be
|
||||||
|
the same from one day to the next. Some of the APIs are
|
||||||
|
hardware-dependent, and not all are compatible with Carbon (OS
|
||||||
|
X). Incidentally, the EGD library is based on the UNIX entropy
|
||||||
|
gathering methods in cryptlib, and isn't suitable for MacOS
|
||||||
|
either.
|
||||||
|
|
||||||
|
* Mozilla (and perhaps earlier versions of Netscape) uses the
|
||||||
|
time of day (in seconds) and an uninitialized local variable
|
||||||
|
to seed the random number generator. The time of day is known
|
||||||
|
to an outside interceptor (to within the accuracy of the
|
||||||
|
system clock). The uninitialized variable could easily be
|
||||||
|
identical between subsequent launches of an application, if it
|
||||||
|
is reached through the same path.
|
||||||
|
|
||||||
|
* OpenSSL provides the function RAND_screen(), by G. van
|
||||||
|
Oosten, which hashes the contents of the screen to generate a
|
||||||
|
seed. This is not useful for an extension or for an
|
||||||
|
application which launches at startup time, since the screen
|
||||||
|
is likely to look identical from one launch to the next. This
|
||||||
|
method is also rather slow.
|
||||||
|
|
||||||
|
* Using variations in disk drive seek times has been proposed
|
||||||
|
(Davis, Ihaka and Fenstermacher, world.std.com/~dtd/;
|
||||||
|
Jakobsson, Shriver, Hillyer and Juels,
|
||||||
|
www.bell-labs.com/user/shriver/random.html). These variations
|
||||||
|
appear to be due to air turbulence inside the disk drive
|
||||||
|
mechanism, and are very strongly unpredictable. Unfortunately
|
||||||
|
this technique is slow, and some implementations of it may be
|
||||||
|
patented (see Shriver's page above.) It of course cannot be
|
||||||
|
used with a RAM disk.
|
||||||
|
|
||||||
|
-- TIMING: On the 601 PowerPC the time base register is guaranteed
|
||||||
|
to change at least once every 10 addi instructions, i.e. 10
|
||||||
|
cycles. On a 60 MHz machine (slowest PowerPC) this translates to
|
||||||
|
a resolution of 1/6 usec. Newer machines seem to be using a 10
|
||||||
|
cycle resolution as well.
|
||||||
|
|
||||||
|
For 68K Macs, the Microseconds() call may be used. See Develop
|
||||||
|
issue 29 on the Apple developer site
|
||||||
|
(developer.apple.com/dev/techsupport/develop/issue29/minow.html)
|
||||||
|
for information on its accuracy and resolution. The code below
|
||||||
|
has been tested only on PowerPC based machines.
|
||||||
|
|
||||||
|
The time from machine startup to the launch of an application in
|
||||||
|
the startup folder has a variance of about 1.6 msec on a new G4
|
||||||
|
machine with a defragmented and optimized disk, most extensions
|
||||||
|
off and no icons on the desktop. This can be reasonably taken as
|
||||||
|
a lower bound on the variance. Most of this variation is likely
|
||||||
|
due to disk seek time variability. The distribution of startup
|
||||||
|
times is probably not entirely even or uncorrelated. This needs
|
||||||
|
to be investigated, but I am guessing that it not a majpor
|
||||||
|
problem. Entropy = log2 (1600/0.166) ~= 13 bits on a 60 MHz
|
||||||
|
machine, ~16 bits for a 450 MHz machine.
|
||||||
|
|
||||||
|
User-launched application startup times will have a variance of
|
||||||
|
a second or more relative to machine startup time. Entropy >~22
|
||||||
|
bits.
|
||||||
|
|
||||||
|
Machine startup time is available with a 1-second resolution. It
|
||||||
|
is predictable to no better a minute or two, in the case of
|
||||||
|
people who show up punctually to work at the same time and
|
||||||
|
immediately start their computer. Using the scheduled startup
|
||||||
|
feature (when available) will cause the machine to start up at
|
||||||
|
the same time every day, making the value predictable. Entropy
|
||||||
|
>~7 bits, or 0 bits with scheduled startup.
|
||||||
|
|
||||||
|
The time of day is of course known to an outsider and thus has 0
|
||||||
|
entropy if the system clock is regularly calibrated.
|
||||||
|
|
||||||
|
-- KEY TIMING: A very fast typist (120 wpm) will have a typical
|
||||||
|
inter-key timing interval of 100 msec. We can assume a variance
|
||||||
|
of no less than 2 msec -- maybe. Do good typists have a constant
|
||||||
|
rhythm, like drummers? Since what we measure is not the
|
||||||
|
key-generated interrupt but the time at which the key event was
|
||||||
|
taken off the event queue, our resolution is roughly the time
|
||||||
|
between process switches, at best 1 tick (17 msec). I therefore
|
||||||
|
consider this technique questionable and not very useful for
|
||||||
|
obtaining high entropy data on the Mac.
|
||||||
|
|
||||||
|
-- MOUSE POSITION AND TIMING: The high bits of the mouse position
|
||||||
|
are far from arbitrary, since the mouse tends to stay in a few
|
||||||
|
limited areas of the screen. I am guessing that the position of
|
||||||
|
the mouse is arbitrary within a 6 pixel square. Since the mouse
|
||||||
|
stays still for long periods of time, it should be sampled only
|
||||||
|
after it was moved, to avoid correlated data. This gives an
|
||||||
|
entropy of log2(6*6) ~= 5 bits per measurement.
|
||||||
|
|
||||||
|
The time during which the mouse stays still can vary from zero
|
||||||
|
to, say, 5 seconds (occasionally longer). If the still time is
|
||||||
|
measured by sampling the mouse during null events, and null
|
||||||
|
events are received once per tick, its resolution is 1/60th of a
|
||||||
|
second, giving an entropy of log2 (60*5) ~= 8 bits per
|
||||||
|
measurement. Since the distribution of still times is uneven,
|
||||||
|
this estimate is on the high side.
|
||||||
|
|
||||||
|
For simplicity and compatibility across system versions, the
|
||||||
|
mouse is to be sampled explicitly (e.g. in the event loop),
|
||||||
|
rather than in a time manager task.
|
||||||
|
|
||||||
|
-- STARTUP DISK TOTAL FILE SIZE: Varies typically by at least 20k
|
||||||
|
from one startup to the next, with 'minimal' computer use. Won't
|
||||||
|
vary at all if machine is started again immediately after
|
||||||
|
startup (unless virtual memory is on), but any application which
|
||||||
|
uses the web and caches information to disk is likely to cause
|
||||||
|
this much variation or more. The variation is probably not
|
||||||
|
random, but I don't know in what way. File sizes tend to be
|
||||||
|
divisible by 4 bytes since file format fields are often
|
||||||
|
long-aligned. Entropy > log2 (20000/4) ~= 12 bits.
|
||||||
|
|
||||||
|
-- STARTUP DISK FIRST AVAILABLE ALLOCATION BLOCK: As the volume
|
||||||
|
gets fragmented this could be anywhere in principle. In a
|
||||||
|
perfectly unfragmented volume this will be strongly correlated
|
||||||
|
with the total file size on the disk. With more fragmentation
|
||||||
|
comes less certainty. I took the variation in this value to be
|
||||||
|
1/8 of the total file size on the volume.
|
||||||
|
|
||||||
|
-- SYSTEM REQUIREMENTS: The code here requires System 7.0 and above
|
||||||
|
(for Gestalt and Microseconds calls). All the calls used are
|
||||||
|
Carbon-compatible.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*------------------------------ Includes ----------------------------*/
|
||||||
|
|
||||||
|
#include "Randomizer.h"
|
||||||
|
|
||||||
|
// Mac OS API
|
||||||
|
#include <Files.h>
|
||||||
|
#include <Folders.h>
|
||||||
|
#include <Events.h>
|
||||||
|
#include <Processes.h>
|
||||||
|
#include <Gestalt.h>
|
||||||
|
#include <Resources.h>
|
||||||
|
#include <LowMem.h>
|
||||||
|
|
||||||
|
// Standard C library
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <math.h>
|
||||||
|
|
||||||
|
/*---------------------- Function declarations -----------------------*/
|
||||||
|
|
||||||
|
// declared in OpenSSL/crypto/rand/rand.h
|
||||||
|
extern "C" void RAND_add (const void *buf, int num, double entropy);
|
||||||
|
|
||||||
|
unsigned long GetPPCTimer (bool is601); // Make it global if needed
|
||||||
|
// elsewhere
|
||||||
|
|
||||||
|
/*---------------------------- Constants -----------------------------*/
|
||||||
|
|
||||||
|
#define kMouseResolution 6 // Mouse position has to differ
|
||||||
|
// from the last one by this
|
||||||
|
// much to be entered
|
||||||
|
#define kMousePositionEntropy 5.16 // log2 (kMouseResolution**2)
|
||||||
|
#define kTypicalMouseIdleTicks 300.0 // I am guessing that a typical
|
||||||
|
// amount of time between mouse
|
||||||
|
// moves is 5 seconds
|
||||||
|
#define kVolumeBytesEntropy 12.0 // about log2 (20000/4),
|
||||||
|
// assuming a variation of 20K
|
||||||
|
// in total file size and
|
||||||
|
// long-aligned file formats.
|
||||||
|
#define kApplicationUpTimeEntropy 6.0 // Variance > 1 second, uptime
|
||||||
|
// in ticks
|
||||||
|
#define kSysStartupEntropy 7.0 // Entropy for machine startup
|
||||||
|
// time
|
||||||
|
|
||||||
|
|
||||||
|
/*------------------------ Function definitions ----------------------*/
|
||||||
|
|
||||||
|
CRandomizer::CRandomizer (void)
|
||||||
|
{
|
||||||
|
long result;
|
||||||
|
|
||||||
|
mSupportsLargeVolumes =
|
||||||
|
(Gestalt(gestaltFSAttr, &result) == noErr) &&
|
||||||
|
((result & (1L << gestaltFSSupports2TBVols)) != 0);
|
||||||
|
|
||||||
|
if (Gestalt (gestaltNativeCPUtype, &result) != noErr)
|
||||||
|
{
|
||||||
|
mIsPowerPC = false;
|
||||||
|
mIs601 = false;
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
mIs601 = (result == gestaltCPU601);
|
||||||
|
mIsPowerPC = (result >= gestaltCPU601);
|
||||||
|
}
|
||||||
|
mLastMouse.h = mLastMouse.v = -10; // First mouse will
|
||||||
|
// always be recorded
|
||||||
|
mLastPeriodicTicks = TickCount();
|
||||||
|
GetTimeBaseResolution ();
|
||||||
|
|
||||||
|
// Add initial entropy
|
||||||
|
AddTimeSinceMachineStartup ();
|
||||||
|
AddAbsoluteSystemStartupTime ();
|
||||||
|
AddStartupVolumeInfo ();
|
||||||
|
AddFiller ();
|
||||||
|
}
|
||||||
|
|
||||||
|
void CRandomizer::PeriodicAction (void)
|
||||||
|
{
|
||||||
|
AddCurrentMouse ();
|
||||||
|
AddNow (0.0); // Should have a better entropy estimate here
|
||||||
|
mLastPeriodicTicks = TickCount();
|
||||||
|
}
|
||||||
|
|
||||||
|
/*------------------------- Private Methods --------------------------*/
|
||||||
|
|
||||||
|
void CRandomizer::AddCurrentMouse (void)
|
||||||
|
{
|
||||||
|
Point mouseLoc;
|
||||||
|
unsigned long lastCheck; // Ticks since mouse was last
|
||||||
|
// sampled
|
||||||
|
|
||||||
|
#if TARGET_API_MAC_CARBON
|
||||||
|
GetGlobalMouse (&mouseLoc);
|
||||||
|
#else
|
||||||
|
mouseLoc = LMGetMouseLocation();
|
||||||
|
#endif
|
||||||
|
|
||||||
|
if (labs (mLastMouse.h - mouseLoc.h) > kMouseResolution/2 &&
|
||||||
|
labs (mLastMouse.v - mouseLoc.v) > kMouseResolution/2)
|
||||||
|
AddBytes (&mouseLoc, sizeof (mouseLoc),
|
||||||
|
kMousePositionEntropy);
|
||||||
|
|
||||||
|
if (mLastMouse.h == mouseLoc.h && mLastMouse.v == mouseLoc.v)
|
||||||
|
mMouseStill ++;
|
||||||
|
else
|
||||||
|
{
|
||||||
|
double entropy;
|
||||||
|
|
||||||
|
// Mouse has moved. Add the number of measurements for
|
||||||
|
// which it's been still. If the resolution is too
|
||||||
|
// coarse, assume the entropy is 0.
|
||||||
|
|
||||||
|
lastCheck = TickCount() - mLastPeriodicTicks;
|
||||||
|
if (lastCheck <= 0)
|
||||||
|
lastCheck = 1;
|
||||||
|
entropy = log2l
|
||||||
|
(kTypicalMouseIdleTicks/(double)lastCheck);
|
||||||
|
if (entropy < 0.0)
|
||||||
|
entropy = 0.0;
|
||||||
|
AddBytes (&mMouseStill, sizeof (mMouseStill), entropy);
|
||||||
|
mMouseStill = 0;
|
||||||
|
}
|
||||||
|
mLastMouse = mouseLoc;
|
||||||
|
}
|
||||||
|
|
||||||
|
void CRandomizer::AddAbsoluteSystemStartupTime (void)
|
||||||
|
{
|
||||||
|
unsigned long now; // Time in seconds since
|
||||||
|
// 1/1/1904
|
||||||
|
GetDateTime (&now);
|
||||||
|
now -= TickCount() / 60; // Time in ticks since machine
|
||||||
|
// startup
|
||||||
|
AddBytes (&now, sizeof (now), kSysStartupEntropy);
|
||||||
|
}
|
||||||
|
|
||||||
|
void CRandomizer::AddTimeSinceMachineStartup (void)
|
||||||
|
{
|
||||||
|
AddNow (1.5); // Uncertainty in app startup
|
||||||
|
// time is > 1.5 msec (for
|
||||||
|
// automated app startup).
|
||||||
|
}
|
||||||
|
|
||||||
|
void CRandomizer::AddAppRunningTime (void)
|
||||||
|
{
|
||||||
|
ProcessSerialNumber PSN;
|
||||||
|
ProcessInfoRec ProcessInfo;
|
||||||
|
|
||||||
|
ProcessInfo.processInfoLength = sizeof (ProcessInfoRec);
|
||||||
|
ProcessInfo.processName = nil;
|
||||||
|
ProcessInfo.processAppSpec = nil;
|
||||||
|
|
||||||
|
GetCurrentProcess (&PSN);
|
||||||
|
GetProcessInformation (&PSN, &ProcessInfo);
|
||||||
|
|
||||||
|
// Now add the amount of time in ticks that the current process
|
||||||
|
// has been active
|
||||||
|
|
||||||
|
AddBytes (&ProcessInfo, sizeof (ProcessInfoRec),
|
||||||
|
kApplicationUpTimeEntropy);
|
||||||
|
}
|
||||||
|
|
||||||
|
void CRandomizer::AddStartupVolumeInfo (void)
|
||||||
|
{
|
||||||
|
short vRefNum;
|
||||||
|
long dirID;
|
||||||
|
XVolumeParam pb;
|
||||||
|
OSErr err;
|
||||||
|
|
||||||
|
if (!mSupportsLargeVolumes)
|
||||||
|
return;
|
||||||
|
|
||||||
|
FindFolder (kOnSystemDisk, kSystemFolderType, kDontCreateFolder,
|
||||||
|
&vRefNum, &dirID);
|
||||||
|
pb.ioVRefNum = vRefNum;
|
||||||
|
pb.ioCompletion = 0;
|
||||||
|
pb.ioNamePtr = 0;
|
||||||
|
pb.ioVolIndex = 0;
|
||||||
|
err = PBXGetVolInfoSync (&pb);
|
||||||
|
if (err != noErr)
|
||||||
|
return;
|
||||||
|
|
||||||
|
// Base the entropy on the amount of space used on the disk and
|
||||||
|
// on the next available allocation block. A lot else might be
|
||||||
|
// unpredictable, so might as well toss the whole block in. See
|
||||||
|
// comments for entropy estimate justifications.
|
||||||
|
|
||||||
|
AddBytes (&pb, sizeof (pb),
|
||||||
|
kVolumeBytesEntropy +
|
||||||
|
log2l (((pb.ioVTotalBytes.hi - pb.ioVFreeBytes.hi)
|
||||||
|
* 4294967296.0D +
|
||||||
|
(pb.ioVTotalBytes.lo - pb.ioVFreeBytes.lo))
|
||||||
|
/ pb.ioVAlBlkSiz - 3.0));
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
On a typical startup CRandomizer will come up with about 60
|
||||||
|
bits of good, unpredictable data. Assuming no more input will
|
||||||
|
be available, we'll need some more lower-quality data to give
|
||||||
|
OpenSSL the 128 bits of entropy it desires. AddFiller adds some
|
||||||
|
relatively predictable data into the soup.
|
||||||
|
*/
|
||||||
|
|
||||||
|
void CRandomizer::AddFiller (void)
|
||||||
|
{
|
||||||
|
struct
|
||||||
|
{
|
||||||
|
ProcessSerialNumber psn; // Front process serial
|
||||||
|
// number
|
||||||
|
RGBColor hiliteRGBValue; // User-selected
|
||||||
|
// highlight color
|
||||||
|
long processCount; // Number of active
|
||||||
|
// processes
|
||||||
|
long cpuSpeed; // Processor speed
|
||||||
|
long totalMemory; // Total logical memory
|
||||||
|
// (incl. virtual one)
|
||||||
|
long systemVersion; // OS version
|
||||||
|
short resFile; // Current resource file
|
||||||
|
} data;
|
||||||
|
|
||||||
|
GetNextProcess ((ProcessSerialNumber*) kNoProcess);
|
||||||
|
while (GetNextProcess (&data.psn) == noErr)
|
||||||
|
data.processCount++;
|
||||||
|
GetFrontProcess (&data.psn);
|
||||||
|
LMGetHiliteRGB (&data.hiliteRGBValue);
|
||||||
|
Gestalt (gestaltProcClkSpeed, &data.cpuSpeed);
|
||||||
|
Gestalt (gestaltLogicalRAMSize, &data.totalMemory);
|
||||||
|
Gestalt (gestaltSystemVersion, &data.systemVersion);
|
||||||
|
data.resFile = CurResFile ();
|
||||||
|
|
||||||
|
// Here we pretend to feed the PRNG completely random data. This
|
||||||
|
// is of course false, as much of the above data is predictable
|
||||||
|
// by an outsider. At this point we don't have any more
|
||||||
|
// randomness to add, but with OpenSSL we must have a 128 bit
|
||||||
|
// seed before we can start. We just add what we can, without a
|
||||||
|
// real entropy estimate, and hope for the best.
|
||||||
|
|
||||||
|
AddBytes (&data, sizeof(data), 8.0 * sizeof(data));
|
||||||
|
AddCurrentMouse ();
|
||||||
|
AddNow (1.0);
|
||||||
|
}
|
||||||
|
|
||||||
|
//------------------- LOW LEVEL ---------------------
|
||||||
|
|
||||||
|
void CRandomizer::AddBytes (void *data, long size, double entropy)
|
||||||
|
{
|
||||||
|
RAND_add (data, size, entropy * 0.125); // Convert entropy bits
|
||||||
|
// to bytes
|
||||||
|
}
|
||||||
|
|
||||||
|
void CRandomizer::AddNow (double millisecondUncertainty)
|
||||||
|
{
|
||||||
|
long time = SysTimer();
|
||||||
|
AddBytes (&time, sizeof (time), log2l (millisecondUncertainty *
|
||||||
|
mTimebaseTicksPerMillisec));
|
||||||
|
}
|
||||||
|
|
||||||
|
//----------------- TIMING SUPPORT ------------------
|
||||||
|
|
||||||
|
void CRandomizer::GetTimeBaseResolution (void)
|
||||||
|
{
|
||||||
|
#ifdef __powerc
|
||||||
|
long speed;
|
||||||
|
|
||||||
|
// gestaltProcClkSpeed available on System 7.5.2 and above
|
||||||
|
if (Gestalt (gestaltProcClkSpeed, &speed) != noErr)
|
||||||
|
// Only PowerPCs running pre-7.5.2 are 60-80 MHz
|
||||||
|
// machines.
|
||||||
|
mTimebaseTicksPerMillisec = 6000.0D;
|
||||||
|
// Assume 10 cycles per clock update, as in 601 spec. Seems true
|
||||||
|
// for later chips as well.
|
||||||
|
mTimebaseTicksPerMillisec = speed / 1.0e4D;
|
||||||
|
#else
|
||||||
|
// 68K VIA-based machines (see Develop Magazine no. 29)
|
||||||
|
mTimebaseTicksPerMillisec = 783.360D;
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
unsigned long CRandomizer::SysTimer (void) // returns the lower 32
|
||||||
|
// bit of the chip timer
|
||||||
|
{
|
||||||
|
#ifdef __powerc
|
||||||
|
return GetPPCTimer (mIs601);
|
||||||
|
#else
|
||||||
|
UnsignedWide usec;
|
||||||
|
Microseconds (&usec);
|
||||||
|
return usec.lo;
|
||||||
|
#endif
|
||||||
|
}
|
||||||
|
|
||||||
|
#ifdef __powerc
|
||||||
|
// The timebase is available through mfspr on 601, mftb on later chips.
|
||||||
|
// Motorola recommends that an 601 implementation map mftb to mfspr
|
||||||
|
// through an exception, but I haven't tested to see if MacOS actually
|
||||||
|
// does this. We only sample the lower 32 bits of the timer (i.e. a
|
||||||
|
// few minutes of resolution)
|
||||||
|
|
||||||
|
asm unsigned long GetPPCTimer (register bool is601)
|
||||||
|
{
|
||||||
|
cmplwi is601, 0 // Check if 601
|
||||||
|
bne _601 // if non-zero goto _601
|
||||||
|
mftb r3 // Available on 603 and later.
|
||||||
|
blr // return with result in r3
|
||||||
|
_601:
|
||||||
|
mfspr r3, spr5 // Available on 601 only.
|
||||||
|
// blr inserted automatically
|
||||||
|
}
|
||||||
|
#endif
|
||||||
42
MacOS/Randomizer.h
Normal file
42
MacOS/Randomizer.h
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
|
||||||
|
// Gathers unpredictable system data to be used for generating
|
||||||
|
// random bits
|
||||||
|
|
||||||
|
#include <MacTypes.h>
|
||||||
|
|
||||||
|
class CRandomizer {
|
||||||
|
public:
|
||||||
|
CRandomizer(void);
|
||||||
|
void PeriodicAction(void);
|
||||||
|
|
||||||
|
private:
|
||||||
|
|
||||||
|
// Private calls
|
||||||
|
|
||||||
|
void AddTimeSinceMachineStartup(void);
|
||||||
|
void AddAbsoluteSystemStartupTime(void);
|
||||||
|
void AddAppRunningTime(void);
|
||||||
|
void AddStartupVolumeInfo(void);
|
||||||
|
void AddFiller(void);
|
||||||
|
|
||||||
|
void AddCurrentMouse(void);
|
||||||
|
void AddNow(double millisecondUncertainty);
|
||||||
|
void AddBytes(void *data, long size, double entropy);
|
||||||
|
|
||||||
|
void GetTimeBaseResolution(void);
|
||||||
|
unsigned long SysTimer(void);
|
||||||
|
|
||||||
|
// System Info
|
||||||
|
bool mSupportsLargeVolumes;
|
||||||
|
bool mIsPowerPC;
|
||||||
|
bool mIs601;
|
||||||
|
|
||||||
|
// Time info
|
||||||
|
double mTimebaseTicksPerMillisec;
|
||||||
|
unsigned long mLastPeriodicTicks;
|
||||||
|
|
||||||
|
// Mouse info
|
||||||
|
long mSamplePeriod;
|
||||||
|
Point mLastMouse;
|
||||||
|
long mMouseStill;
|
||||||
|
};
|
||||||
18
MacOS/TODO
Normal file
18
MacOS/TODO
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
-------------------------------------------------------------------
|
||||||
|
Verify server certificate
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Currently omitted from the project:
|
||||||
|
|
||||||
|
crypto/tmdiff.c
|
||||||
|
crypto/bio/bss_conn.c
|
||||||
|
crypto/bio/b_sock.c
|
||||||
|
crypto/bio/bss_acpt.c
|
||||||
|
crypto/bio/bss_log.h
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Build libraries to link with...
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Port openssl application.
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
BN optimizations (currently PPC version is compiled with BN_LLONG)
|
||||||
|
-------------------------------------------------------------------
|
||||||
9
MacOS/_MWERKS_GUSI_prefix.h
Normal file
9
MacOS/_MWERKS_GUSI_prefix.h
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
#include <MacHeaders.h>
|
||||||
|
#define B_ENDIAN
|
||||||
|
#ifdef __POWERPC__
|
||||||
|
# pragma longlong on
|
||||||
|
#endif
|
||||||
|
#if 1
|
||||||
|
# define MAC_OS_GUSI_SOURCE
|
||||||
|
#endif
|
||||||
|
#define MONOLITH
|
||||||
9
MacOS/_MWERKS_prefix.h
Normal file
9
MacOS/_MWERKS_prefix.h
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
#include <MacHeaders.h>
|
||||||
|
#define B_ENDIAN
|
||||||
|
#ifdef __POWERPC__
|
||||||
|
# pragma longlong on
|
||||||
|
#endif
|
||||||
|
#if 0
|
||||||
|
# define MAC_OS_GUSI_SOURCE
|
||||||
|
#endif
|
||||||
|
#define MONOLITH
|
||||||
5
MacOS/buildinf.h
Normal file
5
MacOS/buildinf.h
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
#ifndef MK1MF_BUILD
|
||||||
|
# define CFLAGS "-DB_ENDIAN"
|
||||||
|
# define PLATFORM "macos"
|
||||||
|
# define DATE "Sun Feb 27 19:44:16 MET 2000"
|
||||||
|
#endif
|
||||||
820
MacOS/mklinks.as.hqx
Normal file
820
MacOS/mklinks.as.hqx
Normal file
@@ -0,0 +1,820 @@
|
|||||||
|
(This file must be converted with BinHex 4.0)
|
||||||
|
|
||||||
|
:#QeVE'PZDh-ZBA-!39"36'&`E(3J!!!!!!!!!*LiI6m!!!!!!3!!!*G#!!#@3J!
|
||||||
|
!!AChFQPd!!!!K3)"!3m(Fh9`F'pbG!!!!)B#!3%$"(0eFQ8!!!#(!J-%"!3("3C
|
||||||
|
cGfPdBfJ!!!#)!J%"#39cH@jMD!!!!)N#"J%$!`-&"3-'FhPcG'9Y!!!!LJ)&"3)
|
||||||
|
%!J8("!-#!`4dB@*X!!!!L`))!3-$!`-$!`-$"(4PE'`!!!#-!J)"#38$G'KP!!!
|
||||||
|
!M3))(J)@!Ki#!J))!K)#!`)B!Kd%G'KPE3!!!)i#!J%&#`4dD'9j!!!!M`)#!J)
|
||||||
|
#$3TdD(*[G@GSEh9d!!!!N!!#!3%&"(4TCQB!!!#4!J%"!`4dD@eP!!!!NJ)"!JS
|
||||||
|
#!h4T!!!!'N!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!H!!!!!!!#!!!!!!
|
||||||
|
!!!!!!!!!!!!!rrrrr`!!!$3!!!!N!!!!!#"[!!5JAb"[!!5K++!M6R9$9'mJFR9
|
||||||
|
Z)(4SDA-JFf0bDA"d)'&`F'aTBf&dD@pZ,#"jEh8JEA9cG#"QDA*cG#"TER0dB@a
|
||||||
|
X)%&`F'aP8f0bDA"d,J!!!)C8D'Pc)(0MFQP`G#"MFQ9KG'9c)#iZ,fPZBfaeC'8
|
||||||
|
[Eh"PER0cE#"KEQ3JCQPXE(-JDA3JGfPdD#"ZC@0PFh0KFRNJB@aTBA0PFbi0$8P
|
||||||
|
d)'eTCfKd)(4KDf8JB5"hD'PXC5"dEb"MEfe`E'9dC5"cEb"`E'9KFf8JBQ8JF'&
|
||||||
|
dD@9ZG$SY+3!!!#S!!J!!!!!!$3!+!"!!!!!-!!!!!!!!!!!!63!0!!S!%!%!!!`
|
||||||
|
!!!!!!!!!!!!B!!!!+!!!!!!!!!!)!!!!)!#N2c`!!DR`!!!!l!!!!!&19[ri,`0
|
||||||
|
f!#m$-$bKVDG'*KmY52ri,`-`2+LITdBQ(b!ZrrLa`'FJ,`-J2'0`ER4"l[rm)NL
|
||||||
|
KV5+)*Kp+3'B)5Ulrr'F#GJ%3!bBZrr41ANje6PB!!#m-@Bm[2%j29%Nr2!#!U"m
|
||||||
|
SAb!-CJK`!cm!UFKJ+#m-UC)J9#!)d+J!'#&!!"JJ9#!)d+J!(#&!!"a9Mbm8)&q
|
||||||
|
JAMk!9%mSE[rm6Pj1G8j@!!![$%kkre4+!'FU@Bm[2'&`E(3[2(0MF(4`)DJU+&m
|
||||||
|
J$'F5@Bm[$#mm!!!!!A!!U#UTp&K26VVrG#KZrra1ANje!!!!('&`E(3!!!!"4P*
|
||||||
|
&4J!!!!!!J%P$6L-!!!!!!*B!!!!"!!!!!!G"8&"-!!!!!!!"!!!"!!!!!S!!!!4
|
||||||
|
!!!"i)!!!K"!!!3))!!)#"!!%"!)!#!J"!"!8!)!J)J"!3%%!)2#!J"#*!%!)KJ!
|
||||||
|
J")3!)!*!!"!")!!3!K!!%!3)!"!)"!!J%!)!3#!"!)"!!S%!J!5#!3!)4!)!#%J
|
||||||
|
%!!KB#!!%C"!!!m)J!!!"3!!!!)!!!!%!!!!$J!!!"m!!!(rJ!!$rm!!"rrJ!!rr
|
||||||
|
m!!IrrJ!2rrm!(rrrJ$rrrm"rrrrJrrrrm2rrrrMrrrrmrrrrrRrrrrmrrrrq(rr
|
||||||
|
rr!rrrrJ(rrr`!rrri!(rrm!$rrq!"rrr!!rrrJ!2rr`!$rri!!IRm!!$`q!!!!(
|
||||||
|
!!!!!J!!!!!)!!!!!!!!!!!m!!!!!!!!!!!!!!!!!!!$`m!!!!!!!!!!!!!!!!!!
|
||||||
|
2!!m!!!!!!!!!!!!!!!rrm!!!m!!!!!!!!!!!!!$`c0m!!!m!!!!!!!!!!!!2!!c
|
||||||
|
-m!!!m!!!!!!!!!!!m!$-cI!!!!m!!!!!!!!!$`!-c0m!!!!!m!!!!!!!!2!!c-h
|
||||||
|
`!!!!!!m!!!!!!!m!$-cIh`!!!!!!m!!!!!$`!-c0rGh`!!!!!!m!!!!2!!c-hph
|
||||||
|
-h`!!!!!!m!!!rrr-cIhF`-h`!!!!!!m!!2lFr0rGc!`-h`!!!!!!m!$pc-rph-$
|
||||||
|
!`-h`!!!!!!m!r-`2cF`-$!!-r3!!!!!!m!m!`-c!`-!!$0m!!!!!$-m!m!`-$!`
|
||||||
|
!!-cI!!!!!-c`!!m!`-$!!!`-h`!!!!c2!!!!m!`-!!$!c0m!!!$-m!!!!!m!`!!
|
||||||
|
-$-hm!!!-c`!!!!!!m!!!`-cIc!!!c2!!!!!!!!m!$!c0r-`!$-m!!!!!!!$pm-$
|
||||||
|
-hmc!!-c`!!!!!!!2hI`-cIc-!!c2!!!!!!!!rGc2c0r-`!$-m!!!!!!!!2h-cmh
|
||||||
|
mc!!-c`!!!!!!!!$mc!rIr-!!c2!!!!!!!!!!$m$2m!r-$-m!!!!!!!!!!!$rr`!
|
||||||
|
!r-c`!!!!!!!!!!!!!!!!!!r2!!!!!!!!!!!!!!!!!!!!m!!!!!!!!!!!!!"!!B!
|
||||||
|
13"%J)4"##18%Q)+3!%&!)5!L%%3BL#83*L!G3!#!!B!2`"rJ2r"rq2rmrrlrrhr
|
||||||
|
r2riIr"ri2r!ri"h!!)!!!!#!!!!!$r!!!!!!!2r`$`!!!!!2$!m!m!!!!2$!c`!
|
||||||
|
2!!!2$!c`!!$`!2r`cpm!!!m!rGrpc2!!!2$p$p`-c`!!$`m!`-$0m!$2!2!-$-h
|
||||||
|
`$2!!$`$-hm$2!!!2m-hm$2!!!2h2hm$2!!!!r-rm$2!!!!!2r`r2!!!!!!!!!2!
|
||||||
|
!!!!!!!#D8f0bDA"d)%&`F'aTBf&dD@pZ$3e8D'Pc)(0MFQP`G#"MFQ9KG'9c)#i
|
||||||
|
Z,fPZBfaeC'8[Eh"PER0cE#"KEQ3JCQPXE(-JDA3JGfPdD#"ZC@0PFh0KFRNJB@a
|
||||||
|
TBA0PFbi0$8Pd)'eTCfKd)(4KDf8JB5"hD'PXC5"dEb"MEfe`E'9dC5"cEb"`E'9
|
||||||
|
KFf8JBQ8JF'&dD@9ZG$SY+3!!!")!!J!!!!!!!!!!!!%!"J!'%iN!!!!+@1!!!b!
|
||||||
|
!!!-J!!!!!"3!+`!(!Cm#@!!V!!F"f!*B!!!!!3!!M`C'BA0N98&6)$%Z-6!a,M%
|
||||||
|
`$J!!!!32rrm!!3!#!!-"rrm!!!d!!3!"D`!!!!!!!!!%!J!%!!)!"3!'$3!&!!*
|
||||||
|
X!!)!!!U`!!IrrJd!"`!#6`!!!!!+X!!)!!N0!!J!!@X!!!!%#Um!#J)!#J!#!!X
|
||||||
|
!$!d!#`!#E!!#!!3!"2rprr`"rrd!!!(rr!!!!J!-!!)!$3!1$3!0!!*X!!%!"!!
|
||||||
|
%rrX!$`(rq`!!$!!2!&N!8b"(CA3JF'&dD#"dEb"dD'Pc)%&`F'aP8f0bDA"d)'&
|
||||||
|
`F'aPG$XJGA0P)'Pd)(4[)'C[FQdJG'KP)("KG'JJG'mJG'KP)'PZBfaeC'8JCQp
|
||||||
|
XC'9b!!)!!!)!$J!#!"!!%3d!%!!#E!!"!!3!"2rk!")"rrS!!!`!%J!Q!#!JB@j
|
||||||
|
N)(4SC5"[G'KPFL"bC@aPGQ&ZG#"QEfaNCA*c,J!#!!!#!"%!!J!6!"30!"-!!R-
|
||||||
|
!!!!%!"%!&3!@$3!9!!*M!!!!"!!1!"F!'!d!&`!#E!!&!!3!$!!CrrN0!"N!!Qi
|
||||||
|
!!!!%!!`!'J!E$3!D!!)d!!!!"3!-rrJ!(!Vrq!!%#Q0[BQS0!"`!!Q`!"3!'!!X
|
||||||
|
!(Irh$3!G!!0*!!)!"J!,rrB!([re#[rf!"JZC@&bFfCQC(*KE'Pc!!!!!!!!)!"
|
||||||
|
KCQ4b$3!H!!"Q!!!!"J!(![re!!!"rrF!!!d!'`!"E3!!!!3!"3!I$`!I!6J)ER9
|
||||||
|
XE!!!!!!!!Gq!rrm!!!!A"NCTEQ4PFJ!!(`*[Me!!ASfm!Qq,i!"HA[!!I&M!!!!
|
||||||
|
!!!!!'mi!!JN#!Qq-1!!!Kb%#Ei`J!!!!!%C14&*038e"3e-!!"%!B@aTF`!!!!!
|
||||||
|
!fJ!#!!!-6@&MD@jdEh0S)%K%!!!!!!!!!!!!!!!!!!!!XSA5h%*%!!!!!!!A"NC
|
||||||
|
TEQ4PFJ!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
|
||||||
|
!!!!!!!!!!!!!!!!!!!!!3rLc#@a!4Nj%8Ne"3e2rrrrr!!!!!!!!!!!!!!!!!!!
|
||||||
|
!!!!!!!e6HA0dC@dJ4QpXC'9b!!!"!!3!!!!A!!)!)8eKBfPZG'pcD#")4$T6HA0
|
||||||
|
dC@dJ4QpXC'9b1NCTEQ4PFJ$rr`!!!Irj!!!0!"J!!@d!!!!-!!hrp!Vrp!!%#Q0
|
||||||
|
dH(30!"B!!@m!!!!!!!$rm`[rm`!5-!!(G'KPF'&dD!!(G'KP8'&dD!)!&!!#!#!
|
||||||
|
!)3d!)!!#E!!#!")!%[rbrr%"rr)!!!(rm3!!!J!K!!)!)J!M$3!L!!*b!!!!%J!
|
||||||
|
A!#3!*3d!*!!#EJ!$!")!&3!Q!#F0!#B!!6%!!!!6!"Arm!Vrm!!%#R4iC'`0!#F
|
||||||
|
!!6%!!!!5!"2rl`Vrl`!%#Q&cBh)0!#8!!@m!!!!!!!$rlJ[rlJ!F-!!-G'KPEfa
|
||||||
|
NC'9XD@ec!!adD'92E'4%C@aTEA-#!#-!!J!S!#N0!#J!!R)!!!!B!"d!+J!V$3!
|
||||||
|
U!!&Y!!!!'!!C!#`-!#`!"`!"1J!#!!!0!#X!!Qi!!`!!!!!!,3!Z$3!Y!!%a!!!
|
||||||
|
!'J!Frqd+rqd!"!TdH'4X$3!Z!!%a!!!!'3!Drq`+rq`!"!TKFf0b!J!T!!)!,`!
|
||||||
|
`$3![!!*X!!)!(J!Hrq[rkJ(rk`!!!IrU!!!#!$!!!J!a!$)0!$%!!R)!!!!H!#X
|
||||||
|
!-`!d$3!c!!*X!!8!(J!T!$Ark3d!03!#EJ!!!"i!+3!f!$F0!$B!!cF"!!!I!#R
|
||||||
|
rk!!i!$N+rqJ!"!TMDA4Y$3!i!!&Y!!!!)`!PrqF$rqF!!3d!13!"E3!!!#B!+2r
|
||||||
|
Q!rrQrrd0!$F!!@m!!!!H!"rrj3[rj3!5-!!(G'KPF'&dD!!(G'KP8'&dD!(rk3!
|
||||||
|
!$3!d!!&[!!!!!!!!rq3,rq3!)$!!$R4SCA"bEfTPBh4`BA4S!!jdD'93FQpUC@0
|
||||||
|
d8'&dD!)!-J!#!$S!1`d!1J!#FJ!!!#`!1`!m!$d0!$`!!Q-!!!!X!$N!2J!r$3!
|
||||||
|
q!!*X!!8!,!!h!%$ri`d!3!!#EJ!!!#`!0`""!%)0!%%!!cF"!!!Y!$IriJ"$!%3
|
||||||
|
+rq)!"!TMDA4Y$3"$!!&Y!!!!-3!crq%$rq%!!3d!4!!"E3!!!$3!0[rJ!rrJrri
|
||||||
|
0!%)!!@m!!!!X!#hrh`[rh`!5-!!(G'KPF'&dD!!(G'KP8'&dD!(ri`!!$3!r!!&
|
||||||
|
Y!!!!0`!irpi+rpi!"!T849K8$3!p!!&[!!!!!!!!rpd,rpd!&M!!#A4SC@ePF'&
|
||||||
|
dD!!*G'KP6@93BA4S!J!l!!)!43"'$3"&!!*X!!)!2!!mrpcrf`(rh!!!!IrE!!!
|
||||||
|
#!%B!!J"(!%J0!%F!!R)!!!!m!%8!53"+$3"*!!*M!!!!2!""!%X!6!d!5`!#BJ!
|
||||||
|
!!$`!2`"0!%i0!%d!!@m!!!!m!$hrfJ[rfJ!J-!!1G'KPF(*[DQ9MG("KG'J!$R4
|
||||||
|
SC9"bEfTPBh43BA4S$3"1!!&Y!!!!23!q!%m-!%m!$3!(D@jME(9NC3!#!!!0!%`
|
||||||
|
!!@d!!!!r!%$rf3Vrf3!%#P4&@&30!%S!!@m!!!!!!!$rf![rf!!Q-!!4D@jME(9
|
||||||
|
NC@C[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S!J")!!)!8!"4$3"3!!*b!!!
|
||||||
|
!4J"9!&)!8`d!8J!#B`!!!%B!83"8!&80!&3!!Q)!!!"'!%m!9J"A$3"@!!*L!!!
|
||||||
|
!4J",!&J!@3d!@!!"E`!!!%B!4rrA#rrA!#!`!!jdD'9`FQpUC@0dF'&dD!!1G'K
|
||||||
|
P8(*[DQ9MG&"KG'J0!&N!!@d!!!"(!%S!@J`!@J!0!!GTEQ0XG@4P!!)!!!d!9`!
|
||||||
|
"E3!!!%X!6J"E$!"E!!d!"fp`C@jcFf`!!J!!$3"9!!&Y!!!!6`"3rpB+rpB!"!T
|
||||||
|
849K8$3"6!!&[!!!!!!!!rp8,rp8!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&
|
||||||
|
dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S!J"4!!)!A!"G$3"F!!*b!!!!9J"
|
||||||
|
K!&i!A`d!AJ!#B`!!!&B!A3"J!'%0!'!!!Q)!!!"@!&X!BJ"M$3"L!!&[!!!!9J"
|
||||||
|
Arp3,rp3!)$!!$R4SCA"bEfTPBh4`BA4S!!jdD'93FQpUC@0d8'&dD!d!B`!"E3!
|
||||||
|
!!&F!@J"N$!"N!!`!"Q0bHA"dE`!#!!!0!'%!!@d!!!"E!&crd`Vrd`!%#P4&@&3
|
||||||
|
0!&m!!@m!!!!!!!$rdJ[rdJ!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4Qp
|
||||||
|
XC'9b8'&dD!)!A3!#!'8!CJd!C3!#FJ!!!')!E3"R!'J0!'F!!Q-!!!"L!'N!D3"
|
||||||
|
U$3"T!!*L!!!!BJ"R!'X!E!d!D`!"E`!!!')!Brr4#rr4!#!`!!jdD'9`FQpUC@0
|
||||||
|
dF'&dD!!1G'KP8(*[DQ9MG&"KG'J0!'`!!@d!!!"M!'B!E3`!E3!*!!0cFf`!!J!
|
||||||
|
!$3"U!!&Y!!!!C`"Srp!+rp!!"!T849K8$3"S!!&[!!!!!!!!rmm,rmm!(M!!$A0
|
||||||
|
cE'C[E'4PFR"KG'J!$A0cE%C[E'4PFP"KG'J#!'B!!J"Z!'m0!'i!!R)!!!"Z!(8
|
||||||
|
!F!"a$3"`!!*M!!!!EJ"a!()!F`d!FJ!"E`!!!'i!Err1#rr1!#!`!!jdD'9`FQp
|
||||||
|
UC@0dF'&dD!!1G'KP8(*[DQ9MG&"KG'J0!(-!!@d!!!"[!($rc3Vrc3!%#P4&@&3
|
||||||
|
0!(%!!@m!!!!!!!$rc![rc!!Q-!!4Eh"PER0cE'C[E'4PFR"KG'J!%@p`C@jcFfa
|
||||||
|
'EfaNCA*3BA4S!J"[!!)!G!"e$3"d!!*X!!)!GJ"frm[rbJ(rb`!!!Ir+!!!#!(8
|
||||||
|
!!J"f!(F0!(B!!R)!!!"f!(X!H!"j$3"i!!&[!!!!GJ"hrmN,rmN!($!!$(4SC@p
|
||||||
|
XC'4PE'PYF`!-G'KP6faN4'9XD@ec$3"j!!*Z!!-!!!!!!(S!H`d!HJ!"-3!!!(J
|
||||||
|
!H[r)#[r)!!3+G(KNE!d!H`!"-3!!!(F!H2r(#[r(!!3+BA0MFJ)!G`!#!(`!I3d
|
||||||
|
!I!!#E!!#!(`!I2r'rm8"rmB!!!(ra3!!!J"p!!)!IJ"r$3"q!!*X!!%!I!"mrm3
|
||||||
|
!J!(ra!!!$!#!!%!!1L"NC@aPG'8JEfaN)'PZBfaeC'8kEh"PER0cE#"QEfaNCA)
|
||||||
|
JB@jN)(*PBh*PBA4P)'Pd)'0XC@&ZE(N!!J!!!J"r!!)!J3##$3#"!!*X!!)!I!"
|
||||||
|
mrm2r`J(r``!!!Ir#!!!#!))!!J#$!)30!)-!!e%!!!"m!+8!K3#'!)F0!)8!!@X
|
||||||
|
!!!"r!*`!L!)!L!!#!)N!LJd!L3!$53!#!(m!N[r"!)[r`!Vr`3!B,QeTFf0cE'0
|
||||||
|
d+LSU+J!!!!!!!*!!!#SU+LS0!)X!!Qi!!!"r!)i!M!#0$3#-!!)d!!!!K`#1rlm
|
||||||
|
!MJVr[`!%#Q0QEf`0!)i!!@d!!!#+!)d!M``!M`!0!!G[F'9ZFh0X!!)!!!d!M3!
|
||||||
|
#0!!!!(m!Krqq!*!!#[qq!!3+BfC[E!d!N!!!!@m!!!#$!)Er[3[r[3!Q-!!4D@j
|
||||||
|
ME(9NC@C[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S![r!!!!#!)S!!J#4rl`
|
||||||
|
0!*%!!dN!!J#6!*crZ`#5rlS+rlX!'#jMEh*PC'9XEbSU+LS!!!!!!!#3!!!U+LS
|
||||||
|
U$3#5!!%a!!!!N`#BrlN+rlN!"!TcC@aP![qk!!!#rl`!!!d!KJ!$8J!!!!!!!2q
|
||||||
|
irlIrYJVrZ!!B,Q&cBh*PFR)J+LSU+J!!!!!!!*!!!#SU+LS"rlF!!!,rYJ!!$3#
|
||||||
|
(!!*X!!%!T!#Nrl8!N`(rY3!!$!#6!"-!$5"TCfj[FQ8JCA*bEh)!!J!!!J#%!!)
|
||||||
|
!P!#9$3#8!!*X!!)!TJ#Qrl6rX`(rY!!!!Iqc!!!#!*8!!J#@!*F0!*B!!dN!!J#
|
||||||
|
Q!,lrX[qa!*J+rl)!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Iqa!!!'!*J
|
||||||
|
!!rq`!*N!QJVrX!!%#QY[Bf`0!*N!!@d!!!#U!+hrV`VrV`!%#Q0QEf`'!*S!!rq
|
||||||
|
Z!*[rV3VrVJ!%#QPZFfJ0!*X!!M3!!!#`!,MrV!#F#[qX!!3+BfC[E!d!R!!"E`!
|
||||||
|
!!,3!YrqV#rqV!#B`!"&TEQ0XG@4PCQpXC'9bF'&dD!!4D@jME(9NC8C[E'4PFP"
|
||||||
|
KG'J'rkd!!!)!P`!#!*d!RJd!R3!#FJ!!!,m!aJ#I!+!0!*m!!Q`"!!#r!-)!SIq
|
||||||
|
U$3#K!!%a!!!![`$#rkN+rkN!"!TbFfad!IqU!!!0!+!!!@m!!!!!!!$rU![rU!!
|
||||||
|
Z-!!9G'KPEQ9hCQpXC'9bFQ9QCA*PEQ0P!"9dD'91CAG'EfaNCA*5C@CPFQ9ZBf8
|
||||||
|
#!*i!!J#L!+-0!+)!!dN!!J$(!-lrT`#NrkB+rkF!'#jYDA0MFfaMG#SU+LS!!!!
|
||||||
|
!!!#3!!!U+LSU$3#N!!&[!!!!a`$+rk8,rk8!,M!!&A4SC@jPGfC[E'4PFR*PCQ9
|
||||||
|
bC@jMC3!9G'KP6Q9h4QpXC'9b8Q9QCA*PEQ0P![qQ!!!#!+-!!J#P!+B0!+8!!R)
|
||||||
|
!!!$2!0`!T`#S$3#R!!&Y!!!!c`$5!+N-!+N!$3!(Eh"PER0cE!!#!!!0!+J!!Qi
|
||||||
|
!!!!!!!!!UJ#V$3#U!!%a!!!!e`$Erk3+rk3!"!T`EQ&Y$3#V!!%a!!!!dJ$Ark-
|
||||||
|
+rk-!"!TcC@aP!J#Q!!)!V!#Y$3#X!!*X!!)!h3$Grk,rS3(rSJ!!!IqK!!!#!+d
|
||||||
|
!!J#Z!+m0!+i!!Q`!!3$G!0hrS!#`!IqJ!!!-!,!!(`!C)&0dBA*d)'eKDfPZCb"
|
||||||
|
dD'8JB@aTBA0PF`!#!!!#!+m!!J#a!,)0!,%!!dN!!J$G!3ArRrqH!,-+rjm!'#j
|
||||||
|
MEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!IqH!!!'!,-!!rqG!,3!Y3VrR3!%#QY
|
||||||
|
[Bf`0!,3!!@d!!!$K!16rR!VrR!!%#Q&XD@%'!,8!!rqE!,B!Y`VrQ`!%#QPZFfJ
|
||||||
|
0!,B!!M3!!!$R!1rrQJ#i#[qD!!3+BfC[E!d!Z!!"E`!!!1X!l[qC#rqC!$3`!"K
|
||||||
|
[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&
|
||||||
|
dD!B!Y`!$rjJ!ZIqA#[qB!!3+G'mJ)!d!Z3!#EJ!!!2)!r`#k!,X0!,S!!M3!!!$
|
||||||
|
i!2rrPJ#m#[q@!!3+CQPXC3d![!!"E3!!!2X!rJ#p$!#p!"-!$@p`C@jcFfaMEfj
|
||||||
|
Q,QJ!!J!!$3#l!!)d!!!!mJ$irj8![JVrP3!%#Q0QEf`0!,i!!@m!!!$f!2IrP![
|
||||||
|
rP!!@-!!*G'KPE@9`BA4S!!PdD'90C9"KG'J'rjF!!!)!XJ!#!,m!`!d![`!#E!!
|
||||||
|
#!3B""[q6rj)"rj-!!!(rNJ!!!J$!!!)!`3$#$3$"!!*b!!!""J%4!--!a!d!``!
|
||||||
|
#BJ!!!3B"$3$&!-B0!-8!!@m!!!%'!3RrN3[rN3!N-!!3Bh*jF(4[CQpXC'9bF'&
|
||||||
|
dD!!3Bh*jF(4[4QpXC'9b8'&dD!d!aJ!"E3!!!3N"$!$($!$(!!X!"6TKFfia!!)
|
||||||
|
!!!d!a!!"E`!!!!!!!2q3!![rN!!!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)!`J!
|
||||||
|
#!-J!b3d!b!!$53!#!4)"22q2rii!bJVrM`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!
|
||||||
|
!!'jeE'`"rii!!!B!bJ!$rid!b`$-#[q0!!3+DfpME!d!b`!"E3!!!4B"'Iq-#[q
|
||||||
|
-!!3+B@aTB3B!c!!$riX!c3$1#[q,!!3+D@jcD!d!c3!#0!!!!4`"*2q+!-m+riS
|
||||||
|
!"!TMCQpX$3$2!!&[!!!")!%MriN,riN!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9
|
||||||
|
bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J$1!!2rL!$3riF+riJ!"!T
|
||||||
|
dEb!J$3$3!!*Z!!!"*`%f!0%!dJd!d3!#0!!!!5m"0[q'!0-+riB!"!TQD@aP$3$
|
||||||
|
6!!&Y!!!"-J%e!03-!03!$!!'BA0Z-5jS!!)!!!d!dJ!#0!!!!5F",rq&!08+ri8
|
||||||
|
!"!TMCQpX$3$9!!&[!!!"+`%Zri3,ri3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!E
|
||||||
|
rK`!!!J$*!!)!eJ$A$3$@!!0*!!)"23&Rri2rJJ$B#[q$!"JZBfpbC@0bC@`U+LS
|
||||||
|
U!!!!!!!!N!!!ER9XE!(rJJ!!"J$B!!2rJ3$C!0S+ri%!"!TVEf0X$3$C!!&Y!!!
|
||||||
|
"33&%ri!+ri!!"!TKE'PK"J$D!!2rI`$E!0`+rhm!"!TTER0S$3$E!!)d!!!"4`&
|
||||||
|
2rhi!h3VrIJ!%#Q0QEf`0!0d!!@m!!!&,!8lrI3[rI3!d-!!BEh"PER0cE'PZBfa
|
||||||
|
eC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!0`!!rpm!0l
|
||||||
|
rH`VrI!!%#R4[)#!0!0i!!Qi!!!&5!@%!h`$J$3$I!!)d!!!"@J&KrhS!i3VrHJ!
|
||||||
|
%#QCTE'80!1%!!@d!!!&G!@!!iJ`!iJ!3!!TKFfiaAfeKBbjS!!)!!!d!i!!#0!!
|
||||||
|
!!9)"@[pj!1-+rhN!"!TMCQpX$3$M!!&[!!!"9J&CrhJ,rhJ!&$!!#(4PEA"`BA4
|
||||||
|
S!!KdC@e`8'&dD!ErH`!!!J$A!!)!j!$P$3$N!!*X!!)"D!&SrhIrGJ(rG`!!!Ip
|
||||||
|
f!!!#!18!!J$Q!1F0!1B!!R)!!!&S!A-!k!$T$3$S!!*L!!!"D!&[!1S!k`d!kJ!
|
||||||
|
"E`!!!@J"Drpe#rpe!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*
|
||||||
|
3BA4S$3$V!!&Y!!!"D`&Z!1`-!1`!#J!%1Q*TE`!#!!!0!1N!!@m!!!!!!!$rG![
|
||||||
|
rG!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J$R!!)!l3$Z$3$Y!!0*!!)"G!'Hrh2
|
||||||
|
rFJ$[#[pc!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(rFJ!!"J$[!!2rF3$
|
||||||
|
`!2%+rh%!"!TVEf0X$3$`!!&Y!!!"H!&lrh!+rh!!"!TKE'PK"J$a!!2rE`$b!2-
|
||||||
|
+rfm!"!TTER0S$3$b!!)d!!!"IJ''rfi!p!VrEJ!%#Q0QEf`0!23!!@m!!!'#!BA
|
||||||
|
rE3[rE3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
|
||||||
|
NC8C[E'4PFP"KG'J'!2-!!rpX!2ArD`VrE!!%#R4[)#!0!28!!Qi!!!'*!CJ!pJ$
|
||||||
|
h$3$f!!)d!!!"N3'BrfS!q!VrDJ!%#QCTE'80!2J!!@d!!!'8!CF!q3`!q3!,!!9
|
||||||
|
LD@mZD!!#!!!0!2F!!M3!!!'*!C(rD3$k#[pT!!3+BfC[E!d!qJ!"E`!!!Bd"N!$
|
||||||
|
rD![rD!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[pV!!!#!1i!!J$l!2`0!2X!!Q`
|
||||||
|
!!J'I!CrrCrpQ!IpR!!!"rfB!!!)!r!!#!2d!rJd!r3!#FJ!!!Cm"UJ$r!3!0!2m
|
||||||
|
!!Q)!!!'I!DB"!3%#$3%"!!&[!!!"R`'Lrf8,rf8!*$!!%'0bHA"dEfC[E'4PFR"
|
||||||
|
KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!3)!!@d!!!'L!D8"!``"!`!*!!-kBQB!!J!
|
||||||
|
!$3%!!!&[!!!!!!!!rf3,rf3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)!rJ!#!33
|
||||||
|
""3d""!!$53!#!DX"eIpMrf)""JVrB`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'j
|
||||||
|
eE'`"rf)!!!B""J!$rf%""`%)#[pK!!3+DfpME!d""`!"E3!!!Dm"X[pJ#[pJ!!3
|
||||||
|
+B@aTB3B"#!!$rem"#3%+#[pI!!3+D@jcD!d"#3!#0!!!!E8"[IpH!3X+rei!"!T
|
||||||
|
MCQpX$3%,!!&[!!!"Z3'mred,red!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&
|
||||||
|
dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J%+!!2rA!%-reX+re`!"!TdEb!
|
||||||
|
J$3%-!!*Z!!!"`!(2!3d"$Jd"$3!#0!!!!FJ"crpD!3m+reS!"!TQD@aP$3%2!!&
|
||||||
|
Y!!!"b`(1!4!-!4!!%!!+BQa[GfCTFfJZD!!#!!!0!3i!!M3!!!(!!FMr@3%4#[p
|
||||||
|
C!!3+BfC[E!d"%3!"E`!!!F3"arpB#rpB!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J
|
||||||
|
'reX!!!)""3!#!4)"%`d"%J!#E!!#!GB"e[pAreB"reF!!!(r9J!!!J%6!!)"&!%
|
||||||
|
9$3%8!!*b!!!"eJ(K!4B"&`d"&J!#BJ!!!GB"h3%B!4N0!4J!!@m!!!(@!GRr93[
|
||||||
|
r93!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"'3!"E3!
|
||||||
|
!!GN"h!%D$!%D!!N!!cTLEJ!#!!!0!4F!!@m!!!!!!!$r9![r9!!8-!!)G'9YF("
|
||||||
|
KG'J!#(4PEA"3BA4S!J%9!!)"'`%F$3%E!!0*!!)"iJ)-re2r8J%G#[p6!"JZBfp
|
||||||
|
bC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(r8J!!"J%G!!2r83%H!4m+re%!"!TVEf0
|
||||||
|
X$3%H!!&Y!!!"jJ(Tre!+re!!"!TKE'PK"J%I!!2r6`%J!5%+rdm!"!TTER0S$3%
|
||||||
|
J!!)d!!!"l!(drdi")JVr6J!%#Q0QEf`0!5)!!@m!!!(`!I2r63[r63!d-!!BEh"
|
||||||
|
PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J
|
||||||
|
'!5%!!rp-!52r5`Vr6!!%#R4[)#!0!5-!!Qi!!!(h!JB"*!%P$3%N!!)d!!!"r`)
|
||||||
|
'rdS"*JVr5J!%#QCTE'80!5B!!@d!!!)#!J8"*``"*`!+!!4LELjS!!)!!!d"*3!
|
||||||
|
#0!!!!IF"rrp*!5J+rdN!"!TMCQpX$3%S!!&[!!!"q`(qrdJ,rdJ!&$!!#(4PEA"
|
||||||
|
`BA4S!!KdC@e`8'&dD!Er5`!!!J%F!!)"+3%U$3%T!!*X!!)#$3)0rdIr4J(r4`!
|
||||||
|
!!Ip'!!!#!5S!!J%V!5`0!5X!!R)!!!)0!KJ",3%Z$3%Y!!*L!!!#$3)8!5m"-!d
|
||||||
|
",`!"E`!!!Jd#%2p&#rp&!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'Efa
|
||||||
|
NCA*3BA4S$3%`!!&Y!!!#%!)6!6%-!6%!$3!(1Q*eCQCPFJ!#!!!0!5i!!@m!!!!
|
||||||
|
!!!$r4![r4!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J%X!!)"-J%c$3%b!!0*!!)
|
||||||
|
#'3*$rd2r3J%d#[p$!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(r3J!!"J%
|
||||||
|
d!!2r33%e!6B+rd%!"!TVEf0X$3%e!!&Y!!!#(3)Jrd!+rd!!"!TKE'PK"J%f!!2
|
||||||
|
r2`%h!6J+rcm!"!TTER0S$3%h!!)d!!!#)`)Vrci"13Vr2J!%#Q0QEf`0!6N!!@m
|
||||||
|
!!!)R!LVr23[r23!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0
|
||||||
|
-5@jME(9NC8C[E'4PFP"KG'J'!6J!!rmm!6Vr1`Vr2!!%#R4[)#!0!6S!!Qi!!!)
|
||||||
|
Z!Md"1`%m$3%l!!)d!!!#0J)prcS"23Vr1J!%#QCTE'80!6d!!@d!!!)j!M`"2J`
|
||||||
|
"2J!1!!KLG@CQCA)ZD!!#!!!0!6`!!M3!!!)Z!MEr13%r#[mj!!3+BfC[E!d"2`!
|
||||||
|
"E`!!!M)#0Imi#rmi!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rcX!!!)"-`!#!8!
|
||||||
|
"33d"3!!#E!!#!N3#42mhrcB"rcF!!!(r0J!!!J&"!!)"3J&$$3&#!!*b!!!#4!*
|
||||||
|
2!83"43d"4!!#BJ!!!N3#5`&'!8F0!8B!!@m!!!*%!NIr03[r03!N-!!3Bh*jF(4
|
||||||
|
[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"4`!"E3!!!NF#5J&)$!&)!!X
|
||||||
|
!"6TMBA0d!!)!!!d"43!"E`!!!!!!!2md#rmd!"3`!!KdC@e`F'&dD!!)G'9YF&"
|
||||||
|
KG'J#!8-!!J&*!8S0!8N!!dN!!J*3!RVr-rmb!8X+rc-!'#jMEh*PBh*PE#SU+LS
|
||||||
|
!!!!!!!#3!!"ZG@aX!Imb!!!'!8X!!rma!8`"63Vr-3!%#QY[Bf`0!8`!!@d!!!*
|
||||||
|
8!PIr-!Vr-!!%#Q&XD@%'!8d!!rm[!8i"6`Vr,`!%#QPZFfJ0!8i!!M3!!!*D!Q,
|
||||||
|
r,J&3#[mZ!!3+BfC[E!d"8!!"E`!!!Pi#BImY#rmY!$3`!"K[F'9ZFh0XD@jME(9
|
||||||
|
NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B"6`!$rb`"8Im
|
||||||
|
V#[mX!!3+G'mJ)!d"83!#EJ!!!Q8#G!&5!9-0!9)!!M3!!!*Y!R6r+J&8#[mU!!3
|
||||||
|
+CQPXC3d"9!!"E3!!!R!#F`&9$!&9!!`!"Q0KFh3ZD!!#!!!0!9-!!M3!!!*P!Qh
|
||||||
|
r+3&@#[mT!!3+BfC[E!d"9J!"E`!!!QN#E2mS#rmS!"3`!!KdC@e`F'&dD!!)G'9
|
||||||
|
YF&"KG'J'rbX!!!)"5J!#!9F"@!d"9`!#E!!#!RX#HrmRrbB"rbF!!!(r*J!!!J&
|
||||||
|
B!!)"@3&D$3&C!!*b!!!#H`+'!9X"A!d"@`!#BJ!!!RX#JJ&G!9i0!9d!!@m!!!*
|
||||||
|
l!Rlr*3[r*3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d
|
||||||
|
"AJ!"E3!!!Ri#J3&I$!&I!!X!"6TMEfe`!!)!!!d"A!!"E`!!!!!!!2mN#rmN!"3
|
||||||
|
`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!9S!!J&J!@%0!@!!!dN!!J+(!V(r)rmL!@)
|
||||||
|
+rb-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!ImL!!!'!@)!!rmK!@-"C!V
|
||||||
|
r)3!%#QY[Bf`0!@-!!@d!!!+,!Slr)!Vr)!!%#Q&XD@%'!@3!!rmI!@8"CJVr(`!
|
||||||
|
%#QPZFfJ0!@8!!M3!!!+4!TRr(J&R#[mH!!3+BfC[E!d"C`!"E`!!!T8#Q2mG#rm
|
||||||
|
G!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4Qp
|
||||||
|
XC'9b8'&dD!B"CJ!$ra`"D2mE#[mF!!3+G'mJ)!d"D!!#EJ!!!T`#U`&T!@S0!@N
|
||||||
|
!!M3!!!+N!U[r'J&V#[mD!!3+CQPXC3d"D`!"E3!!!UF#UJ&X$!&X!!`!"Q0[EA!
|
||||||
|
ZD!!#!!!0!@S!!M3!!!+F!U6r'3&Y#[mC!!3+BfC[E!d"E3!"E`!!!U!#SrmB#rm
|
||||||
|
B!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'raX!!!)"B3!#!@i"E`d"EJ!#E!!#!V)
|
||||||
|
#X[mAraB"raF!!!(r&J!!!J&[!!)"F!&a$3&`!!*b!!!#XJ+p!A)"F`d"FJ!#BJ!
|
||||||
|
!!V)#Z3&d!A80!A3!!@m!!!+b!VAr&3[r&3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!
|
||||||
|
3Bh*jF(4[4QpXC'9b8'&dD!d"G3!"E3!!!V8#Z!&f$!&f!!X!"6TMEfjQ!!)!!!d
|
||||||
|
"F`!"E`!!!!!!!2m8#rm8!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!A%!!J&h!AJ
|
||||||
|
0!AF!!dN!!J+q!ZMr%rm5!AN+ra-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@a
|
||||||
|
X!Im5!!!'!AN!!rm4!AS"H`Vr%3!%#QY[Bf`0!AS!!@d!!!,#!XAr%!Vr%!!%#Q&
|
||||||
|
XD@%'!AX!!rm2!A`"I3Vr$`!%#QPZFfJ0!A`!!M3!!!,)!Y$r$J&q#[m1!!3+BfC
|
||||||
|
[E!d"IJ!"E`!!!X`#crm0#rm0!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J
|
||||||
|
!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B"I3!$r``"Irm,#[m-!!3+G'mJ)!d
|
||||||
|
"I`!#EJ!!!Y-#iJ'!!B%0!B!!!M3!!!,E!Z,r#J'##[m+!!3+CQPXC3d"JJ!"E3!
|
||||||
|
!!Yi#i3'$$!'$!!`!"Q0[EQBZD!!#!!!0!B%!!M3!!!,6!Y[r#3'%#[m*!!3+BfC
|
||||||
|
[E!d"K!!"E`!!!YF#f[m)#rm)!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'r`X!!!)
|
||||||
|
"H!!#!B8"KJd"K3!#E!!#!ZN#kIm(r`B"r`F!!!(r"J!!!J''!!)"K`')$3'(!!*
|
||||||
|
b!!!#k3,d!BN"LJd"L3!#BJ!!!ZN#m!',!B`0!BX!!@m!!!,T!Zcr"3[r"3!N-!!
|
||||||
|
3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"M!!"E3!!!Z`#l`'
|
||||||
|
0$!'0!!S!"$TNCA-!!J!!$3'+!!&[!!!!!!!!r`3,r`3!&$!!#(4PEA"`BA4S!!K
|
||||||
|
dC@e`8'&dD!)"L!!#!Bi"M`d"MJ!$53!#![8$(rm$r`)"N!!+r`-!'#jMEh*PBh*
|
||||||
|
PE#SU+LS!!!!!!!#3!!"ZG@aX!Im#!!!'!C!!!!2r!3'4!C)+r`%!"!TVEf0X$3'
|
||||||
|
4!!&Y!!!#q3,mr`!+r`!!"!TKE'PK"J'5!!2qr`'6!C3+r[m!"!TTER0S$3'6!!)
|
||||||
|
d!!!#r`-(r[i"P3VqrJ!%#Q0QEf`0!C8!!@m!!!-$!`Eqr3[qr3!d-!!BEh"PER0
|
||||||
|
cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!C3
|
||||||
|
!!rlm!CEqq`Vqr!!%#R4[)#!0!CB!!Qi!!!-+!aN"P`'B$3'A!!)d!!!$%J-Cr[S
|
||||||
|
"Q3VqqJ!%#QCTE'80!CN!!@d!!!-9!aJ"QJ`"QJ!,!!9NCA-ZD!!#!!!0!CJ!!M3
|
||||||
|
!!!-+!a,qq3'E#[lj!!3+BfC[E!d"Q`!"E`!!!`i$%Ili#rli!"3`!!KdC@e`F'&
|
||||||
|
dD!!)G'9YF&"KG'J'r[X!!!)"M`!#!C`"R3d"R!!#E!!#!b!$)2lhr[B"r[F!!!(
|
||||||
|
qpJ!!!J'G!!)"RJ'I$3'H!!*b!!!$)!-V!D!"S3d"S!!#BJ!!!b!$*`'L!D-0!D)
|
||||||
|
!!@m!!!-J!b2qp3[qp3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9
|
||||||
|
b8'&dD!d"S`!"E3!!!b-$*J'N$!'N!!N!!cTND!!#!!!0!D%!!@m!!!!!!!$qp![
|
||||||
|
qp!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J'I!!)"T3'Q$3'P!!0*!!)$,!0@r[2
|
||||||
|
qmJ'R#[lc!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(qmJ!!"J'R!!2qm3'
|
||||||
|
S!DN+r[%!"!TVEf0X$3'S!!&Y!!!$-!-cr[!+r[!!"!TKE'PK"J'T!!2ql`'U!DX
|
||||||
|
+rZm!"!TTER0S$3'U!!)d!!!$0J-qrZi"V!VqlJ!%#Q0QEf`0!D`!!@m!!!-k!ch
|
||||||
|
ql3[ql3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
|
||||||
|
NC8C[E'4PFP"KG'J'!DX!!rlX!Dhqk`Vql!!%#R4[)#!0!Dd!!Qi!!!0"!e!"VJ'
|
||||||
|
[$3'Z!!)d!!!$5303rZS"X!VqkJ!%#QCTE'80!E!!!@d!!!0-!dm"X3`"X3!+!!4
|
||||||
|
ND#jS!!)!!!d"V`!#0!!!!d%$5IlT!E)+rZN!"!TMCQpX$3'b!!&[!!!$430)rZJ
|
||||||
|
,rZJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eqk`!!!J'Q!!)"X`'d$3'c!!*X!!)
|
||||||
|
$9`0ArZIqjJ(qj`!!!IlQ!!!#!E3!!J'e!EB0!E8!!R)!!!0A!f)"Y`'i$3'h!!*
|
||||||
|
L!!!$9`0H!EN"ZJd"Z3!"E`!!!eF$@[lP#rlP!#3`!""MFRP`G'pQEfaNCA*`BA4
|
||||||
|
S!""MFRP`G'p'EfaNCA*3BA4S$3'k!!&Y!!!$@J0G!EX-!EX!#J!%1Q4cB3!#!!!
|
||||||
|
0!EJ!!@m!!!!!!!$qj![qj!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J'f!!)"[!'
|
||||||
|
p$3'm!!0*!!)$B`10rZ2qiJ'q#[lM!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9
|
||||||
|
XE!(qiJ!!"J'q!!2qi3'r!F!+rZ%!"!TVEf0X$3'r!!&Y!!!$C`0UrZ!+rZ!!"!T
|
||||||
|
KE'PK"J(!!!2qh`("!F)+rYm!"!TTER0S$3("!!)d!!!$E30erYi"``VqhJ!%#Q0
|
||||||
|
QEf`0!F-!!@m!!!0a!h6qh3[qh3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4
|
||||||
|
S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!F)!!rlF!F6qf`Vqh!!%#R4[)#!
|
||||||
|
0!F3!!Qi!!!0i!iF"a3('$3(&!!)d!!!$J!1(rYS"a`VqfJ!%#QCTE'80!FF!!@d
|
||||||
|
!!!1$!iB"b!`"b!!,!!9NFf%ZD!!#!!!0!FB!!M3!!!0i!i$qf3(*#[lC!!3+BfC
|
||||||
|
[E!d"b3!"E`!!!h`$IrlB#rlB!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rYX!!!)
|
||||||
|
"[3!#!FS"b`d"bJ!#E!!#!ii$M[lArYB"rYF!!!(qeJ!!!J(,!!)"c!(0$3(-!!*
|
||||||
|
b!!!$MJ1C!Fi"c`d"cJ!#BJ!!!ii$P3(3!G%0!G!!!@m!!!11!j(qe3[qe3!N-!!
|
||||||
|
3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"d3!"E3!!!j%$P!(
|
||||||
|
5$!(5!!S!"$TPFR)!!J!!$3(2!!&[!!!!!!!!rY3,rY3!&$!!#(4PEA"`BA4S!!K
|
||||||
|
dC@e`8'&dD!)"c3!#!G-"e!d"d`!$53!#!jS$a2l6rY)"e3Vqd`!B,Q0[FQ9MFQ9
|
||||||
|
X+LSU+J!!!!!!!*!!!'jeE'`"rY)!!!B"e3!$rY%"eJ(A#[l4!!3+DfpME!d"eJ!
|
||||||
|
"E3!!!ji$SIl3#[l3!!3+B@aTB3B"e`!$rXm"f!(C#[l2!!3+D@jcD!d"f!!#0!!
|
||||||
|
!!k3$V2l1!GS+rXi!"!TMCQpX$3(D!!&[!!!$U!1VrXd,rXd!0$!!''p`C@jcFfa
|
||||||
|
TEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J(C!!2
|
||||||
|
qc!(ErXX+rX`!"!TdEb!J$3(E!!*Z!!!$V`1q!G`"h3d"h!!#0!!!!lF$[[l+!Gi
|
||||||
|
+rXS!"!TQD@aP$3(H!!&Y!!!$ZJ1p!Gm-!Gm!#`!&CA*b,QJ!!J!!$3(G!!)d!!!
|
||||||
|
$V`1hrXN"i!Vqb3!%#Q0QEf`0!H!!!@m!!!1c!lEqb![qb!!8-!!)G'9YF("KG'J
|
||||||
|
!#(4PEA"3BA4S"[l,!!!#!G3!!J(K!H)0!H%!!Q`!!J2&!mAqarl'!Il(!!!"rXB
|
||||||
|
!!!)"iJ!#!H-"j!d"i`!#FJ!!!m8$d!(P!HB0!H8!!Q)!!!2&!m`"j`(S$3(R!!&
|
||||||
|
[!!!$a32)rX8,rX8!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC[E'4PFP"
|
||||||
|
KG'J0!HJ!!@d!!!2)!mX"k3`"k3!+!!3kCAC`!!)!!!d"jJ!"E`!!!!!!!2l%#rl
|
||||||
|
%!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!H3!!J(U!HX0!HS!!dN!!J24!r[q`rl
|
||||||
|
#!H`+rX-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Il#!!!'!H`!!rl"!Hd
|
||||||
|
"lJVq`3!%#QY[Bf`0!Hd!!@d!!!29!pMq`!Vq`!!%#Q&XD@%'!Hi!!rkr!Hm"m!V
|
||||||
|
q[`!%#QPZFfJ0!Hm!!M3!!!2E!q2q[J(a#[kq!!3+BfC[E!d"m3!"E`!!!pm$i[k
|
||||||
|
p#rkp!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4
|
||||||
|
P4QpXC'9b8'&dD!B"m!!$rV`"m[kl#[km!!3+G'mJ)!d"mJ!#EJ!!!qB$p3(c!I3
|
||||||
|
0!I-!!M3!!!2Z!rAqZJ(e#[kk!!3+CQPXC3d"p3!"E3!!!r%$p!(f$!(f!!X!"@9
|
||||||
|
fF#jS!!)!!!d"p!!#0!!!!qB$l[kj!IF+rVN!"!TMCQpX$3(h!!&[!!!$kJ2YrVJ
|
||||||
|
,rVJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!EqZ`!!!J(V!!)"q!(j$3(i!!*X!!)
|
||||||
|
$r!2mrVIqYJ(qY`!!!Ikf!!!#!IN!!J(k!IX0!IS!!R)!!!2m"!F"r!(p$3(m!!*
|
||||||
|
L!!!$r!3$!Ii"r`d"rJ!"E`!!!r`$rrke#rke!#3`!""MFRP`G'pQEfaNCA*`BA4
|
||||||
|
S!""MFRP`G'p'EfaNCA*3BA4S$3(r!!&Y!!!$r`3#!J!-!J!!#`!&1QKYB@-!!J!
|
||||||
|
!$3(p!!&[!!!!!!!!rV3,rV3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)"q`!#!J%
|
||||||
|
#!Jd#!3!$53!#"!J%-[kcrV)#!`VqX`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'j
|
||||||
|
eE'`"rV)!!!B#!`!$rV%#"!)&#[ka!!3+DfpME!d#"!!"E3!!"!`%$rk`#[k`!!3
|
||||||
|
+B@aTB3B#"3!$rUm#"J)(#[k[!!3+D@jcD!d#"J!#0!!!"")%'[kZ!JJ+rUi!"!T
|
||||||
|
MCQpX$3))!!&[!!!%&J3CrUd,rUd!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&
|
||||||
|
dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J)(!!2qV!)*rUX+rU`!"!TdEb!
|
||||||
|
J$3)*!!*Z!!!%(33X!JS##`d##J!#0!!!"#8%,2kU!J`+rUS!"!TQD@aP$3)-!!&
|
||||||
|
Y!!!%+!3V!Jd-!Jd!$!!'D'eKBbjS!!)!!!d##`!#0!!!""d%*IkT!Ji+rUN!"!T
|
||||||
|
MCQpX$3)1!!&[!!!%)33NrUJ,rUJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!EqU`!
|
||||||
|
!!J)#!!)#$`)3$3)2!!*X!!)%-`3crUIqTJ(qT`!!!IkQ!!!#!K!!!J)4!K)0!K%
|
||||||
|
!!R)!!!3c"$i#%`)8$3)6!!*L!!!%-`3k!K8#&Jd#&3!"E`!!"$-%0[kP#rkP!#3
|
||||||
|
`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3)@!!&Y!!!%0J3
|
||||||
|
j!KF-!KF!#`!&1QPNC@%!!J!!$3)8!!&[!!!!!!!!rU3,rU3!&$!!#(4PEA"`BA4
|
||||||
|
S!!KdC@e`8'&dD!)#%J!#!KJ#'3d#'!!$53!#"$m%DIkMrU)#'JVqS`!B,Q0[FQ9
|
||||||
|
MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rU)!!!B#'J!$rU%#'`)F#[kK!!3+DfpME!d
|
||||||
|
#'`!"E3!!"%-%4[kJ#[kJ!!3+B@aTB3B#(!!$rTm#(3)H#[kI!!3+D@jcD!d#(3!
|
||||||
|
#0!!!"%N%8IkH!Km+rTi!"!TMCQpX$3)I!!&[!!!%6343rTd,rTd!0$!!''p`C@j
|
||||||
|
cFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J)
|
||||||
|
H!!2qR!)JrTX+rT`!"!TdEb!J$3)J!!*Z!!!%9!4M!L%#)Jd#)3!#0!!!"&`%Brk
|
||||||
|
D!L-+rTS!"!TQD@aP$3)M!!&Y!!!%A`4L!L3-!L3!$!!'D@4PB5jS!!)!!!d#)J!
|
||||||
|
#0!!!"&3%A2kC!L8+rTN!"!TMCQpX$3)P!!&[!!!%@!4ErTJ,rTJ!&$!!#(4PEA"
|
||||||
|
`BA4S!!KdC@e`8'&dD!EqQ`!!!J)C!!)#*J)R$3)Q!!*X!!)%DJ4UrTIqPJ(qP`!
|
||||||
|
!!Ik@!!!#!LF!!J)S!LN0!LJ!!R)!!!4U"(8#+J)V$3)U!!*L!!!%DJ4a!L`#,3d
|
||||||
|
#,!!"E`!!"'S%EIk9#rk9!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'Efa
|
||||||
|
NCA*3BA4S$3)Y!!&Y!!!%E34`!Li-!Li!$!!'1QaSBA0S!!)!!!d#+`!"E`!!!!!
|
||||||
|
!!2k8#rk8!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!LN!!J)[!M!0!Lm!!dN!!J4
|
||||||
|
f"+$qNrk5!M%+rT-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ik5!!!'!M%
|
||||||
|
!!rk4!M)#-`VqN3!%#QY[Bf`0!M)!!@d!!!4k"(hqN!!+rT!!!!3+B@aTB3B#-`!
|
||||||
|
$rSm#0!)e#[k2!!3+D@jcD!d#0!!#0!!!")!%L2k1!MB+rSi!"!TMCQpX$3)f!!&
|
||||||
|
[!!!%K!5(rSd,rSd!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP0
|
||||||
|
66%PZBfaeC'9'EfaNCA*3BA4S"J)e!!2qM!)hrSX+rS`!"!TdEb!J$3)h!!*Z!!!
|
||||||
|
%L`5D!MJ#13d#1!!#0!!!"*-%Q[k+!MS+rSS!"!TQD@aP$3)k!!&Y!!!%PJ5C!MX
|
||||||
|
-!MX!$3!(E'KKFfJZD!!#!!!0!MN!!M3!!!5,"*2qL3)m#[k*!!3+BfC[E!d#2!!
|
||||||
|
"E`!!")m%N[k)#rk)!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rSX!!!)#-!!#!Md
|
||||||
|
#2Jd#23!#E!!#"+%%SIk(rSB"rSF!!!(qKJ!!!J)q!!)#2`*!$3)r!!*b!!!%S35
|
||||||
|
X!N%#3Jd#33!#BJ!!"+%%U!*$!N30!N-!!@m!!!5K"+6qK3[qK3!N-!!3Bh*jF(4
|
||||||
|
[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d#4!!"E3!!"+3%T`*&$!*&!!S
|
||||||
|
!"$TYC$)!!J!!$3*#!!&[!!!!!!!!rS3,rS3!&$!!#(4PEA"`BA4S!!KdC@e`8'&
|
||||||
|
dD!)#3!!#!NB#4`d#4J!$53!#"+d%erk$rS)#5!VqJ`!B,Q0[FQ9MFQ9X+LSU+J!
|
||||||
|
!!!!!!*!!!'jeE'`"rS)!!!B#5!!$rS%#53*+#[k"!!3+DfpME!d#53!"E3!!",%
|
||||||
|
%Y2k!#[k!!!3+B@aTB3B#5J!$rRm#5`*-#[jr!!3+D@jcD!d#5`!#0!!!",F%[rj
|
||||||
|
q!Nd+rRi!"!TMCQpX$3*0!!&[!!!%Z`5qrRd,rRd!0$!!''p`C@jcFfaTEQ0XG@4
|
||||||
|
PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J*-!!2qI!*1rRX
|
||||||
|
+rR`!"!TdEb!J$3*1!!*Z!!!%`J64!Nm#8!d#6`!#0!!!"-S%dIjk!P%+rRS!"!T
|
||||||
|
QD@aP$3*4!!&Y!!!%c363!P)-!P)!#`!&E@3b,QJ!!J!!$3*3!!)d!!!%`J6+rRN
|
||||||
|
#8`VqH3!%#Q0QEf`0!P-!!@m!!!6'"-RqH![qH!!8-!!)G'9YF("KG'J!#(4PEA"
|
||||||
|
3BA4S"[jl!!!#!NF!!J*8!P80!P3!!Q`!!J6B"0MqGrjf!Ijh!!!"rRB!!!)#93!
|
||||||
|
#!PB#9`d#9J!#FJ!!"0J%i`*B!PN0!PJ!!Q)!!!6B"0m#@J*E$3*D!!&[!!!%f!6
|
||||||
|
ErR8,rR8!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!PX
|
||||||
|
!!@d!!!6E"0i#A!`#A!!+!!3kE@3e!!)!!!d#@3!"E`!!!!!!!2jd#rjd!"3`!!K
|
||||||
|
dC@e`F'&dD!!)G'9YF&"KG'J#!PF!!J*G!Pi0!Pd!!dN!!J6N"3lqFrjb!Pm+rR-
|
||||||
|
!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ijb!!!'!Pm!!rja!Q!#B3VqF3!
|
||||||
|
%#QY[Bf`0!Q!!!@d!!!6S"1[qF!VqF!!%#Q&XD@%'!Q%!!rj[!Q)#B`VqE`!%#QP
|
||||||
|
ZFfJ0!Q)!!M3!!!6Z"2EqEJ*N#[jZ!!3+BfC[E!d#C!!"E`!!"2)%pIjY#rjY!$3
|
||||||
|
`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9
|
||||||
|
b8'&dD!B#B`!$rQ`#CIjV#[jX!!3+G'mJ)!d#C3!#EJ!!"2N&#!*Q!QF0!QB!!M3
|
||||||
|
!!!8""3MqDJ*S#[jU!!3+CQPXC3d#D!!"E3!!"33&"`*T$!*T!!X!"@eN05jS!!)
|
||||||
|
!!!d#C`!#0!!!"2N&!IjT!QS+rQN!"!TMCQpX$3*U!!&[!!!%r38!rQJ,rQJ!&$!
|
||||||
|
!#(4PEA"`BA4S!!KdC@e`8'&dD!EqD`!!!J*H!!)#D`*X$3*V!!*X!!)&$`82rQI
|
||||||
|
qCJ(qC`!!!IjQ!!!#!Q`!!J*Y!Qi0!Qd!!R)!!!82"4S#E`*`$3*[!!*L!!!&$`8
|
||||||
|
@!R%#FJd#F3!"E`!!"3m&%[jP#rjP!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP
|
||||||
|
`G'p'EfaNCA*3BA4S$3*b!!&Y!!!&%J89!R--!R-!#`!&1QeNBc)!!J!!$3*`!!&
|
||||||
|
[!!!!!!!!rQ3,rQ3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)#EJ!#!R3#G3d#G!!
|
||||||
|
$53!#"4X&4IjMrQ)#GJVqB`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rQ)
|
||||||
|
!!!B#GJ!$rQ%#G`*i#[jK!!3+DfpME!d#G`!"E3!!"4m&)[jJ#[jJ!!3+B@aTB3B
|
||||||
|
#H!!$rPm#H3*k#[jI!!3+D@jcD!d#H3!#0!!!"58&,IjH!RX+rPi!"!TMCQpX$3*
|
||||||
|
l!!&[!!!&+38XrPd,rPd!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"
|
||||||
|
PEP066%PZBfaeC'9'EfaNCA*3BA4S"J*k!!2qA!*mrPX+rP`!"!TdEb!J$3*m!!*
|
||||||
|
Z!!!&-!8r!Rd#IJd#I3!#0!!!"6J&2rjD!Rm+rPS!"!TQD@aP$3*r!!&Y!!!&1`8
|
||||||
|
q!S!-!S!!$!!'E@4M-LjS!!)!!!d#IJ!#0!!!"6!&12jC!S%+rPN!"!TMCQpX$3+
|
||||||
|
"!!&[!!!&0!8hrPJ,rPJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eq@`!!!J*e!!)
|
||||||
|
#JJ+$$3+#!!*X!!)&4J9'rPIq9J(q9`!!!Ij@!!!#!S-!!J+%!S80!S3!!R)!!!9
|
||||||
|
'"9%#KJ+($3+'!!*L!!!&4J90!SJ#L3d#L!!"E`!!"8B&5Ij9#rj9!#3`!""MFRP
|
||||||
|
`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3+*!!&Y!!!&539-!SS-!SS
|
||||||
|
!$J!)1QpLDQ9MG(-!!J!!$3+(!!&[!!!!!!!!rP3,rP3!&$!!#(4PEA"`BA4S!!K
|
||||||
|
dC@e`8'&dD!)#K3!#!SX#M!d#L`!$53!#"9)&I2j6rP)#M3Vq8`!B,Q0[FQ9MFQ9
|
||||||
|
X+LSU+J!!!!!!!*!!!'jeE'`"rP)!!!B#M3!$rP%#MJ+2#[j4!!3+DfpME!d#MJ!
|
||||||
|
"E3!!"9B&@Ij3#[j3!!3+B@aTB3B#M`!$rNm#N!!#N3Vq6`!%#QPZFfJ0!T!!!!)
|
||||||
|
d!!!&A!9NrNi#NJVq6J!%#Q0QEf`0!T)!!@m!!!9J"@2q63[q63!d-!!BEh"PER0
|
||||||
|
cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!T%
|
||||||
|
!!rj-!T2q5`Vq6!!%#R4[)#!0!T-!!Qi!!!9R"AB#P!+9$3+8!!)d!!!&E`9frNS
|
||||||
|
#PJVq5J!%#QCTE'80!TB!!@d!!!9b"A8#P``#P`!2!!P[BQTPBh4c,QJ!!J!!$3+
|
||||||
|
9!!)d!!!&C`9[rNN#Q!Vq53!%#Q0QEf`0!TJ!!@m!!!9V"@lq5![q5!!8-!!)G'9
|
||||||
|
YF("KG'J!#(4PEA"3BA4S"[j,!!!#!S`!!J+C!TS0!TN!!Q`!!J9p"Ahq4rj'!Ij
|
||||||
|
(!!!"rNB!!!)#QJ!#!TX#R!d#Q`!#FJ!!"Ad&L!+G!Ti0!Td!!Q)!!!9p"B3#R`+
|
||||||
|
J$3+I!!&[!!!&I3@!rN8,rN8!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC
|
||||||
|
[E'4PFP"KG'J0!U!!!@d!!!@!"B-#S3`#S3!+!!3kF'9Y!!)!!!d#RJ!"E`!!!!!
|
||||||
|
!!2j%#rj%!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!T`!!J+L!U-0!U)!!dN!!J@
|
||||||
|
*"E2q3rj#!U3+rN-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ij#!!!'!U3
|
||||||
|
!!rj"!U8#TJVq33!%#QY[Bf`0!U8!!@d!!!@0"C!!rN!+rN!!"!TKE'PK"J+Q!!2
|
||||||
|
q2`+R!UJ+rMm!"!TTER0S$3+R!!)d!!!&N`@ErMi#U3Vq2J!%#Q0QEf`0!UN!!@m
|
||||||
|
!!!@A"CVq23[q23!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0
|
||||||
|
-5@jME(9NC8C[E'4PFP"KG'J'!UJ!!rim!UVq1`Vq2!!%#R4[)#!0!US!!Qi!!!@
|
||||||
|
H"Dd#U`+X$3+V!!)d!!!&TJ@YrMS#V3Vq1J!%#QCTE'80!Ud!!@d!!!@T"D`#VJ`
|
||||||
|
#VJ!,!!9`C@dZD!!#!!!0!U`!!M3!!!@H"DEq13+[#[ij!!3+BfC[E!d#V`!"E`!
|
||||||
|
!"D)&TIii#rii!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rMX!!!)#S`!#!V!#X3d
|
||||||
|
#X!!$53!#"E3&h[ihrMB#XJVq0`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`
|
||||||
|
"rMB!!!B#XJ!$rM8#X`+d#[ie!!3+DfpME!d#X`!"E3!!"EJ&Zrid#[id!!3+B@a
|
||||||
|
TB3B#Y!!$rM-#Y3+f#[ic!!3+D@jcD!d#Y3!#0!!!"Ei&a[ib!VF+rM)!"!TMCQp
|
||||||
|
X$3+h!!&[!!!&`JA&rM%,rM%!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!
|
||||||
|
BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J+f!!2q-!+irLm+rM!!"!TdEb!J$3+
|
||||||
|
i!!*Z!!!&b3AB!VN#ZJd#Z3!#0!!!"G%&f2iZ!VX+rLi!"!TQD@aP$3+l!!&Y!!!
|
||||||
|
&e!AA!V`-!V`!$!!'F'9Y-LjS!!)!!!d#ZJ!#0!!!"FN&dIiY!Vd+rLd!"!TMCQp
|
||||||
|
X$3+p!!&[!!!&c3A3rL`,rL`!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eq,`!!!J+
|
||||||
|
a!!)#[J+r$3+q!!*X!!)&h`AIrL[q+J(q+`!!!IiU!!!#!Vm!!J,!!X%0!X!!!R)
|
||||||
|
!!!AI"HS#`J,$$3,#!!*L!!!&h`AQ!X3#a3d#a!!"E`!!"Gm&i[iT#riT!#3`!""
|
||||||
|
MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3,&!!&Y!!!&iJAP!XB
|
||||||
|
-!XB!$3!(1R"VBh-a-J!#!!!0!X-!!@m!!!!!!!$q+![q+!!8-!!)G'9YF("KG'J
|
||||||
|
!#(4PEA"3BA4S!J,"!!)#a`,)$3,(!!0*!!)&k`B9rLIq*J,*#[iR!"JZBfpbC@0
|
||||||
|
bC@`U+LSU!!!!!!!!N!!!ER9XE!(q*J!!"J,*!!2q*3,+!XX+rL8!"!TVEf0X$3,
|
||||||
|
+!!&Y!!!&l`AbrL3+rL3!"!TKE'PK"J,,!!2q)`,-!Xd+rL-!"!TTER0S$3,-!!)
|
||||||
|
d!!!&p3AprL)#cJVq)J!%#Q0QEf`0!Xi!!@m!!!Aj"Icq)3[q)3!d-!!BEh"PER0
|
||||||
|
cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!Xd
|
||||||
|
!!riJ!Xrq(`Vq)!!%#R4[)#!0!Xm!!Qi!!!B!"Jm#d!,4$3,3!!)d!!!'#!B2rKi
|
||||||
|
#dJVq(J!%#QCTE'80!Y)!!@d!!!B,"Ji#d``#d`!1!!K`Df0c-6)ZD!!#!!!0!Y%
|
||||||
|
!!M3!!!B!"JMq(3,8#[iG!!3+BfC[E!d#e!!"E`!!"J3'"riF#riF!"3`!!KdC@e
|
||||||
|
`F'&dD!!)G'9YF&"KG'J'rKm!!!)#b!!#!Y8#eJd#e3!#E!!#"KB'&[iErKS"rKX
|
||||||
|
!!!(q'J!!!J,@!!)#e`,B$3,A!!*b!!!'&JBK!YN#fJd#f3!#BJ!!"KB'(3,E!Y`
|
||||||
|
0!YX!!@m!!!B@"KRq'3[q'3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4Qp
|
||||||
|
XC'9b8'&dD!d#h!!"E3!!"KN'(!,G$!,G!!`!"MT`Df0c0`!#!!!0!YS!!@m!!!!
|
||||||
|
!!!$q'![q'!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J,B!!)#hJ,I$3,H!!0*!!)
|
||||||
|
')JC-rKIq&J,J#[iA!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(q&J!!"J,
|
||||||
|
J!!2q&3,K!Z)+rK8!"!TVEf0X$3,K!!&Y!!!'*JBTrK3+rK3!"!TKE'PK"J,L!!2
|
||||||
|
q%`,M!Z3+rK-!"!TTER0S$3,M!!)d!!!',!BdrK)#j3Vq%J!%#Q0QEf`0!Z8!!@m
|
||||||
|
!!!B`"M2q%3[q%3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0
|
||||||
|
-5@jME(9NC8C[E'4PFP"KG'J'!Z3!!ri3!ZEq$`Vq%!!%#R4[)#!0!ZB!!Qi!!!B
|
||||||
|
h"NB#j`,S$3,R!!)d!!!'2`C'rJi#k3Vq$J!%#QCTE'80!ZN!!@d!!!C#"N8#kJ`
|
||||||
|
#kJ!0!!G`Df0c0bjS!!)!!!d#k!!#0!!!"MF'2ri0!ZX+rJd!"!TMCQpX$3,V!!&
|
||||||
|
[!!!'1`BqrJ`,rJ`!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eq$`!!!J,I!!)#l!,
|
||||||
|
Y$3,X!!*X!!)'63C0rJ[q#J(q#`!!!Ii+!!!#!Zd!!J,Z!Zm0!Zi!!R)!!!C0"PJ
|
||||||
|
#m!,a$3,`!!*L!!!'63C8![)#m`d#mJ!"E`!!"Nd'82i*#ri*!#3`!""MFRP`G'p
|
||||||
|
QEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3,c!!&Y!!!'8!C6![3-![3!#`!
|
||||||
|
&1R*KEQ3!!J!!$3,a!!&[!!!!!!!!rJJ,rJJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&
|
||||||
|
dD!)#l`!#![8#pJd#p3!$53!#"PN'Jri(rJB#p`Vq"`!B,Q0[FQ9MFQ9X+LSU+J!
|
||||||
|
!!!!!!*!!!'jeE'`"rJB!!!B#p`!$rJ8#q!,j#[i&!!3+DfpME!d#q!!"E3!!"Pd
|
||||||
|
'B2i%#[i%!!3+B@aTB3B#q3!$rJ-#qJ,l#[i$!!3+D@jcD!d#qJ!#0!!!"Q-'Dri
|
||||||
|
#![`+rJ)!"!TMCQpX$3,m!!&[!!!'C`CUrJ%,rJ%!0$!!''p`C@jcFfaTEQ0XG@4
|
||||||
|
PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J,l!!2q!!,prIm
|
||||||
|
+rJ!!"!TdEb!J$3,p!!*Z!!!'EJCp![i#r`d#rJ!#0!!!"RB'IIhq!`!+rIi!"!T
|
||||||
|
QD@aP$3-!!!&Y!!!'H3Cm!`%-!`%!$!!'FQ&ZC#jS!!)!!!d#r`!#0!!!"Qi'G[h
|
||||||
|
p!`)+rId!"!TMCQpX$3-#!!&[!!!'FJCerI`,rI`!&$!!#(4PEA"`BA4S!!KdC@e
|
||||||
|
`8'&dD!Epr`!!!J,f!!)$!`-%$3-$!!*X!!)'K!D%rI[pqJ(pq`!!!Ihk!!!#!`3
|
||||||
|
!!J-&!`B0!`8!!R)!!!D%"Sm$"`-)$3-(!!*L!!!'K!D,!`N$#Jd$#3!"E`!!"S3
|
||||||
|
'Krhj#rhj!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3-
|
||||||
|
+!!&Y!!!'K`D+!`X-!`X!#J!%1R*M-J!#!!!0!`J!!@m!!!!!!!$pq![pq!!8-!!
|
||||||
|
)G'9YF("KG'J!#(4PEA"3BA4S!J-'!!)$$!-0$3--!!0*!!)'N!!'Z[hhrIB$$JV
|
||||||
|
pp`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rIB!!!B$$J!$rI8$$`-3#[h
|
||||||
|
e!!3+DfpME!d$$`!"E3!!"T3'Prhd#[hd!!3+B@aTB3B$%!!$rI-$%3-5#[hc!!3
|
||||||
|
+D@jcD!d$%3!#0!!!"TS'S[hb!a-+rI)!"!TMCQpX$3-6!!&[!!!'RJDKrI%,rI%
|
||||||
|
!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'Efa
|
||||||
|
NCA*3BA4S"J-5!!2pm!-8rHm+rI!!"!TdEb!J$3-8!!*Z!!!'T3Dd!a8$&Jd$&3!
|
||||||
|
#0!!!"Ud'Y2hZ!aF+rHi!"!TQD@aP$3-A!!&Y!!!'X!Dc!aJ-!aJ!#`!&FQ-b,QJ
|
||||||
|
!!J!!$3-@!!)d!!!'T3DYrHd$'3Vpl3!%#Q0QEf`0!aN!!@m!!!DT"Ucpl![pl!!
|
||||||
|
8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[h[!!!#!`d!!J-D!aX0!aS!!Q`!!JDl"V[
|
||||||
|
pkrhU!IhV!!!"rHS!!!)$'`!#!a`$(3d$(!!#FJ!!"VX'aJ-H!am0!ai!!Q)!!!D
|
||||||
|
l"X)$)!-K$3-J!!&[!!!'Z`DqrHN,rHN!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0
|
||||||
|
bHA"dEdC[E'4PFP"KG'J0!b%!!@d!!!Dq"X%$)J`$)J!+!!3kFQ-d!!)!!!d$(`!
|
||||||
|
"E`!!!!!!!2hS#rhS!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!ad!!J-M!b30!b-
|
||||||
|
!!dN!!JE("[(pjrhQ!b8+rHF!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ih
|
||||||
|
Q!!!'!b8!!rhP!bB$*`Vpj3!%#QY[Bf`0!bB!!@d!!!E,"Xlpj!Vpj!!%#Q&XD@%
|
||||||
|
'!bF!!rhM!bJ$+3Vpi`!%#QPZFfJ0!bJ!!M3!!!E4"YRpiJ-U#[hL!!3+BfC[E!d
|
||||||
|
$+J!"E`!!"Y8'f2hK#rhK!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p
|
||||||
|
`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B$+3!$rH!$+rhI#[hJ!!3+G'mJ)!d$+`!
|
||||||
|
#EJ!!"Y`'k`-X!bd0!b`!!M3!!!EN"Z[phJ-Z#[hH!!3+CQPXC3d$,J!"E3!!"ZF
|
||||||
|
'kJ-[$!-[!!X!"A*M0#jS!!)!!!d$,3!#0!!!"Y`'j2hG!c!+rGd!"!TMCQpX$3-
|
||||||
|
`!!&[!!!'i!EMrG`,rG`!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eph`!!!J-N!!)
|
||||||
|
$-3-b$3-a!!*X!!)'mJEbrG[pfJ(pf`!!!IhD!!!#!c)!!J-c!c30!c-!!R)!!!E
|
||||||
|
b"[d$03-f$3-e!!*L!!!'mJEj!cF$1!d$0`!"E`!!"[)'pIhC#rhC!#3`!""MFRP
|
||||||
|
`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3-i!!&Y!!!'p3Ei!cN-!cN
|
||||||
|
!#J!%1R*M03!#!!!0!cB!!@m!!!!!!!$pf![pf!!8-!!)G'9YF("KG'J!#(4PEA"
|
||||||
|
3BA4S!J-d!!)$1J-l$3-k!!0*!!)'rJFSrGIpeJ-m#[hA!"JZBfpbC@0bC@`U+LS
|
||||||
|
U!!!!!!!!N!!!ER9XE!(peJ!!"J-m!!2pe3-p!ci+rG8!"!TVEf0X$3-p!!&Y!!!
|
||||||
|
(!JF&rG3+rG3!"!TKE'PK"J-q!!2pd`-r!d!+rG-!"!TTER0S$3-r!!)d!!!(#!F
|
||||||
|
3rG)$33VpdJ!%#Q0QEf`0!d%!!@m!!!F-"`rpd3[pd3!d-!!BEh"PER0cE'PZBfa
|
||||||
|
eC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!d!!!rh3!d,
|
||||||
|
pc`Vpd!!%#R4[)#!0!d)!!Qi!!!F6"b)$3`0%$30$!!)d!!!('`FLrFi$43VpcJ!
|
||||||
|
%#QCTE'80!d8!!@d!!!FH"b%$4J`$4J!,!!9bBc8ZD!!#!!!0!d3!!M3!!!F6"a[
|
||||||
|
pc30(#[h0!!3+BfC[E!d$4`!"E`!!"aF('[h-#rh-!"3`!!KdC@e`F'&dD!!)G'9
|
||||||
|
YF&"KG'J'rFm!!!)$1`!#!dJ$53d$5!!#E!!#"bN(+Ih,rFS"rFX!!!(pbJ!!!J0
|
||||||
|
*!!)$5J0,$30+!!*b!!!(+3Fd!d`$63d$6!!#BJ!!"bN(-!01!dm0!di!!@m!!!F
|
||||||
|
T"bcpb3[pb3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d
|
||||||
|
$6`!"E3!!"b`(,`03$!03!!d!"cTbDA"PE@3!!J!!$300!!&[!!!!!!!!rFJ,rFJ
|
||||||
|
!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)$5`!#!e%$8Jd$83!$53!#"c8(Arh(rFB
|
||||||
|
$8`Vpa`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rFB!!!B$8`!$rF8$9!0
|
||||||
|
9#[h&!!3+DfpME!d$9!!"E3!!"cN(22h%#[h%!!3+B@aTB3B$93!$rF-$9J0A#[h
|
||||||
|
$!!3+D@jcD!d$9J!#0!!!"cm(4rh#!eJ+rF)!"!TMCQpX$30B!!&[!!!(3`G'rF%
|
||||||
|
,rF%!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9
|
||||||
|
'EfaNCA*3BA4S"J0A!!2p`!0CrEm+rF!!"!TdEb!J$30C!!*Z!!!(5JGC!eS$@`d
|
||||||
|
$@J!#0!!!"e)(@Ifq!e`+rEi!"!TQD@aP$30F!!&Y!!!(93GB!ed-!ed!$J!)FQP
|
||||||
|
`C@eN,QJ!!J!!$30E!!)d!!!(5JG5rEd$AJVp[3!%#Q0QEf`0!ei!!@m!!!G1"e(
|
||||||
|
p[![p[!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[fr!!!#!e)!!J0I!f!0!em!!Q`
|
||||||
|
!!JGJ"f$pZrfk!Ifl!!!"rES!!!)$B!!#!f%$BJd$B3!#FJ!!"f!(D`0M!f30!f-
|
||||||
|
!!Q)!!!GJ"fF$C30Q$30P!!&[!!!(B!GMrEN,rEN!*$!!%'0bHA"dEfC[E'4PFR"
|
||||||
|
KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!fB!!@d!!!GM"fB$C``$C`!+!!3kFR0K!!)
|
||||||
|
!!!d$C!!"E`!!!!!!!2fi#rfi!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!f)!!J0
|
||||||
|
S!fN0!fJ!!dN!!JGX"jEpYrff!fS+rEF!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"
|
||||||
|
ZG@aX!Iff!!!'!fS!!rfe!fX$E!VpY3!%#QY[Bf`0!fX!!@d!!!G`"h2pY!VpY!!
|
||||||
|
%#Q&XD@%'!f`!!rfc!fd$EJVpX`!%#QPZFfJ0!fd!!M3!!!Gf"hlpXJ0[#[fb!!3
|
||||||
|
+BfC[E!d$E`!"E`!!"hS(IIfa#rfa!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"
|
||||||
|
KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B$EJ!$rE!$F2f[#[f`!!3+G'm
|
||||||
|
J)!d$F!!#EJ!!"i%(N!!$F30b$30a!!)d!!!(L3H3!2fZ!h-+rDi!"!TQD@aP$30
|
||||||
|
c!!&Y!!!(M!H2!h3-!h3!#`!&FR0K,QJ!!J!!$30b!!)d!!!(J3H*rDd$G3VpV3!
|
||||||
|
%#Q0QEf`0!h8!!@m!!!H&"iMpV![pV!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[f
|
||||||
|
[!!!#!fN!!J0f!hF0!hB!!Q`!!JHA"jIpUrfU!IfV!!!"rDS!!!)$G`!#!hJ$H3d
|
||||||
|
$H!!#FJ!!"jF(SJ0k!hX0!hS!!Q)!!!HA"ji$I!0p$30m!!&[!!!(P`HDrDN,rDN
|
||||||
|
!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!hd!!@d!!!H
|
||||||
|
D"jd$IJ`$IJ!-!!BkFh4KBfX!!J!!$30l!!&[!!!!!!!!rDJ,rDJ!&$!!#(4PEA"
|
||||||
|
`BA4S!!KdC@e`8'&dD!)$H3!#!hm$J!d$I`!$53!#"k-(cIfRrDB$J3VpT`!B,Q0
|
||||||
|
[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rDB!!!B$J3!$rD8$JJ1$#[fP!!3+Dfp
|
||||||
|
ME!d$JJ!"E3!!"kF(U[fN#[fN!!3+B@aTB3B$J`!$rD-$K!1&#[fM!!3+D@jcD!d
|
||||||
|
$K!!#0!!!"kd(YIfL!iB+rD)!"!TMCQpX$31'!!&[!!!(X3HdrD%,rD%!0$!!''p
|
||||||
|
`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4
|
||||||
|
S"J1&!!2pS!1(rCm+rD!!"!TdEb!J$31(!!*Z!!!(Z!I(!iJ$L3d$L!!#0!!!"m!
|
||||||
|
(arfH!iS+rCi!"!TQD@aP$31+!!&Y!!!(``I'!iX-!iX!$3!(Fh4KBfXZD!!#!!!
|
||||||
|
0!iN!!M3!!!Hi"m$pR31-#[fG!!3+BfC[E!d$M!!"E`!!"l`([rfF#rfF!"3`!!K
|
||||||
|
dC@e`F'&dD!!)G'9YF&"KG'J'rCm!!!)$J!!#!id$MJd$M3!$53!#"mi(q2fErCS
|
||||||
|
$M`VpQ`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rCS!!!B$M`!$rCN$N!!
|
||||||
|
$N3VpQ3!%#QY[Bf`0!j!!!!&Y!!!(dJI9rCJ+rCJ!"!TKE'PK"J14!!2pP`15!j-
|
||||||
|
+rCF!"!TTER0S$315!!)d!!!(f!IJrCB$P!VpPJ!%#Q0QEf`0!j3!!@m!!!IF"pr
|
||||||
|
pP3[pP3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
|
||||||
|
NC8C[E'4PFP"KG'J'!j-!!rf8!jApN`VpP!!%#R4[)#!0!j8!!Qi!!!IM"r)$PJ1
|
||||||
|
A$31@!!)d!!!(k`IbrC)$Q!VpNJ!%#QCTE'80!jJ!!@d!!!IZ"r%$Q3`$Q3!4!!Y
|
||||||
|
cB@CPFh4KBfXZD!!#!!!0!jF!!M3!!!IM"q[pN31D#[f4!!3+BfC[E!d$QJ!"E`!
|
||||||
|
!"qF(k[f3!![pN!!!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!EpN`!!!J11!!)$Q`1
|
||||||
|
F$31E!!*X!!)(q3IjrBrpMJ(pM`!!!If1!!!#!j`!!J1G!ji0!jd!!R)!!!Ij#!3
|
||||||
|
$R`1J$31I!!*L!!!(q3J!!k%$SJd$S3!"E`!!"rN(r2f0#rf0!#3`!""MFRP`G'p
|
||||||
|
QEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$31L!!&Y!!!(r!Ir!k--!k-!#J!
|
||||||
|
%1R0SB3!#!!!0!k!!!@m!!!!!!!$pM![pM!!8-!!)G'9YF("KG'J!#(4PEA"3BA4
|
||||||
|
S!J1H!!)$T!1P$31N!!0*!!))"3J[rB[pLJ1Q#[f,!"JZBfpbC@0bC@`U+LSU!!!
|
||||||
|
!!!!!N!!!ER9XE!(pLJ!!"J1Q!!2pL31R!kJ+rBN!"!TVEf0X$31R!!&Y!!!)#3J
|
||||||
|
-rBJ+rBJ!"!TKE'PK"J1S!!2pK`1T!kS+rBF!"!TTER0S$31T!!)d!!!)$`JArBB
|
||||||
|
$U`VpKJ!%#Q0QEf`0!kX!!@m!!!J6#"EpK3[pK3!d-!!BEh"PER0cE'PZBfaeC'9
|
||||||
|
QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!kS!!rf%!kcpJ`V
|
||||||
|
pK!!%#R4[)#!0!k`!!Qi!!!JD##N$V31Z$31Y!!)d!!!))JJTrB)$V`VpJJ!%#QC
|
||||||
|
TE'80!km!!@d!!!JP##J$X!`$X!!,!!9cD'%ZD!!#!!!0!ki!!M3!!!JD##,pJ31
|
||||||
|
a#[f"!!3+BfC[E!d$X3!"E`!!#"i))If!#rf!!"3`!!KdC@e`F'&dD!!)G'9YF&"
|
||||||
|
KG'J'rB-!!!)$T3!#!l)$X`d$XJ!#E!!##$!)-2errAi"rAm!!!(pIJ!!!J1c!!)
|
||||||
|
$Y!1e$31d!!*b!!!)-!Jl!lB$Y`d$YJ!#BJ!!#$!)0`1i!lN0!lJ!!@m!!!J`#$2
|
||||||
|
pI3[pI3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d$Z3!
|
||||||
|
"E3!!#$-)0J1k$!1k!!d!"cTdH(4IC')!!J!!$31h!!&[!!!!!!!!rA`,rA`!&$!
|
||||||
|
!#(4PEA"`BA4S!!KdC@e`8'&dD!)$Y3!#!lX$[!d$Z`!$53!##$`)C[elrAS$[3V
|
||||||
|
pH`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rAS!!!B$[3!$rAN$[J1r#[e
|
||||||
|
j!!3+DfpME!d$[J!"E3!!#%!)3rei#[ei!!3+B@aTB3B$[`!$rAF$`!2"#[eh!!3
|
||||||
|
+D@jcD!d$`!!#0!!!#%B)6[ef!m)+rAB!"!TMCQpX$32#!!&[!!!)5JK0rA8,rA8
|
||||||
|
!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'Efa
|
||||||
|
NCA*3BA4S"J2"!!2pG!2$rA-+rA3!"!TdEb!J$32$!!*Z!!!)83KJ!m3$a3d$a!!
|
||||||
|
#0!!!#&N)B2eb!mB+rA)!"!TQD@aP$32'!!&Y!!!)A!KI!mF-!mF!$J!)G(KdAf4
|
||||||
|
L,QJ!!J!!$32&!!)d!!!)83KCrA%$b!VpF3!%#Q0QEf`0!mJ!!@m!!!K9#&MpF![
|
||||||
|
pF!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[ec!!!#!l`!!J2*!mS0!mN!!Q`!!JK
|
||||||
|
R#'IpEreZ!Ie[!!!"r@i!!!)$bJ!#!mX$c!d$b`!#FJ!!#'F)FJ20!mi0!md!!Q)
|
||||||
|
!!!KR#'i$c`23$322!!&[!!!)C`KUr@d,r@d!*$!!%'0bHA"dEfC[E'4PFR"KG'J
|
||||||
|
!%'0bHA"dEdC[E'4PFP"KG'J0!p!!!@d!!!KU#'d$d3`$d3!,!!8kH$8`13!#!!!
|
||||||
|
0!mi!!@m!!!!!!!$pE![pE!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J2-!!)$dJ2
|
||||||
|
6$325!!0*!!))F`LGr@[pDJ28#[eV!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9
|
||||||
|
XE!(pDJ!!"J28!!2pD329!pB+r@N!"!TVEf0X$329!!&Y!!!)G`Kkr@J+r@J!"!T
|
||||||
|
KE'PK"J2@!!2pC`2A!pJ+r@F!"!TTER0S$32A!!)d!!!)I3L&r@B$f3VpCJ!%#Q0
|
||||||
|
QEf`0!pN!!@m!!!L"#)6pC3[pC3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4
|
||||||
|
S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!pJ!!reN!pVpB`VpC!!%#R4[)#!
|
||||||
|
0!pS!!Qi!!!L)#*F$f`2F$32E!!)d!!!)N!!)PreL!pd+r@)!"!TQD@aP$32G!!&
|
||||||
|
Y!!!)N`L@!pi-!pi!$!!'H$8`15jS!!)!!!d$h!!#0!!!#)J)N!$pB32I#[eK!!3
|
||||||
|
+BfC[E!d$h`!"E`!!#)`)MreJ#reJ!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'r@-
|
||||||
|
!!!)$d`!#!q!$i3d$i!!$53!##*i)b2eIr9i$iJVpA`!B,Q0[FQ9MFQ9X+LSU+J!
|
||||||
|
!!!!!!*!!!'jeE'`"r9i!!!B$iJ!$r9d$i`2N#[eG!!3+DfpME!d$i`!"E3!!#+)
|
||||||
|
)TIeF#[eF!!3+B@aTB3B$j!!$r9X$j32Q#[eE!!3+D@jcD!d$j3!#0!!!#+J)X2e
|
||||||
|
D!qF+r9S!"!TMCQpX$32R!!&[!!!)V!L[r9N,r9N!0$!!''p`C@jcFfaTEQ0XG@4
|
||||||
|
PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J2Q!!2p@!2Sr9F
|
||||||
|
+r9J!"!TdEb!J$32S!!*Z!!!)X`M#!qN$kJd$k3!#0!!!#,X)`[e@!qX+r9B!"!T
|
||||||
|
QD@aP$32V!!&Y!!!)[JM"!q`-!q`!%!!+H$8`19pfCRNZD!!#!!!0!qS!!M3!!!L
|
||||||
|
c#,[p932Y#[e9!!3+BfC[E!d$l3!"E`!!#,F)Z[e8#re8!"3`!!KdC@e`F'&dD!!
|
||||||
|
)G'9YF&"KG'J'r9F!!!)$i3!#!qi$l`d$lJ!#E!!##-N)bIe6r9)"r9-!!!(p8J!
|
||||||
|
!!J2[!!)$m!2a$32`!!*b!!!)b3M8!r)$m`d$mJ!#BJ!!#-N)d!2d!r80!r3!!@m
|
||||||
|
!!!M*#-cp83[p83!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&
|
||||||
|
dD!d$p3!"E3!!#-`)c`2f$!2f!!d!"cTi06!jGM-!!J!!$32c!!&[!!!!!!!!r9!
|
||||||
|
,r9!!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)$m3!#!rF$q!d$p`!$53!##08)rre
|
||||||
|
2r8i$q3Vp6`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r8i!!!B$q3!$r8d
|
||||||
|
$qJ2l#[e0!!3+DfpME!d$qJ!"E3!!#0N)h2e-#[e-!!3+B@aTB3B$q`!$r8X$r!2
|
||||||
|
p#[e,!!3+D@jcD!d$r!!#0!!!#0m)jre+!ri+r8S!"!TMCQpX$32q!!&[!!!)i`M
|
||||||
|
Qr8N,r8N!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfa
|
||||||
|
eC'9'EfaNCA*3BA4S"J2p!!2p5!2rr8F+r8J!"!TdEb!J$32r!!*Z!!!)kJMj"!!
|
||||||
|
%!3d%!!!#0!!!#2))qIe'"!)+r8B!"!TQD@aP$33#!!&Y!!!)p3Mi"!--"!-!$J!
|
||||||
|
)H$8`1ABc,QJ!!J!!$33"!!)d!!!)kJMbr88%"!Vp43!%#Q0QEf`0"!3!!@m!!!M
|
||||||
|
Z#2(p4![p4!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[e(!!!#!rJ!!J3&"!B0"!8
|
||||||
|
!!Q`!!JN!#3$p3re#!Ie$!!!"r8)!!!)%"J!#"!F%#!d%"`!$53!##3!*+[e"r8!
|
||||||
|
%#3Vp33!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r8!!!!B%#3!$r6m%#J3
|
||||||
|
,#[dr!!3+DfpME!d%#J!"E3!!#33*"rdq#[dq!!3+B@aTB3B%#`!$r6d%$!30#[d
|
||||||
|
p!!3+D@jcD!d%$!!#0!!!#3S*%[dm"!i+r6`!"!TMCQpX$331!!&[!!!*$JN4r6X
|
||||||
|
,r6X!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9
|
||||||
|
'EfaNCA*3BA4S"J30!!2p1J32r6N+r6S!"!TdEb!J$332!!*Z!!!*&3NN""!%%3d
|
||||||
|
%%!!#0!!!#4d**2di"")+r6J!"!TQD@aP$335!!&Y!!!*)!NM""--""-!#`!&Fh0
|
||||||
|
X,QJ!!J!!$334!!)d!!!*&3NGr6F%&!Vp0`!%#Q0QEf`0""3!!@m!!!NC#4cp0J[
|
||||||
|
p0J!H-!!0Fh0XCQpXC'9bF'&dD!!0Fh0X4QpXC'9b8'&dD!Ep13!!!J3)!!)%&33
|
||||||
|
@$339!!0*!!)*+`P9r6Ap0!3A#[de!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9
|
||||||
|
XE!(p0!!!"J3A!!2p-`3B""N+r6-!"!TVEf0X$33B!!&Y!!!*,`Nbr6)+r6)!"!T
|
||||||
|
KE'PK"J3C!!2p-33D""X+r6%!"!TTER0S$33D!!)d!!!*03Npr6!%(!Vp-!!%#Q0
|
||||||
|
QEf`0""`!!@m!!!Nj#6cp,`[p,`!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4
|
||||||
|
S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'""X!!rdZ""hp,3Vp,J!%#R4[)#!
|
||||||
|
0""d!!Qi!!!P!#8m%(J3I$33H!!)d!!!*5!P2r5`%)!Vp,!!%#QCTE'80"#!!!@d
|
||||||
|
!!!P,#8i%)3`%)3!-!!CcFf`b,QJ!!J!!$33I!!)d!!!*3!P)r5X%)JVp+`!%#Q0
|
||||||
|
QEf`0"#)!!@m!!!P%#8Ip+J[p+J!H-!!0Fh0XCQpXC'9bF'&dD!!0Fh0X4QpXC'9
|
||||||
|
b8'&dD!Ep,3!!!J3@!!)%)`3N$33M!!0*!!)*9JQ!r5Rp+!3P#[dT!"JZBfpbC@0
|
||||||
|
bC@`U+LSU!!!!!!!!N!!!ER9XE!(p+!!!"J3P!!2p*`3Q"#F+r5F!"!TVEf0X$33
|
||||||
|
Q!!&Y!!!*@JPGr5B+r5B!"!TKE'PK"J3R!!2p*33S"#N+r58!"!TTER0S$33S!!)
|
||||||
|
d!!!*B!PSr53%+JVp*!!%#Q0QEf`0"#S!!@m!!!PN#@Ip)`[p)`!d-!!BEh"PER0
|
||||||
|
cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'"#N
|
||||||
|
!!rdL"#[p)3Vp)J!%#R4[)#!0"#X!!Qi!!!PV#AS%,!3Y$33X!!)d!!!*F`Pkr5!
|
||||||
|
%,JVp)!!%#QCTE'80"#i!!@d!!!Pf#AN%,``%,`!0!!GcFf`b-bjS!!)!!!d%,3!
|
||||||
|
#0!!!#@X*FrdI"$!+r4m!"!TMCQpX$33`!!&[!!!*E`Pbr4i,r4i!(M!!$A0cE'C
|
||||||
|
[E'4PFR"KG'J!$A0cE%C[E'4PFP"KG'J'r5%!!!)%*!!#"$%%-Jd%-3!$53!##B%
|
||||||
|
*UrdGr4`%-`Vp(3!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r4`!!!B%-`!
|
||||||
|
$r4X%0!3e#[dE!!3+DfpME!d%0!!"E3!!#B8*L2dD#[dD!!3+B@aTB3B%03!$r4N
|
||||||
|
%0J3h#[dC!!3+D@jcD!d%0J!#0!!!#BX*NrdB"$J+r4J!"!TMCQpX$33i!!&[!!!
|
||||||
|
*M`Q5r4F,r4F!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%P
|
||||||
|
ZBfaeC'9'EfaNCA*3BA4S"J3h!!2p&J3jr48+r4B!"!TdEb!J$33j!!*Z!!!*PJQ
|
||||||
|
P"$S%1`d%1J!#0!!!#Ci*TId8"$`+r43!"!TQD@aP$33m!!&Y!!!*S3QN"$d-"$d
|
||||||
|
!$!!'Fh0X-bjS!!)!!!d%1`!#0!!!#CB*R[d6"$i+r4-!"!TMCQpX$33q!!&[!!!
|
||||||
|
*QJQGr4),r4)!(M!!$A0cE'C[E'4PFR"KG'J!$A0cE%C[E'4PFP"KG'J'r48!!!)
|
||||||
|
%-J!#"$m%3!d%2`!$53!##D`*e[d4r4!%33Vp%3!B,Q0[FQ9MFQ9X+LSU+J!!!!!
|
||||||
|
!!*!!!'jeE'`"r4!!!!B%33!$r3m%3J4$#[d2!!3+DfpME!d%3J!"E3!!#E!*Xrd
|
||||||
|
1#[d1!!3+B@aTB3B%3`!$r3d%4!4&#[d0!!3+D@jcD!d%4!!#0!!!#EB*[[d-"%B
|
||||||
|
+r3`!"!TMCQpX$34'!!&[!!!*ZJQpr3X,r3X!0$!!''p`C@jcFfaTEQ0XG@4PCQp
|
||||||
|
XC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J4&!!2p#J4(r3N+r3S
|
||||||
|
!"!TdEb!J$34(!!*Z!!!*`3R3"%J%53d%5!!#0!!!#FN*d2d)"%S+r3J!"!TQD@a
|
||||||
|
P$34+!!&Y!!!*c!R2"%X-"%X!$!!'G'ac-5jS!!)!!!d%53!#0!!!#F%*bId("%`
|
||||||
|
+r3F!"!TMCQpX$34-!!&[!!!*a3R)r3B,r3B!(M!!$A0cE'C[E'4PFR"KG'J!$A0
|
||||||
|
cE%C[E'4PFP"KG'J'r3N!!!)%3!!#"%d%6Jd%63!#E!!##GF*erd&r33"r38!!!(
|
||||||
|
p"!!!!J41!!)%6`43$342!!0*!!)*e`S"r32p!J44#[d$!"JZBfpbC@0bC@`U+LS
|
||||||
|
U!!!!!!!!N!!!ER9XE!(p!J!!"J44!!2p!345"&-+r3%!"!TVEf0X$345!!&Y!!!
|
||||||
|
*f`RHr3!+r3!!"!TKE'PK"J46!!2mr`48"&8+r2m!"!TTER0S$348!!)d!!!*i3R
|
||||||
|
Tr2i%9JVmrJ!%#Q0QEf`0"&B!!@m!!!RP#HMmr3[mr3!d-!!BEh"PER0cE'PZBfa
|
||||||
|
eC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'"&8!!rcm"&I
|
||||||
|
mq`Vmr!!%#R4[)#!0"&F!!Qi!!!RX#IX%@!4C$34B!!)d!!!*p!Rlr2S%@JVmqJ!
|
||||||
|
%#QCTE'80"&S!!@d!!!Rh#IS%@``%@`!1!!KMFRP`G'mZD!!#!!!0"&N!!M3!!!R
|
||||||
|
X#I6mq34F#[cj!!3+BfC[E!d%A!!"E`!!#I!*mrci#rci!#3`!""MFRP`G'pQEfa
|
||||||
|
NCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S"[cl!!!#"&!!!J4G"&i0"&d!!Q`!!JS
|
||||||
|
##J,mprcf!Ich!!!"r2B!!!)%AJ!#"&m%B!d%A`!$53!##J)+,2cer23%B3Vmp3!
|
||||||
|
B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r23!!!B%B3!$r2-%BJ4M#[cc!!3
|
||||||
|
+DfpME!d%BJ!"E3!!#JB+#Icb#[cb!!3+B@aTB3B%B`!$r2%%C!4P#[ca!!3+D@j
|
||||||
|
cD!d%C!!#0!!!#J`+&2c`"'B+r2!!"!TMCQpX$34Q!!&[!!!+%!S6r1m,r1m!0$!
|
||||||
|
!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*
|
||||||
|
3BA4S"J4P!!2mlJ4Rr1d+r1i!"!TdEb!J$34R!!*Z!!!+&`SQ"'J%D3d%D!!#0!!
|
||||||
|
!#Km+*[cX"'S+r1`!"!TQD@aP$34U!!&Y!!!+)JSP"'X-"'X!%!!+Eh"PER0cE(B
|
||||||
|
ZD!!#!!!0"'N!!M3!!!SA#Krmk`4X#[cV!!3+BfC[E!d%E!!"E`!!#KX+([cU#rc
|
||||||
|
U!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S"[cY!!!#"'!
|
||||||
|
!!J4Y"'i0"'d!!dN!!JSY#PImkIcS"'m+r1N!'#jMEh*PBh*PE#SU+LS!!!!!!!#
|
||||||
|
3!!"ZG@aX!IcS!!!'"'m!!rcR"(!%F3Vmj`!%#QY[Bf`0"(!!!@d!!!Sa#M6mjJV
|
||||||
|
mjJ!%#Q&XD@%'"(%!!rcP"()%F`Vmj3!%#QPZFfJ0"()!!M3!!!Sh#Mrmj!4d#[c
|
||||||
|
N!!3+BfC[E!d%G!!"E`!!#MX+2[cM#rcM!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4
|
||||||
|
PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B%F`!$r1)%GIcK#[cL!!3
|
||||||
|
+G'mJ)!d%G3!#EJ!!#N)+834f"(F0"(B!!M3!!!T+#P(mi!4i#[cJ!!3+CQPXC3d
|
||||||
|
%H!!"E3!!#Nd+8!4j$!4j!!i!#(4YC'PQCLjS!!)!!!d%G`!#0!!!#N)+5[cI"(S
|
||||||
|
+r0m!"!TMCQpX$34k!!&[!!!+4JT*r0i,r0i!*$!!%'0bHA"dEfC[E'4PFR"KG'J
|
||||||
|
!%'0bHA"dEdC[E'4PFP"KG'J'r1%!!!)%EJ!#"(X%I!d%H`!#E!!##PJ+@2cGr0`
|
||||||
|
"r0d!!!(mh!!!!J4m!!)%I34q$34p!!*X!!)+@!TBr0[mfJ(mf`!!!IcD!!!#"(i
|
||||||
|
!!J4r")!0"(m!!dN!!JTB#S,mfIcB")%+r0N!'#jMEh*PBh*PE#SU+LS!!!!!!!#
|
||||||
|
3!!"ZG@aX!IcB!!!'")%!!rcA"))%J`Vme`!%#QY[Bf`0"))!!@d!!!TF#PrmeJV
|
||||||
|
meJ!%#Q&XD@%'")-!!rc9")3%K3Vme3!%#QPZFfJ0")3!!M3!!!TL#QVme!5'#[c
|
||||||
|
8!!3+BfC[E!d%KJ!"E`!!#QB+DIc6#rc6!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4
|
||||||
|
PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B%K3!$r0)%Krc4#[c5!!3
|
||||||
|
+G'mJ)!d%K`!#EJ!!#Qd+I!5)")N0")J!!M3!!!Te#Rcmd!5+#[c3!!3+CQPXC3d
|
||||||
|
%LJ!"E3!!#RJ+H`5,$!5,!!`!"Q9IEh-ZD!!#!!!0")N!!M3!!!TY#RAmc`5-#[c
|
||||||
|
2!!3+BfC[E!d%M!!"E`!!#R%+G2c1#rc1!#B`!"&[F'9ZFh0XCQpXC'9bF'&dD!!
|
||||||
|
4Eh"PER0cE%C[E'4PFP"KG'J'r0%!!!)%J!!#")d%MJd%M3!$53!##S-+VIc0r-`
|
||||||
|
%M`Vmc3!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r-`!!!B%M`!$r-X%N!!
|
||||||
|
%N3Vmb`!%#QY[Bf`0"*!!!!&Y!!!+K`U+r-S+r-S!"!TKE'PK"J54!!2mb355"*-
|
||||||
|
+r-N!"!TTER0S$355!!)d!!!+M3U9r-J%P!Vmb!!%#Q0QEf`0"*3!!@m!!!U4#T6
|
||||||
|
ma`[ma`!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
|
||||||
|
NC8C[E'4PFP"KG'J'"*-!!rc'"*Ama3VmaJ!%#R4[)#!0"*8!!Qi!!!UB#UF%PJ5
|
||||||
|
A$35@!!)d!!!+S!URr-3%Q!Vma!!%#QCTE'80"*J!!@d!!!UM#UB%Q3`%Q3!0!!G
|
||||||
|
PAfpc-LjS!!)!!!d%P`!#0!!!#TJ+S2c$"*S+r--!"!TMCQpX$35D!!&[!!!+R!U
|
||||||
|
Ir-),r-)!*M!!%@p`C@jcFfaQEfaNCA*`BA4S!"&[F'9ZFh0X4QpXC'9b8'&dD!E
|
||||||
|
ma3!!!J51!!)%Qrc"$35E!!*X!!)+VJUZr-$m[`(m`!!!!Ibr!!!#r-%!!!d!#3!
|
||||||
|
"E3!!!!!!!3!I!Irq!!!#!!B!!J5F"*d0"*`!!Q`!!J!!!!$m[[bp!Ibq!!!"r,d
|
||||||
|
!!!)%R3!#"*i%R`d%RJ!#E!!##V%+b!5Jr,`0"+!!!dN!!JUa#XMmZ`5K"+)+r,X
|
||||||
|
!'#jcHA0[C'a[Cf&cDh)!!!!!!!!!!&4&@&30"+%!!@d!!!Ua#V3%S``%S`!'!!!
|
||||||
|
!!J!!"J5L!!2mZJ5N"+8+r,S!"!TLG'jc$35N!!&+!!!+Y`Um"+B#"+B!!J5Rr,N
|
||||||
|
0"+F!!@d!!!Uh#VS%U!`%U!!+!!4%EfjP!!)!!!,mZ3!!"J5P!!2mZ!5Tr,F+r,J
|
||||||
|
!"!TRDACe$35T!!&Y!!!+[`V#r,B$r,B!"3EmY`!!!Ibm!!!#"*m!!J5Ur,80"+S
|
||||||
|
!!Q`!!J!!!!$mY2bc!Ibd!!!"r,-!!!,mY3!!$J!#!!!2%!!$!",mXJ5V"+`%V35
|
||||||
|
Z"+m%X!5a",)%X`5d",8%YJ5hr,(mX2b[r+i"r,)!!"!%U`!3r+hmV2bVr+VmUIb
|
||||||
|
Sr+ImT[bPr+6mSrbLr+(mS2bIr*i+r+d!'#jKCACdEf&`F'jeE'`!!)!!!!#3!!!
|
||||||
|
U+LSU#rbX!")`!!GdD'9`BA4S!!GdD'93BA4S#rbV!"``!!adD'9[E'4NC@aTEA-
|
||||||
|
!$(4SC8pXC%4PE'PYF`[mUJ!J-!!1G'KPF(*[DQ9MG("KG'J!$R4SC9"bEfTPBh4
|
||||||
|
3BA4S#rbT!"B`!!PdD'9YCA"KG'J!#A4SC8eP8'&dD![mU!!Q-!!4D@jME(9NC@C
|
||||||
|
[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S#rbR!$3`!"K[F'9ZFh0XD@jME(9
|
||||||
|
NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD![mTJ!N-!!3Bh*
|
||||||
|
jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD![mT3!H-!!0Fh0XCQpXC'9
|
||||||
|
bF'&dD!!0Fh0X4QpXC'9b8'&dD![mT!!Q-!!4Eh"PER0cE'C[E'4PFR"KG'J!%@p
|
||||||
|
`C@jcFfa'EfaNCA*3BA4S#rbM!#i`!"9dD'9ZCAGQEfaNCA*bC@CPFQ9ZBf8!&A4
|
||||||
|
SC8jPGdC[E'4PFP*PCQ9bC@jMC3[mSJ!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!Ib
|
||||||
|
K!!!"r+!!!!(mR`!!!IbH!!!1"+`!"a$mR35ir*cmQ`5j",VmQJVmR3!B,Q&PGR4
|
||||||
|
[BA"`ER9XE!!!J!!!!*!!!#SU+LS0",J!!@X!!!!!#XJ%Z`)%Z`!#!!8%[!)%[!!
|
||||||
|
#"*lmQ3,mQ3!!!IbF!!!#r*X!!"!%Z3!!%!5k!)B!(rbBr*ImP[b9r*6mNrb5!#c
|
||||||
|
mNIb3!2b2r)lmMIb-!%rmL`"D!&[mLJ"Nr)N!EIb)r)ImKJ#2r)AmK2b$r),mJIb
|
||||||
|
!r(rmI[apr(cmH`#Tr(VmHIair(F![Iaf!-ImG3$8!1)!l!$j!3-"%!%D!5F"-3%
|
||||||
|
q!8J"93&I!@`"GJ'$!Bd"QJ'N!E%"Z`()!G)"h`(T!IB#!!)0!KF#*!)Z!MX#43*
|
||||||
|
5!P`#D3*c!S!#LJ+A!U%#VJ+m!XB#d`,G!ZS#p!-"!`X$'!-L!bm$130'!e!$A30
|
||||||
|
R!h3$IJ1,!jN$S`1`!lS$a`24!pi$l!2f"!-%%`3K"#m%234,"&X%D`4j")X%Q35
|
||||||
|
Mr(3%U2acr(,mF3VmQ!!%#Q0[BQS+r*F!'#jPBA*cCQCNFQ&XDA-!!!!!!!!J!'&
|
||||||
|
QC()+r*B!"!TMG(Kd#rb9!")`!!GdD'9`BA4S!!GdD'93BA4S#[b8!!3+BA0MFJV
|
||||||
|
mN`!%#R4iC'`,r*)!($!!$(4SC@pXC'4PE'PYF`!-G'KP6faN4'9XD@ec#[b4!!3
|
||||||
|
+BfPdE32mN!$rr3[mM`!J-!!1G'KPF(*[DQ9MG("KG'J!$R4SC9"bEfTPBh43BA4
|
||||||
|
S!rb1rri+r)d!"!T849K8#rb-!"B`!!PdD'9YCA"KG'J!#A4SC8eP8'&dD![mL`!
|
||||||
|
Q-!!4D@jME(9NC@C[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S#rb+!$3`!"K
|
||||||
|
[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&
|
||||||
|
dD![mL3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD![mL!!
|
||||||
|
H-!!0Fh0XCQpXC'9bF'&dD!!0Fh0X4QpXC'9b8'&dD![mK`!Q-!!4Eh"PER0cE'C
|
||||||
|
[E'4PFR"KG'J!%@p`C@jcFfa'EfaNCA*3BA4S#[b'!!3+BfC[E!VmK3!B,QeTFf0
|
||||||
|
cE'0d+LSU+J!!!!!!!*!!!#SU+LS+r)3!"!TcC@aP#[b$!"JZBfpbC@4PE'mU+LS
|
||||||
|
U!!!!!!!!N!!!+LSU+J(mJJ!!![b"!!!+r)!!"!TVEf0X#[ar!!3+D@jcD!2mIJ!
|
||||||
|
%#[ap!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!VmI!!%#R*cE(3,r(X!,M!
|
||||||
|
!&A4SC@jPGfC[E'4PFR*PCQ9bC@jMC3!9G'KP6Q9h4QpXC'9b8Q9QCA*PEQ0P#[a
|
||||||
|
k!!3+F'jKE3VmH3!%#Q&XD@%+r(J!"!TdEb!J#[ah!!3+CQPXC32mGJ!'#rae!"3
|
||||||
|
`!!KdC@e`F'&dD!!)G'9YF&"KG'J+r(3!"!TLG'jc#[ac!!3+CfPfG32mFJ!&#[a
|
||||||
|
a!"JZFhPcEf4XEfGKFfYb!!!!!!!!!!"849K8%IbD#XRJ%JUYi1%TDJ`!!LrM*N9
|
||||||
|
4e%r&jLa&edrSaHBX4Nr%@qPF@eTVA&VU-NAE6m4Ek9aE@QYF@Z`bl5C&hNr,lbA
|
||||||
|
Y*N9J!""2bf%!%59K!")Pl5C&B!!66mYK!"3Pl5C&B!!96mYK!"BPl5C&B!!A6m[
|
||||||
|
Y*N9J!"K2amAQ,%C2&!!L+Q%!'9m!%#pK!"PK!"S[DJ`!'dmUB3!F,'S-!"eA!!K
|
||||||
|
B!"i!(fK2+Q%!)'%!'@%!)5TK!"PI!"![B3!L$!!M6em!*%9J!#92A`!PDJ`!'dp
|
||||||
|
K!#BUB3!F,'%!*ba'6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"R1,f%!+Q%!+bp
|
||||||
|
K!#`-!#02A`!9B3!Y*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,Lp
|
||||||
|
K!#TK!#m[B3!X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3!
|
||||||
|
`,f%!,!`!)dpI!"9K!$%P4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!
|
||||||
|
Z,f%!+Q%!-LpK!#`-!#02A`!9B3!c*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!
|
||||||
|
T+Q%!'9m!,LpK!#TK!$3[B3!X$!!M6em!&@%!059&B!!Z6bTK!#"K!#KK!#%UB3!
|
||||||
|
CA`!6,f%!+5TK!"PI!#i[B3!UB3!f,f%!,!`!)dpI!"9K!$FP4@!!,NmUB3!JB3!
|
||||||
|
SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!1#pK!#`-!#02A`!9B3!j*89J!#j
|
||||||
|
2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!$S[B3!X$!!M6em!&@%
|
||||||
|
!1b9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3!m,f%!,!`
|
||||||
|
!)dpI!"9K!$dP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%
|
||||||
|
!2LpK!#`-!#02A`!9B3!r*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m
|
||||||
|
!,LpK!#TK!%![B3!X$!!M6em!&@%!359&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%
|
||||||
|
!+5TK!"PI!#i[B3!UB3"#,f%!,!`!)dpI!"9K!%-P4@!!,NmUB3!JB3!SB3!K+Q%
|
||||||
|
!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!4#pK!#`-!#02A`!9B3"&*89J!#j2+Q%!)'%
|
||||||
|
!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!%B[B3!X$!!M6em!&@%!4b9&B!!
|
||||||
|
Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"),f%!,!`!)dpI!"9
|
||||||
|
K!%NP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!5LpK!#`
|
||||||
|
-!#02A`!9B3",*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#T
|
||||||
|
K!%`[B3!X$!!M6em!&@%!659&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"P
|
||||||
|
I!#i[B3!UB3"1,f%!,!`!)dpI!"9K!%mP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bp
|
||||||
|
K!#NUB3!CA`!Z,f%!+Q%!8#pK!#`-!#02A`!9B3"4*89J!#j2+Q%!)'%!+'%!)5T
|
||||||
|
K!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!&)[B3!X$!!M6em!&@%!8b9&B!!Z6bTK!#"
|
||||||
|
K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"8,f%!,!`!)dpI!"9K!&8P4@!
|
||||||
|
!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!9LpK!#`-!#02A`!
|
||||||
|
9B3"A*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!&J[B3!
|
||||||
|
X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"C,f%!,!`!)dp
|
||||||
|
I!"9K!&SP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!@bp
|
||||||
|
K!#`-!#02A`!9B3"F*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,Lp
|
||||||
|
K!#TK!&d[B3!X$!!M6em!&@%!AL9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5T
|
||||||
|
K!"PI!#i[B3!UB3"I,f%!,!`!)dpI!"9K!'!P4@!!,NmUB3!JB3!SB3!K+Q%!'9m
|
||||||
|
!%bpK!#NUB3!CA`!Z,f%!+Q%!B5pK!#`-!#02A`!9B3"L*89J!#j2+Q%!)'%!+'%
|
||||||
|
!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!'-[B3!X$!!M6em!&@%!C#9&B!!Z6bT
|
||||||
|
K!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"P,f%!,!`!)dpI!"9K!'B
|
||||||
|
P4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!CbpK!#`-!#0
|
||||||
|
2A`!9B3"S*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!'N
|
||||||
|
[B3!X$!!M6em!&@%!DL9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i
|
||||||
|
[B3!UB3"V,f%!,!`!)dmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%
|
||||||
|
!E#pK!#`-!#02A`!9B3"Y*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m
|
||||||
|
!,LpK!#TK!'i[B3!X$!!M6em!&@%!Eb9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%
|
||||||
|
!+5TK!"PI!#i[B3!UB3"`,f%!,!`!)dpI!"9K!(%P4@!!,NmUB3!JB3!SB3!K+Q%
|
||||||
|
!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!FLpK!#`-!#02+Q%!)'%!+'%!)5TK!"PI!"-
|
||||||
|
[B3!T+Q%!'9m!,LpK!#TK!(-[B3!X$!!M6em!&@%!G#9&B!!Z6bTK!#"K!#KK!#%
|
||||||
|
UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"e,f%!,!`!)dmUB3!JB3!SB3!K+Q%!'9m
|
||||||
|
!%bpK!#NUB3!CA`!A,f%!+Q%!GLpK!#`-!#02+Q%!)'%!+'%!)5TK!"PI!"-[B3!
|
||||||
|
T+Q%!'9m!&bpK!#TK!(F[B3!X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"P
|
||||||
|
I!"F[B3!UB3"i,f%!,!`!)dmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!A,f%
|
||||||
|
!+Q%!H5pK!#`-!#02+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!&bpK!#TK!(S
|
||||||
|
[B3!X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!"8[B3!UB3"l,f%!,!`
|
||||||
|
!)dmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!9,f%!+Q%!I#pK!#`-!#02+Q%
|
||||||
|
!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!&5pK!#TK!(d[B3!X$!!M6bTK!#"K!#K
|
||||||
|
K!#%UB3!CA`!6,f%!+5TK!"PI!"J[B3!UB3"q,f%!,!`!)dmUB3!JB3!SB3!K+Q%
|
||||||
|
!'9m!%bpK!#NUB3!CA`!B,f%!+Q%!IbpK!#`-!#028&92B3#!B3#"B3##DhCK!)0
|
||||||
|
K!)4K!#)-!)82$!5Y!&%!5deKBfPZG'pcD#")4$T%CA0VG'p`)%C[E'4PFMT*EQ0
|
||||||
|
[E@PZCcT[F'9ZFh0X,90139!Y-6Nj16%b-6%k6@&M6e-kE@YXD@jVFbjKF`!#!!!
|
||||||
|
1"+i!!J6mF!5p!ra`!!%1",d!!3!%[J`%[J!'!!!!!J!!$J5[!!)%r'm%[`2mE`!
|
||||||
|
%$J5r!!3!"-!%`36#"---"-!!%J!-6@&MD@jdEh0S)%K%!!)!!!`%`3!8!!j%CA0
|
||||||
|
VG'p`)%C[E'4PFJ!#!!!-"-)!$J!)5@jMEfeTEQF!!J!!$!6$!"X!&@p`C@jcFf`
|
||||||
|
Y8dj"8#da16Nj-6)a-3!#!!!-",!!4J"!6@&MD@jdEh0S)%K%1N4PFfYdEh!J4Qp
|
||||||
|
XC'9b1NPZBfpYD@jR1Qp`C@jcFf`Y8dj"8#da16Nj-6)a-6T0B@028`!#!!!-",%
|
||||||
|
!5!"#6@&MD@jdEh0S)%K%1N4PFfYdEh!J4QpXC'9b1NPZBfpYD@jR1Qp`C@jcFf`
|
||||||
|
Y8dj"8#da16Nj-6)a-6TTEQ0XG@4P!!)!!!`%XJ"3!%T0B@0TER4[FfJJ5%3k4'9
|
||||||
|
cDh4[F#"'EfaNCA)k5@jMEfeTEQFkEh"PER0cE#e66N&3,6%j16Na-M%a1QPZBfa
|
||||||
|
eC'8kEh"PER0cE!!#!!!-",-!4`""6@&MD@jdEh0S)%K%1N4PFfYdEh!J4QpXC'9
|
||||||
|
b1NPZBfpYD@jR1Qp`C@jcFf`Y8dj"8#da16Nj-6)a-6TMFRP`G'm!!J!!$!5d!%3
|
||||||
|
!2NeKBfPZG'pcD#")4$T%CA0VG'p`)%C[E'4PFMT*EQ0[E@PZCcT[F'9ZFh0X,90
|
||||||
|
139!Y-6Nj16%b-6%kFh0X!!)!!!`%Y3"!!$T0B@0TER4[FfJJ5%3k4'9cDh4[F#"
|
||||||
|
'EfaNCA)k5@jMEfeTEQFkEh"PER0cE#e66N&3,6%j16Na-M%a!!)!!!i%YJ!"&!6
|
||||||
|
%$J6%!!-B"-AmEJ6'$J6&!!-B"-ImE36)$J6(!!-B"-RmE!6+$J6*!!-B!"rmD`6
|
||||||
|
,#[aV!!3+BfC[E!`%b`!1!!K*EQ0[E@PZC`!#!!!+r'`!"!TMCQpX$!6+!"X!&@p
|
||||||
|
`C@jcFf`Y8dj"8#da16Nj-6)a-3!#!!!+r'd!"!TMCQpX$!6)!!d!"fPZBfaeC'8
|
||||||
|
!!J!!#[aZ!!3+BfC[E!`%aJ!9!!peER4TG'aPC#"QEfaNCA)!!J!!$!5h!%i!5%e
|
||||||
|
KBfPZG'pcD#")4$T%CA0VG'p`)%C[E'4PFMT*EQ0[E@PZCcT[F'9ZFh0X,90139!
|
||||||
|
Y-6Nj16%b-6%kBh*jF(4[1RJe-$Pf-`!#!!!"r,%!!!(mX!!!!Ib[!!!"r+i!!'&
|
||||||
|
cBh)!!3!-qYlHV3!!!3!!!*G#!!#@3J!!!AB!!$-8-0J!!!!F!AB!$h0MFhS!!!#
|
||||||
|
#6Np853!!!)jcBh"d!!!!QP4&@&3!!3#QFh4jE!!!!,j$6d4&!!%!bN*14%`!!!$
|
||||||
|
LBA"XG!!!!1j'8N9'!!!!qNP$6L-!!!%'D@0X0!!!!4*TBh-M!!!"(QPMFc3!!!%
|
||||||
|
UD'CNFJ!!!6C659T&!!!"3PG3Eh-!!!&1!!$rr`!!!!!!!!!!!)$rre!!!"i!!!!
|
||||||
|
!!)$rr`!!"cJ#DH#m"'Mrr`!!!*S!!!!!%iRrr`!!"Pi!!!!!"'Mrr`!!!53!!!!
|
||||||
|
!!!$rrb!!!9)!!!!!!!(rra3!!@i#DG`%!)$rr`!!!Pi#DH"X!!$rr`!!!Ri!!!!
|
||||||
|
!!)$rr`!!!S-#DH"d!*Err`!!!Si!!!!!!*Err`!!!j)!!!!!!*Err`!!"CB#DH%
|
||||||
|
i!*Err`!!"GS#DH%dkF$rr`!!"[`!!!!!rrrrr`!!"a)!!!!!!)$rr`!!"b!!!!!
|
||||||
|
!*4S:
|
||||||
126
MacOS/opensslconf.h
Normal file
126
MacOS/opensslconf.h
Normal file
@@ -0,0 +1,126 @@
|
|||||||
|
/* MacOS/opensslconf.h */
|
||||||
|
|
||||||
|
#if !(defined(VMS) || defined(__VMS)) /* VMS uses logical names instead */
|
||||||
|
# if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR)
|
||||||
|
# define OPENSSLDIR "/usr/local/ssl"
|
||||||
|
# endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(HEADER_IDEA_H) && !defined(IDEA_INT)
|
||||||
|
# define IDEA_INT unsigned int
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(HEADER_MD2_H) && !defined(MD2_INT)
|
||||||
|
# define MD2_INT unsigned int
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(HEADER_RC2_H) && !defined(RC2_INT)
|
||||||
|
/* I need to put in a mod for the alpha - eay */
|
||||||
|
# define RC2_INT unsigned int
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(HEADER_RC4_H)
|
||||||
|
# if !defined(RC4_INT)
|
||||||
|
/*
|
||||||
|
* using int types make the structure larger but make the code faster on most
|
||||||
|
* boxes I have tested - up to %20 faster.
|
||||||
|
*/
|
||||||
|
/*-
|
||||||
|
* I don't know what does "most" mean, but declaring "int" is a must on:
|
||||||
|
* - Intel P6 because partial register stalls are very expensive;
|
||||||
|
* - elder Alpha because it lacks byte load/store instructions;
|
||||||
|
*/
|
||||||
|
# define RC4_INT unsigned char
|
||||||
|
# endif
|
||||||
|
# if !defined(RC4_CHUNK)
|
||||||
|
/*
|
||||||
|
* This enables code handling data aligned at natural CPU word
|
||||||
|
* boundary. See crypto/rc4/rc4_enc.c for further details.
|
||||||
|
*/
|
||||||
|
# define RC4_CHUNK unsigned long
|
||||||
|
# endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(HEADER_DES_H) && !defined(DES_LONG)
|
||||||
|
/*
|
||||||
|
* If this is set to 'unsigned int' on a DEC Alpha, this gives about a %20
|
||||||
|
* speed up (longs are 8 bytes, int's are 4).
|
||||||
|
*/
|
||||||
|
# ifndef DES_LONG
|
||||||
|
# define DES_LONG unsigned long
|
||||||
|
# endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(HEADER_BN_H) && !defined(CONFIG_HEADER_BN_H)
|
||||||
|
# define CONFIG_HEADER_BN_H
|
||||||
|
# if __option(longlong)
|
||||||
|
# define BN_LLONG
|
||||||
|
# else
|
||||||
|
# undef BN_LLONG
|
||||||
|
# endif
|
||||||
|
|
||||||
|
/* Should we define BN_DIV2W here? */
|
||||||
|
|
||||||
|
/* Only one for the following should be defined */
|
||||||
|
/*
|
||||||
|
* The prime number generation stuff may not work when EIGHT_BIT but I don't
|
||||||
|
* care since I've only used this mode for debuging the bignum libraries
|
||||||
|
*/
|
||||||
|
# undef SIXTY_FOUR_BIT_LONG
|
||||||
|
# undef SIXTY_FOUR_BIT
|
||||||
|
# define THIRTY_TWO_BIT
|
||||||
|
# undef SIXTEEN_BIT
|
||||||
|
# undef EIGHT_BIT
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(HEADER_RC4_LOCL_H) && !defined(CONFIG_HEADER_RC4_LOCL_H)
|
||||||
|
# define CONFIG_HEADER_RC4_LOCL_H
|
||||||
|
/*
|
||||||
|
* if this is defined data[i] is used instead of *data, this is a %20 speedup
|
||||||
|
* on x86
|
||||||
|
*/
|
||||||
|
# undef RC4_INDEX
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(HEADER_BF_LOCL_H) && !defined(CONFIG_HEADER_BF_LOCL_H)
|
||||||
|
# define CONFIG_HEADER_BF_LOCL_H
|
||||||
|
# define BF_PTR
|
||||||
|
#endif /* HEADER_BF_LOCL_H */
|
||||||
|
|
||||||
|
#if defined(HEADER_DES_LOCL_H) && !defined(CONFIG_HEADER_DES_LOCL_H)
|
||||||
|
# define CONFIG_HEADER_DES_LOCL_H
|
||||||
|
/*
|
||||||
|
* the following is tweaked from a config script, that is why it is a
|
||||||
|
* protected undef/define
|
||||||
|
*/
|
||||||
|
# ifndef DES_PTR
|
||||||
|
# define DES_PTR
|
||||||
|
# endif
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This helps C compiler generate the correct code for multiple functional
|
||||||
|
* units. It reduces register dependancies at the expense of 2 more
|
||||||
|
* registers
|
||||||
|
*/
|
||||||
|
# ifndef DES_RISC1
|
||||||
|
# define DES_RISC1
|
||||||
|
# endif
|
||||||
|
|
||||||
|
# ifndef DES_RISC2
|
||||||
|
# undef DES_RISC2
|
||||||
|
# endif
|
||||||
|
|
||||||
|
# if defined(DES_RISC1) && defined(DES_RISC2)
|
||||||
|
YOU SHOULD NOT HAVE BOTH DES_RISC1 AND DES_RISC2 DEFINED ! !!!!
|
||||||
|
# endif
|
||||||
|
/*
|
||||||
|
* Unroll the inner loop, this sometimes helps, sometimes hinders. Very mucy
|
||||||
|
* CPU dependant
|
||||||
|
*/
|
||||||
|
# ifndef DES_UNROLL
|
||||||
|
# define DES_UNROLL
|
||||||
|
# endif
|
||||||
|
#endif /* HEADER_DES_LOCL_H */
|
||||||
|
#ifndef __POWERPC__
|
||||||
|
# define MD32_XARRAY
|
||||||
|
#endif
|
||||||
638
Makefile.fips
638
Makefile.fips
@@ -1,638 +0,0 @@
|
|||||||
##
|
|
||||||
## Makefile for OpenSSL: fipscanister.o only
|
|
||||||
##
|
|
||||||
|
|
||||||
VERSION=fips-2.0-test
|
|
||||||
MAJOR=
|
|
||||||
MINOR=
|
|
||||||
SHLIB_VERSION_NUMBER=
|
|
||||||
SHLIB_VERSION_HISTORY=
|
|
||||||
SHLIB_MAJOR=
|
|
||||||
SHLIB_MINOR=
|
|
||||||
SHLIB_EXT=
|
|
||||||
PLATFORM=dist
|
|
||||||
OPTIONS=
|
|
||||||
CONFIGURE_ARGS=
|
|
||||||
SHLIB_TARGET=
|
|
||||||
|
|
||||||
# HERE indicates where this Makefile lives. This can be used to indicate
|
|
||||||
# where sub-Makefiles are expected to be. Currently has very limited usage,
|
|
||||||
# and should probably not be bothered with at all.
|
|
||||||
HERE=.
|
|
||||||
|
|
||||||
# INSTALL_PREFIX is for package builders so that they can configure
|
|
||||||
# for, say, /usr/ and yet have everything installed to /tmp/somedir/usr/.
|
|
||||||
# Normally it is left empty.
|
|
||||||
INSTALL_PREFIX=
|
|
||||||
INSTALLTOP=/usr/local/ssl
|
|
||||||
|
|
||||||
# Do not edit this manually. Use Configure --openssldir=DIR do change this!
|
|
||||||
OPENSSLDIR=/usr/local/ssl
|
|
||||||
|
|
||||||
# NO_IDEA - Define to build without the IDEA algorithm
|
|
||||||
# NO_RC4 - Define to build without the RC4 algorithm
|
|
||||||
# NO_RC2 - Define to build without the RC2 algorithm
|
|
||||||
# THREADS - Define when building with threads, you will probably also need any
|
|
||||||
# system defines as well, i.e. _REENTERANT for Solaris 2.[34]
|
|
||||||
# TERMIO - Define the termio terminal subsystem, needed if sgtty is missing.
|
|
||||||
# TERMIOS - Define the termios terminal subsystem, Silicon Graphics.
|
|
||||||
# LONGCRYPT - Define to use HPUX 10.x's long password modification to crypt(3).
|
|
||||||
# DEVRANDOM - Give this the value of the 'random device' if your OS supports
|
|
||||||
# one. 32 bytes will be read from this when the random
|
|
||||||
# number generator is initalised.
|
|
||||||
# SSL_FORBID_ENULL - define if you want the server to be not able to use the
|
|
||||||
# NULL encryption ciphers.
|
|
||||||
#
|
|
||||||
# LOCK_DEBUG - turns on lots of lock debug output :-)
|
|
||||||
# REF_CHECK - turn on some xyz_free() assertions.
|
|
||||||
# REF_PRINT - prints some stuff on structure free.
|
|
||||||
# CRYPTO_MDEBUG - turns on my 'memory leak' detecting stuff
|
|
||||||
# MFUNC - Make all Malloc/Free/Realloc calls call
|
|
||||||
# CRYPTO_malloc/CRYPTO_free/CRYPTO_realloc which can be setup to
|
|
||||||
# call application defined callbacks via CRYPTO_set_mem_functions()
|
|
||||||
# MD5_ASM needs to be defined to use the x86 assembler for MD5
|
|
||||||
# SHA1_ASM needs to be defined to use the x86 assembler for SHA1
|
|
||||||
# RMD160_ASM needs to be defined to use the x86 assembler for RIPEMD160
|
|
||||||
# Do not define B_ENDIAN or L_ENDIAN if 'unsigned long' == 8. It must
|
|
||||||
# equal 4.
|
|
||||||
# PKCS1_CHECK - pkcs1 tests.
|
|
||||||
|
|
||||||
CC= cc
|
|
||||||
CFLAG= -O
|
|
||||||
DEPFLAG=
|
|
||||||
PEX_LIBS=
|
|
||||||
EX_LIBS=
|
|
||||||
EXE_EXT=
|
|
||||||
ARFLAGS=
|
|
||||||
AR=ar $(ARFLAGS) r
|
|
||||||
RANLIB= ranlib
|
|
||||||
NM= nm
|
|
||||||
PERL= perl
|
|
||||||
TAR= tar
|
|
||||||
TARFLAGS= --no-recursion
|
|
||||||
MAKEDEPPROG=makedepend
|
|
||||||
LIBDIR=lib
|
|
||||||
|
|
||||||
# We let the C compiler driver to take care of .s files. This is done in
|
|
||||||
# order to be excused from maintaining a separate set of architecture
|
|
||||||
# dependent assembler flags. E.g. if you throw -mcpu=ultrasparc at SPARC
|
|
||||||
# gcc, then the driver will automatically translate it to -xarch=v8plus
|
|
||||||
# and pass it down to assembler.
|
|
||||||
#AS=$(CC) -c
|
|
||||||
ASFLAG=$(CFLAG)
|
|
||||||
|
|
||||||
# For x86 assembler: Set PROCESSOR to 386 if you want to support
|
|
||||||
# the 80386.
|
|
||||||
PROCESSOR=
|
|
||||||
|
|
||||||
# CPUID module collects small commonly used assembler snippets
|
|
||||||
CPUID_OBJ=
|
|
||||||
BN_ASM= bn_asm.o
|
|
||||||
DES_ENC= des_enc.o fcrypt_b.o
|
|
||||||
AES_ENC= aes_core.o aes_cbc.o
|
|
||||||
BF_ENC= bf_enc.o
|
|
||||||
CAST_ENC= c_enc.o
|
|
||||||
RC4_ENC= rc4_enc.o
|
|
||||||
RC5_ENC= rc5_enc.o
|
|
||||||
MD5_ASM_OBJ=
|
|
||||||
SHA1_ASM_OBJ=
|
|
||||||
RMD160_ASM_OBJ=
|
|
||||||
WP_ASM_OBJ=
|
|
||||||
CMLL_ENC=
|
|
||||||
MODES_ASM_OBJ=
|
|
||||||
PERLASM_SCHEME=
|
|
||||||
|
|
||||||
# KRB5 stuff
|
|
||||||
KRB5_INCLUDES=
|
|
||||||
LIBKRB5=
|
|
||||||
|
|
||||||
# Zlib stuff
|
|
||||||
ZLIB_INCLUDE=
|
|
||||||
LIBZLIB=
|
|
||||||
|
|
||||||
# This is the location of fipscanister.o and friends.
|
|
||||||
# The FIPS module build will place it $(INSTALLTOP)/lib
|
|
||||||
# but since $(INSTALLTOP) can only take the default value
|
|
||||||
# when the module is built it will be in /usr/local/ssl/lib
|
|
||||||
# $(INSTALLTOP) for this build may be different so hard
|
|
||||||
# code the path.
|
|
||||||
|
|
||||||
FIPSLIBDIR=/usr/local/ssl/$(LIBDIR)/
|
|
||||||
|
|
||||||
# This is set to "y" if fipscanister.o is compiled internally as
|
|
||||||
# opposed to coming from an external validated location.
|
|
||||||
|
|
||||||
FIPSCANISTERINTERNAL=n
|
|
||||||
|
|
||||||
# This is set if we only build fipscanister.o
|
|
||||||
|
|
||||||
FIPSCANISTERONLY=y
|
|
||||||
|
|
||||||
# The location of the library which contains fipscanister.o
|
|
||||||
# normally it will be libcrypto unless fipsdso is set in which
|
|
||||||
# case it will be libfips. If not compiling in FIPS mode at all
|
|
||||||
# this is empty making it a useful test for a FIPS compile.
|
|
||||||
|
|
||||||
FIPSCANLIB=
|
|
||||||
|
|
||||||
# Shared library base address. Currently only used on Windows.
|
|
||||||
#
|
|
||||||
|
|
||||||
BASEADDR=
|
|
||||||
|
|
||||||
DIRS= crypto fips test
|
|
||||||
ENGDIRS= ccgost
|
|
||||||
SHLIBDIRS= crypto
|
|
||||||
|
|
||||||
# dirs in crypto to build
|
|
||||||
SDIRS= \
|
|
||||||
sha hmac des aes modes \
|
|
||||||
bn ec rsa dsa ecdsa dh \
|
|
||||||
buffer evp ecdh cmac
|
|
||||||
# keep in mind that the above list is adjusted by ./Configure
|
|
||||||
# according to no-xxx arguments...
|
|
||||||
|
|
||||||
LINKDIRS= \
|
|
||||||
objects sha hmac des aes modes \
|
|
||||||
bn ec rsa dsa ecdh cmac ecdsa dh engine \
|
|
||||||
buffer bio stack lhash rand err \
|
|
||||||
evp asn1 ui
|
|
||||||
|
|
||||||
# tests to perform. "alltests" is a special word indicating that all tests
|
|
||||||
# should be performed.
|
|
||||||
TESTS = alltests
|
|
||||||
|
|
||||||
MAKEFILE= Makefile
|
|
||||||
|
|
||||||
MANDIR=$(OPENSSLDIR)/man
|
|
||||||
MAN1=1
|
|
||||||
MAN3=3
|
|
||||||
MANSUFFIX=
|
|
||||||
HTMLSUFFIX=html
|
|
||||||
HTMLDIR=$(OPENSSLDIR)/html
|
|
||||||
SHELL=/bin/sh
|
|
||||||
|
|
||||||
TOP= .
|
|
||||||
ONEDIRS=out tmp
|
|
||||||
EDIRS= times doc bugs util include certs ms shlib mt demos perl sf dep VMS
|
|
||||||
WDIRS= windows
|
|
||||||
LIBS=
|
|
||||||
SHARED_CRYPTO=libcrypto$(SHLIB_EXT)
|
|
||||||
SHARED_SSL=libssl$(SHLIB_EXT)
|
|
||||||
SHARED_LIBS=
|
|
||||||
SHARED_LIBS_LINK_EXTS=
|
|
||||||
SHARED_LDFLAGS=
|
|
||||||
|
|
||||||
GENERAL= Makefile
|
|
||||||
BASENAME= openssl
|
|
||||||
NAME= $(BASENAME)-$(VERSION)
|
|
||||||
TARFILE= openssl-fips-2.0-test.tar
|
|
||||||
WTARFILE= $(NAME)-win.tar
|
|
||||||
EXHEADER= e_os2.h
|
|
||||||
HEADER= e_os.h
|
|
||||||
|
|
||||||
all: Makefile build_all openssl.pc libssl.pc libcrypto.pc
|
|
||||||
|
|
||||||
# as we stick to -e, CLEARENV ensures that local variables in lower
|
|
||||||
# Makefiles remain local and variable. $${VAR+VAR} is tribute to Korn
|
|
||||||
# shell, which [annoyingly enough] terminates unset with error if VAR
|
|
||||||
# is not present:-( TOP= && unset TOP is tribute to HP-UX /bin/sh,
|
|
||||||
# which terminates unset with error if no variable was present:-(
|
|
||||||
CLEARENV= TOP= && unset TOP $${LIB+LIB} $${LIBS+LIBS} \
|
|
||||||
$${INCLUDE+INCLUDE} $${INCLUDES+INCLUDES} \
|
|
||||||
$${DIR+DIR} $${DIRS+DIRS} $${SRC+SRC} \
|
|
||||||
$${LIBSRC+LIBSRC} $${LIBOBJ+LIBOBJ} $${ALL+ALL} \
|
|
||||||
$${EXHEADER+EXHEADER} $${HEADER+HEADER} \
|
|
||||||
$${GENERAL+GENERAL} $${CFLAGS+CFLAGS} \
|
|
||||||
$${ASFLAGS+ASFLAGS} $${AFLAGS+AFLAGS} \
|
|
||||||
$${LDCMD+LDCMD} $${LDFLAGS+LDFLAGS} \
|
|
||||||
$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS} \
|
|
||||||
$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
|
|
||||||
|
|
||||||
BUILDENV= PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)' \
|
|
||||||
CC='$(CC)' CFLAG='$(CFLAG)' \
|
|
||||||
ASFLAG='$(CFLAG) -c' \
|
|
||||||
AR='$(AR)' NM='$(NM)' RANLIB='$(RANLIB)' \
|
|
||||||
CROSS_COMPILE='$(CROSS_COMPILE)' \
|
|
||||||
PERL='$(PERL)' ENGDIRS='$(ENGDIRS)' \
|
|
||||||
SDIRS='$(SDIRS)' LIBRPATH='$(INSTALLTOP)/$(LIBDIR)' \
|
|
||||||
INSTALL_PREFIX='$(INSTALL_PREFIX)' \
|
|
||||||
INSTALLTOP='$(INSTALLTOP)' OPENSSLDIR='$(OPENSSLDIR)' \
|
|
||||||
LIBDIR='$(LIBDIR)' \
|
|
||||||
MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD $(MAKEDEPPROG)' \
|
|
||||||
DEPFLAG='-DOPENSSL_NO_DEPRECATED $(DEPFLAG)' \
|
|
||||||
MAKEDEPPROG='$(MAKEDEPPROG)' \
|
|
||||||
SHARED_LDFLAGS='$(SHARED_LDFLAGS)' \
|
|
||||||
KRB5_INCLUDES='$(KRB5_INCLUDES)' LIBKRB5='$(LIBKRB5)' \
|
|
||||||
ZLIB_INCLUDE='$(ZLIB_INCLUDE)' LIBZLIB='$(LIBZLIB)' \
|
|
||||||
EXE_EXT='$(EXE_EXT)' SHARED_LIBS='$(SHARED_LIBS)' \
|
|
||||||
SHLIB_EXT='$(SHLIB_EXT)' SHLIB_TARGET='$(SHLIB_TARGET)' \
|
|
||||||
PEX_LIBS='$(PEX_LIBS)' EX_LIBS='$(EX_LIBS)' \
|
|
||||||
CPUID_OBJ='$(CPUID_OBJ)' \
|
|
||||||
BN_ASM='$(BN_ASM)' DES_ENC='$(DES_ENC)' \
|
|
||||||
AES_ENC='$(AES_ENC)' CMLL_ENC='$(CMLL_ENC)' \
|
|
||||||
BF_ENC='$(BF_ENC)' CAST_ENC='$(CAST_ENC)' \
|
|
||||||
RC4_ENC='$(RC4_ENC)' RC5_ENC='$(RC5_ENC)' \
|
|
||||||
SHA1_ASM_OBJ='$(SHA1_ASM_OBJ)' \
|
|
||||||
MD5_ASM_OBJ='$(MD5_ASM_OBJ)' \
|
|
||||||
RMD160_ASM_OBJ='$(RMD160_ASM_OBJ)' \
|
|
||||||
WP_ASM_OBJ='$(WP_ASM_OBJ)' \
|
|
||||||
MODES_ASM_OBJ='$(MODES_ASM_OBJ)' \
|
|
||||||
PERLASM_SCHEME='$(PERLASM_SCHEME)' \
|
|
||||||
FIPSLIBDIR='${FIPSLIBDIR}' \
|
|
||||||
FIPSCANLIB="$${FIPSCANLIB:-$(FIPSCANLIB)}" \
|
|
||||||
FIPSCANISTERINTERNAL='${FIPSCANISTERINTERNAL}' \
|
|
||||||
FIPSCANISTERONLY='${FIPSCANISTERONLY}' \
|
|
||||||
FIPS_EX_OBJ='${FIPS_EX_OBJ}' \
|
|
||||||
THIS=$${THIS:-$@} MAKEFILE=Makefile MAKEOVERRIDES=
|
|
||||||
# MAKEOVERRIDES= effectively "equalizes" GNU-ish and SysV-ish make flavors,
|
|
||||||
# which in turn eliminates ambiguities in variable treatment with -e.
|
|
||||||
|
|
||||||
# BUILD_CMD is a generic macro to build a given target in a given
|
|
||||||
# subdirectory. The target must be given through the shell variable
|
|
||||||
# `target' and the subdirectory to build in must be given through `dir'.
|
|
||||||
# This macro shouldn't be used directly, use RECURSIVE_BUILD_CMD or
|
|
||||||
# BUILD_ONE_CMD instead.
|
|
||||||
#
|
|
||||||
# BUILD_ONE_CMD is a macro to build a given target in a given
|
|
||||||
# subdirectory if that subdirectory is part of $(DIRS). It requires
|
|
||||||
# exactly the same shell variables as BUILD_CMD.
|
|
||||||
#
|
|
||||||
# RECURSIVE_BUILD_CMD is a macro to build a given target in all
|
|
||||||
# subdirectories defined in $(DIRS). It requires that the target
|
|
||||||
# is given through the shell variable `target'.
|
|
||||||
BUILD_CMD= if [ -d "$$dir" ]; then \
|
|
||||||
( cd $$dir && echo "making $$target in $$dir..." && \
|
|
||||||
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. DIR=$$dir $$target \
|
|
||||||
) || exit 1; \
|
|
||||||
fi
|
|
||||||
RECURSIVE_BUILD_CMD=for dir in $(DIRS); do $(BUILD_CMD); done
|
|
||||||
BUILD_ONE_CMD=\
|
|
||||||
if expr " $(DIRS) " : ".* $$dir " >/dev/null 2>&1; then \
|
|
||||||
$(BUILD_CMD); \
|
|
||||||
fi
|
|
||||||
|
|
||||||
reflect:
|
|
||||||
@[ -n "$(THIS)" ] && $(CLEARENV) && $(MAKE) $(THIS) -e $(BUILDENV)
|
|
||||||
|
|
||||||
FIPS_EX_OBJ= ../crypto/aes/aes_cfb.o \
|
|
||||||
../crypto/aes/aes_ecb.o \
|
|
||||||
../crypto/aes/aes_ofb.o \
|
|
||||||
../crypto/bn/bn_add.o \
|
|
||||||
../crypto/bn/bn_blind.o \
|
|
||||||
../crypto/bn/bn_ctx.o \
|
|
||||||
../crypto/bn/bn_div.o \
|
|
||||||
../crypto/bn/bn_exp2.o \
|
|
||||||
../crypto/bn/bn_exp.o \
|
|
||||||
../crypto/bn/bn_gcd.o \
|
|
||||||
../crypto/bn/bn_gf2m.o \
|
|
||||||
../crypto/bn/bn_lib.o \
|
|
||||||
../crypto/bn/bn_mod.o \
|
|
||||||
../crypto/bn/bn_mont.o \
|
|
||||||
../crypto/bn/bn_mul.o \
|
|
||||||
../crypto/bn/bn_nist.o \
|
|
||||||
../crypto/bn/bn_prime.o \
|
|
||||||
../crypto/bn/bn_rand.o \
|
|
||||||
../crypto/bn/bn_recp.o \
|
|
||||||
../crypto/bn/bn_shift.o \
|
|
||||||
../crypto/bn/bn_sqr.o \
|
|
||||||
../crypto/bn/bn_word.o \
|
|
||||||
../crypto/bn/bn_x931p.o \
|
|
||||||
../crypto/buffer/buf_str.o \
|
|
||||||
../crypto/cmac/cmac.o \
|
|
||||||
../crypto/cryptlib.o \
|
|
||||||
../crypto/des/cfb64ede.o \
|
|
||||||
../crypto/des/cfb64enc.o \
|
|
||||||
../crypto/des/cfb_enc.o \
|
|
||||||
../crypto/des/ecb3_enc.o \
|
|
||||||
../crypto/des/ofb64ede.o \
|
|
||||||
../crypto/des/fcrypt.o \
|
|
||||||
../crypto/des/set_key.o \
|
|
||||||
../crypto/dh/dh_check.o \
|
|
||||||
../crypto/dh/dh_gen.o \
|
|
||||||
../crypto/dh/dh_key.o \
|
|
||||||
../crypto/dsa/dsa_gen.o \
|
|
||||||
../crypto/dsa/dsa_key.o \
|
|
||||||
../crypto/dsa/dsa_ossl.o \
|
|
||||||
../crypto/ec/ec_curve.o \
|
|
||||||
../crypto/ec/ec_cvt.o \
|
|
||||||
../crypto/ec/ec_key.o \
|
|
||||||
../crypto/ec/ec_lib.o \
|
|
||||||
../crypto/ec/ecp_mont.o \
|
|
||||||
../crypto/ec/ec_mult.o \
|
|
||||||
../crypto/ec/ecp_nist.o \
|
|
||||||
../crypto/ec/ecp_smpl.o \
|
|
||||||
../crypto/ec/ec2_mult.o \
|
|
||||||
../crypto/ec/ec2_smpl.o \
|
|
||||||
../crypto/ecdh/ech_key.o \
|
|
||||||
../crypto/ecdh/ech_ossl.o \
|
|
||||||
../crypto/ecdsa/ecs_ossl.o \
|
|
||||||
../crypto/evp/e_aes.o \
|
|
||||||
../crypto/evp/e_des3.o \
|
|
||||||
../crypto/evp/e_null.o \
|
|
||||||
../crypto/evp/m_sha1.o \
|
|
||||||
../crypto/evp/m_dss1.o \
|
|
||||||
../crypto/evp/m_dss.o \
|
|
||||||
../crypto/evp/m_ecdsa.o \
|
|
||||||
../crypto/hmac/hmac.o \
|
|
||||||
../crypto/modes/cbc128.o \
|
|
||||||
../crypto/modes/ccm128.o \
|
|
||||||
../crypto/modes/cfb128.o \
|
|
||||||
../crypto/modes/ctr128.o \
|
|
||||||
../crypto/modes/gcm128.o \
|
|
||||||
../crypto/modes/ofb128.o \
|
|
||||||
../crypto/modes/xts128.o \
|
|
||||||
../crypto/rsa/rsa_eay.o \
|
|
||||||
../crypto/rsa/rsa_gen.o \
|
|
||||||
../crypto/rsa/rsa_crpt.o \
|
|
||||||
../crypto/rsa/rsa_none.o \
|
|
||||||
../crypto/rsa/rsa_oaep.o \
|
|
||||||
../crypto/rsa/rsa_pk1.o \
|
|
||||||
../crypto/rsa/rsa_pss.o \
|
|
||||||
../crypto/rsa/rsa_ssl.o \
|
|
||||||
../crypto/rsa/rsa_x931.o \
|
|
||||||
../crypto/rsa/rsa_x931g.o \
|
|
||||||
../crypto/sha/sha1dgst.o \
|
|
||||||
../crypto/sha/sha256.o \
|
|
||||||
../crypto/sha/sha512.o \
|
|
||||||
../crypto/thr_id.o \
|
|
||||||
../crypto/uid.o
|
|
||||||
|
|
||||||
sub_all: build_all
|
|
||||||
build_all: build_libs
|
|
||||||
|
|
||||||
build_libs: build_crypto build_fips
|
|
||||||
|
|
||||||
build_fips:
|
|
||||||
@dir=fips; target=all; [ -z "$(FIPSCANLIB)" ] || $(BUILD_ONE_CMD)
|
|
||||||
|
|
||||||
build_crypto:
|
|
||||||
if [ -n "$(FIPSCANLIB)" ]; then \
|
|
||||||
EXCL_OBJ='$(AES_ENC) $(BN_ASM) $(DES_ENC) $(CPUID_OBJ) $(SHA1_ASM_OBJ) $(MODES_ASM_OBJ) $(FIPS_EX_OBJ)' ; export EXCL_OBJ ; \
|
|
||||||
ARX='$(PERL) $${TOP}/util/arx.pl $(AR)' ; \
|
|
||||||
else \
|
|
||||||
ARX='${AR}' ; \
|
|
||||||
fi ; export ARX ; \
|
|
||||||
if [ $(FIPSCANISTERINTERNAL) = "y" ]; then \
|
|
||||||
AS='$(PERL) $${TOP}/util/fipsas.pl $${TOP} $${<} $(CC)' ; \
|
|
||||||
else \
|
|
||||||
AS='$(CC) -c' ; \
|
|
||||||
fi ; export AS ; \
|
|
||||||
dir=crypto; target=fips; $(BUILD_ONE_CMD)
|
|
||||||
build_ssl:
|
|
||||||
@dir=ssl; target=all; $(BUILD_ONE_CMD)
|
|
||||||
build_engines:
|
|
||||||
@dir=engines; target=all; $(BUILD_ONE_CMD)
|
|
||||||
build_apps:
|
|
||||||
@dir=apps; target=all; $(BUILD_ONE_CMD)
|
|
||||||
build_tests:
|
|
||||||
@dir=test; target=fipsexe; $(BUILD_ONE_CMD)
|
|
||||||
build_algvs:
|
|
||||||
@dir=test; target=fipsalgvs; $(BUILD_ONE_CMD)
|
|
||||||
build_tools:
|
|
||||||
@dir=tools; target=all; $(BUILD_ONE_CMD)
|
|
||||||
|
|
||||||
all_testapps: build_libs build_testapps
|
|
||||||
build_testapps:
|
|
||||||
@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
|
|
||||||
|
|
||||||
libcrypto$(SHLIB_EXT): libcrypto.a build_fips
|
|
||||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
|
||||||
if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
|
|
||||||
FIPSLD_CC="$(CC)"; CC=fips/fipsld; \
|
|
||||||
export CC FIPSLD_CC; \
|
|
||||||
fi; \
|
|
||||||
$(MAKE) SHLIBDIRS=crypto build-shared; \
|
|
||||||
else \
|
|
||||||
echo "There's no support for shared libraries on this platform" >&2; \
|
|
||||||
exit 1; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
|
|
||||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
|
||||||
$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \
|
|
||||||
else \
|
|
||||||
echo "There's no support for shared libraries on this platform" >&2; \
|
|
||||||
exit 1; \
|
|
||||||
fi
|
|
||||||
|
|
||||||
clean-shared:
|
|
||||||
@set -e; for i in $(SHLIBDIRS); do \
|
|
||||||
if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
|
|
||||||
tmp="$(SHARED_LIBS_LINK_EXTS)"; \
|
|
||||||
for j in $${tmp:-x}; do \
|
|
||||||
( set -x; rm -f lib$$i$$j ); \
|
|
||||||
done; \
|
|
||||||
fi; \
|
|
||||||
( set -x; rm -f lib$$i$(SHLIB_EXT) ); \
|
|
||||||
if [ "$(PLATFORM)" = "Cygwin" ]; then \
|
|
||||||
( set -x; rm -f cyg$$i$(SHLIB_EXT) lib$$i$(SHLIB_EXT).a ); \
|
|
||||||
fi; \
|
|
||||||
done
|
|
||||||
|
|
||||||
link-shared:
|
|
||||||
@ set -e; for i in $(SHLIBDIRS); do \
|
|
||||||
$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
|
|
||||||
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
|
||||||
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
|
||||||
symlink.$(SHLIB_TARGET); \
|
|
||||||
libs="$$libs -l$$i"; \
|
|
||||||
done
|
|
||||||
|
|
||||||
build-shared: do_$(SHLIB_TARGET) link-shared
|
|
||||||
|
|
||||||
do_$(SHLIB_TARGET):
|
|
||||||
@ set -e; libs='-L. $(SHLIBDEPS)'; for i in $(SHLIBDIRS); do \
|
|
||||||
if [ "$$i" = "ssl" -a -n "$(LIBKRB5)" ]; then \
|
|
||||||
libs="$(LIBKRB5) $$libs"; \
|
|
||||||
fi; \
|
|
||||||
$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
|
||||||
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
|
||||||
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
|
||||||
LIBDEPS="$$libs $(EX_LIBS)" \
|
|
||||||
link_a.$(SHLIB_TARGET); \
|
|
||||||
libs="-l$$i $$libs"; \
|
|
||||||
done
|
|
||||||
|
|
||||||
libcrypto.pc: Makefile
|
|
||||||
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
|
||||||
echo 'exec_prefix=$${prefix}'; \
|
|
||||||
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
|
||||||
echo 'includedir=$${prefix}/include'; \
|
|
||||||
echo ''; \
|
|
||||||
echo 'Name: OpenSSL-libcrypto'; \
|
|
||||||
echo 'Description: OpenSSL cryptography library'; \
|
|
||||||
echo 'Version: '$(VERSION); \
|
|
||||||
echo 'Requires: '; \
|
|
||||||
echo 'Libs: -L$${libdir} -lcrypto $(EX_LIBS)'; \
|
|
||||||
echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libcrypto.pc
|
|
||||||
|
|
||||||
libssl.pc: Makefile
|
|
||||||
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
|
||||||
echo 'exec_prefix=$${prefix}'; \
|
|
||||||
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
|
||||||
echo 'includedir=$${prefix}/include'; \
|
|
||||||
echo ''; \
|
|
||||||
echo 'Name: OpenSSL'; \
|
|
||||||
echo 'Description: Secure Sockets Layer and cryptography libraries'; \
|
|
||||||
echo 'Version: '$(VERSION); \
|
|
||||||
echo 'Requires: '; \
|
|
||||||
echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \
|
|
||||||
echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > libssl.pc
|
|
||||||
|
|
||||||
openssl.pc: Makefile
|
|
||||||
@ ( echo 'prefix=$(INSTALLTOP)'; \
|
|
||||||
echo 'exec_prefix=$${prefix}'; \
|
|
||||||
echo 'libdir=$${exec_prefix}/$(LIBDIR)'; \
|
|
||||||
echo 'includedir=$${prefix}/include'; \
|
|
||||||
echo ''; \
|
|
||||||
echo 'Name: OpenSSL'; \
|
|
||||||
echo 'Description: Secure Sockets Layer and cryptography libraries and tools'; \
|
|
||||||
echo 'Version: '$(VERSION); \
|
|
||||||
echo 'Requires: '; \
|
|
||||||
echo 'Libs: -L$${libdir} -lssl -lcrypto $(EX_LIBS)'; \
|
|
||||||
echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > openssl.pc
|
|
||||||
|
|
||||||
Makefile: Makefile.fips Configure config
|
|
||||||
@echo "Makefile is older than Makefile.org, Configure or config."
|
|
||||||
@echo "Reconfigure the source tree (via './config' or 'perl Configure'), please."
|
|
||||||
@false
|
|
||||||
|
|
||||||
libclean:
|
|
||||||
rm -f *.map *.so *.so.* *.dll engines/*.so engines/*.dll *.a engines/*.a */lib */*/lib
|
|
||||||
|
|
||||||
clean: libclean
|
|
||||||
rm -f shlib/*.o *.o core a.out fluff testlog make.log cctest cctest.c
|
|
||||||
@set -e; target=clean; $(RECURSIVE_BUILD_CMD)
|
|
||||||
rm -f $(LIBS)
|
|
||||||
rm -f openssl.pc libssl.pc libcrypto.pc
|
|
||||||
rm -f speed.* .pure
|
|
||||||
rm -f $(TARFILE)
|
|
||||||
@set -e; for i in $(ONEDIRS) ;\
|
|
||||||
do \
|
|
||||||
rm -fr $$i/*; \
|
|
||||||
done
|
|
||||||
|
|
||||||
makefile.one: files
|
|
||||||
$(PERL) util/mk1mf.pl >makefile.one; \
|
|
||||||
sh util/do_ms.sh
|
|
||||||
|
|
||||||
files:
|
|
||||||
$(PERL) $(TOP)/util/files.pl Makefile > $(TOP)/MINFO
|
|
||||||
@set -e; target=files; $(RECURSIVE_BUILD_CMD)
|
|
||||||
|
|
||||||
links:
|
|
||||||
@$(PERL) $(TOP)/util/mkdir-p.pl include/openssl
|
|
||||||
@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
|
|
||||||
@set -e; dir=fips target=links; $(BUILD_ONE_CMD)
|
|
||||||
@(cd crypto ; TEST='' SDIRS='$(LINKDIRS)' $(MAKE) -e links)
|
|
||||||
|
|
||||||
gentests:
|
|
||||||
@(cd test && echo "generating dummy tests (if needed)..." && \
|
|
||||||
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on generate );
|
|
||||||
|
|
||||||
dclean:
|
|
||||||
rm -rf *.bak include/openssl certs/.0
|
|
||||||
@set -e; target=dclean; $(RECURSIVE_BUILD_CMD)
|
|
||||||
|
|
||||||
test: tests
|
|
||||||
|
|
||||||
tests:
|
|
||||||
@echo "Not implemented in FIPS build" ; false
|
|
||||||
|
|
||||||
report:
|
|
||||||
@$(PERL) util/selftest.pl
|
|
||||||
|
|
||||||
depend:
|
|
||||||
@echo make depend not supported ; false
|
|
||||||
|
|
||||||
lint:
|
|
||||||
@set -e; target=lint; $(RECURSIVE_BUILD_CMD)
|
|
||||||
|
|
||||||
tags:
|
|
||||||
rm -f TAGS
|
|
||||||
find . -name '[^.]*.[ch]' | xargs etags -a
|
|
||||||
|
|
||||||
errors:
|
|
||||||
$(PERL) util/mkerr.pl -recurse -write
|
|
||||||
(cd engines; $(MAKE) PERL=$(PERL) errors)
|
|
||||||
$(PERL) util/ck_errf.pl -strict */*.c */*/*.c
|
|
||||||
|
|
||||||
stacks:
|
|
||||||
$(PERL) util/mkstack.pl -write
|
|
||||||
|
|
||||||
util/libeay.num::
|
|
||||||
$(PERL) util/mkdef.pl crypto update
|
|
||||||
|
|
||||||
util/ssleay.num::
|
|
||||||
$(PERL) util/mkdef.pl ssl update
|
|
||||||
|
|
||||||
crypto/objects/obj_dat.h: crypto/objects/obj_dat.pl crypto/objects/obj_mac.h
|
|
||||||
$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
|
||||||
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
|
|
||||||
$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
|
||||||
crypto/objects/obj_xref.h: crypto/objects/objxref.pl crypto/objects/obj_xref.txt crypto/objects/obj_mac.num
|
|
||||||
$(PERL) crypto/objects/objxref.pl crypto/objects/obj_mac.num crypto/objects/obj_xref.txt >crypto/objects/obj_xref.h
|
|
||||||
|
|
||||||
apps/openssl-vms.cnf: apps/openssl.cnf
|
|
||||||
$(PERL) VMS/VMSify-conf.pl < apps/openssl.cnf > apps/openssl-vms.cnf
|
|
||||||
|
|
||||||
crypto/bn/bn_prime.h: crypto/bn/bn_prime.pl
|
|
||||||
$(PERL) crypto/bn/bn_prime.pl >crypto/bn/bn_prime.h
|
|
||||||
|
|
||||||
|
|
||||||
TABLE: Configure
|
|
||||||
(echo 'Output of `Configure TABLE'"':"; \
|
|
||||||
$(PERL) Configure TABLE) > TABLE
|
|
||||||
|
|
||||||
update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h crypto/objects/obj_xref.h apps/openssl-vms.cnf crypto/bn/bn_prime.h TABLE depend
|
|
||||||
|
|
||||||
# Build distribution tar-file. As the list of files returned by "find" is
|
|
||||||
# pretty long, on several platforms a "too many arguments" error or similar
|
|
||||||
# would occur. Therefore the list of files is temporarily stored into a file
|
|
||||||
# and read directly, requiring GNU-Tar. Call "make TAR=gtar dist" if the normal
|
|
||||||
# tar does not support the --files-from option.
|
|
||||||
tar:
|
|
||||||
find . -type d -print | xargs chmod 755
|
|
||||||
find . -type f -print | xargs chmod a+r
|
|
||||||
find . -type f -perm -0100 -print | xargs chmod a+x
|
|
||||||
find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE | $(BUILDENV) LINKDIRS='$(LINKDIRS)' $(PERL) util/fipsdist.pl | sort > ../$(TARFILE).list; \
|
|
||||||
$(TAR) $(TARFLAGS) --files-from ../$(TARFILE).list -cvf - | \
|
|
||||||
tardy --user_number=0 --user_name=openssl \
|
|
||||||
--group_number=0 --group_name=openssl \
|
|
||||||
--prefix=openssl-$(VERSION) - |\
|
|
||||||
gzip --best >../$(TARFILE).gz; \
|
|
||||||
rm -f ../$(TARFILE).list; \
|
|
||||||
ls -l ../$(TARFILE).gz
|
|
||||||
|
|
||||||
tar-snap:
|
|
||||||
@$(TAR) $(TARFLAGS) -cvf - \
|
|
||||||
`find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE \! -name '*.o' \! -name '*.a' \! -name '*.so' \! -name '*.so.*' \! -name 'openssl' \! -name '*test' \! -name '.#*' \! -name '*~' | sort` |\
|
|
||||||
tardy --user_number=0 --user_name=openssl \
|
|
||||||
--group_number=0 --group_name=openssl \
|
|
||||||
--prefix=openssl-$(VERSION) - > ../$(TARFILE);\
|
|
||||||
ls -l ../$(TARFILE)
|
|
||||||
|
|
||||||
dist:
|
|
||||||
$(PERL) Configure dist fipscanisteronly
|
|
||||||
@$(MAKE) dist_pem_h
|
|
||||||
@$(MAKE) SDIRS='$(SDIRS)' clean
|
|
||||||
@$(MAKE) -f Makefile.fips TAR='$(TAR)' TARFLAGS='$(TARFLAGS)' tar
|
|
||||||
|
|
||||||
dist_pem_h:
|
|
||||||
(cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean)
|
|
||||||
|
|
||||||
install: all install_sw
|
|
||||||
|
|
||||||
install_sw:
|
|
||||||
@$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \
|
|
||||||
$(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR) \
|
|
||||||
$(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl
|
|
||||||
@set -e; headerlist="$(EXHEADER)"; for i in $$headerlist;\
|
|
||||||
do \
|
|
||||||
(cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \
|
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
|
|
||||||
done;
|
|
||||||
@set -e; target=install; $(RECURSIVE_BUILD_CMD)
|
|
||||||
|
|
||||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
|
|
||||||
286
Makefile.org
286
Makefile.org
@@ -65,11 +65,11 @@ EX_LIBS=
|
|||||||
EXE_EXT=
|
EXE_EXT=
|
||||||
ARFLAGS=
|
ARFLAGS=
|
||||||
AR=ar $(ARFLAGS) r
|
AR=ar $(ARFLAGS) r
|
||||||
|
ARD=ar $(ARFLAGS) d
|
||||||
RANLIB= ranlib
|
RANLIB= ranlib
|
||||||
NM= nm
|
|
||||||
PERL= perl
|
PERL= perl
|
||||||
TAR= tar
|
TAR= tar
|
||||||
TARFLAGS= --no-recursion
|
TARFLAGS= --no-recursion --record-size=10240
|
||||||
MAKEDEPPROG=makedepend
|
MAKEDEPPROG=makedepend
|
||||||
LIBDIR=lib
|
LIBDIR=lib
|
||||||
|
|
||||||
@@ -78,7 +78,7 @@ LIBDIR=lib
|
|||||||
# dependent assembler flags. E.g. if you throw -mcpu=ultrasparc at SPARC
|
# dependent assembler flags. E.g. if you throw -mcpu=ultrasparc at SPARC
|
||||||
# gcc, then the driver will automatically translate it to -xarch=v8plus
|
# gcc, then the driver will automatically translate it to -xarch=v8plus
|
||||||
# and pass it down to assembler.
|
# and pass it down to assembler.
|
||||||
#AS=$(CC) -c
|
AS=$(CC) -c
|
||||||
ASFLAG=$(CFLAG)
|
ASFLAG=$(CFLAG)
|
||||||
|
|
||||||
# For x86 assembler: Set PROCESSOR to 386 if you want to support
|
# For x86 assembler: Set PROCESSOR to 386 if you want to support
|
||||||
@@ -89,7 +89,7 @@ PROCESSOR=
|
|||||||
CPUID_OBJ=
|
CPUID_OBJ=
|
||||||
BN_ASM= bn_asm.o
|
BN_ASM= bn_asm.o
|
||||||
DES_ENC= des_enc.o fcrypt_b.o
|
DES_ENC= des_enc.o fcrypt_b.o
|
||||||
AES_ENC= aes_core.o aes_cbc.o
|
AES_ASM_OBJ=aes_core.o aes_cbc.o
|
||||||
BF_ENC= bf_enc.o
|
BF_ENC= bf_enc.o
|
||||||
CAST_ENC= c_enc.o
|
CAST_ENC= c_enc.o
|
||||||
RC4_ENC= rc4_enc.o
|
RC4_ENC= rc4_enc.o
|
||||||
@@ -97,11 +97,6 @@ RC5_ENC= rc5_enc.o
|
|||||||
MD5_ASM_OBJ=
|
MD5_ASM_OBJ=
|
||||||
SHA1_ASM_OBJ=
|
SHA1_ASM_OBJ=
|
||||||
RMD160_ASM_OBJ=
|
RMD160_ASM_OBJ=
|
||||||
WP_ASM_OBJ=
|
|
||||||
CMLL_ENC=
|
|
||||||
MODES_ASM_OBJ=
|
|
||||||
ENGINES_ASM_OBJ=
|
|
||||||
PERLASM_SCHEME=
|
|
||||||
|
|
||||||
# KRB5 stuff
|
# KRB5 stuff
|
||||||
KRB5_INCLUDES=
|
KRB5_INCLUDES=
|
||||||
@@ -115,7 +110,7 @@ LIBZLIB=
|
|||||||
# The FIPS module build will place it $(INSTALLTOP)/lib
|
# The FIPS module build will place it $(INSTALLTOP)/lib
|
||||||
# but since $(INSTALLTOP) can only take the default value
|
# but since $(INSTALLTOP) can only take the default value
|
||||||
# when the module is built it will be in /usr/local/ssl/lib
|
# when the module is built it will be in /usr/local/ssl/lib
|
||||||
# $(INSTALLTOP) for this build may be different so hard
|
# $(INSTALLTOP) for this build make be different so hard
|
||||||
# code the path.
|
# code the path.
|
||||||
|
|
||||||
FIPSLIBDIR=/usr/local/ssl/$(LIBDIR)/
|
FIPSLIBDIR=/usr/local/ssl/$(LIBDIR)/
|
||||||
@@ -138,18 +133,17 @@ FIPSCANLIB=
|
|||||||
BASEADDR=
|
BASEADDR=
|
||||||
|
|
||||||
DIRS= crypto fips ssl engines apps test tools
|
DIRS= crypto fips ssl engines apps test tools
|
||||||
ENGDIRS= ccgost
|
SHLIBDIRS= crypto ssl fips
|
||||||
SHLIBDIRS= crypto ssl
|
|
||||||
|
|
||||||
# dirs in crypto to build
|
# dirs in crypto to build
|
||||||
SDIRS= \
|
SDIRS= \
|
||||||
objects \
|
objects \
|
||||||
md2 md4 md5 sha mdc2 hmac ripemd whrlpool \
|
md2 md4 md5 sha mdc2 hmac ripemd \
|
||||||
des aes rc2 rc4 rc5 idea bf cast camellia seed modes \
|
des aes rc2 rc4 rc5 idea bf cast camellia seed \
|
||||||
bn ec rsa dsa ecdsa dh ecdh dso engine \
|
bn ec rsa dsa ecdsa dh ecdh dso engine \
|
||||||
buffer bio stack lhash rand err \
|
buffer bio stack lhash rand err \
|
||||||
evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5 \
|
evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5 \
|
||||||
cms pqueue ts jpake srp store cmac
|
store cms pqueue jpake
|
||||||
# keep in mind that the above list is adjusted by ./Configure
|
# keep in mind that the above list is adjusted by ./Configure
|
||||||
# according to no-xxx arguments...
|
# according to no-xxx arguments...
|
||||||
|
|
||||||
@@ -163,8 +157,6 @@ MANDIR=$(OPENSSLDIR)/man
|
|||||||
MAN1=1
|
MAN1=1
|
||||||
MAN3=3
|
MAN3=3
|
||||||
MANSUFFIX=
|
MANSUFFIX=
|
||||||
HTMLSUFFIX=html
|
|
||||||
HTMLDIR=$(OPENSSLDIR)/html
|
|
||||||
SHELL=/bin/sh
|
SHELL=/bin/sh
|
||||||
|
|
||||||
TOP= .
|
TOP= .
|
||||||
@@ -174,6 +166,7 @@ WDIRS= windows
|
|||||||
LIBS= libcrypto.a libssl.a
|
LIBS= libcrypto.a libssl.a
|
||||||
SHARED_CRYPTO=libcrypto$(SHLIB_EXT)
|
SHARED_CRYPTO=libcrypto$(SHLIB_EXT)
|
||||||
SHARED_SSL=libssl$(SHLIB_EXT)
|
SHARED_SSL=libssl$(SHLIB_EXT)
|
||||||
|
SHARED_FIPS=
|
||||||
SHARED_LIBS=
|
SHARED_LIBS=
|
||||||
SHARED_LIBS_LINK_EXTS=
|
SHARED_LIBS_LINK_EXTS=
|
||||||
SHARED_LDFLAGS=
|
SHARED_LDFLAGS=
|
||||||
@@ -204,37 +197,30 @@ CLEARENV= TOP= && unset TOP $${LIB+LIB} $${LIBS+LIBS} \
|
|||||||
$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS} \
|
$${SHAREDCMD+SHAREDCMD} $${SHAREDFLAGS+SHAREDFLAGS} \
|
||||||
$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
|
$${SHARED_LIB+SHARED_LIB} $${LIBEXTRAS+LIBEXTRAS}
|
||||||
|
|
||||||
BUILDENV= PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)' \
|
BUILDENV= PLATFORM='${PLATFORM}' PROCESSOR='${PROCESSOR}' \
|
||||||
CC='$(CC)' CFLAG='$(CFLAG)' \
|
CC='${CC}' CFLAG='${CFLAG}' \
|
||||||
ASFLAG='$(CFLAG) -c' \
|
AS='${CC}' ASFLAG='${CFLAG} -c' \
|
||||||
AR='$(AR)' NM='$(NM)' RANLIB='$(RANLIB)' \
|
AR='${AR}' PERL='${PERL}' RANLIB='${RANLIB}' \
|
||||||
CROSS_COMPILE='$(CROSS_COMPILE)' \
|
SDIRS='${SDIRS}' LIBRPATH='${INSTALLTOP}/$(LIBDIR)' \
|
||||||
PERL='$(PERL)' ENGDIRS='$(ENGDIRS)' \
|
INSTALL_PREFIX='${INSTALL_PREFIX}' \
|
||||||
SDIRS='$(SDIRS)' LIBRPATH='$(INSTALLTOP)/$(LIBDIR)' \
|
INSTALLTOP='${INSTALLTOP}' OPENSSLDIR='${OPENSSLDIR}' \
|
||||||
INSTALL_PREFIX='$(INSTALL_PREFIX)' \
|
LIBDIR='${LIBDIR}' \
|
||||||
INSTALLTOP='$(INSTALLTOP)' OPENSSLDIR='$(OPENSSLDIR)' \
|
MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD ${MAKEDEPPROG}' \
|
||||||
LIBDIR='$(LIBDIR)' \
|
DEPFLAG='-DOPENSSL_NO_DEPRECATED ${DEPFLAG}' \
|
||||||
MAKEDEPEND='$$$${TOP}/util/domd $$$${TOP} -MD $(MAKEDEPPROG)' \
|
MAKEDEPPROG='${MAKEDEPPROG}' \
|
||||||
DEPFLAG='-DOPENSSL_NO_DEPRECATED $(DEPFLAG)' \
|
SHARED_LDFLAGS='${SHARED_LDFLAGS}' \
|
||||||
MAKEDEPPROG='$(MAKEDEPPROG)' \
|
KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' \
|
||||||
SHARED_LDFLAGS='$(SHARED_LDFLAGS)' \
|
EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' \
|
||||||
KRB5_INCLUDES='$(KRB5_INCLUDES)' LIBKRB5='$(LIBKRB5)' \
|
SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' \
|
||||||
ZLIB_INCLUDE='$(ZLIB_INCLUDE)' LIBZLIB='$(LIBZLIB)' \
|
PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' \
|
||||||
EXE_EXT='$(EXE_EXT)' SHARED_LIBS='$(SHARED_LIBS)' \
|
CPUID_OBJ='${CPUID_OBJ}' \
|
||||||
SHLIB_EXT='$(SHLIB_EXT)' SHLIB_TARGET='$(SHLIB_TARGET)' \
|
BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' \
|
||||||
PEX_LIBS='$(PEX_LIBS)' EX_LIBS='$(EX_LIBS)' \
|
AES_ASM_OBJ='${AES_ASM_OBJ}' \
|
||||||
CPUID_OBJ='$(CPUID_OBJ)' \
|
BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' \
|
||||||
BN_ASM='$(BN_ASM)' DES_ENC='$(DES_ENC)' \
|
RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' \
|
||||||
AES_ENC='$(AES_ENC)' CMLL_ENC='$(CMLL_ENC)' \
|
SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' \
|
||||||
BF_ENC='$(BF_ENC)' CAST_ENC='$(CAST_ENC)' \
|
MD5_ASM_OBJ='${MD5_ASM_OBJ}' \
|
||||||
RC4_ENC='$(RC4_ENC)' RC5_ENC='$(RC5_ENC)' \
|
RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' \
|
||||||
SHA1_ASM_OBJ='$(SHA1_ASM_OBJ)' \
|
|
||||||
MD5_ASM_OBJ='$(MD5_ASM_OBJ)' \
|
|
||||||
RMD160_ASM_OBJ='$(RMD160_ASM_OBJ)' \
|
|
||||||
WP_ASM_OBJ='$(WP_ASM_OBJ)' \
|
|
||||||
MODES_ASM_OBJ='$(MODES_ASM_OBJ)' \
|
|
||||||
ENGINES_ASM_OBJ='$(ENGINES_ASM_OBJ)' \
|
|
||||||
PERLASM_SCHEME='$(PERLASM_SCHEME)' \
|
|
||||||
FIPSLIBDIR='${FIPSLIBDIR}' \
|
FIPSLIBDIR='${FIPSLIBDIR}' \
|
||||||
FIPSCANLIB="$${FIPSCANLIB:-$(FIPSCANLIB)}" \
|
FIPSCANLIB="$${FIPSCANLIB:-$(FIPSCANLIB)}" \
|
||||||
FIPSCANISTERINTERNAL='${FIPSCANISTERINTERNAL}' \
|
FIPSCANISTERINTERNAL='${FIPSCANISTERINTERNAL}' \
|
||||||
@@ -257,13 +243,14 @@ BUILDENV= PLATFORM='$(PLATFORM)' PROCESSOR='$(PROCESSOR)' \
|
|||||||
# subdirectories defined in $(DIRS). It requires that the target
|
# subdirectories defined in $(DIRS). It requires that the target
|
||||||
# is given through the shell variable `target'.
|
# is given through the shell variable `target'.
|
||||||
BUILD_CMD= if [ -d "$$dir" ]; then \
|
BUILD_CMD= if [ -d "$$dir" ]; then \
|
||||||
( cd $$dir && echo "making $$target in $$dir..." && \
|
( [ $$target != all -a -z "$(FIPSCANLIB)" ] && FIPSCANLIB=/dev/null; \
|
||||||
|
cd $$dir && echo "making $$target in $$dir..." && \
|
||||||
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. DIR=$$dir $$target \
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. DIR=$$dir $$target \
|
||||||
) || exit 1; \
|
) || exit 1; \
|
||||||
fi
|
fi
|
||||||
RECURSIVE_BUILD_CMD=for dir in $(DIRS); do $(BUILD_CMD); done
|
RECURSIVE_BUILD_CMD=for dir in $(DIRS); do $(BUILD_CMD); done
|
||||||
BUILD_ONE_CMD=\
|
BUILD_ONE_CMD=\
|
||||||
if expr " $(DIRS) " : ".* $$dir " >/dev/null 2>&1; then \
|
if echo " $(DIRS) " | grep " $$dir " >/dev/null 2>/dev/null; then \
|
||||||
$(BUILD_CMD); \
|
$(BUILD_CMD); \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
@@ -280,12 +267,10 @@ FIPS_EX_OBJ= ../crypto/aes/aes_cfb.o \
|
|||||||
../crypto/bn/bn_exp2.o \
|
../crypto/bn/bn_exp2.o \
|
||||||
../crypto/bn/bn_exp.o \
|
../crypto/bn/bn_exp.o \
|
||||||
../crypto/bn/bn_gcd.o \
|
../crypto/bn/bn_gcd.o \
|
||||||
../crypto/bn/bn_gf2m.o \
|
|
||||||
../crypto/bn/bn_lib.o \
|
../crypto/bn/bn_lib.o \
|
||||||
../crypto/bn/bn_mod.o \
|
../crypto/bn/bn_mod.o \
|
||||||
../crypto/bn/bn_mont.o \
|
../crypto/bn/bn_mont.o \
|
||||||
../crypto/bn/bn_mul.o \
|
../crypto/bn/bn_mul.o \
|
||||||
../crypto/bn/bn_nist.o \
|
|
||||||
../crypto/bn/bn_prime.o \
|
../crypto/bn/bn_prime.o \
|
||||||
../crypto/bn/bn_rand.o \
|
../crypto/bn/bn_rand.o \
|
||||||
../crypto/bn/bn_recp.o \
|
../crypto/bn/bn_recp.o \
|
||||||
@@ -294,108 +279,91 @@ FIPS_EX_OBJ= ../crypto/aes/aes_cfb.o \
|
|||||||
../crypto/bn/bn_word.o \
|
../crypto/bn/bn_word.o \
|
||||||
../crypto/bn/bn_x931p.o \
|
../crypto/bn/bn_x931p.o \
|
||||||
../crypto/buffer/buf_str.o \
|
../crypto/buffer/buf_str.o \
|
||||||
../crypto/cmac/cmac.o \
|
|
||||||
../crypto/cryptlib.o \
|
../crypto/cryptlib.o \
|
||||||
../crypto/des/cfb64ede.o \
|
../crypto/des/cfb64ede.o \
|
||||||
../crypto/des/cfb64enc.o \
|
../crypto/des/cfb64enc.o \
|
||||||
../crypto/des/cfb_enc.o \
|
../crypto/des/cfb_enc.o \
|
||||||
../crypto/des/ecb3_enc.o \
|
../crypto/des/ecb3_enc.o \
|
||||||
|
../crypto/des/ecb_enc.o \
|
||||||
../crypto/des/ofb64ede.o \
|
../crypto/des/ofb64ede.o \
|
||||||
|
../crypto/des/ofb64enc.o \
|
||||||
../crypto/des/fcrypt.o \
|
../crypto/des/fcrypt.o \
|
||||||
../crypto/des/set_key.o \
|
../crypto/des/set_key.o \
|
||||||
../crypto/dh/dh_check.o \
|
../crypto/dsa/dsa_utl.o \
|
||||||
../crypto/dh/dh_gen.o \
|
../crypto/dsa/dsa_sign.o \
|
||||||
../crypto/dh/dh_key.o \
|
../crypto/dsa/dsa_vrf.o \
|
||||||
../crypto/dsa/dsa_gen.o \
|
../crypto/err/err.o \
|
||||||
../crypto/dsa/dsa_key.o \
|
../crypto/evp/digest.o \
|
||||||
../crypto/dsa/dsa_ossl.o \
|
../crypto/evp/enc_min.o \
|
||||||
../crypto/ec/ec_curve.o \
|
|
||||||
../crypto/ec/ec_cvt.o \
|
|
||||||
../crypto/ec/ec_key.o \
|
|
||||||
../crypto/ec/ec_lib.o \
|
|
||||||
../crypto/ec/ecp_mont.o \
|
|
||||||
../crypto/ec/ec_mult.o \
|
|
||||||
../crypto/ec/ecp_nist.o \
|
|
||||||
../crypto/ec/ecp_smpl.o \
|
|
||||||
../crypto/ec/ec2_mult.o \
|
|
||||||
../crypto/ec/ec2_smpl.o \
|
|
||||||
../crypto/ecdh/ech_key.o \
|
|
||||||
../crypto/ecdh/ech_ossl.o \
|
|
||||||
../crypto/ecdsa/ecs_ossl.o \
|
|
||||||
../crypto/evp/e_aes.o \
|
../crypto/evp/e_aes.o \
|
||||||
../crypto/evp/e_des3.o \
|
../crypto/evp/e_des3.o \
|
||||||
../crypto/evp/e_null.o \
|
../crypto/evp/p_sign.o \
|
||||||
../crypto/evp/m_sha1.o \
|
../crypto/evp/p_verify.o \
|
||||||
../crypto/evp/m_dss1.o \
|
../crypto/mem_clr.o \
|
||||||
../crypto/evp/m_dss.o \
|
../crypto/mem.o \
|
||||||
../crypto/evp/m_ecdsa.o \
|
../crypto/rand/md_rand.o \
|
||||||
../crypto/hmac/hmac.o \
|
../crypto/rand/rand_egd.o \
|
||||||
../crypto/modes/cbc128.o \
|
../crypto/rand/randfile.o \
|
||||||
../crypto/modes/ccm128.o \
|
../crypto/rand/rand_lib.o \
|
||||||
../crypto/modes/cfb128.o \
|
../crypto/rand/rand_os2.o \
|
||||||
../crypto/modes/ctr128.o \
|
../crypto/rand/rand_unix.o \
|
||||||
../crypto/modes/gcm128.o \
|
../crypto/rand/rand_win.o \
|
||||||
../crypto/modes/ofb128.o \
|
../crypto/rsa/rsa_lib.o \
|
||||||
../crypto/modes/xts128.o \
|
|
||||||
../crypto/rsa/rsa_eay.o \
|
|
||||||
../crypto/rsa/rsa_gen.o \
|
|
||||||
../crypto/rsa/rsa_crpt.o \
|
|
||||||
../crypto/rsa/rsa_none.o \
|
../crypto/rsa/rsa_none.o \
|
||||||
../crypto/rsa/rsa_oaep.o \
|
../crypto/rsa/rsa_oaep.o \
|
||||||
../crypto/rsa/rsa_pk1.o \
|
../crypto/rsa/rsa_pk1.o \
|
||||||
../crypto/rsa/rsa_pss.o \
|
../crypto/rsa/rsa_pss.o \
|
||||||
../crypto/rsa/rsa_ssl.o \
|
../crypto/rsa/rsa_ssl.o \
|
||||||
../crypto/rsa/rsa_x931.o \
|
../crypto/rsa/rsa_x931.o \
|
||||||
../crypto/rsa/rsa_x931g.o \
|
|
||||||
../crypto/sha/sha1dgst.o \
|
../crypto/sha/sha1dgst.o \
|
||||||
../crypto/sha/sha256.o \
|
../crypto/sha/sha256.o \
|
||||||
../crypto/sha/sha512.o \
|
../crypto/sha/sha512.o \
|
||||||
../crypto/thr_id.o \
|
|
||||||
../crypto/uid.o
|
../crypto/uid.o
|
||||||
|
|
||||||
sub_all: build_all
|
sub_all: build_all
|
||||||
build_all: build_libs build_apps build_tests build_tools
|
build_all: build_libs build_apps build_tests build_tools
|
||||||
|
|
||||||
build_libs: build_crypto build_fips build_ssl build_engines
|
build_libs: build_crypto build_fips build_ssl build_shared build_engines
|
||||||
|
|
||||||
build_fips:
|
|
||||||
@dir=fips; target=all; [ -z "$(FIPSCANLIB)" ] || $(BUILD_ONE_CMD)
|
|
||||||
|
|
||||||
build_crypto:
|
build_crypto:
|
||||||
if [ -n "$(FIPSCANLIB)" ]; then \
|
if [ -n "$(FIPSCANLIB)" ]; then \
|
||||||
EXCL_OBJ='$(AES_ENC) $(BN_ASM) $(DES_ENC) $(CPUID_OBJ) $(SHA1_ASM_OBJ) $(MODES_ASM_OBJ) $(FIPS_EX_OBJ)' ; export EXCL_OBJ ; \
|
EXCL_OBJ='$(AES_ASM_OBJ) $(BN_ASM) $(DES_ENC) $(CPUID_OBJ) $(SHA1_ASM_OBJ) $(FIPS_EX_OBJ)' ; export EXCL_OBJ ; \
|
||||||
ARX='$(PERL) $${TOP}/util/arx.pl $(AR)' ; \
|
ARX='$(PERL) $${TOP}/util/arx.pl $(AR)' ; \
|
||||||
else \
|
else \
|
||||||
ARX='${AR}' ; \
|
ARX='${AR}' ; \
|
||||||
fi ; export ARX ; \
|
fi ; export ARX ; \
|
||||||
if [ $(FIPSCANISTERINTERNAL) = "y" ]; then \
|
|
||||||
AS='$(PERL) $${TOP}/util/fipsas.pl $${TOP} $${<} $(CC) -c' ; \
|
|
||||||
else \
|
|
||||||
AS='$(CC) -c' ; \
|
|
||||||
fi ; export AS ; \
|
|
||||||
dir=crypto; target=all; $(BUILD_ONE_CMD)
|
dir=crypto; target=all; $(BUILD_ONE_CMD)
|
||||||
build_ssl:
|
build_fips:
|
||||||
|
@dir=fips; target=all; [ -z "$(FIPSCANLIB)" ] || $(BUILD_ONE_CMD)
|
||||||
|
build_ssl: build_crypto
|
||||||
@dir=ssl; target=all; $(BUILD_ONE_CMD)
|
@dir=ssl; target=all; $(BUILD_ONE_CMD)
|
||||||
build_engines:
|
build_engines: build_crypto
|
||||||
@dir=engines; target=all; AS='$(CC) -c'; export AS; $(BUILD_ONE_CMD)
|
@dir=engines; target=all; $(BUILD_ONE_CMD)
|
||||||
build_apps:
|
build_apps: build_libs
|
||||||
@dir=apps; target=all; $(BUILD_ONE_CMD)
|
@dir=apps; target=all; $(BUILD_ONE_CMD)
|
||||||
build_tests:
|
build_tests: build_libs
|
||||||
@dir=test; target=all; $(BUILD_ONE_CMD)
|
@dir=test; target=all; $(BUILD_ONE_CMD)
|
||||||
build_tools:
|
build_tools: build_libs
|
||||||
@dir=tools; target=all; $(BUILD_ONE_CMD)
|
@dir=tools; target=all; $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
all_testapps: build_libs build_testapps
|
all_testapps: build_libs build_testapps
|
||||||
build_testapps:
|
build_testapps:
|
||||||
@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
|
@dir=crypto; target=testapps; $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
libcrypto$(SHLIB_EXT): libcrypto.a build_fips
|
build_shared: $(SHARED_LIBS)
|
||||||
|
libcrypto$(SHLIB_EXT): libcrypto.a $(SHARED_FIPS)
|
||||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||||
if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
|
if [ "$(FIPSCANLIB)" = "libfips" ]; then \
|
||||||
FIPSLD_CC="$(CC)"; CC=fips/fipsld; \
|
$(ARD) libcrypto.a fipscanister.o ; \
|
||||||
export CC FIPSLD_CC; \
|
$(MAKE) SHLIBDIRS='crypto' SHLIBDEPS='-lfips' build-shared; \
|
||||||
fi; \
|
$(AR) libcrypto.a fips/fipscanister.o ; \
|
||||||
$(MAKE) -e SHLIBDIRS=crypto build-shared; \
|
else \
|
||||||
|
if [ "$(FIPSCANLIB)" = "libcrypto" ]; then \
|
||||||
|
FIPSLD_CC="$(CC)"; CC=fips/fipsld; \
|
||||||
|
export CC FIPSLD_CC; \
|
||||||
|
fi; \
|
||||||
|
$(MAKE) -e SHLIBDIRS='crypto' build-shared; \
|
||||||
|
fi \
|
||||||
else \
|
else \
|
||||||
echo "There's no support for shared libraries on this platform" >&2; \
|
echo "There's no support for shared libraries on this platform" >&2; \
|
||||||
exit 1; \
|
exit 1; \
|
||||||
@@ -403,12 +371,32 @@ libcrypto$(SHLIB_EXT): libcrypto.a build_fips
|
|||||||
|
|
||||||
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
|
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
|
||||||
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||||
$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \
|
shlibdeps=-lcrypto; \
|
||||||
|
[ "$(FIPSCANLIB)" = "libfips" ] && shlibdeps="$$shlibdeps -lfips"; \
|
||||||
|
$(MAKE) SHLIBDIRS=ssl SHLIBDEPS="$$shlibdeps" build-shared; \
|
||||||
|
else \
|
||||||
|
echo "There's no support for shared libraries on this platform" >&2 ; \
|
||||||
|
exit 1; \
|
||||||
|
fi
|
||||||
|
|
||||||
|
fips/fipscanister.o: build_fips
|
||||||
|
libfips$(SHLIB_EXT): fips/fipscanister.o
|
||||||
|
@if [ "$(SHLIB_TARGET)" != "" ]; then \
|
||||||
|
FIPSLD_CC="$(CC)"; CC=fips/fipsld; export CC FIPSLD_CC; \
|
||||||
|
$(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
||||||
|
CC=$${CC} LIBNAME=fips THIS=$@ \
|
||||||
|
LIBEXTRAS=fips/fipscanister.o \
|
||||||
|
LIBDEPS="$(EX_LIBS)" \
|
||||||
|
LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||||
|
link_o.$(SHLIB_TARGET) || { rm -f $@; exit 1; } \
|
||||||
else \
|
else \
|
||||||
echo "There's no support for shared libraries on this platform" >&2; \
|
echo "There's no support for shared libraries on this platform" >&2; \
|
||||||
exit 1; \
|
exit 1; \
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
libfips.a:
|
||||||
|
dir=fips; target=all; $(BUILD_ONE_CMD)
|
||||||
|
|
||||||
clean-shared:
|
clean-shared:
|
||||||
@set -e; for i in $(SHLIBDIRS); do \
|
@set -e; for i in $(SHLIBDIRS); do \
|
||||||
if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
|
if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
|
||||||
@@ -424,10 +412,10 @@ clean-shared:
|
|||||||
done
|
done
|
||||||
|
|
||||||
link-shared:
|
link-shared:
|
||||||
@ set -e; for i in $(SHLIBDIRS); do \
|
@ set -e; for i in ${SHLIBDIRS}; do \
|
||||||
$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
|
$(MAKE) -f $(HERE)/Makefile.shared -e $(BUILDENV) \
|
||||||
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
LIBNAME=$$i LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||||
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
LIBCOMPATVERSIONS=";${SHLIB_VERSION_HISTORY}" \
|
||||||
symlink.$(SHLIB_TARGET); \
|
symlink.$(SHLIB_TARGET); \
|
||||||
libs="$$libs -l$$i"; \
|
libs="$$libs -l$$i"; \
|
||||||
done
|
done
|
||||||
@@ -435,13 +423,13 @@ link-shared:
|
|||||||
build-shared: do_$(SHLIB_TARGET) link-shared
|
build-shared: do_$(SHLIB_TARGET) link-shared
|
||||||
|
|
||||||
do_$(SHLIB_TARGET):
|
do_$(SHLIB_TARGET):
|
||||||
@ set -e; libs='-L. $(SHLIBDEPS)'; for i in $(SHLIBDIRS); do \
|
@ set -e; libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
|
||||||
if [ "$$i" = "ssl" -a -n "$(LIBKRB5)" ]; then \
|
if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
|
||||||
libs="$(LIBKRB5) $$libs"; \
|
libs="$(LIBKRB5) $$libs"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
$(CLEARENV) && $(MAKE) -f Makefile.shared -e $(BUILDENV) \
|
||||||
LIBNAME=$$i LIBVERSION=$(SHLIB_MAJOR).$(SHLIB_MINOR) \
|
LIBNAME=$$i LIBVERSION=${SHLIB_MAJOR}.${SHLIB_MINOR} \
|
||||||
LIBCOMPATVERSIONS=";$(SHLIB_VERSION_HISTORY)" \
|
LIBCOMPATVERSIONS=";${SHLIB_VERSION_HISTORY}" \
|
||||||
LIBDEPS="$$libs $(EX_LIBS)" \
|
LIBDEPS="$$libs $(EX_LIBS)" \
|
||||||
link_a.$(SHLIB_TARGET); \
|
link_a.$(SHLIB_TARGET); \
|
||||||
libs="-l$$i $$libs"; \
|
libs="-l$$i $$libs"; \
|
||||||
@@ -524,29 +512,28 @@ links:
|
|||||||
|
|
||||||
gentests:
|
gentests:
|
||||||
@(cd test && echo "generating dummy tests (if needed)..." && \
|
@(cd test && echo "generating dummy tests (if needed)..." && \
|
||||||
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on generate );
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on generate );
|
||||||
|
|
||||||
dclean:
|
dclean:
|
||||||
rm -rf *.bak include/openssl certs/.0
|
rm -f *.bak
|
||||||
@set -e; target=dclean; $(RECURSIVE_BUILD_CMD)
|
@set -e; target=dclean; $(RECURSIVE_BUILD_CMD)
|
||||||
|
|
||||||
rehash: rehash.time
|
rehash: rehash.time
|
||||||
rehash.time: certs apps
|
rehash.time: certs apps
|
||||||
@if [ -z "$(CROSS_COMPILE)" ]; then \
|
@if [ -z "$(CROSS_COMPILE)" ]; then \
|
||||||
(OPENSSL="`pwd`/util/opensslwrap.sh"; \
|
(OPENSSL="`pwd`/util/opensslwrap.sh"; \
|
||||||
[ -x "apps/openssl.exe" ] && OPENSSL="apps/openssl.exe" || :; \
|
|
||||||
OPENSSL_DEBUG_MEMORY=on; \
|
OPENSSL_DEBUG_MEMORY=on; \
|
||||||
export OPENSSL OPENSSL_DEBUG_MEMORY; \
|
export OPENSSL OPENSSL_DEBUG_MEMORY; \
|
||||||
$(PERL) tools/c_rehash certs) && \
|
$(PERL) tools/c_rehash certs) && \
|
||||||
touch rehash.time; \
|
touch rehash.time; \
|
||||||
else :; fi
|
fi
|
||||||
|
|
||||||
test: tests
|
test: tests
|
||||||
|
|
||||||
tests: rehash
|
tests: rehash
|
||||||
@(cd test && echo "testing..." && \
|
@(cd test && echo "testing..." && \
|
||||||
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. TESTS='$(TESTS)' OPENSSL_DEBUG_MEMORY=on OPENSSL_CONF=../apps/openssl.cnf tests );
|
$(CLEARENV) && $(MAKE) -e $(BUILDENV) TOP=.. TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on tests );
|
||||||
OPENSSL_CONF=apps/openssl.cnf util/opensslwrap.sh version -a
|
util/opensslwrap.sh version -a
|
||||||
|
|
||||||
report:
|
report:
|
||||||
@$(PERL) util/selftest.pl
|
@$(PERL) util/selftest.pl
|
||||||
@@ -564,7 +551,7 @@ tags:
|
|||||||
errors:
|
errors:
|
||||||
$(PERL) util/mkerr.pl -recurse -write
|
$(PERL) util/mkerr.pl -recurse -write
|
||||||
(cd engines; $(MAKE) PERL=$(PERL) errors)
|
(cd engines; $(MAKE) PERL=$(PERL) errors)
|
||||||
$(PERL) util/ck_errf.pl -strict */*.c */*/*.c
|
$(PERL) util/ck_errf.pl */*.c */*/*.c
|
||||||
|
|
||||||
stacks:
|
stacks:
|
||||||
$(PERL) util/mkstack.pl -write
|
$(PERL) util/mkstack.pl -write
|
||||||
@@ -579,8 +566,6 @@ crypto/objects/obj_dat.h: crypto/objects/obj_dat.pl crypto/objects/obj_mac.h
|
|||||||
$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
|
||||||
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
|
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
|
||||||
$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
|
||||||
crypto/objects/obj_xref.h: crypto/objects/objxref.pl crypto/objects/obj_xref.txt crypto/objects/obj_mac.num
|
|
||||||
$(PERL) crypto/objects/objxref.pl crypto/objects/obj_mac.num crypto/objects/obj_xref.txt >crypto/objects/obj_xref.h
|
|
||||||
|
|
||||||
apps/openssl-vms.cnf: apps/openssl.cnf
|
apps/openssl-vms.cnf: apps/openssl.cnf
|
||||||
$(PERL) VMS/VMSify-conf.pl < apps/openssl.cnf > apps/openssl-vms.cnf
|
$(PERL) VMS/VMSify-conf.pl < apps/openssl.cnf > apps/openssl-vms.cnf
|
||||||
@@ -593,7 +578,7 @@ TABLE: Configure
|
|||||||
(echo 'Output of `Configure TABLE'"':"; \
|
(echo 'Output of `Configure TABLE'"':"; \
|
||||||
$(PERL) Configure TABLE) > TABLE
|
$(PERL) Configure TABLE) > TABLE
|
||||||
|
|
||||||
update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h crypto/objects/obj_xref.h apps/openssl-vms.cnf crypto/bn/bn_prime.h TABLE depend
|
update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h apps/openssl-vms.cnf crypto/bn/bn_prime.h TABLE depend
|
||||||
|
|
||||||
# Build distribution tar-file. As the list of files returned by "find" is
|
# Build distribution tar-file. As the list of files returned by "find" is
|
||||||
# pretty long, on several platforms a "too many arguments" error or similar
|
# pretty long, on several platforms a "too many arguments" error or similar
|
||||||
@@ -624,8 +609,8 @@ tar-snap:
|
|||||||
dist:
|
dist:
|
||||||
$(PERL) Configure dist
|
$(PERL) Configure dist
|
||||||
@$(MAKE) dist_pem_h
|
@$(MAKE) dist_pem_h
|
||||||
@$(MAKE) SDIRS='$(SDIRS)' clean
|
@$(MAKE) SDIRS='${SDIRS}' clean
|
||||||
@$(MAKE) TAR='$(TAR)' TARFLAGS='$(TARFLAGS)' tar
|
@$(MAKE) TAR='${TAR}' TARFLAGS='${TARFLAGS}' tar
|
||||||
|
|
||||||
dist_pem_h:
|
dist_pem_h:
|
||||||
(cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean)
|
(cd crypto/pem; $(MAKE) -e $(BUILDENV) pem.h; $(MAKE) clean)
|
||||||
@@ -647,7 +632,7 @@ install_sw:
|
|||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
|
||||||
done;
|
done;
|
||||||
@set -e; target=install; $(RECURSIVE_BUILD_CMD)
|
@set -e; target=install; $(RECURSIVE_BUILD_CMD)
|
||||||
@set -e; liblist="$(LIBS)"; for i in $$liblist ;\
|
@set -e; for i in $(LIBS) ;\
|
||||||
do \
|
do \
|
||||||
if [ -f "$$i" ]; then \
|
if [ -f "$$i" ]; then \
|
||||||
( echo installing $$i; \
|
( echo installing $$i; \
|
||||||
@@ -676,16 +661,6 @@ install_sw:
|
|||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new; \
|
||||||
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i; \
|
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/$$i; \
|
||||||
fi ); \
|
fi ); \
|
||||||
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
|
||||||
( case $$i in \
|
|
||||||
*crypto*) i=libeay32.dll;; \
|
|
||||||
*ssl*) i=ssleay32.dll;; \
|
|
||||||
esac; \
|
|
||||||
echo installing $$i; \
|
|
||||||
cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new; \
|
|
||||||
chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new; \
|
|
||||||
mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i ); \
|
|
||||||
fi; \
|
|
||||||
fi; \
|
fi; \
|
||||||
done; \
|
done; \
|
||||||
( here="`pwd`"; \
|
( here="`pwd`"; \
|
||||||
@@ -705,27 +680,6 @@ install_sw:
|
|||||||
cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig
|
cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig
|
||||||
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig/openssl.pc
|
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/$(LIBDIR)/pkgconfig/openssl.pc
|
||||||
|
|
||||||
install_html_docs:
|
|
||||||
here="`pwd`"; \
|
|
||||||
for subdir in apps crypto ssl; do \
|
|
||||||
mkdir -p $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir; \
|
|
||||||
for i in doc/$$subdir/*.pod; do \
|
|
||||||
fn=`basename $$i .pod`; \
|
|
||||||
echo "installing html/$$fn.$(HTMLSUFFIX)"; \
|
|
||||||
cat $$i \
|
|
||||||
| sed -r 's/L<([^)]*)(\([0-9]\))?\|([^)]*)(\([0-9]\))?>/L<\1|\3>/g' \
|
|
||||||
| pod2html --podroot=doc --htmlroot=.. --podpath=apps:crypto:ssl \
|
|
||||||
| sed -r 's/<!DOCTYPE.*//g' \
|
|
||||||
> $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir/$$fn.$(HTMLSUFFIX); \
|
|
||||||
$(PERL) util/extract-names.pl < $$i | \
|
|
||||||
grep -v $$filecase "^$$fn\$$" | \
|
|
||||||
(cd $(INSTALL_PREFIX)$(HTMLDIR)/$$subdir; \
|
|
||||||
while read n; do \
|
|
||||||
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$(HTMLSUFFIX) "$$n".$(HTMLSUFFIX); \
|
|
||||||
done); \
|
|
||||||
done; \
|
|
||||||
done
|
|
||||||
|
|
||||||
install_docs:
|
install_docs:
|
||||||
@$(PERL) $(TOP)/util/mkdir-p.pl \
|
@$(PERL) $(TOP)/util/mkdir-p.pl \
|
||||||
$(INSTALL_PREFIX)$(MANDIR)/man1 \
|
$(INSTALL_PREFIX)$(MANDIR)/man1 \
|
||||||
@@ -752,7 +706,7 @@ install_docs:
|
|||||||
(grep -v "[ ]"; true) | \
|
(grep -v "[ ]"; true) | \
|
||||||
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
||||||
while read n; do \
|
while read n; do \
|
||||||
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
$$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
||||||
done); \
|
done); \
|
||||||
done; \
|
done; \
|
||||||
set -e; for i in doc/crypto/*.pod doc/ssl/*.pod; do \
|
set -e; for i in doc/crypto/*.pod doc/ssl/*.pod; do \
|
||||||
@@ -769,7 +723,7 @@ install_docs:
|
|||||||
(grep -v "[ ]"; true) | \
|
(grep -v "[ ]"; true) | \
|
||||||
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
|
||||||
while read n; do \
|
while read n; do \
|
||||||
PLATFORM=$(PLATFORM) $$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
$$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
|
||||||
done); \
|
done); \
|
||||||
done
|
done
|
||||||
|
|
||||||
|
|||||||
142
Makefile.shared
142
Makefile.shared
@@ -14,8 +14,6 @@ CFLAGS=$(CFLAG)
|
|||||||
LDFLAGS=
|
LDFLAGS=
|
||||||
SHARED_LDFLAGS=
|
SHARED_LDFLAGS=
|
||||||
|
|
||||||
NM=nm
|
|
||||||
|
|
||||||
# LIBNAME contains just the name of the library, without prefix ("lib"
|
# LIBNAME contains just the name of the library, without prefix ("lib"
|
||||||
# on Unix, "cyg" for certain forms under Cygwin...) or suffix (.a, .so,
|
# on Unix, "cyg" for certain forms under Cygwin...) or suffix (.a, .so,
|
||||||
# .dll, ...). This one MUST have a value when using this makefile to
|
# .dll, ...). This one MUST have a value when using this makefile to
|
||||||
@@ -93,7 +91,7 @@ LINK_APP= \
|
|||||||
( $(SET_X); \
|
( $(SET_X); \
|
||||||
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
LDCMD="$${LDCMD:-$(CC)}"; LDFLAGS="$${LDFLAGS:-$(CFLAGS)}"; \
|
LDCMD="$${LDCMD:-$(CC)}"; LDFLAGS="$${LDFLAGS:-$(CFLAGS)}"; \
|
||||||
LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \
|
LIBPATH=`for x in $$LIBDEPS; do if echo $$x | grep '^ *-L' > /dev/null 2>&1; then echo $$x | sed -e 's/^ *-L//'; fi; done | uniq`; \
|
||||||
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
||||||
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
||||||
$${LDCMD} $${LDFLAGS} -o $${APPNAME:=$(APPNAME)} $(OBJECTS) $${LIBDEPS} )
|
$${LDCMD} $${LDFLAGS} -o $${APPNAME:=$(APPNAME)} $(OBJECTS) $${LIBDEPS} )
|
||||||
@@ -103,7 +101,7 @@ LINK_SO= \
|
|||||||
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
LIBDEPS="$${LIBDEPS:-$(LIBDEPS)}"; \
|
||||||
SHAREDCMD="$${SHAREDCMD:-$(CC)}"; \
|
SHAREDCMD="$${SHAREDCMD:-$(CC)}"; \
|
||||||
SHAREDFLAGS="$${SHAREDFLAGS:-$(CFLAGS) $(SHARED_LDFLAGS)}"; \
|
SHAREDFLAGS="$${SHAREDFLAGS:-$(CFLAGS) $(SHARED_LDFLAGS)}"; \
|
||||||
LIBPATH=`for x in $$LIBDEPS; do echo $$x; done | sed -e 's/^ *-L//;t' -e d | uniq`; \
|
LIBPATH=`for x in $$LIBDEPS; do if echo $$x | grep '^ *-L' > /dev/null 2>&1; then echo $$x | sed -e 's/^ *-L//'; fi; done | uniq`; \
|
||||||
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
LIBPATH=`echo $$LIBPATH | sed -e 's/ /:/g'`; \
|
||||||
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
LD_LIBRARY_PATH=$$LIBPATH:$$LD_LIBRARY_PATH \
|
||||||
$${SHAREDCMD} $${SHAREDFLAGS} \
|
$${SHAREDCMD} $${SHAREDFLAGS} \
|
||||||
@@ -135,7 +133,7 @@ LINK_SO_A_VIA_O= \
|
|||||||
ALL=$$ALLSYMSFLAGS; ALLSYMSFLAGS=; NOALLSYMSFLAGS=; \
|
ALL=$$ALLSYMSFLAGS; ALLSYMSFLAGS=; NOALLSYMSFLAGS=; \
|
||||||
( $(SET_X); \
|
( $(SET_X); \
|
||||||
ld $(LDFLAGS) -r -o lib$(LIBNAME).o $$ALL lib$(LIBNAME).a $(LIBEXTRAS) ); \
|
ld $(LDFLAGS) -r -o lib$(LIBNAME).o $$ALL lib$(LIBNAME).a $(LIBEXTRAS) ); \
|
||||||
$(LINK_SO) && rm -f lib$(LIBNAME).o
|
$(LINK_SO) && rm -f $(LIBNAME).o
|
||||||
|
|
||||||
LINK_SO_A_UNPACKED= \
|
LINK_SO_A_UNPACKED= \
|
||||||
UNPACKDIR=link_tmp.$$$$; rm -rf $$UNPACKDIR; mkdir $$UNPACKDIR; \
|
UNPACKDIR=link_tmp.$$$$; rm -rf $$UNPACKDIR; mkdir $$UNPACKDIR; \
|
||||||
@@ -144,7 +142,7 @@ LINK_SO_A_UNPACKED= \
|
|||||||
SHOBJECTS=$$UNPACKDIR/*.o; \
|
SHOBJECTS=$$UNPACKDIR/*.o; \
|
||||||
$(LINK_SO) && rm -rf $$UNPACKDIR
|
$(LINK_SO) && rm -rf $$UNPACKDIR
|
||||||
|
|
||||||
DETECT_GNU_LD=($(CC) -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
|
DETECT_GNU_LD=(${CC} -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
|
||||||
|
|
||||||
DO_GNU_SO=$(CALC_VERSIONS); \
|
DO_GNU_SO=$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -170,19 +168,8 @@ link_a.gnu:
|
|||||||
link_app.gnu:
|
link_app.gnu:
|
||||||
@ $(DO_GNU_APP); $(LINK_APP)
|
@ $(DO_GNU_APP); $(LINK_APP)
|
||||||
|
|
||||||
DO_BEOS_SO= SHLIB=lib$(LIBNAME).so; \
|
|
||||||
SHLIB_SUFFIX=; \
|
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
|
||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -Wl,-Bsymbolic -Wl,-soname=$$SHLIB$$SHLIB_SUFFIX"
|
|
||||||
|
|
||||||
link_o.beos:
|
|
||||||
@ $(DO_BEOS_SO); $(LINK_SO_O)
|
|
||||||
link_a.beos:
|
|
||||||
@ $(DO_BEOS_SO); $(LINK_SO_A)
|
|
||||||
|
|
||||||
link_o.bsd:
|
link_o.bsd:
|
||||||
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
@@ -192,7 +179,7 @@ link_o.bsd:
|
|||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
||||||
fi; $(LINK_SO_O)
|
fi; $(LINK_SO_O)
|
||||||
link_a.bsd:
|
link_a.bsd:
|
||||||
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
@@ -202,34 +189,24 @@ link_a.bsd:
|
|||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared -nostdlib"; \
|
||||||
fi; $(LINK_SO_A)
|
fi; $(LINK_SO_A)
|
||||||
link_app.bsd:
|
link_app.bsd:
|
||||||
@if $(DETECT_GNU_LD); then $(DO_GNU_APP); else \
|
@if ${DETECT_GNU_LD}; then $(DO_GNU_APP); else \
|
||||||
LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBPATH)"; \
|
LDFLAGS="$(CFLAGS) -Wl,-rpath,$(LIBPATH)"; \
|
||||||
fi; $(LINK_APP)
|
fi; $(LINK_APP)
|
||||||
|
|
||||||
# For Darwin AKA Mac OS/X (dyld)
|
# For Darwin AKA Mac OS/X (dyld)
|
||||||
# Originally link_o.darwin produced .so, because it was hard-coded
|
# link_o.darwin produces .so, because we let it use dso_dlfcn module,
|
||||||
# in dso_dlfcn module. At later point dso_dlfcn switched to .dylib
|
# which has .so extension hard-coded. One can argue that one should
|
||||||
# extension in order to allow for run-time linking with vendor-
|
# develop special dso module for MacOS X. At least manual encourages
|
||||||
# supplied shared libraries such as libz, so that link_o.darwin had
|
# to use native NSModule(3) API and refers to dlfcn as termporary hack.
|
||||||
# to be harmonized with it. This caused minor controversy, because
|
|
||||||
# it was believed that dlopen can't be used to dynamically load
|
|
||||||
# .dylib-s, only so called bundle modules (ones linked with -bundle
|
|
||||||
# flag). The belief seems to be originating from pre-10.4 release,
|
|
||||||
# where dlfcn functionality was emulated by dlcompat add-on. In
|
|
||||||
# 10.4 dlopen was rewritten as native part of dyld and is documented
|
|
||||||
# to be capable of loading both dynamic libraries and bundles. In
|
|
||||||
# order to provide compatibility with pre-10.4 dlopen, modules are
|
|
||||||
# linked with -bundle flag, which makes .dylib extension misleading.
|
|
||||||
# It works, because dlopen is [and always was] extension-agnostic.
|
|
||||||
# Alternative to this heuristic approach is to develop specific
|
|
||||||
# MacOS X dso module relying on whichever "native" dyld interface.
|
|
||||||
link_o.darwin:
|
link_o.darwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME); \
|
SHLIB=`expr "$$THIS" : '.*/\([^/\.]*\)\.'`; \
|
||||||
SHLIB_SUFFIX=.dylib; \
|
SHLIB=$${SHLIB:-lib$(LIBNAME)}; \
|
||||||
|
SHLIB_SUFFIX=`expr "$$THIS" : '.*\(\.[^\.]*\)$$'`; \
|
||||||
|
SHLIB_SUFFIX=$${SHLIB_SUFFIX:-.so}; \
|
||||||
ALLSYMSFLAGS='-all_load'; \
|
ALLSYMSFLAGS='-all_load'; \
|
||||||
NOALLSYMSFLAGS=''; \
|
NOALLSYMSFLAGS=''; \
|
||||||
SHAREDFLAGS="$(CFLAGS) `echo $(SHARED_LDFLAGS) | sed s/dynamiclib/bundle/`"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS)"; \
|
||||||
if [ -n "$(LIBVERSION)" ]; then \
|
if [ -n "$(LIBVERSION)" ]; then \
|
||||||
SHAREDFLAGS="$$SHAREDFLAGS -current_version $(LIBVERSION)"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -current_version $(LIBVERSION)"; \
|
||||||
fi; \
|
fi; \
|
||||||
@@ -250,7 +227,7 @@ link_a.darwin:
|
|||||||
if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
|
if [ -n "$$SHLIB_SOVER_NODOT" ]; then \
|
||||||
SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -compatibility_version $$SHLIB_SOVER_NODOT"; \
|
||||||
fi; \
|
fi; \
|
||||||
SHAREDFLAGS="$$SHAREDFLAGS -install_name $(INSTALLTOP)/$(LIBDIR)/$$SHLIB$(SHLIB_EXT)"; \
|
SHAREDFLAGS="$$SHAREDFLAGS -install_name ${INSTALLTOP}/lib/$$SHLIB${SHLIB_EXT}"; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
link_app.darwin: # is there run-path on darwin?
|
link_app.darwin: # is there run-path on darwin?
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
@@ -260,59 +237,40 @@ link_o.cygwin:
|
|||||||
INHIBIT_SYMLINKS=yes; \
|
INHIBIT_SYMLINKS=yes; \
|
||||||
SHLIB=cyg$(LIBNAME); \
|
SHLIB=cyg$(LIBNAME); \
|
||||||
base=-Wl,--enable-auto-image-base; \
|
base=-Wl,--enable-auto-image-base; \
|
||||||
deffile=; \
|
|
||||||
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
SHLIB=$(LIBNAME)eay32; base=; \
|
SHLIB=$(LIBNAME)eay32; base=; \
|
||||||
if test -f $(LIBNAME)eay32.def; then \
|
|
||||||
deffile=$(LIBNAME)eay32.def; \
|
|
||||||
fi; \
|
|
||||||
fi; \
|
fi; \
|
||||||
SHLIB_SUFFIX=.dll; \
|
SHLIB_SUFFIX=.dll; \
|
||||||
LIBVERSION="$(LIBVERSION)"; \
|
LIBVERSION="$(LIBVERSION)"; \
|
||||||
SHLIB_SOVER=${LIBVERSION:+"-$(LIBVERSION)"}; \
|
SHLIB_SOVER=${LIBVERSION:+"-$(LIBVERSION)"}; \
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base $$deffile -Wl,-s,-Bsymbolic"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a"; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
#for mingw target if def-file is in use dll-name should match library-name
|
|
||||||
link_a.cygwin:
|
link_a.cygwin:
|
||||||
@ $(CALC_VERSIONS); \
|
@ $(CALC_VERSIONS); \
|
||||||
INHIBIT_SYMLINKS=yes; \
|
INHIBIT_SYMLINKS=yes; \
|
||||||
SHLIB=cyg$(LIBNAME); SHLIB_SOVER=-$(LIBVERSION); SHLIB_SUFFIX=.dll; \
|
SHLIB=cyg$(LIBNAME); \
|
||||||
dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; extras=; \
|
|
||||||
base=-Wl,--enable-auto-image-base; \
|
base=-Wl,--enable-auto-image-base; \
|
||||||
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
if expr $(PLATFORM) : 'mingw' > /dev/null; then \
|
||||||
case $(LIBNAME) in \
|
SHLIB=$(LIBNAME)eay32; \
|
||||||
crypto) SHLIB=libeay;; \
|
base=; [ $(LIBNAME) = "crypto" ] && base=-Wl,--image-base,0x63000000; \
|
||||||
ssl) SHLIB=ssleay;; \
|
|
||||||
esac; \
|
|
||||||
SHLIB_SOVER=32; \
|
|
||||||
extras="$(LIBNAME).def"; \
|
|
||||||
$(PERL) util/mkdef.pl 32 $$SHLIB > $$extras; \
|
|
||||||
base=; [ $(LIBNAME) = "crypto" ] && base=-Wl,--image-base,0x63000000; \
|
|
||||||
fi; \
|
fi; \
|
||||||
dll_name=$$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX; \
|
SHLIB_SUFFIX=.dll; \
|
||||||
$(PERL) util/mkrc.pl $$dll_name | \
|
SHLIB_SOVER=-$(LIBVERSION); \
|
||||||
$(CROSS_COMPILE)windres -o rc.o; \
|
|
||||||
extras="$$extras rc.o"; \
|
|
||||||
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
ALLSYMSFLAGS='-Wl,--whole-archive'; \
|
||||||
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
NOALLSYMSFLAGS='-Wl,--no-whole-archive'; \
|
||||||
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-s,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a $$extras"; \
|
SHAREDFLAGS="$(CFLAGS) $(SHARED_LDFLAGS) -shared $$base -Wl,-Bsymbolic -Wl,--out-implib,lib$(LIBNAME).dll.a"; \
|
||||||
[ -f apps/$$dll_name ] && rm apps/$$dll_name; \
|
[ -f apps/$$SHLIB$$SHLIB_SUFFIX ] && rm apps/$$SHLIB$$SHLIB_SUFFIX; \
|
||||||
[ -f test/$$dll_name ] && rm test/$$dll_name; \
|
[ -f test/$$SHLIB$$SHLIB_SUFFIX ] && rm test/$$SHLIB$$SHLIB_SUFFIX; \
|
||||||
$(LINK_SO_A) || exit 1; \
|
$(LINK_SO_A) || exit 1; \
|
||||||
rm $$extras; \
|
cp -p $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX apps/; \
|
||||||
cp -p $$dll_name apps/; \
|
cp -p $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX test/
|
||||||
cp -p $$dll_name test/
|
|
||||||
link_app.cygwin:
|
link_app.cygwin:
|
||||||
@if expr "$(CFLAGS)" : '.*OPENSSL_USE_APPLINK' > /dev/null; then \
|
|
||||||
LIBDEPS="$(TOP)/crypto/applink.o $${LIBDEPS:-$(LIBDEPS)}"; \
|
|
||||||
export LIBDEPS; \
|
|
||||||
fi; \
|
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.alpha-osf1:
|
link_o.alpha-osf1:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -333,7 +291,7 @@ link_o.alpha-osf1:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.alpha-osf1:
|
link_a.alpha-osf1:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -354,7 +312,7 @@ link_a.alpha-osf1:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
link_app.alpha-osf1:
|
link_app.alpha-osf1:
|
||||||
@if $(DETECT_GNU_LD); then \
|
@if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_APP); \
|
$(DO_GNU_APP); \
|
||||||
else \
|
else \
|
||||||
LDFLAGS="$(CFLAGS) -rpath $(LIBRPATH)"; \
|
LDFLAGS="$(CFLAGS) -rpath $(LIBRPATH)"; \
|
||||||
@@ -362,7 +320,7 @@ link_app.alpha-osf1:
|
|||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.solaris:
|
link_o.solaris:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -376,12 +334,12 @@ link_o.solaris:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.solaris:
|
link_a.solaris:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
MINUSZ='-z '; \
|
MINUSZ='-z '; \
|
||||||
($(CC) -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
|
(${CC} -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=;\
|
SHLIB_SUFFIX=;\
|
||||||
ALLSYMSFLAGS="$${MINUSZ}allextract"; \
|
ALLSYMSFLAGS="$${MINUSZ}allextract"; \
|
||||||
@@ -390,7 +348,7 @@ link_a.solaris:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A)
|
$(LINK_SO_A)
|
||||||
link_app.solaris:
|
link_app.solaris:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_APP); \
|
$(DO_GNU_APP); \
|
||||||
else \
|
else \
|
||||||
LDFLAGS="$(CFLAGS) -R $(LIBRPATH)"; \
|
LDFLAGS="$(CFLAGS) -R $(LIBRPATH)"; \
|
||||||
@@ -399,7 +357,7 @@ link_app.solaris:
|
|||||||
|
|
||||||
# OpenServer 5 native compilers used
|
# OpenServer 5 native compilers used
|
||||||
link_o.svr3:
|
link_o.svr3:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -411,7 +369,7 @@ link_o.svr3:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.svr3:
|
link_a.svr3:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -423,12 +381,12 @@ link_a.svr3:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A_UNPACKED)
|
$(LINK_SO_A_UNPACKED)
|
||||||
link_app.svr3:
|
link_app.svr3:
|
||||||
@$(DETECT_GNU_LD) && $(DO_GNU_APP); \
|
@${DETECT_GNU_LD} && $(DO_GNU_APP); \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
# UnixWare 7 and OpenUNIX 8 native compilers used
|
# UnixWare 7 and OpenUNIX 8 native compilers used
|
||||||
link_o.svr5:
|
link_o.svr5:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -442,12 +400,12 @@ link_o.svr5:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.svr5:
|
link_a.svr5:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHARE_FLAG='-G'; \
|
SHARE_FLAG='-G'; \
|
||||||
($(CC) -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
|
(${CC} -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
|
||||||
SHLIB=lib$(LIBNAME).so; \
|
SHLIB=lib$(LIBNAME).so; \
|
||||||
SHLIB_SUFFIX=; \
|
SHLIB_SUFFIX=; \
|
||||||
ALLSYMSFLAGS=''; \
|
ALLSYMSFLAGS=''; \
|
||||||
@@ -456,11 +414,11 @@ link_a.svr5:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_A_UNPACKED)
|
$(LINK_SO_A_UNPACKED)
|
||||||
link_app.svr5:
|
link_app.svr5:
|
||||||
@$(DETECT_GNU_LD) && $(DO_GNU_APP); \
|
@${DETECT_GNU_LD} && $(DO_GNU_APP); \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
|
|
||||||
link_o.irix:
|
link_o.irix:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -474,7 +432,7 @@ link_o.irix:
|
|||||||
fi; \
|
fi; \
|
||||||
$(LINK_SO_O)
|
$(LINK_SO_O)
|
||||||
link_a.irix:
|
link_a.irix:
|
||||||
@ if $(DETECT_GNU_LD); then \
|
@ if ${DETECT_GNU_LD}; then \
|
||||||
$(DO_GNU_SO); \
|
$(DO_GNU_SO); \
|
||||||
else \
|
else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
@@ -500,7 +458,7 @@ link_app.irix:
|
|||||||
# ELFs by the way].
|
# ELFs by the way].
|
||||||
#
|
#
|
||||||
link_o.hpux:
|
link_o.hpux:
|
||||||
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).sl; \
|
SHLIB=lib$(LIBNAME).sl; \
|
||||||
expr "$(CFLAGS)" : '.*DSO_DLFCN' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
expr "$(CFLAGS)" : '.*DSO_DLFCN' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -513,7 +471,7 @@ link_o.hpux:
|
|||||||
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
||||||
$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
$(LINK_SO_O) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
||||||
link_a.hpux:
|
link_a.hpux:
|
||||||
@if $(DETECT_GNU_LD); then $(DO_GNU_SO); else \
|
@if ${DETECT_GNU_LD}; then $(DO_GNU_SO); else \
|
||||||
$(CALC_VERSIONS); \
|
$(CALC_VERSIONS); \
|
||||||
SHLIB=lib$(LIBNAME).sl; \
|
SHLIB=lib$(LIBNAME).sl; \
|
||||||
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
@@ -526,7 +484,7 @@ link_a.hpux:
|
|||||||
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
rm -f $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX || :; \
|
||||||
$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
$(LINK_SO_A) && chmod a=rx $$SHLIB$$SHLIB_SOVER$$SHLIB_SUFFIX
|
||||||
link_app.hpux:
|
link_app.hpux:
|
||||||
@if $(DETECT_GNU_LD); then $(DO_GNU_APP); else \
|
@if ${DETECT_GNU_LD}; then $(DO_GNU_APP); else \
|
||||||
LDFLAGS="$(CFLAGS) -Wl,+s,+cdp,../:,+cdp,./:,+b,$(LIBRPATH)"; \
|
LDFLAGS="$(CFLAGS) -Wl,+s,+cdp,../:,+cdp,./:,+b,$(LIBRPATH)"; \
|
||||||
fi; \
|
fi; \
|
||||||
$(LINK_APP)
|
$(LINK_APP)
|
||||||
@@ -591,7 +549,7 @@ symlink.hpux:
|
|||||||
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
expr $(PLATFORM) : '.*ia64' > /dev/null && SHLIB=lib$(LIBNAME).so; \
|
||||||
$(SYMLINK_SO)
|
$(SYMLINK_SO)
|
||||||
# The following lines means those specific architectures do no symlinks
|
# The following lines means those specific architectures do no symlinks
|
||||||
symlink.cygwin symlink.alpha-osf1 symlink.tru64 symlink.tru64-rpath symlink.beos:
|
symlink.cygwin symlink.alpha-osf1 symlink.tru64 symlink.tru64-rpath:
|
||||||
|
|
||||||
# Compatibility targets
|
# Compatibility targets
|
||||||
link_o.bsd-gcc-shared link_o.linux-shared link_o.gnu-shared: link_o.gnu
|
link_o.bsd-gcc-shared link_o.linux-shared link_o.gnu-shared: link_o.gnu
|
||||||
@@ -649,7 +607,3 @@ link_o.reliantunix-shared: link_o.reliantunix
|
|||||||
link_a.reliantunix-shared: link_a.reliantunix
|
link_a.reliantunix-shared: link_a.reliantunix
|
||||||
link_app.reliantunix-shared: link_app.reliantunix
|
link_app.reliantunix-shared: link_app.reliantunix
|
||||||
symlink.reliantunix-shared: symlink.reliantunix
|
symlink.reliantunix-shared: symlink.reliantunix
|
||||||
link_o.beos-shared: link_o.beos
|
|
||||||
link_a.beos-shared: link_a.beos
|
|
||||||
link_app.beos-shared: link_app.gnu
|
|
||||||
symlink.beos-shared: symlink.beos
|
|
||||||
|
|||||||
245
NEWS
245
NEWS
@@ -5,66 +5,119 @@
|
|||||||
This file gives a brief overview of the major changes between each OpenSSL
|
This file gives a brief overview of the major changes between each OpenSSL
|
||||||
release. For more details please read the CHANGES file.
|
release. For more details please read the CHANGES file.
|
||||||
|
|
||||||
Major changes between OpenSSL 1.0.0c and OpenSSL 1.0.0d:
|
Major changes between OpenSSL 0.9.8zf and OpenSSL 0.9.8zg [11 Jun 2015]
|
||||||
|
|
||||||
|
o Malformed ECParameters causes infinite loop (CVE-2015-1788)
|
||||||
|
o Exploitable out-of-bounds read in X509_cmp_time (CVE-2015-1789)
|
||||||
|
o PKCS7 crash with missing EnvelopedContent (CVE-2015-1790)
|
||||||
|
o CMS verify infinite loop with unknown hash function (CVE-2015-1792)
|
||||||
|
o Race condition handling NewSessionTicket (CVE-2015-1791)
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8ze and OpenSSL 0.9.8zf [19 Mar 2015]
|
||||||
|
|
||||||
|
o Segmentation fault in ASN1_TYPE_cmp fix (CVE-2015-0286)
|
||||||
|
o ASN.1 structure reuse memory corruption fix (CVE-2015-0287)
|
||||||
|
o PKCS7 NULL pointer dereferences fix (CVE-2015-0289)
|
||||||
|
o DoS via reachable assert in SSLv2 servers fix (CVE-2015-0293)
|
||||||
|
o Use After Free following d2i_ECPrivatekey error fix (CVE-2015-0209)
|
||||||
|
o X509_to_X509_REQ NULL pointer deref fix (CVE-2015-0288)
|
||||||
|
o Removed the export ciphers from the DEFAULT ciphers
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8zd and OpenSSL 0.9.8ze [15 Jan 2015]
|
||||||
|
|
||||||
|
o Build fixes for the Windows and OpenVMS platforms
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8zc and OpenSSL 0.9.8zd [8 Jan 2015]
|
||||||
|
|
||||||
|
o Fix for CVE-2014-3571
|
||||||
|
o Fix for CVE-2014-3569
|
||||||
|
o Fix for CVE-2014-3572
|
||||||
|
o Fix for CVE-2015-0204
|
||||||
|
o Fix for CVE-2014-8275
|
||||||
|
o Fix for CVE-2014-3570
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8zb and OpenSSL 0.9.8zc [15 Oct 2014]:
|
||||||
|
|
||||||
|
o Fix for CVE-2014-3513
|
||||||
|
o Fix for CVE-2014-3567
|
||||||
|
o Mitigation for CVE-2014-3566 (SSL protocol vulnerability)
|
||||||
|
o Fix for CVE-2014-3568
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8za and OpenSSL 0.9.8zb [6 Aug 2014]:
|
||||||
|
|
||||||
|
o Fix for CVE-2014-3510
|
||||||
|
o Fix for CVE-2014-3507
|
||||||
|
o Fix for CVE-2014-3506
|
||||||
|
o Fix for CVE-2014-3505
|
||||||
|
o Fix for CVE-2014-3508
|
||||||
|
|
||||||
|
Known issues in OpenSSL 0.9.8za:
|
||||||
|
|
||||||
|
o Compilation failure of s3_pkt.c on some platforms due to missing
|
||||||
|
<limits.h> include. Fixed in 0.9.8zb-dev.
|
||||||
|
o FIPS capable link failure with missing symbol BN_consttime_swap.
|
||||||
|
Fixed in 0.9.8zb-dev. Workaround is to compile with no-ec: the EC
|
||||||
|
algorithms are not FIPS approved in OpenSSL 0.9.8 anyway.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8y and OpenSSL 0.9.8za [5 Jun 2014]:
|
||||||
|
|
||||||
|
o Fix for CVE-2014-0224
|
||||||
|
o Fix for CVE-2014-0221
|
||||||
|
o Fix for CVE-2014-0195
|
||||||
|
o Fix for CVE-2014-3470
|
||||||
|
o Fix for CVE-2014-0076
|
||||||
|
o Fix for CVE-2010-5298
|
||||||
|
o Fix to TLS alert handling.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8x and OpenSSL 0.9.8y [5 Feb 2013]:
|
||||||
|
|
||||||
|
o Fix for SSL/TLS/DTLS CBC plaintext recovery attack CVE-2013-0169
|
||||||
|
o Fix OCSP bad key DoS attack CVE-2013-0166
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8w and OpenSSL 0.9.8x [10 May 2012]:
|
||||||
|
|
||||||
|
o Fix DTLS record length checking bug CVE-2012-2333
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8v and OpenSSL 0.9.8w [23 Apr 2012]:
|
||||||
|
|
||||||
|
o Fix for CVE-2012-2131 (corrected fix for 0.9.8 and CVE-2012-2110)
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8u and OpenSSL 0.9.8v [19 Apr 2012]:
|
||||||
|
|
||||||
|
o Fix for ASN1 overflow bug CVE-2012-2110
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8t and OpenSSL 0.9.8u [12 Mar 2012]:
|
||||||
|
|
||||||
|
o Fix for CMS/PKCS#7 MMA CVE-2012-0884
|
||||||
|
o Corrected fix for CVE-2011-4619
|
||||||
|
o Various DTLS fixes.
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8s and OpenSSL 0.9.8t [18 Jan 2012]:
|
||||||
|
|
||||||
|
o Fix for DTLS DoS issue CVE-2012-0050
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8r and OpenSSL 0.9.8s [4 Jan 2012]:
|
||||||
|
|
||||||
|
o Fix for DTLS plaintext recovery attack CVE-2011-4108
|
||||||
|
o Fix policy check double free error CVE-2011-4109
|
||||||
|
o Clear block padding bytes of SSL 3.0 records CVE-2011-4576
|
||||||
|
o Only allow one SGC handshake restart for SSL/TLS CVE-2011-4619
|
||||||
|
o Check for malformed RFC3779 data CVE-2011-4577
|
||||||
|
|
||||||
|
Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r [8 Feb 2011]:
|
||||||
|
|
||||||
o Fix for security issue CVE-2011-0014
|
o Fix for security issue CVE-2011-0014
|
||||||
|
|
||||||
Major changes between OpenSSL 1.0.0b and OpenSSL 1.0.0c:
|
Major changes between OpenSSL 0.9.8p and OpenSSL 0.9.8q [2 Dec 2010]:
|
||||||
|
|
||||||
o Fix for security issue CVE-2010-4180
|
|
||||||
o Fix for CVE-2010-4252
|
|
||||||
o Fix mishandling of absent EC point format extension.
|
|
||||||
o Fix various platform compilation issues.
|
|
||||||
o Corrected fix for security issue CVE-2010-3864.
|
|
||||||
|
|
||||||
Major changes between OpenSSL 1.0.0a and OpenSSL 1.0.0b:
|
|
||||||
|
|
||||||
o Fix for security issue CVE-2010-3864.
|
|
||||||
o Fix for CVE-2010-2939
|
|
||||||
o Fix WIN32 build system for GOST ENGINE.
|
|
||||||
|
|
||||||
Major changes between OpenSSL 1.0.0 and OpenSSL 1.0.0a:
|
|
||||||
|
|
||||||
o Fix for security issue CVE-2010-1633.
|
|
||||||
o GOST MAC and CFB fixes.
|
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8n and OpenSSL 1.0.0:
|
|
||||||
|
|
||||||
o RFC3280 path validation: sufficient to process PKITS tests.
|
|
||||||
o Integrated support for PVK files and keyblobs.
|
|
||||||
o Change default private key format to PKCS#8.
|
|
||||||
o CMS support: able to process all examples in RFC4134
|
|
||||||
o Streaming ASN1 encode support for PKCS#7 and CMS.
|
|
||||||
o Multiple signer and signer add support for PKCS#7 and CMS.
|
|
||||||
o ASN1 printing support.
|
|
||||||
o Whirlpool hash algorithm added.
|
|
||||||
o RFC3161 time stamp support.
|
|
||||||
o New generalised public key API supporting ENGINE based algorithms.
|
|
||||||
o New generalised public key API utilities.
|
|
||||||
o New ENGINE supporting GOST algorithms.
|
|
||||||
o SSL/TLS GOST ciphersuite support.
|
|
||||||
o PKCS#7 and CMS GOST support.
|
|
||||||
o RFC4279 PSK ciphersuite support.
|
|
||||||
o Supported points format extension for ECC ciphersuites.
|
|
||||||
o ecdsa-with-SHA224/256/384/512 signature types.
|
|
||||||
o dsa-with-SHA224 and dsa-with-SHA256 signature types.
|
|
||||||
o Opaque PRF Input TLS extension support.
|
|
||||||
o Updated time routines to avoid OS limitations.
|
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8q and OpenSSL 0.9.8r:
|
|
||||||
|
|
||||||
o Fix for security issue CVE-2011-0014
|
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8p and OpenSSL 0.9.8q:
|
|
||||||
|
|
||||||
o Fix for security issue CVE-2010-4180
|
o Fix for security issue CVE-2010-4180
|
||||||
o Fix for CVE-2010-4252
|
o Fix for CVE-2010-4252
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8o and OpenSSL 0.9.8p:
|
Major changes between OpenSSL 0.9.8o and OpenSSL 0.9.8p [16 Nov 2010]:
|
||||||
|
|
||||||
o Fix for security issue CVE-2010-3864.
|
o Fix for security issue CVE-2010-3864.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8n and OpenSSL 0.9.8o:
|
Major changes between OpenSSL 0.9.8n and OpenSSL 0.9.8o [1 Jun 2010]:
|
||||||
|
|
||||||
o Fix for security issue CVE-2010-0742.
|
o Fix for security issue CVE-2010-0742.
|
||||||
o Various DTLS fixes.
|
o Various DTLS fixes.
|
||||||
@@ -72,12 +125,12 @@
|
|||||||
o Fix for no-rc4 compilation.
|
o Fix for no-rc4 compilation.
|
||||||
o Chil ENGINE unload workaround.
|
o Chil ENGINE unload workaround.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n:
|
Major changes between OpenSSL 0.9.8m and OpenSSL 0.9.8n [24 Mar 2010]:
|
||||||
|
|
||||||
o CFB cipher definition fixes.
|
o CFB cipher definition fixes.
|
||||||
o Fix security issues CVE-2010-0740 and CVE-2010-0433.
|
o Fix security issues CVE-2010-0740 and CVE-2010-0433.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m:
|
Major changes between OpenSSL 0.9.8l and OpenSSL 0.9.8m [25 Feb 2010]:
|
||||||
|
|
||||||
o Cipher definition fixes.
|
o Cipher definition fixes.
|
||||||
o Workaround for slow RAND_poll() on some WIN32 versions.
|
o Workaround for slow RAND_poll() on some WIN32 versions.
|
||||||
@@ -89,33 +142,33 @@
|
|||||||
o Ticket and SNI coexistence fixes.
|
o Ticket and SNI coexistence fixes.
|
||||||
o Many fixes to DTLS handling.
|
o Many fixes to DTLS handling.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l:
|
Major changes between OpenSSL 0.9.8k and OpenSSL 0.9.8l [5 Nov 2009]:
|
||||||
|
|
||||||
o Temporary work around for CVE-2009-3555: disable renegotiation.
|
o Temporary work around for CVE-2009-3555: disable renegotiation.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k:
|
Major changes between OpenSSL 0.9.8j and OpenSSL 0.9.8k [25 Mar 2009]:
|
||||||
|
|
||||||
o Fix various build issues.
|
o Fix various build issues.
|
||||||
o Fix security issues (CVE-2009-0590, CVE-2009-0591, CVE-2009-0789)
|
o Fix security issues (CVE-2009-0590, CVE-2009-0591, CVE-2009-0789)
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j:
|
Major changes between OpenSSL 0.9.8i and OpenSSL 0.9.8j [7 Jan 2009]:
|
||||||
|
|
||||||
o Fix security issue (CVE-2008-5077)
|
o Fix security issue (CVE-2008-5077)
|
||||||
o Merge FIPS 140-2 branch code.
|
o Merge FIPS 140-2 branch code.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h:
|
Major changes between OpenSSL 0.9.8g and OpenSSL 0.9.8h [28 May 2008]:
|
||||||
|
|
||||||
o CryptoAPI ENGINE support.
|
o CryptoAPI ENGINE support.
|
||||||
o Various precautionary measures.
|
o Various precautionary measures.
|
||||||
o Fix for bugs affecting certificate request creation.
|
o Fix for bugs affecting certificate request creation.
|
||||||
o Support for local machine keyset attribute in PKCS#12 files.
|
o Support for local machine keyset attribute in PKCS#12 files.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g:
|
Major changes between OpenSSL 0.9.8f and OpenSSL 0.9.8g [19 Oct 2007]:
|
||||||
|
|
||||||
o Backport of CMS functionality to 0.9.8.
|
o Backport of CMS functionality to 0.9.8.
|
||||||
o Fixes for bugs introduced with 0.9.8f.
|
o Fixes for bugs introduced with 0.9.8f.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f:
|
Major changes between OpenSSL 0.9.8e and OpenSSL 0.9.8f [11 Oct 2007]:
|
||||||
|
|
||||||
o Add gcc 4.2 support.
|
o Add gcc 4.2 support.
|
||||||
o Add support for AES and SSE2 assembly lanugauge optimization
|
o Add support for AES and SSE2 assembly lanugauge optimization
|
||||||
@@ -126,23 +179,23 @@
|
|||||||
o RFC4507bis support.
|
o RFC4507bis support.
|
||||||
o TLS Extensions support.
|
o TLS Extensions support.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e:
|
Major changes between OpenSSL 0.9.8d and OpenSSL 0.9.8e [23 Feb 2007]:
|
||||||
|
|
||||||
o Various ciphersuite selection fixes.
|
o Various ciphersuite selection fixes.
|
||||||
o RFC3779 support.
|
o RFC3779 support.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8c and OpenSSL 0.9.8d:
|
Major changes between OpenSSL 0.9.8c and OpenSSL 0.9.8d [28 Sep 2006]:
|
||||||
|
|
||||||
o Introduce limits to prevent malicious key DoS (CVE-2006-2940)
|
o Introduce limits to prevent malicious key DoS (CVE-2006-2940)
|
||||||
o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
|
o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
|
||||||
o Changes to ciphersuite selection algorithm
|
o Changes to ciphersuite selection algorithm
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8b and OpenSSL 0.9.8c:
|
Major changes between OpenSSL 0.9.8b and OpenSSL 0.9.8c [5 Sep 2006]:
|
||||||
|
|
||||||
o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
|
o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
|
||||||
o New cipher Camellia
|
o New cipher Camellia
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8a and OpenSSL 0.9.8b:
|
Major changes between OpenSSL 0.9.8a and OpenSSL 0.9.8b [4 May 2006]:
|
||||||
|
|
||||||
o Cipher string fixes.
|
o Cipher string fixes.
|
||||||
o Fixes for VC++ 2005.
|
o Fixes for VC++ 2005.
|
||||||
@@ -152,12 +205,12 @@
|
|||||||
o Built in dynamic engine compilation support on Win32.
|
o Built in dynamic engine compilation support on Win32.
|
||||||
o Fixes auto dynamic engine loading in Win32.
|
o Fixes auto dynamic engine loading in Win32.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.8 and OpenSSL 0.9.8a:
|
Major changes between OpenSSL 0.9.8 and OpenSSL 0.9.8a [11 Oct 2005]:
|
||||||
|
|
||||||
o Fix potential SSL 2.0 rollback, CVE-2005-2969
|
o Fix potential SSL 2.0 rollback, CVE-2005-2969
|
||||||
o Extended Windows CE support
|
o Extended Windows CE support
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.8:
|
Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.8 [5 Jul 2005]:
|
||||||
|
|
||||||
o Major work on the BIGNUM library for higher efficiency and to
|
o Major work on the BIGNUM library for higher efficiency and to
|
||||||
make operations more streamlined and less contradictory. This
|
make operations more streamlined and less contradictory. This
|
||||||
@@ -231,36 +284,36 @@
|
|||||||
o Added initial support for Win64.
|
o Added initial support for Win64.
|
||||||
o Added alternate pkg-config files.
|
o Added alternate pkg-config files.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m:
|
Major changes between OpenSSL 0.9.7l and OpenSSL 0.9.7m [23 Feb 2007]:
|
||||||
|
|
||||||
o FIPS 1.1.1 module linking.
|
o FIPS 1.1.1 module linking.
|
||||||
o Various ciphersuite selection fixes.
|
o Various ciphersuite selection fixes.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l:
|
Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l [28 Sep 2006]:
|
||||||
|
|
||||||
o Introduce limits to prevent malicious key DoS (CVE-2006-2940)
|
o Introduce limits to prevent malicious key DoS (CVE-2006-2940)
|
||||||
o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
|
o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k:
|
Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k [5 Sep 2006]:
|
||||||
|
|
||||||
o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
|
o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j:
|
Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j [4 May 2006]:
|
||||||
|
|
||||||
o Visual C++ 2005 fixes.
|
o Visual C++ 2005 fixes.
|
||||||
o Update Windows build system for FIPS.
|
o Update Windows build system for FIPS.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i:
|
Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i [14 Oct 2005]:
|
||||||
|
|
||||||
o Give EVP_MAX_MD_SIZE it's old value, except for a FIPS build.
|
o Give EVP_MAX_MD_SIZE it's old value, except for a FIPS build.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h:
|
Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h [11 Oct 2005]:
|
||||||
|
|
||||||
o Fix SSL 2.0 Rollback, CVE-2005-2969
|
o Fix SSL 2.0 Rollback, CVE-2005-2969
|
||||||
o Allow use of fixed-length exponent on DSA signing
|
o Allow use of fixed-length exponent on DSA signing
|
||||||
o Default fixed-window RSA, DSA, DH private-key operations
|
o Default fixed-window RSA, DSA, DH private-key operations
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g:
|
Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g [11 Apr 2005]:
|
||||||
|
|
||||||
o More compilation issues fixed.
|
o More compilation issues fixed.
|
||||||
o Adaptation to more modern Kerberos API.
|
o Adaptation to more modern Kerberos API.
|
||||||
@@ -269,7 +322,7 @@
|
|||||||
o More constification.
|
o More constification.
|
||||||
o Added processing of proxy certificates (RFC 3820).
|
o Added processing of proxy certificates (RFC 3820).
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f:
|
Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f [22 Mar 2005]:
|
||||||
|
|
||||||
o Several compilation issues fixed.
|
o Several compilation issues fixed.
|
||||||
o Many memory allocation failure checks added.
|
o Many memory allocation failure checks added.
|
||||||
@@ -277,12 +330,12 @@
|
|||||||
o Mandatory basic checks on certificates.
|
o Mandatory basic checks on certificates.
|
||||||
o Performance improvements.
|
o Performance improvements.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e:
|
Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e [25 Oct 2004]:
|
||||||
|
|
||||||
o Fix race condition in CRL checking code.
|
o Fix race condition in CRL checking code.
|
||||||
o Fixes to PKCS#7 (S/MIME) code.
|
o Fixes to PKCS#7 (S/MIME) code.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d:
|
Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d [17 Mar 2004]:
|
||||||
|
|
||||||
o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
|
o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
|
||||||
o Security: Fix null-pointer assignment in do_change_cipher_spec()
|
o Security: Fix null-pointer assignment in do_change_cipher_spec()
|
||||||
@@ -290,14 +343,14 @@
|
|||||||
o Multiple X509 verification fixes
|
o Multiple X509 verification fixes
|
||||||
o Speed up HMAC and other operations
|
o Speed up HMAC and other operations
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c:
|
Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c [30 Sep 2003]:
|
||||||
|
|
||||||
o Security: fix various ASN1 parsing bugs.
|
o Security: fix various ASN1 parsing bugs.
|
||||||
o New -ignore_err option to OCSP utility.
|
o New -ignore_err option to OCSP utility.
|
||||||
o Various interop and bug fixes in S/MIME code.
|
o Various interop and bug fixes in S/MIME code.
|
||||||
o SSL/TLS protocol fix for unrequested client certificates.
|
o SSL/TLS protocol fix for unrequested client certificates.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b:
|
Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b [10 Apr 2003]:
|
||||||
|
|
||||||
o Security: counter the Klima-Pokorny-Rosa extension of
|
o Security: counter the Klima-Pokorny-Rosa extension of
|
||||||
Bleichbacher's attack
|
Bleichbacher's attack
|
||||||
@@ -308,7 +361,7 @@
|
|||||||
o ASN.1: treat domainComponent correctly.
|
o ASN.1: treat domainComponent correctly.
|
||||||
o Documentation: fixes and additions.
|
o Documentation: fixes and additions.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a:
|
Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a [19 Feb 2003]:
|
||||||
|
|
||||||
o Security: Important security related bugfixes.
|
o Security: Important security related bugfixes.
|
||||||
o Enhanced compatibility with MIT Kerberos.
|
o Enhanced compatibility with MIT Kerberos.
|
||||||
@@ -319,7 +372,7 @@
|
|||||||
o SSL/TLS: now handles manual certificate chain building.
|
o SSL/TLS: now handles manual certificate chain building.
|
||||||
o SSL/TLS: certain session ID malfunctions corrected.
|
o SSL/TLS: certain session ID malfunctions corrected.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7:
|
Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7 [30 Dec 2002]:
|
||||||
|
|
||||||
o New library section OCSP.
|
o New library section OCSP.
|
||||||
o Complete rewrite of ASN1 code.
|
o Complete rewrite of ASN1 code.
|
||||||
@@ -365,23 +418,23 @@
|
|||||||
o SSL/TLS: add callback to retrieve SSL/TLS messages.
|
o SSL/TLS: add callback to retrieve SSL/TLS messages.
|
||||||
o SSL/TLS: support AES cipher suites (RFC3268).
|
o SSL/TLS: support AES cipher suites (RFC3268).
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k:
|
Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k [30 Sep 2003]:
|
||||||
|
|
||||||
o Security: fix various ASN1 parsing bugs.
|
o Security: fix various ASN1 parsing bugs.
|
||||||
o SSL/TLS protocol fix for unrequested client certificates.
|
o SSL/TLS protocol fix for unrequested client certificates.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j:
|
Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j [10 Apr 2003]:
|
||||||
|
|
||||||
o Security: counter the Klima-Pokorny-Rosa extension of
|
o Security: counter the Klima-Pokorny-Rosa extension of
|
||||||
Bleichbacher's attack
|
Bleichbacher's attack
|
||||||
o Security: make RSA blinding default.
|
o Security: make RSA blinding default.
|
||||||
o Build: shared library support fixes.
|
o Build: shared library support fixes.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i:
|
Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i [19 Feb 2003]:
|
||||||
|
|
||||||
o Important security related bugfixes.
|
o Important security related bugfixes.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h:
|
Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h [5 Dec 2002]:
|
||||||
|
|
||||||
o New configuration targets for Tandem OSS and A/UX.
|
o New configuration targets for Tandem OSS and A/UX.
|
||||||
o New OIDs for Microsoft attributes.
|
o New OIDs for Microsoft attributes.
|
||||||
@@ -395,25 +448,25 @@
|
|||||||
o Fixes for smaller building problems.
|
o Fixes for smaller building problems.
|
||||||
o Updates of manuals, FAQ and other instructive documents.
|
o Updates of manuals, FAQ and other instructive documents.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g:
|
Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g [9 Aug 2002]:
|
||||||
|
|
||||||
o Important building fixes on Unix.
|
o Important building fixes on Unix.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f:
|
Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f [8 Aug 2002]:
|
||||||
|
|
||||||
o Various important bugfixes.
|
o Various important bugfixes.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e:
|
Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e [30 Jul 2002]:
|
||||||
|
|
||||||
o Important security related bugfixes.
|
o Important security related bugfixes.
|
||||||
o Various SSL/TLS library bugfixes.
|
o Various SSL/TLS library bugfixes.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d:
|
Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d [9 May 2002]:
|
||||||
|
|
||||||
o Various SSL/TLS library bugfixes.
|
o Various SSL/TLS library bugfixes.
|
||||||
o Fix DH parameter generation for 'non-standard' generators.
|
o Fix DH parameter generation for 'non-standard' generators.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c:
|
Major changes between OpenSSL 0.9.6b and OpenSSL 0.9.6c [21 Dec 2001]:
|
||||||
|
|
||||||
o Various SSL/TLS library bugfixes.
|
o Various SSL/TLS library bugfixes.
|
||||||
o BIGNUM library fixes.
|
o BIGNUM library fixes.
|
||||||
@@ -426,7 +479,7 @@
|
|||||||
Broadcom and Cryptographic Appliance's keyserver
|
Broadcom and Cryptographic Appliance's keyserver
|
||||||
[in 0.9.6c-engine release].
|
[in 0.9.6c-engine release].
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b:
|
Major changes between OpenSSL 0.9.6a and OpenSSL 0.9.6b [9 Jul 2001]:
|
||||||
|
|
||||||
o Security fix: PRNG improvements.
|
o Security fix: PRNG improvements.
|
||||||
o Security fix: RSA OAEP check.
|
o Security fix: RSA OAEP check.
|
||||||
@@ -443,7 +496,7 @@
|
|||||||
o Increase default size for BIO buffering filter.
|
o Increase default size for BIO buffering filter.
|
||||||
o Compatibility fixes in some scripts.
|
o Compatibility fixes in some scripts.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a:
|
Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.6a [5 Apr 2001]:
|
||||||
|
|
||||||
o Security fix: change behavior of OpenSSL to avoid using
|
o Security fix: change behavior of OpenSSL to avoid using
|
||||||
environment variables when running as root.
|
environment variables when running as root.
|
||||||
@@ -468,7 +521,7 @@
|
|||||||
o New function BN_rand_range().
|
o New function BN_rand_range().
|
||||||
o Add "-rand" option to openssl s_client and s_server.
|
o Add "-rand" option to openssl s_client and s_server.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6:
|
Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6 [10 Oct 2000]:
|
||||||
|
|
||||||
o Some documentation for BIO and SSL libraries.
|
o Some documentation for BIO and SSL libraries.
|
||||||
o Enhanced chain verification using key identifiers.
|
o Enhanced chain verification using key identifiers.
|
||||||
@@ -483,7 +536,7 @@
|
|||||||
[1] The support for external crypto devices is currently a separate
|
[1] The support for external crypto devices is currently a separate
|
||||||
distribution. See the file README.ENGINE.
|
distribution. See the file README.ENGINE.
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a:
|
Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a [1 Apr 2000]:
|
||||||
|
|
||||||
o Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8
|
o Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8
|
||||||
o Shared library support for HPUX and Solaris-gcc
|
o Shared library support for HPUX and Solaris-gcc
|
||||||
@@ -492,7 +545,7 @@
|
|||||||
o New 'rand' application
|
o New 'rand' application
|
||||||
o New way to check for existence of algorithms from scripts
|
o New way to check for existence of algorithms from scripts
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5:
|
Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5 [25 May 2000]:
|
||||||
|
|
||||||
o S/MIME support in new 'smime' command
|
o S/MIME support in new 'smime' command
|
||||||
o Documentation for the OpenSSL command line application
|
o Documentation for the OpenSSL command line application
|
||||||
@@ -528,7 +581,7 @@
|
|||||||
o Enhanced support for Alpha Linux
|
o Enhanced support for Alpha Linux
|
||||||
o Experimental MacOS support
|
o Experimental MacOS support
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4:
|
Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4 [9 Aug 1999]:
|
||||||
|
|
||||||
o Transparent support for PKCS#8 format private keys: these are used
|
o Transparent support for PKCS#8 format private keys: these are used
|
||||||
by several software packages and are more secure than the standard
|
by several software packages and are more secure than the standard
|
||||||
@@ -539,7 +592,7 @@
|
|||||||
o New pipe-like BIO that allows using the SSL library when actual I/O
|
o New pipe-like BIO that allows using the SSL library when actual I/O
|
||||||
must be handled by the application (BIO pair)
|
must be handled by the application (BIO pair)
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3:
|
Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3 [24 May 1999]:
|
||||||
o Lots of enhancements and cleanups to the Configuration mechanism
|
o Lots of enhancements and cleanups to the Configuration mechanism
|
||||||
o RSA OEAP related fixes
|
o RSA OEAP related fixes
|
||||||
o Added `openssl ca -revoke' option for revoking a certificate
|
o Added `openssl ca -revoke' option for revoking a certificate
|
||||||
@@ -553,7 +606,7 @@
|
|||||||
o Sparc assembler bignum implementation, optimized hash functions
|
o Sparc assembler bignum implementation, optimized hash functions
|
||||||
o Option to disable selected ciphers
|
o Option to disable selected ciphers
|
||||||
|
|
||||||
Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b:
|
Major changes between OpenSSL 0.9.1c and OpenSSL 0.9.2b [22 Mar 1999]:
|
||||||
o Fixed a security hole related to session resumption
|
o Fixed a security hole related to session resumption
|
||||||
o Fixed RSA encryption routines for the p < q case
|
o Fixed RSA encryption routines for the p < q case
|
||||||
o "ALL" in cipher lists now means "everything except NULL ciphers"
|
o "ALL" in cipher lists now means "everything except NULL ciphers"
|
||||||
@@ -575,7 +628,7 @@
|
|||||||
o Lots of memory leak fixes.
|
o Lots of memory leak fixes.
|
||||||
o Lots of bug fixes.
|
o Lots of bug fixes.
|
||||||
|
|
||||||
Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c:
|
Major changes between SSLeay 0.9.0b and OpenSSL 0.9.1c [23 Dec 1998]:
|
||||||
o Integration of the popular NO_RSA/NO_DSA patches
|
o Integration of the popular NO_RSA/NO_DSA patches
|
||||||
o Initial support for compression inside the SSL record layer
|
o Initial support for compression inside the SSL record layer
|
||||||
o Added BIO proxy and filtering functionality
|
o Added BIO proxy and filtering functionality
|
||||||
|
|||||||
@@ -159,8 +159,6 @@ cd ..\..\..
|
|||||||
echo SHA1
|
echo SHA1
|
||||||
cd crypto\sha\asm
|
cd crypto\sha\asm
|
||||||
perl sha1-586.pl %ASM_MODE% > s1-nw.asm
|
perl sha1-586.pl %ASM_MODE% > s1-nw.asm
|
||||||
perl sha256-586.pl %ASM_MODE% > sha256-nw.asm
|
|
||||||
perl sha512-586.pl %ASM_MODE% > sha512-nw.asm
|
|
||||||
cd ..\..\..
|
cd ..\..\..
|
||||||
|
|
||||||
echo RIPEMD160
|
echo RIPEMD160
|
||||||
@@ -173,11 +171,6 @@ cd crypto\rc5\asm
|
|||||||
perl rc5-586.pl %ASM_MODE% > r5-nw.asm
|
perl rc5-586.pl %ASM_MODE% > r5-nw.asm
|
||||||
cd ..\..\..
|
cd ..\..\..
|
||||||
|
|
||||||
echo WHIRLPOOL
|
|
||||||
cd crypto\whrlpool\asm
|
|
||||||
perl wp-mmx.pl %ASM_MODE% > wp-nw.asm
|
|
||||||
cd ..\..\..
|
|
||||||
|
|
||||||
echo CPUID
|
echo CPUID
|
||||||
cd crypto
|
cd crypto
|
||||||
perl x86cpuid.pl %ASM_MODE% > x86cpuid-nw.asm
|
perl x86cpuid.pl %ASM_MODE% > x86cpuid-nw.asm
|
||||||
|
|||||||
4
README
4
README
@@ -1,5 +1,5 @@
|
|||||||
|
|
||||||
OpenSSL 1.1.0-dev
|
OpenSSL 0.9.8zg 11 Jun 2015
|
||||||
|
|
||||||
Copyright (c) 1998-2011 The OpenSSL Project
|
Copyright (c) 1998-2011 The OpenSSL Project
|
||||||
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
|
||||||
@@ -190,7 +190,7 @@
|
|||||||
reason as to why that feature isn't implemented.
|
reason as to why that feature isn't implemented.
|
||||||
|
|
||||||
Patches should be as up to date as possible, preferably relative to the
|
Patches should be as up to date as possible, preferably relative to the
|
||||||
current CVS or the last snapshot. They should follow the coding style of
|
current Git or the last snapshot. They should follow the coding style of
|
||||||
OpenSSL and compile without warnings. Some of the core team developer targets
|
OpenSSL and compile without warnings. Some of the core team developer targets
|
||||||
can be used for testing purposes, (debug-steve64, debug-geoff etc). OpenSSL
|
can be used for testing purposes, (debug-steve64, debug-geoff etc). OpenSSL
|
||||||
compiles on many varied platforms: try to ensure you only use portable
|
compiles on many varied platforms: try to ensure you only use portable
|
||||||
|
|||||||
61
README.ECC
61
README.ECC
@@ -1,61 +0,0 @@
|
|||||||
NOTE: The OpenSSL Software Foundation has executed a sublicense agreement
|
|
||||||
entitled "Elliptic Curve Cryptography Patent License Agreement" with the
|
|
||||||
National Security Agency/ Central Security Service Commercial Solutions
|
|
||||||
Center (NCSC) dated 2010-11-04. That agreement permits implementation and
|
|
||||||
distribution of software containing features covered by any or all of the
|
|
||||||
following patents:
|
|
||||||
|
|
||||||
1.) U.S. Pat. No. 5,761,305 entitled "Key Agreement and Transport Protocol
|
|
||||||
with Implicit Signatures" issued on June 2, 1998;
|
|
||||||
2.) Can. Pat. Appl. Ser. No. 2176972 entitled "Key Agreement and Transport
|
|
||||||
Protocol with Implicit Signature and Reduced Bandwidth" filed on May
|
|
||||||
16, 1996;
|
|
||||||
3.) U.S. Pat. No. 5,889,865 entitled "Key Agreement and Transport Protocol
|
|
||||||
with Implicit Signatures" issued on March 30, 1999;
|
|
||||||
4.) U.S. Pat. No. 5,896,455 entitled "Key Agreement and Transport Protocol
|
|
||||||
with Implicit Signatures" issued on April 20, 1999;
|
|
||||||
5.) U.S. Pat. No. 5,933,504 entitled "Strengthened Public Key Protocol"
|
|
||||||
issued on August 3, 1999;
|
|
||||||
6.) Can. Pat. Appl. Ser. No. 2176866 entitled "Strengthened Public Key
|
|
||||||
Protocol" filed on May 17, 1996;
|
|
||||||
7.) E.P. Pat. Appl. Ser. No. 96201322.3 entitled "Strengthened Public Key
|
|
||||||
Protocol" filed on May 17, 1996;
|
|
||||||
8.) U.S. Pat. No. 5,999,626 entitled "Digital Signatures on a Smartcard"
|
|
||||||
issued on December 7, 1999;
|
|
||||||
9.) Can. Pat. Appl. Ser. No. 2202566 entitled "Digital Signatures on a
|
|
||||||
Smartcard" filed on April 14, 1997;
|
|
||||||
10.) E.P. Pat. Appl. No. 97106114.8 entitled "Digital Signatures on a
|
|
||||||
Smartcard" filed on April 15, 1997;
|
|
||||||
11.) U.S Pat. No. 6,122,736 entitled "Key Agreement and Transport Protocol
|
|
||||||
with Implicit Signatures" issued on September 19, 2000;
|
|
||||||
12.) Can. Pat. Appl. Ser. No. 2174261 entitled "Key Agreement and Transport
|
|
||||||
Protocol with Implicit Signatures" filed on April 16, 1996;
|
|
||||||
13.) E.P. Pat. Appl. Ser. No. 96105920.1 entitled "Key Agreement and
|
|
||||||
Transport Protocol with Implicit Signatures" filed on April 16, 1996;
|
|
||||||
14.) U.S. Pat. No. 6,141,420 entitled "Elliptic Curve Encryption Systems"
|
|
||||||
issued on October 31, 2000;
|
|
||||||
15.) Can. Pat. Appl. Ser. No. 2155038 entitled "Elliptic Curve Encryption
|
|
||||||
Systems" filed on July 31, 1995;
|
|
||||||
16.) E.P. Pat. Appl. Ser. No. 95926348.4 entitled "Elliptic Curve Encryption
|
|
||||||
Systems" filed on July 31, 1995;
|
|
||||||
17.) U.S. Pat. No. 6,336,188 entitled "Authenticated Key Agreement" issued
|
|
||||||
on January 1, 2002;
|
|
||||||
18.) U.S. Pat. No. 6,487,661 entitled "Key Agreement and Transport Protocol"
|
|
||||||
issued on November 26, 2002;
|
|
||||||
19.) Can. Pat. Appl. Ser. No. 2174260 entitled "Key Agreement and Transport
|
|
||||||
Protocol" filed on April 16, 1996;
|
|
||||||
20.) E.P. Pat. Appl. Ser. No. 96105921.9 entitled "Key Agreement and
|
|
||||||
Transport Protocol" filed on April 21, 1996;
|
|
||||||
21.) U.S. Pat. No. 6,563,928 entitled "Strengthened Public Key Protocol"
|
|
||||||
issued on May 13, 2003;
|
|
||||||
22.) U.S. Pat. No. 6,618,483 entitled "Elliptic Curve Encryption Systems"
|
|
||||||
issued September 9, 2003;
|
|
||||||
23.) U.S. Pat. Appl. Ser. No. 09/434,247 entitled "Digital Signatures on a
|
|
||||||
Smartcard" filed on November 5, 1999;
|
|
||||||
24.) U.S. Pat. Appl. Ser. No. 09/558,256 entitled "Key Agreement and
|
|
||||||
Transport Protocol with Implicit Signatures" filed on April 25, 2000;
|
|
||||||
25.) U.S. Pat. Appl. Ser. No. 09/942,492 entitled "Digital Signatures on a
|
|
||||||
Smartcard" filed on August 29, 2001 and published on July 18, 2002; and,
|
|
||||||
26.) U.S. Pat. Appl. Ser. No. 10/185,735 entitled "Strengthened Public Key
|
|
||||||
Protocol" filed on July 1, 2000.
|
|
||||||
|
|
||||||
130
README.FIPS
130
README.FIPS
@@ -1,130 +0,0 @@
|
|||||||
Preliminary status and build information for FIPS module v2.0
|
|
||||||
|
|
||||||
NB: if you are cross compiling you now need to use the latest "incore" script
|
|
||||||
this can be found at util/incore in the tarballs.
|
|
||||||
|
|
||||||
If you have any object files from a previous build do:
|
|
||||||
|
|
||||||
make clean
|
|
||||||
|
|
||||||
To build the module do:
|
|
||||||
|
|
||||||
./config fipscanisteronly
|
|
||||||
make
|
|
||||||
|
|
||||||
Build should complete without errors.
|
|
||||||
|
|
||||||
Build test utilities:
|
|
||||||
|
|
||||||
make build_tests
|
|
||||||
|
|
||||||
Run test suite:
|
|
||||||
|
|
||||||
test/fips_test_suite
|
|
||||||
|
|
||||||
again should complete without errors.
|
|
||||||
|
|
||||||
Run test vectors:
|
|
||||||
|
|
||||||
1. Download an appropriate set of testvectors from www.openssl.org/docs/fips
|
|
||||||
only the fips-2.0 testvector files are usable for complete tests.
|
|
||||||
|
|
||||||
2. Extract the files to a suitable directory.
|
|
||||||
|
|
||||||
3. Run the test vector perl script, for example:
|
|
||||||
|
|
||||||
cd fips
|
|
||||||
perl fipsalgtest.pl --dir=/wherever/stuff/was/extracted
|
|
||||||
|
|
||||||
4. It should say "passed all tests" at the end. Report full details of any
|
|
||||||
failures.
|
|
||||||
|
|
||||||
If you wish to use the older 1.2.x testvectors (for example those from 2007)
|
|
||||||
you need the command line switch --disable-v2 to fipsalgtest.pl
|
|
||||||
|
|
||||||
Examine the external symbols in fips/fipscanister.o they should all begin
|
|
||||||
with FIPS or fips. One way to check with GNU nm is:
|
|
||||||
|
|
||||||
nm -g --defined-only fips/fipscanister.o | grep -v -i fips
|
|
||||||
|
|
||||||
If you get *any* output at all from this test (i.e. symbols not starting with
|
|
||||||
fips or FIPS) please report it.
|
|
||||||
|
|
||||||
Restricted tarball tests.
|
|
||||||
|
|
||||||
The validated module will have its own tarball containing sufficient code to
|
|
||||||
build fipscanister.o and the associated algorithm tests. You can create a
|
|
||||||
similar tarball yourself for testing purposes using the commands below.
|
|
||||||
|
|
||||||
Standard restricted tarball:
|
|
||||||
|
|
||||||
make -f Makefile.fips dist
|
|
||||||
|
|
||||||
Prime field field only ECC tarball:
|
|
||||||
|
|
||||||
make NOEC2M=1 -f Makefile.fips dist
|
|
||||||
|
|
||||||
Once you've created the tarball extract into a fresh directory and do:
|
|
||||||
|
|
||||||
./config
|
|
||||||
make
|
|
||||||
|
|
||||||
You can then run the algorithm tests as above. This build automatically uses
|
|
||||||
fipscanisterbuild and no-ec2m as appropriate.
|
|
||||||
|
|
||||||
FIPS capable OpenSSL test: WARNING PRELIMINARY INSTRUCTIONS, SUBJECT TO CHANGE.
|
|
||||||
|
|
||||||
At least initially the test module and FIPS capable OpenSSL may change and
|
|
||||||
by out of sync. You are advised to check for any changes and pull the latest
|
|
||||||
source from CVS if you have problems. See anon CVS and rsync instructions at:
|
|
||||||
|
|
||||||
http://www.openssl.org/source/repos.html
|
|
||||||
|
|
||||||
Make or download a restricted tarball from ftp://ftp.openssl.org/snapshot/
|
|
||||||
|
|
||||||
If required set the environment variable FIPSDIR to an appropriate location
|
|
||||||
to install the test module. If cross compiling set other environment
|
|
||||||
variables too.
|
|
||||||
|
|
||||||
In this restricted tarball on a Linux or U*ix like system run:
|
|
||||||
|
|
||||||
./config
|
|
||||||
make
|
|
||||||
make install
|
|
||||||
|
|
||||||
On Windows from a VC++ environment do:
|
|
||||||
|
|
||||||
ms\do_fips
|
|
||||||
|
|
||||||
This will build and install the test module and some associated files.
|
|
||||||
|
|
||||||
Now download the latest version of the OpenSSL 1.0.1 branch from either a
|
|
||||||
snapshot or preferably CVS. For Linux do:
|
|
||||||
|
|
||||||
./config fips [other args]
|
|
||||||
make
|
|
||||||
|
|
||||||
For Windows:
|
|
||||||
|
|
||||||
perl Configure VC-WIN32 fips [other args]
|
|
||||||
ms\do_nasm
|
|
||||||
nmake -f ms\ntdll.mak
|
|
||||||
|
|
||||||
(or ms\nt.mak for a static build).
|
|
||||||
|
|
||||||
Where [other args] can be any other arguments you use for an OpenSSL build
|
|
||||||
such as "shared" or "zlib".
|
|
||||||
|
|
||||||
This will build the fips capable OpenSSL and link it to the test module. You
|
|
||||||
can now try linking and testing applications against the FIPS capable OpenSSL.
|
|
||||||
|
|
||||||
Please report any problems to either the openssl-dev mailing list or directly
|
|
||||||
to me steve@openssl.org . Check the mailing lists regularly to avoid duplicate
|
|
||||||
reports.
|
|
||||||
|
|
||||||
Known issues:
|
|
||||||
|
|
||||||
Code needs extensively reviewing to ensure it builds correctly on
|
|
||||||
supported platforms and is compliant with FIPS 140-2.
|
|
||||||
The "FIPS capable OpenSSL" is still largely untested, it builds and runs
|
|
||||||
some simple tests OK on some systems but needs far more "real world" testing.
|
|
||||||
148
STATUS
148
STATUS
@@ -1,148 +0,0 @@
|
|||||||
|
|
||||||
OpenSSL STATUS Last modified at
|
|
||||||
______________ $Date: 2011/02/08 17:48:56 $
|
|
||||||
|
|
||||||
DEVELOPMENT STATE
|
|
||||||
|
|
||||||
o OpenSSL 1.1.0: Under development...
|
|
||||||
o OpenSSL 1.0.1: Under development...
|
|
||||||
o OpenSSL 1.0.0d: Released on February 8nd, 2011
|
|
||||||
o OpenSSL 1.0.0c: Released on December 2nd, 2010
|
|
||||||
o OpenSSL 1.0.0b: Released on November 16th, 2010
|
|
||||||
o OpenSSL 1.0.0a: Released on June 1st, 2010
|
|
||||||
o OpenSSL 1.0.0: Released on March 29th, 2010
|
|
||||||
o OpenSSL 0.9.8r: Released on February 8nd, 2011
|
|
||||||
o OpenSSL 0.9.8q: Released on December 2nd, 2010
|
|
||||||
o OpenSSL 0.9.8p: Released on November 16th, 2010
|
|
||||||
o OpenSSL 0.9.8o: Released on June 1st, 2010
|
|
||||||
o OpenSSL 0.9.8n: Released on March 24th, 2010
|
|
||||||
o OpenSSL 0.9.8m: Released on February 25th, 2010
|
|
||||||
o OpenSSL 0.9.8l: Released on November 5th, 2009
|
|
||||||
o OpenSSL 0.9.8k: Released on March 25th, 2009
|
|
||||||
o OpenSSL 0.9.8j: Released on January 7th, 2009
|
|
||||||
o OpenSSL 0.9.8i: Released on September 15th, 2008
|
|
||||||
o OpenSSL 0.9.8h: Released on May 28th, 2008
|
|
||||||
o OpenSSL 0.9.8g: Released on October 19th, 2007
|
|
||||||
o OpenSSL 0.9.8f: Released on October 11th, 2007
|
|
||||||
o OpenSSL 0.9.8e: Released on February 23rd, 2007
|
|
||||||
o OpenSSL 0.9.8d: Released on September 28th, 2006
|
|
||||||
o OpenSSL 0.9.8c: Released on September 5th, 2006
|
|
||||||
o OpenSSL 0.9.8b: Released on May 4th, 2006
|
|
||||||
o OpenSSL 0.9.8a: Released on October 11th, 2005
|
|
||||||
o OpenSSL 0.9.8: Released on July 5th, 2005
|
|
||||||
o OpenSSL 0.9.7m: Released on February 23rd, 2007
|
|
||||||
o OpenSSL 0.9.7l: Released on September 28th, 2006
|
|
||||||
o OpenSSL 0.9.7k: Released on September 5th, 2006
|
|
||||||
o OpenSSL 0.9.7j: Released on May 4th, 2006
|
|
||||||
o OpenSSL 0.9.7i: Released on October 14th, 2005
|
|
||||||
o OpenSSL 0.9.7h: Released on October 11th, 2005
|
|
||||||
o OpenSSL 0.9.7g: Released on April 11th, 2005
|
|
||||||
o OpenSSL 0.9.7f: Released on March 22nd, 2005
|
|
||||||
o OpenSSL 0.9.7e: Released on October 25th, 2004
|
|
||||||
o OpenSSL 0.9.7d: Released on March 17th, 2004
|
|
||||||
o OpenSSL 0.9.7c: Released on September 30th, 2003
|
|
||||||
o OpenSSL 0.9.7b: Released on April 10th, 2003
|
|
||||||
o OpenSSL 0.9.7a: Released on February 19th, 2003
|
|
||||||
o OpenSSL 0.9.7: Released on December 31st, 2002
|
|
||||||
o OpenSSL 0.9.6m: Released on March 17th, 2004
|
|
||||||
o OpenSSL 0.9.6l: Released on November 4th, 2003
|
|
||||||
o OpenSSL 0.9.6k: Released on September 30th, 2003
|
|
||||||
o OpenSSL 0.9.6j: Released on April 10th, 2003
|
|
||||||
o OpenSSL 0.9.6i: Released on February 19th, 2003
|
|
||||||
o OpenSSL 0.9.6h: Released on December 5th, 2002
|
|
||||||
o OpenSSL 0.9.6g: Released on August 9th, 2002
|
|
||||||
o OpenSSL 0.9.6f: Released on August 8th, 2002
|
|
||||||
o OpenSSL 0.9.6e: Released on July 30th, 2002
|
|
||||||
o OpenSSL 0.9.6d: Released on May 9th, 2002
|
|
||||||
o OpenSSL 0.9.6c: Released on December 21st, 2001
|
|
||||||
o OpenSSL 0.9.6b: Released on July 9th, 2001
|
|
||||||
o OpenSSL 0.9.6a: Released on April 5th, 2001
|
|
||||||
o OpenSSL 0.9.6: Released on September 24th, 2000
|
|
||||||
o OpenSSL 0.9.5a: Released on April 1st, 2000
|
|
||||||
o OpenSSL 0.9.5: Released on February 28th, 2000
|
|
||||||
o OpenSSL 0.9.4: Released on August 09th, 1999
|
|
||||||
o OpenSSL 0.9.3a: Released on May 29th, 1999
|
|
||||||
o OpenSSL 0.9.3: Released on May 25th, 1999
|
|
||||||
o OpenSSL 0.9.2b: Released on March 22th, 1999
|
|
||||||
o OpenSSL 0.9.1c: Released on December 23th, 1998
|
|
||||||
|
|
||||||
[See also http://www.openssl.org/support/rt.html]
|
|
||||||
|
|
||||||
RELEASE SHOWSTOPPERS
|
|
||||||
|
|
||||||
o The Makefiles fail with some SysV makes.
|
|
||||||
o
|
|
||||||
|
|
||||||
AVAILABLE PATCHES
|
|
||||||
|
|
||||||
o
|
|
||||||
|
|
||||||
IN PROGRESS
|
|
||||||
|
|
||||||
o Steve is currently working on (in no particular order):
|
|
||||||
ASN1 code redesign, butchery, replacement.
|
|
||||||
OCSP
|
|
||||||
EVP cipher enhancement.
|
|
||||||
Enhanced certificate chain verification.
|
|
||||||
Private key, certificate and CRL API and implementation.
|
|
||||||
Developing and bugfixing PKCS#7 (S/MIME code).
|
|
||||||
Various X509 issues: character sets, certificate request extensions.
|
|
||||||
o Richard is currently working on:
|
|
||||||
Constification
|
|
||||||
Attribute Certificate support
|
|
||||||
Certificate Pair support
|
|
||||||
Storage Engines (primarly an LDAP storage engine)
|
|
||||||
Certificate chain validation with full RFC 3280 compatibility
|
|
||||||
|
|
||||||
NEEDS PATCH
|
|
||||||
|
|
||||||
o 0.9.8-dev: COMPLEMENTOFALL and COMPLEMENTOFDEFAULT do not
|
|
||||||
handle ECCdraft cipher suites correctly.
|
|
||||||
|
|
||||||
o apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file
|
|
||||||
|
|
||||||
o "OpenSSL STATUS" is never up-to-date.
|
|
||||||
|
|
||||||
OPEN ISSUES
|
|
||||||
|
|
||||||
o The Makefile hierarchy and build mechanism is still not a round thing:
|
|
||||||
|
|
||||||
1. The config vs. Configure scripts
|
|
||||||
It's the same nasty situation as for Apache with APACI vs.
|
|
||||||
src/Configure. It confuses.
|
|
||||||
Suggestion: Merge Configure and config into a single configure
|
|
||||||
script with a Autoconf style interface ;-) and remove
|
|
||||||
Configure and config. Or even let us use GNU Autoconf
|
|
||||||
itself. Then we can avoid a lot of those platform checks
|
|
||||||
which are currently in Configure.
|
|
||||||
|
|
||||||
o Support for Shared Libraries has to be added at least
|
|
||||||
for the major Unix platforms. The details we can rip from the stuff
|
|
||||||
Ralf has done for the Apache src/Configure script. Ben wants the
|
|
||||||
solution to be really simple.
|
|
||||||
|
|
||||||
Status: Ralf will look how we can easily incorporate the
|
|
||||||
compiler PIC and linker DSO flags from Apache
|
|
||||||
into the OpenSSL Configure script.
|
|
||||||
|
|
||||||
Ulf: +1 for using GNU autoconf and libtool (but not automake,
|
|
||||||
which apparently is not flexible enough to generate
|
|
||||||
libcrypto)
|
|
||||||
|
|
||||||
WISHES
|
|
||||||
|
|
||||||
o Add variants of DH_generate_parameters() and BN_generate_prime() [etc?]
|
|
||||||
where the callback function can request that the function be aborted.
|
|
||||||
[Gregory Stark <ghstark@pobox.com>, <rayyang2000@yahoo.com>]
|
|
||||||
|
|
||||||
o SRP in TLS.
|
|
||||||
[wished by:
|
|
||||||
Dj <derek@yo.net>, Tom Wu <tom@arcot.com>,
|
|
||||||
Tom Holroyd <tomh@po.crl.go.jp>]
|
|
||||||
|
|
||||||
See http://search.ietf.org/internet-drafts/draft-ietf-tls-srp-00.txt
|
|
||||||
as well as http://www-cs-students.stanford.edu/~tjw/srp/.
|
|
||||||
|
|
||||||
Tom Holroyd tells us there is a SRP patch for OpenSSH at
|
|
||||||
http://members.tripod.com/professor_tom/archives/, that could
|
|
||||||
be useful.
|
|
||||||
@@ -1,67 +0,0 @@
|
|||||||
$! install-vms.com -- Installs the files in a given directory tree
|
|
||||||
$!
|
|
||||||
$! Author: Richard Levitte <richard@levitte.org>
|
|
||||||
$! Time of creation: 23-MAY-1998 19:22
|
|
||||||
$!
|
|
||||||
$! P1 root of the directory tree
|
|
||||||
$!
|
|
||||||
$!
|
|
||||||
$! Announce/identify.
|
|
||||||
$!
|
|
||||||
$ proc = f$environment( "procedure")
|
|
||||||
$ write sys$output "@@@ "+ -
|
|
||||||
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
|
||||||
$!
|
|
||||||
$ on error then goto tidy
|
|
||||||
$ on control_c then goto tidy
|
|
||||||
$!
|
|
||||||
$ if p1 .eqs. ""
|
|
||||||
$ then
|
|
||||||
$ write sys$output "First argument missing."
|
|
||||||
$ write sys$output -
|
|
||||||
"Should be the directory where you want things installed."
|
|
||||||
$ exit
|
|
||||||
$ endif
|
|
||||||
$
|
|
||||||
$ if (f$getsyi( "cpu") .lt. 128)
|
|
||||||
$ then
|
|
||||||
$ arch = "VAX"
|
|
||||||
$ else
|
|
||||||
$ arch = f$edit( f$getsyi( "arch_name"), "upcase")
|
|
||||||
$ if (arch .eqs. "") then arch = "UNK"
|
|
||||||
$ endif
|
|
||||||
$
|
|
||||||
$ root = f$parse( P1, "[]A.;0", , , "SYNTAX_ONLY, NO_CONCEAL")- "A.;0"
|
|
||||||
$ root_dev = f$parse( root, , , "device", "syntax_only")
|
|
||||||
$ root_dir = f$parse( root, , , "directory", "syntax_only") - -
|
|
||||||
"[000000." - "][" - "[" - "]"
|
|
||||||
$ root = root_dev + "[" + root_dir
|
|
||||||
$
|
|
||||||
$ define /nolog wrk_sslroot 'root'.] /translation_attributes = concealed
|
|
||||||
$ define /nolog wrk_sslinclude wrk_sslroot:[include]
|
|
||||||
$
|
|
||||||
$ if f$parse( "wrk_sslroot:[000000]") .eqs. "" then -
|
|
||||||
create /directory /log wrk_sslroot:[000000]
|
|
||||||
$ if f$parse( "wrk_sslinclude:") .eqs. "" then -
|
|
||||||
create /directory /log wrk_sslinclude:
|
|
||||||
$ if f$parse( "wrk_sslroot:[vms]") .eqs. "" then -
|
|
||||||
create /directory /log wrk_sslroot:[vms]
|
|
||||||
$!
|
|
||||||
$ copy /log /protection = world:re openssl_startup.com wrk_sslroot:[vms]
|
|
||||||
$ copy /log /protection = world:re openssl_undo.com wrk_sslroot:[vms]
|
|
||||||
$ copy /log /protection = world:re openssl_utils.com wrk_sslroot:[vms]
|
|
||||||
$!
|
|
||||||
$ tidy:
|
|
||||||
$!
|
|
||||||
$ call deass wrk_sslroot
|
|
||||||
$ call deass wrk_sslinclude
|
|
||||||
$!
|
|
||||||
$ exit
|
|
||||||
$!
|
|
||||||
$ deass: subroutine
|
|
||||||
$ if (f$trnlnm( p1, "LNM$PROCESS") .nes. "")
|
|
||||||
$ then
|
|
||||||
$ deassign /process 'p1'
|
|
||||||
$ endif
|
|
||||||
$ endsubroutine
|
|
||||||
$!
|
|
||||||
79
VMS/install.com
Normal file
79
VMS/install.com
Normal file
@@ -0,0 +1,79 @@
|
|||||||
|
$! INSTALL.COM -- Installs the files in a given directory tree
|
||||||
|
$!
|
||||||
|
$! Author: Richard Levitte <richard@levitte.org>
|
||||||
|
$! Time of creation: 23-MAY-1998 19:22
|
||||||
|
$!
|
||||||
|
$! P1 root of the directory tree
|
||||||
|
$!
|
||||||
|
$ IF P1 .EQS. ""
|
||||||
|
$ THEN
|
||||||
|
$ WRITE SYS$OUTPUT "First argument missing."
|
||||||
|
$ WRITE SYS$OUTPUT "Should be the directory where you want things installed."
|
||||||
|
$ EXIT
|
||||||
|
$ ENDIF
|
||||||
|
$
|
||||||
|
$ IF (F$GETSYI("CPU").LT.128)
|
||||||
|
$ THEN
|
||||||
|
$ ARCH := VAX
|
||||||
|
$ ELSE
|
||||||
|
$ ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ IF (ARCH .EQS. "") THEN ARCH = "UNK"
|
||||||
|
$ ENDIF
|
||||||
|
$
|
||||||
|
$ ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
|
||||||
|
$ ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
|
||||||
|
$ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
||||||
|
- "[000000." - "][" - "[" - "]"
|
||||||
|
$ ROOT = ROOT_DEV + "[" + ROOT_DIR
|
||||||
|
$
|
||||||
|
$ DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
|
||||||
|
$ DEFINE/NOLOG WRK_SSLINCLUDE WRK_SSLROOT:[INCLUDE]
|
||||||
|
$
|
||||||
|
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
||||||
|
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
||||||
|
$ IF F$PARSE("WRK_SSLINCLUDE:") .EQS. "" THEN -
|
||||||
|
CREATE/DIR/LOG WRK_SSLINCLUDE:
|
||||||
|
$ IF F$PARSE("WRK_SSLROOT:[VMS]") .EQS. "" THEN -
|
||||||
|
CREATE/DIR/LOG WRK_SSLROOT:[VMS]
|
||||||
|
$
|
||||||
|
$ IF F$SEARCH("WRK_SSLINCLUDE:vms_idhacks.h") .NES. "" THEN -
|
||||||
|
DELETE WRK_SSLINCLUDE:vms_idhacks.h;*
|
||||||
|
$
|
||||||
|
$ OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
|
||||||
|
$ WRITE SYS$OUTPUT "%OPEN-I-CREATED, ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
|
||||||
|
$ WRITE SF "$! Startup file for Openssl"
|
||||||
|
$ WRITE SF "$!"
|
||||||
|
$ WRITE SF "$! Do not edit this file, as it will be regenerated during next installation."
|
||||||
|
$ WRITE SF "$! Instead, add or change SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
|
||||||
|
$ WRITE SF "$!"
|
||||||
|
$ WRITE SF "$! P1 a qualifier to DEFINE. For example ""/SYSTEM"" to get the logical names"
|
||||||
|
$ WRITE SF "$! defined in the system logical name table."
|
||||||
|
$ WRITE SF "$!"
|
||||||
|
$ WRITE SF "$ IF (F$GETSYI(""CPU"").LT.128)"
|
||||||
|
$ WRITE SF "$ THEN"
|
||||||
|
$ WRITE SF "$ ARCH := VAX"
|
||||||
|
$ WRITE SF "$ ELSE"
|
||||||
|
$ WRITE SF "$ ARCH = F$EDIT( F$GETSYI( ""ARCH_NAME""), ""UPCASE"")"
|
||||||
|
$ WRITE SF "$ IF (ARCH .EQS. """") THEN ARCH = ""UNK"""
|
||||||
|
$ WRITE SF "$ ENDIF"
|
||||||
|
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLROOT ",ROOT,".] /TRANS=CONC"
|
||||||
|
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLLIB SSLROOT:['ARCH'_LIB]"
|
||||||
|
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLINCLUDE SSLROOT:[INCLUDE]"
|
||||||
|
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLEXE SSLROOT:['ARCH'_EXE]"
|
||||||
|
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLCERTS SSLROOT:[CERTS]"
|
||||||
|
$ WRITE SF "$ DEFINE/NOLOG'P1 SSLPRIVATE SSLROOT:[PRIVATE]"
|
||||||
|
$ WRITE SF "$"
|
||||||
|
$ WRITE SF "$! This is program can include <openssl/{foo}.h>"
|
||||||
|
$ WRITE SF "$ DEFINE/NOLOG'P1 OPENSSL SSLINCLUDE:"
|
||||||
|
$ WRITE SF "$"
|
||||||
|
$ WRITE SF "$ IF F$SEARCH(""SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"") .NES."""" THEN -"
|
||||||
|
$ WRITE SF " @SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
|
||||||
|
$ WRITE SF "$"
|
||||||
|
$ WRITE SF "$ EXIT"
|
||||||
|
$ CLOSE SF
|
||||||
|
$ SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
|
||||||
|
$
|
||||||
|
$ COPY OPENSSL_UTILS.COM WRK_SSLROOT:[VMS]/LOG
|
||||||
|
$ SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_UTILS.COM
|
||||||
|
$
|
||||||
|
$ EXIT
|
||||||
233
VMS/mkshared.com
233
VMS/mkshared.com
@@ -1,162 +1,85 @@
|
|||||||
$! MKSHARED.COM -- Create shareable images.
|
$! MKSHARED.COM -- script to created shareable images on VMS
|
||||||
$!
|
$!
|
||||||
$! P1: "64" for 64-bit pointers.
|
$! No command line parameters. This should be run at the start of the source
|
||||||
|
$! tree (the same directory where one finds INSTALL.VMS).
|
||||||
$!
|
$!
|
||||||
$! P2: Zlib object library path (optional).
|
$! Input: [.UTIL]LIBEAY.NUM,[.xxx.EXE.CRYPTO]LIBCRYPTO.OLB
|
||||||
$!
|
$! [.UTIL]SSLEAY.NUM,[.xxx.EXE.SSL]LIBSSL.OLB
|
||||||
$! Input: [.UTIL]LIBEAY.NUM,[.xxx.EXE.CRYPTO]SSL_LIBCRYPTO[32].OLB
|
$! Output: [.xxx.EXE.CRYPTO]LIBCRYPTO.OPT,.MAP,.EXE
|
||||||
$! [.UTIL]SSLEAY.NUM,[.xxx.EXE.SSL]SSL_LIBSSL[32].OLB
|
$! [.xxx.EXE.SSL]LIBSSL.OPT,.MAP,.EXE
|
||||||
$! Output: [.xxx.EXE.CRYPTO]SSL_LIBCRYPTO_SHR[32].OPT,.MAP,.EXE
|
|
||||||
$! [.xxx.EXE.SSL]SSL_LIBSSL_SRH[32].OPT,.MAP,.EXE
|
|
||||||
$!
|
$!
|
||||||
$! So far, tests have only been made on VMS for Alpha. VAX will come in time.
|
$! So far, tests have only been made on VMS for Alpha. VAX will come in time.
|
||||||
$! ===========================================================================
|
$! ===========================================================================
|
||||||
$!
|
$
|
||||||
$! Announce/identify.
|
|
||||||
$!
|
|
||||||
$ proc = f$environment( "procedure")
|
|
||||||
$ write sys$output "@@@ "+ -
|
|
||||||
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
|
||||||
$!
|
|
||||||
$! Save the original default device:[directory].
|
|
||||||
$!
|
|
||||||
$ def_orig = f$environment( "default")
|
|
||||||
$ on error then goto tidy
|
|
||||||
$ on control_c then goto tidy
|
|
||||||
$!
|
|
||||||
$! SET DEFAULT to the main kit directory.
|
|
||||||
$!
|
|
||||||
$ proc = f$environment("procedure")
|
|
||||||
$ proc = f$parse( "A.;", proc)- "A.;"
|
|
||||||
$ set default 'proc'
|
|
||||||
$ set default [-]
|
|
||||||
$!
|
|
||||||
$! ----- Prepare info for processing: version number and file info
|
$! ----- Prepare info for processing: version number and file info
|
||||||
$ gosub read_version_info
|
$ gosub read_version_info
|
||||||
$ if libver .eqs. ""
|
$ if libver .eqs. ""
|
||||||
$ then
|
$ then
|
||||||
$ write sys$error "ERROR: Couldn't find any library version info..."
|
$ write sys$error "ERROR: Couldn't find any library version info..."
|
||||||
$ go to tidy:
|
$ exit
|
||||||
$ endif
|
$ endif
|
||||||
$
|
$
|
||||||
$ if (f$getsyi("cpu") .lt. 128)
|
$ if (f$getsyi("cpu").lt.128)
|
||||||
$ then
|
$ then
|
||||||
$ arch_vax = 1
|
$ arch := VAX
|
||||||
$ arch = "VAX"
|
|
||||||
$ else
|
$ else
|
||||||
|
$ arch = f$edit( f$getsyi( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ if (arch .eqs. "") then arch = "UNK"
|
||||||
|
$ endif
|
||||||
|
$
|
||||||
|
$ if arch .nes. "VAX"
|
||||||
|
$ then
|
||||||
$ arch_vax = 0
|
$ arch_vax = 0
|
||||||
$ arch = f$edit( f$getsyi( "ARCH_NAME"), "UPCASE")
|
$ libid = "Crypto"
|
||||||
$ if (arch .eqs. "") then arch = "UNK"
|
$ libnum = "[.UTIL]LIBEAY.NUM"
|
||||||
$ endif
|
$ libdir = "[.''ARCH'.EXE.CRYPTO]"
|
||||||
$!
|
$ libolb = "''libdir'LIBCRYPTO.OLB"
|
||||||
$ archd = arch
|
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
||||||
$ lib32 = "32"
|
$ libmap = "''libdir'LIBCRYPTO.MAP"
|
||||||
$ shr = "SHR32"
|
$ libgoal= "''libdir'LIBCRYPTO.EXE"
|
||||||
$!
|
$ libref = ""
|
||||||
$ if (p1 .nes. "")
|
$ gosub create_nonvax_shr
|
||||||
$ then
|
$ libid = "SSL"
|
||||||
$ if (p1 .eqs. "64")
|
$ libnum = "[.UTIL]SSLEAY.NUM"
|
||||||
$ then
|
$ libdir = "[.''ARCH'.EXE.SSL]"
|
||||||
$ archd = arch+ "_64"
|
$ libolb = "''libdir'LIBSSL.OLB"
|
||||||
$ lib32 = ""
|
$ libopt = "''libdir'LIBSSL.OPT"
|
||||||
$ shr = "SHR"
|
$ libmap = "''libdir'LIBSSL.MAP"
|
||||||
$ else
|
$ libgoal= "''libdir'LIBSSL.EXE"
|
||||||
$ if (p1 .nes. "32")
|
$ libref = "[.''ARCH'.EXE.CRYPTO]LIBCRYPTO.EXE"
|
||||||
$ then
|
$ gosub create_nonvax_shr
|
||||||
$ write sys$output "Second argument invalid."
|
$ else
|
||||||
$ write sys$output "It should be "32", "64", or nothing."
|
$ arch_vax = 1
|
||||||
$ exit
|
|
||||||
$ endif
|
|
||||||
$ endif
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$ ZLIB = p2
|
|
||||||
$ zlib_lib = ""
|
|
||||||
$ if (ZLIB .nes. "")
|
|
||||||
$ then
|
|
||||||
$ file2 = f$parse( ZLIB, "libz.olb", , , "syntax_only")
|
|
||||||
$ if (f$search( file2) .eqs. "")
|
|
||||||
$ then
|
|
||||||
$ write sys$output ""
|
|
||||||
$ write sys$output "The Option ", ZLIB, " Is Invalid."
|
|
||||||
$ write sys$output " Can't find library: ''file2'"
|
|
||||||
$ write sys$output ""
|
|
||||||
$ goto tidy
|
|
||||||
$ endif
|
|
||||||
$ zlib_lib = ", ''file2' /library"
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$ if (arch_vax)
|
|
||||||
$ then
|
|
||||||
$ libtit = "CRYPTO_TRANSFER_VECTOR"
|
$ libtit = "CRYPTO_TRANSFER_VECTOR"
|
||||||
$ libid = "Crypto"
|
$ libid = "Crypto"
|
||||||
$ libnum = "[.UTIL]LIBEAY.NUM"
|
$ libnum = "[.UTIL]LIBEAY.NUM"
|
||||||
$ libdir = "[.''ARCHD'.EXE.CRYPTO]"
|
$ libdir = "[.''ARCH'.EXE.CRYPTO]"
|
||||||
$ libmar = "''libdir'SSL_LIBCRYPTO_''shr'.MAR"
|
$ libmar = "''libdir'LIBCRYPTO.MAR"
|
||||||
$ libolb = "''libdir'SSL_LIBCRYPTO''lib32'.OLB"
|
$ libolb = "''libdir'LIBCRYPTO.OLB"
|
||||||
$ libopt = "''libdir'SSL_LIBCRYPTO_''shr'.OPT"
|
$ libopt = "''libdir'LIBCRYPTO.OPT"
|
||||||
$ libobj = "''libdir'SSL_LIBCRYPTO_''shr'.OBJ"
|
$ libobj = "''libdir'LIBCRYPTO.OBJ"
|
||||||
$ libmap = "''libdir'SSL_LIBCRYPTO_''shr'.MAP"
|
$ libmap = "''libdir'LIBCRYPTO.MAP"
|
||||||
$ libgoal= "''libdir'SSL_LIBCRYPTO_''shr'.EXE"
|
$ libgoal= "''libdir'LIBCRYPTO.EXE"
|
||||||
$ libref = ""
|
$ libref = ""
|
||||||
$ libvec = "LIBCRYPTO"
|
$ libvec = "LIBCRYPTO"
|
||||||
$ if f$search( libolb) .nes. "" then gosub create_vax_shr
|
$ gosub create_vax_shr
|
||||||
$ libtit = "SSL_TRANSFER_VECTOR"
|
$ libtit = "SSL_TRANSFER_VECTOR"
|
||||||
$ libid = "SSL"
|
$ libid = "SSL"
|
||||||
$ libnum = "[.UTIL]SSLEAY.NUM"
|
$ libnum = "[.UTIL]SSLEAY.NUM"
|
||||||
$ libdir = "[.''ARCHD'.EXE.SSL]"
|
$ libdir = "[.''ARCH'.EXE.SSL]"
|
||||||
$ libmar = "''libdir'SSL_LIBSSL_''shr'.MAR"
|
$ libmar = "''libdir'LIBSSL.MAR"
|
||||||
$ libolb = "''libdir'SSL_LIBSSL''lib32'.OLB"
|
$ libolb = "''libdir'LIBSSL.OLB"
|
||||||
$ libopt = "''libdir'SSL_LIBSSL_''shr'.OPT"
|
$ libopt = "''libdir'LIBSSL.OPT"
|
||||||
$ libobj = "''libdir'SSL_LIBSSL_''shr'.OBJ"
|
$ libobj = "''libdir'LIBSSL.OBJ"
|
||||||
$ libmap = "''libdir'SSL_LIBSSL_''shr'.MAP"
|
$ libmap = "''libdir'LIBSSL.MAP"
|
||||||
$ libgoal= "''libdir'SSL_LIBSSL_''shr'.EXE"
|
$ libgoal= "''libdir'LIBSSL.EXE"
|
||||||
$ libref = "[.''ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO_''shr'.EXE"
|
$ libref = "[.''ARCH'.EXE.CRYPTO]LIBCRYPTO.EXE"
|
||||||
$ libvec = "LIBSSL"
|
$ libvec = "LIBSSL"
|
||||||
$ if f$search( libolb) .nes. "" then gosub create_vax_shr
|
$ gosub create_vax_shr
|
||||||
$ else
|
|
||||||
$ libid = "Crypto"
|
|
||||||
$ libnum = "[.UTIL]LIBEAY.NUM"
|
|
||||||
$ libdir = "[.''ARCHD'.EXE.CRYPTO]"
|
|
||||||
$ libolb = "''libdir'SSL_LIBCRYPTO''lib32'.OLB"
|
|
||||||
$ libopt = "''libdir'SSL_LIBCRYPTO_''shr'.OPT"
|
|
||||||
$ libmap = "''libdir'SSL_LIBCRYPTO_''shr'.MAP"
|
|
||||||
$ libgoal= "''libdir'SSL_LIBCRYPTO_''shr'.EXE"
|
|
||||||
$ libref = ""
|
|
||||||
$ if f$search( libolb) .nes. "" then gosub create_nonvax_shr
|
|
||||||
$ libid = "SSL"
|
|
||||||
$ libnum = "[.UTIL]SSLEAY.NUM"
|
|
||||||
$ libdir = "[.''ARCHD'.EXE.SSL]"
|
|
||||||
$ libolb = "''libdir'SSL_LIBSSL''lib32'.OLB"
|
|
||||||
$ libopt = "''libdir'SSL_LIBSSL_''shr'.OPT"
|
|
||||||
$ libmap = "''libdir'SSL_LIBSSL_''shr'.MAP"
|
|
||||||
$ libgoal= "''libdir'SSL_LIBSSL_''shr'.EXE"
|
|
||||||
$ libref = "[.''ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO_''shr'.EXE"
|
|
||||||
$ if f$search( libolb) .nes. "" then gosub create_nonvax_shr
|
|
||||||
$ endif
|
$ endif
|
||||||
$!
|
|
||||||
$ tidy:
|
|
||||||
$!
|
|
||||||
$! Close any open files.
|
|
||||||
$!
|
|
||||||
$ if (f$trnlnm( "libnum", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
|
||||||
close libnum
|
|
||||||
$!
|
|
||||||
$ if (f$trnlnm( "mar", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
|
||||||
close mar
|
|
||||||
$!
|
|
||||||
$ if (f$trnlnm( "opt", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
|
||||||
close opt
|
|
||||||
$!
|
|
||||||
$ if (f$trnlnm( "vf", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
|
||||||
close vf
|
|
||||||
$!
|
|
||||||
$! Restore the original default device:[directory].
|
|
||||||
$!
|
|
||||||
$ set default 'def_orig'
|
|
||||||
$ exit
|
$ exit
|
||||||
$
|
$
|
||||||
$! ----- Subroutines to build the shareable libraries
|
$! ----- Soubroutines to build the shareable libraries
|
||||||
$! For each supported architecture, there's a main shareable library
|
$! For each supported architecture, there's a main shareable library
|
||||||
$! creator, which is called from the main code above.
|
$! creator, which is called from the main code above.
|
||||||
$! The creator will define a number of variables to tell the next levels of
|
$! The creator will define a number of variables to tell the next levels of
|
||||||
@@ -188,9 +111,9 @@ $! ----- Subroutines for non-VAX
|
|||||||
$! -----
|
$! -----
|
||||||
$! The creator routine
|
$! The creator routine
|
||||||
$ create_nonvax_shr:
|
$ create_nonvax_shr:
|
||||||
$ open /write opt 'libopt'
|
$ open/write opt 'libopt'
|
||||||
$ write opt "identification=""",libid," ",libverstr,""""
|
$ write opt "identification=""",libid," ",libverstr,""""
|
||||||
$ write opt libolb, " /library"
|
$ write opt libolb,"/lib"
|
||||||
$ if libref .nes. "" then write opt libref,"/SHARE"
|
$ if libref .nes. "" then write opt libref,"/SHARE"
|
||||||
$ write opt "SYMBOL_VECTOR=(-"
|
$ write opt "SYMBOL_VECTOR=(-"
|
||||||
$ libfirstentry := true
|
$ libfirstentry := true
|
||||||
@@ -201,8 +124,7 @@ $ gosub read_func_num
|
|||||||
$ write opt ")"
|
$ write opt ")"
|
||||||
$ write opt "GSMATCH=",libvmatch,",",libver
|
$ write opt "GSMATCH=",libvmatch,",",libver
|
||||||
$ close opt
|
$ close opt
|
||||||
$ link /map = 'libmap' /full /share = 'libgoal' 'libopt' /options -
|
$ link/map='libmap'/full/share='libgoal' 'libopt'/option
|
||||||
'zlib_lib'
|
|
||||||
$ return
|
$ return
|
||||||
$
|
$
|
||||||
$! The record writer routine
|
$! The record writer routine
|
||||||
@@ -236,7 +158,7 @@ $! ----- Subroutines for VAX
|
|||||||
$! -----
|
$! -----
|
||||||
$! The creator routine
|
$! The creator routine
|
||||||
$ create_vax_shr:
|
$ create_vax_shr:
|
||||||
$ open /write mar 'libmar'
|
$ open/write mar 'libmar'
|
||||||
$ type sys$input:/out=mar:
|
$ type sys$input:/out=mar:
|
||||||
;
|
;
|
||||||
; Transfer vector for VAX shareable image
|
; Transfer vector for VAX shareable image
|
||||||
@@ -271,10 +193,10 @@ $! libwriter := write_vax_vtransfer_entry
|
|||||||
$! gosub read_func_num
|
$! gosub read_func_num
|
||||||
$ write mar " .END"
|
$ write mar " .END"
|
||||||
$ close mar
|
$ close mar
|
||||||
$ open /write opt 'libopt'
|
$ open/write opt 'libopt'
|
||||||
$ write opt "identification=""",libid," ",libverstr,""""
|
$ write opt "identification=""",libid," ",libverstr,""""
|
||||||
$ write opt libobj
|
$ write opt libobj
|
||||||
$ write opt libolb, " /library"
|
$ write opt libolb,"/lib"
|
||||||
$ if libref .nes. "" then write opt libref,"/SHARE"
|
$ if libref .nes. "" then write opt libref,"/SHARE"
|
||||||
$ type sys$input:/out=opt:
|
$ type sys$input:/out=opt:
|
||||||
!
|
!
|
||||||
@@ -293,8 +215,7 @@ $ libwriter := write_vax_psect_attr
|
|||||||
$ gosub read_func_num
|
$ gosub read_func_num
|
||||||
$ close opt
|
$ close opt
|
||||||
$ macro/obj='libobj' 'libmar'
|
$ macro/obj='libobj' 'libmar'
|
||||||
$ link /map = 'libmap' /full /share = 'libgoal' 'libopt' /options -
|
$ link/map='libmap'/full/share='libgoal' 'libopt'/option
|
||||||
'zlib_lib'
|
|
||||||
$ return
|
$ return
|
||||||
$
|
$
|
||||||
$! The record writer routine for VAX functions
|
$! The record writer routine for VAX functions
|
||||||
@@ -316,9 +237,9 @@ $ return
|
|||||||
$
|
$
|
||||||
$! ----- Common subroutines
|
$! ----- Common subroutines
|
||||||
$! -----
|
$! -----
|
||||||
$! The .num file reader. This one has great responsibility.
|
$! The .num file reader. This one has great responsability.
|
||||||
$ read_func_num:
|
$ read_func_num:
|
||||||
$ open /read libnum 'libnum'
|
$ open libnum 'libnum'
|
||||||
$ goto read_nums
|
$ goto read_nums
|
||||||
$
|
$
|
||||||
$ read_nums:
|
$ read_nums:
|
||||||
@@ -326,30 +247,27 @@ $ libentrynum=0
|
|||||||
$ liblastentry:=false
|
$ liblastentry:=false
|
||||||
$ entrycount=0
|
$ entrycount=0
|
||||||
$ loop:
|
$ loop:
|
||||||
$ read /end=loop_end /err=loop_end libnum line
|
$ read/end=loop_end/err=loop_end libnum line
|
||||||
$ lin = f$edit( line, "COMPRESS,TRIM")
|
$ entrynum=f$int(f$element(1," ",f$edit(line,"COMPRESS,TRIM")))
|
||||||
$! Skip a "#" comment line.
|
$ entryinfo=f$element(2," ",f$edit(line,"COMPRESS,TRIM"))
|
||||||
$ if (f$extract( 0, 1, lin) .eqs. "#") then goto loop
|
$ curentry=f$element(0," ",f$edit(line,"COMPRESS,TRIM"))
|
||||||
$ entrynum = f$int(f$element( 1, " ", lin))
|
$ info_exist=f$element(0,":",entryinfo)
|
||||||
$ entryinfo = f$element( 2, " ", lin)
|
$ info_platforms=","+f$element(1,":",entryinfo)+","
|
||||||
$ curentry = f$element( 0, " ", lin)
|
$ info_kind=f$element(2,":",entryinfo)
|
||||||
$ info_exist = f$element( 0, ":", entryinfo)
|
$ info_algorithms=","+f$element(3,":",entryinfo)+","
|
||||||
$ info_platforms = ","+ f$element(1, ":", entryinfo)+ ","
|
|
||||||
$ info_kind = f$element( 2, ":", entryinfo)
|
|
||||||
$ info_algorithms = ","+ f$element( 3, ":", entryinfo)+ ","
|
|
||||||
$ if info_exist .eqs. "NOEXIST" then goto loop
|
$ if info_exist .eqs. "NOEXIST" then goto loop
|
||||||
$ truesum = 0
|
$ truesum = 0
|
||||||
$ falsesum = 0
|
$ falsesum = 0
|
||||||
$ negatives = 1
|
$ negatives = 1
|
||||||
$ plat_i = 0
|
$ plat_i = 0
|
||||||
$ loop1:
|
$ loop1:
|
||||||
$ plat_entry = f$element( plat_i, ",", info_platforms)
|
$ plat_entry = f$element(plat_i,",",info_platforms)
|
||||||
$ plat_i = plat_i + 1
|
$ plat_i = plat_i + 1
|
||||||
$ if plat_entry .eqs. "" then goto loop1
|
$ if plat_entry .eqs. "" then goto loop1
|
||||||
$ if plat_entry .nes. ","
|
$ if plat_entry .nes. ","
|
||||||
$ then
|
$ then
|
||||||
$ if f$extract(0,1,plat_entry) .nes. "!" then negatives = 0
|
$ if f$extract(0,1,plat_entry) .nes. "!" then negatives = 0
|
||||||
$ if (arch_vax)
|
$ if f$getsyi("CPU") .lt. 128
|
||||||
$ then
|
$ then
|
||||||
$ if plat_entry .eqs. "EXPORT_VAR_AS_FUNCTION" then -
|
$ if plat_entry .eqs. "EXPORT_VAR_AS_FUNCTION" then -
|
||||||
$ truesum = truesum + 1
|
$ truesum = truesum + 1
|
||||||
@@ -358,7 +276,6 @@ $ falsesum = falsesum + 1
|
|||||||
$ endif
|
$ endif
|
||||||
$!
|
$!
|
||||||
$ if ((plat_entry .eqs. "VMS") .or. -
|
$ if ((plat_entry .eqs. "VMS") .or. -
|
||||||
((plat_entry .eqs. "ZLIB") .and. (ZLIB .nes. "")) .or. -
|
|
||||||
(arch_vax .and. (plat_entry .eqs. "VMSVAX"))) then -
|
(arch_vax .and. (plat_entry .eqs. "VMSVAX"))) then -
|
||||||
truesum = truesum + 1
|
truesum = truesum + 1
|
||||||
$!
|
$!
|
||||||
@@ -428,7 +345,7 @@ $
|
|||||||
$! The version number reader
|
$! The version number reader
|
||||||
$ read_version_info:
|
$ read_version_info:
|
||||||
$ libver = ""
|
$ libver = ""
|
||||||
$ open /read vf [.CRYPTO]OPENSSLV.H
|
$ open/read vf [.CRYPTO]OPENSSLV.H
|
||||||
$ loop_rvi:
|
$ loop_rvi:
|
||||||
$ read/err=endloop_rvi/end=endloop_rvi vf rvi_line
|
$ read/err=endloop_rvi/end=endloop_rvi vf rvi_line
|
||||||
$ if rvi_line - "SHLIB_VERSION_NUMBER """ .eqs. rvi_line then -
|
$ if rvi_line - "SHLIB_VERSION_NUMBER """ .eqs. rvi_line then -
|
||||||
|
|||||||
@@ -1,108 +0,0 @@
|
|||||||
$!
|
|
||||||
$! Startup file for OpenSSL 1.x.
|
|
||||||
$!
|
|
||||||
$! 2011-03-05 SMS.
|
|
||||||
$!
|
|
||||||
$! This procedure must reside in the OpenSSL installation directory.
|
|
||||||
$! It will fail if it is copied to a different location.
|
|
||||||
$!
|
|
||||||
$! P1 qualifier(s) for DEFINE. For example, "/SYSTEM" to get the
|
|
||||||
$! logical names defined in the system logical name table.
|
|
||||||
$!
|
|
||||||
$! P2 "64", to use executables which were built with 64-bit pointers.
|
|
||||||
$!
|
|
||||||
$! Good (default) and bad status values.
|
|
||||||
$!
|
|
||||||
$ status = %x00010001 ! RMS$_NORMAL, normal successful completion.
|
|
||||||
$ rms_e_fnf = %x00018292 ! RMS$_FNF, file not found.
|
|
||||||
$!
|
|
||||||
$! Prepare for problems.
|
|
||||||
$!
|
|
||||||
$ orig_dev_dir = f$environment( "DEFAULT")
|
|
||||||
$ on control_y then goto clean_up
|
|
||||||
$ on error then goto clean_up
|
|
||||||
$!
|
|
||||||
$! Determine hardware architecture.
|
|
||||||
$!
|
|
||||||
$ if (f$getsyi( "cpu") .lt. 128)
|
|
||||||
$ then
|
|
||||||
$ arch_name = "VAX"
|
|
||||||
$ else
|
|
||||||
$ arch_name = f$edit( f$getsyi( "arch_name"), "upcase")
|
|
||||||
$ if (arch_name .eqs. "") then arch_name = "UNK"
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$ if (p2 .eqs. "64")
|
|
||||||
$ then
|
|
||||||
$ arch_name_exe = arch_name+ "_64"
|
|
||||||
$ else
|
|
||||||
$ arch_name_exe = arch_name
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$! Derive the OpenSSL installation device:[directory] from the location
|
|
||||||
$! of this command procedure.
|
|
||||||
$!
|
|
||||||
$ proc = f$environment( "procedure")
|
|
||||||
$ proc_dev_dir = f$parse( "A.;", proc, , , "no_conceal") - "A.;"
|
|
||||||
$ proc_dev = f$parse( proc_dev_dir, , , "device", "syntax_only")
|
|
||||||
$ proc_dir = f$parse( proc_dev_dir, , , "directory", "syntax_only") - -
|
|
||||||
".][000000"- "[000000."- "]["- "["- "]"
|
|
||||||
$ proc_dev_dir = proc_dev+ "["+ proc_dir+ "]"
|
|
||||||
$ set default 'proc_dev_dir'
|
|
||||||
$ set default [-]
|
|
||||||
$ ossl_dev_dir = f$environment( "default")
|
|
||||||
$!
|
|
||||||
$! Check existence of expected directories (to see if this procedure has
|
|
||||||
$! been moved away from its proper place).
|
|
||||||
$!
|
|
||||||
$ if ((f$search( "certs.dir;1") .eqs. "") .or. -
|
|
||||||
(f$search( "include.dir;1") .eqs. "") .or. -
|
|
||||||
(f$search( "private.dir;1") .eqs. "") .or. -
|
|
||||||
(f$search( "vms.dir;1") .eqs. ""))
|
|
||||||
$ then
|
|
||||||
$ write sys$output -
|
|
||||||
" Can't find expected common OpenSSL directories in:"
|
|
||||||
$ write sys$output " ''ossl_dev_dir'"
|
|
||||||
$ status = rms_e_fnf
|
|
||||||
$ goto clean_up
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$ if ((f$search( "''arch_name_exe'_exe.dir;1") .eqs. "") .or. -
|
|
||||||
(f$search( "''arch_name'_lib.dir;1") .eqs. ""))
|
|
||||||
$ then
|
|
||||||
$ write sys$output -
|
|
||||||
" Can't find expected architecture-specific OpenSSL directories in:"
|
|
||||||
$ write sys$output " ''ossl_dev_dir'"
|
|
||||||
$ status = rms_e_fnf
|
|
||||||
$ goto clean_up
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$! All seems well (enough). Define the OpenSSL logical names.
|
|
||||||
$!
|
|
||||||
$ ossl_root = ossl_dev_dir- "]"+ ".]"
|
|
||||||
$ define /translation_attributes = concealed /nolog'p1 SSLROOT 'ossl_root'
|
|
||||||
$ define /nolog 'p1' SSLCERTS sslroot:[certs]
|
|
||||||
$ define /nolog 'p1' SSLINCLUDE sslroot:[include]
|
|
||||||
$ define /nolog 'p1' SSLPRIVATE sslroot:[private]
|
|
||||||
$ define /nolog 'p1' SSLEXE sslroot:['arch_name_exe'_exe]
|
|
||||||
$ define /nolog 'p1' SSLLIB sslroot:['arch_name'_lib]
|
|
||||||
$!
|
|
||||||
$! Defining OPENSSL lets a C program use "#include <openssl/{foo}.h>":
|
|
||||||
$ define /nolog 'p1' OPENSSL SSLINCLUDE:
|
|
||||||
$!
|
|
||||||
$! Run a site-specific procedure, if it exists.
|
|
||||||
$!
|
|
||||||
$ if f$search( "sslroot:[vms]openssl_systartup.com") .nes."" then -
|
|
||||||
@ sslroot:[vms]openssl_systartup.com
|
|
||||||
$!
|
|
||||||
$! Restore the original default dev:[dir] (if known).
|
|
||||||
$!
|
|
||||||
$ clean_up:
|
|
||||||
$!
|
|
||||||
$ if (f$type( orig_dev_dir) .nes. "")
|
|
||||||
$ then
|
|
||||||
$ set default 'orig_dev_dir'
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$ EXIT 'status'
|
|
||||||
$!
|
|
||||||
@@ -1,20 +0,0 @@
|
|||||||
$!
|
|
||||||
$! Deassign OpenSSL logical names.
|
|
||||||
$!
|
|
||||||
$ call deass "OPENSSL" "''p1'"
|
|
||||||
$ call deass "SSLCERTS" "''p1'"
|
|
||||||
$ call deass "SSLEXE" "''p1'"
|
|
||||||
$ call deass "SSLINCLUDE" "''p1'"
|
|
||||||
$ call deass "SSLLIB" "''p1'"
|
|
||||||
$ call deass "SSLPRIVATE" "''p1'"
|
|
||||||
$ call deass "SSLROOT" "''p1'"
|
|
||||||
$!
|
|
||||||
$ exit
|
|
||||||
$!
|
|
||||||
$deass: subroutine
|
|
||||||
$ if (f$trnlnm( p1) .nes. "")
|
|
||||||
$ then
|
|
||||||
$ deassign 'p2' 'p1'
|
|
||||||
$ endif
|
|
||||||
$ endsubroutine
|
|
||||||
$!
|
|
||||||
@@ -5,4 +5,3 @@ der_chop.bak
|
|||||||
CA.pl
|
CA.pl
|
||||||
*.flc
|
*.flc
|
||||||
semantic.cache
|
semantic.cache
|
||||||
*.dll
|
|
||||||
|
|||||||
98
apps/CA.com
98
apps/CA.com
@@ -37,25 +37,14 @@ $ VERIFY = openssl + " verify"
|
|||||||
$ X509 = openssl + " x509"
|
$ X509 = openssl + " x509"
|
||||||
$ PKCS12 = openssl + " pkcs12"
|
$ PKCS12 = openssl + " pkcs12"
|
||||||
$ echo = "write sys$Output"
|
$ echo = "write sys$Output"
|
||||||
$ RET = 1
|
|
||||||
$!
|
$!
|
||||||
$! 2010-12-20 SMS.
|
$ s = F$PARSE(F$ENVIRONMENT("DEFAULT"),"[]") - "].;"
|
||||||
$! Use a concealed logical name to reduce command line lengths, to
|
$ CATOP := 's'.demoCA
|
||||||
$! avoid DCL errors on VAX:
|
$ CAKEY := ]cakey.pem
|
||||||
$! %DCL-W-TKNOVF, command element is too long - shorten
|
$ CACERT := ]cacert.pem
|
||||||
$! (Path segments like "openssl-1_0_1-stable-SNAP-20101217" accumulate
|
|
||||||
$! quickly.)
|
|
||||||
$!
|
|
||||||
$ CATOP = F$PARSE( F$ENVIRONMENT( "DEFAULT"), "[]")- "].;"+ ".demoCA.]"
|
|
||||||
$ define /translation_attributes = concealed CATOP 'CATOP'
|
|
||||||
$!
|
|
||||||
$ on error then goto clean_up
|
|
||||||
$ on control_y then goto clean_up
|
|
||||||
$!
|
|
||||||
$ CAKEY = "CATOP:[private]cakey.pem"
|
|
||||||
$ CACERT = "CATOP:[000000]cacert.pem"
|
|
||||||
$
|
$
|
||||||
$ __INPUT := SYS$COMMAND
|
$ __INPUT := SYS$COMMAND
|
||||||
|
$ RET = 1
|
||||||
$!
|
$!
|
||||||
$ i = 1
|
$ i = 1
|
||||||
$opt_loop:
|
$opt_loop:
|
||||||
@@ -66,7 +55,7 @@ $
|
|||||||
$ IF (prog_opt .EQS. "?" .OR. prog_opt .EQS. "-h" .OR. prog_opt .EQS. "-help")
|
$ IF (prog_opt .EQS. "?" .OR. prog_opt .EQS. "-h" .OR. prog_opt .EQS. "-help")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ echo "usage: CA -newcert|-newreq|-newca|-sign|-verify"
|
$ echo "usage: CA -newcert|-newreq|-newca|-sign|-verify"
|
||||||
$ goto clean_up
|
$ exit
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$ IF (prog_opt .EQS. "-input")
|
$ IF (prog_opt .EQS. "-input")
|
||||||
@@ -80,7 +69,7 @@ $!
|
|||||||
$ IF (prog_opt .EQS. "-newcert")
|
$ IF (prog_opt .EQS. "-newcert")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ ! Create a certificate.
|
$ ! Create a certificate.
|
||||||
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
$ DEFINE/USER SYS$INPUT '__INPUT'
|
||||||
$ REQ -new -x509 -keyout newreq.pem -out newreq.pem 'DAYS'
|
$ REQ -new -x509 -keyout newreq.pem -out newreq.pem 'DAYS'
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ echo "Certificate (and private key) is in newreq.pem"
|
$ echo "Certificate (and private key) is in newreq.pem"
|
||||||
@@ -90,7 +79,7 @@ $!
|
|||||||
$ IF (prog_opt .EQS. "-newreq")
|
$ IF (prog_opt .EQS. "-newreq")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ ! Create a certificate request
|
$ ! Create a certificate request
|
||||||
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
$ DEFINE/USER SYS$INPUT '__INPUT'
|
||||||
$ REQ -new -keyout newreq.pem -out newreq.pem 'DAYS'
|
$ REQ -new -keyout newreq.pem -out newreq.pem 'DAYS'
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ echo "Request (and private key) is in newreq.pem"
|
$ echo "Request (and private key) is in newreq.pem"
|
||||||
@@ -101,40 +90,41 @@ $ IF (prog_opt .EQS. "-newca")
|
|||||||
$ THEN
|
$ THEN
|
||||||
$ ! If explicitly asked for or it doesn't exist then setup the directory
|
$ ! If explicitly asked for or it doesn't exist then setup the directory
|
||||||
$ ! structure that Eric likes to manage things.
|
$ ! structure that Eric likes to manage things.
|
||||||
$ IF F$SEARCH( "CATOP:[000000]serial.") .EQS. ""
|
$ IF F$SEARCH(CATOP+"]serial.") .EQS. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[000000]
|
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP']
|
||||||
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[certs]
|
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.certs]
|
||||||
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[crl]
|
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.crl]
|
||||||
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[newcerts]
|
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.newcerts]
|
||||||
$ CREATE /DIRECTORY /PROTECTION=OWNER:RWED CATOP:[private]
|
$ CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.private]
|
||||||
$
|
$
|
||||||
$ OPEN /WRITE ser_file CATOP:[000000]serial.
|
$ OPEN /WRITE ser_file 'CATOP']serial.
|
||||||
$ WRITE ser_file "01"
|
$ WRITE ser_file "01"
|
||||||
$ CLOSE ser_file
|
$ CLOSE ser_file
|
||||||
$ APPEND /NEW_VERSION NL: CATOP:[000000]index.txt
|
$ APPEND/NEW NL: 'CATOP']index.txt
|
||||||
$
|
$
|
||||||
$ ! The following is to make sure access() doesn't get confused. It
|
$ ! The following is to make sure access() doesn't get confused. It
|
||||||
$ ! really needs one file in the directory to give correct answers...
|
$ ! really needs one file in the directory to give correct answers...
|
||||||
$ COPY NLA0: CATOP:[certs].;
|
$ COPY NLA0: 'CATOP'.certs].;
|
||||||
$ COPY NLA0: CATOP:[crl].;
|
$ COPY NLA0: 'CATOP'.crl].;
|
||||||
$ COPY NLA0: CATOP:[newcerts].;
|
$ COPY NLA0: 'CATOP'.newcerts].;
|
||||||
$ COPY NLA0: CATOP:[private].;
|
$ COPY NLA0: 'CATOP'.private].;
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$ IF F$SEARCH( CAKEY) .EQS. ""
|
$ IF F$SEARCH(CATOP+".private"+CAKEY) .EQS. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ READ '__INPUT' FILE -
|
$ READ '__INPUT' FILE -
|
||||||
/PROMPT="CA certificate filename (or enter to create): "
|
/PROMPT="CA certificate filename (or enter to create): "
|
||||||
$ IF (FILE .NES. "") .AND. (F$SEARCH(FILE) .NES. "")
|
$ IF (FILE .NES. "") .AND. (F$SEARCH(FILE) .NES. "")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ COPY 'FILE' 'CAKEY'
|
$ COPY 'FILE' 'CATOP'.private'CAKEY'
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ echo "Making CA certificate ..."
|
$ echo "Making CA certificate ..."
|
||||||
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
$ DEFINE/USER SYS$INPUT '__INPUT'
|
||||||
$ REQ -new -x509 -keyout 'CAKEY' -out 'CACERT' 'DAYS'
|
$ REQ -new -x509 -keyout 'CATOP'.private'CAKEY' -
|
||||||
$ RET=$STATUS
|
-out 'CATOP''CACERT' 'DAYS'
|
||||||
|
$ RET=$STATUS
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ GOTO opt_loop_continue
|
$ GOTO opt_loop_continue
|
||||||
@@ -145,16 +135,16 @@ $ THEN
|
|||||||
$ i = i + 1
|
$ i = i + 1
|
||||||
$ cname = P'i'
|
$ cname = P'i'
|
||||||
$ IF cname .EQS. "" THEN cname = "My certificate"
|
$ IF cname .EQS. "" THEN cname = "My certificate"
|
||||||
$ PKCS12 -in newcert.pem -inkey newreq.pem -certfile 'CACERT' -
|
$ PKCS12 -in newcert.pem -inkey newreq.pem -certfile 'CATOP''CACERT -
|
||||||
-out newcert.p12 -export -name "''cname'"
|
-out newcert.p12 -export -name "''cname'"
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ goto clean_up
|
$ exit RET
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$ IF (prog_opt .EQS. "-xsign")
|
$ IF (prog_opt .EQS. "-xsign")
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
$ DEFINE/USER SYS$INPUT '__INPUT'
|
||||||
$ CA -policy policy_anything -infiles newreq.pem
|
$ CA -policy policy_anything -infiles newreq.pem
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ GOTO opt_loop_continue
|
$ GOTO opt_loop_continue
|
||||||
@@ -163,7 +153,7 @@ $!
|
|||||||
$ IF ((prog_opt .EQS. "-sign") .OR. (prog_opt .EQS. "-signreq"))
|
$ IF ((prog_opt .EQS. "-sign") .OR. (prog_opt .EQS. "-signreq"))
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
$ DEFINE/USER SYS$INPUT '__INPUT'
|
||||||
$ CA -policy policy_anything -out newcert.pem -infiles newreq.pem
|
$ CA -policy policy_anything -out newcert.pem -infiles newreq.pem
|
||||||
$ RET=$STATUS
|
$ RET=$STATUS
|
||||||
$ type newcert.pem
|
$ type newcert.pem
|
||||||
@@ -175,9 +165,9 @@ $ IF (prog_opt .EQS. "-signcert")
|
|||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ echo "Cert passphrase will be requested twice - bug?"
|
$ echo "Cert passphrase will be requested twice - bug?"
|
||||||
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
$ DEFINE/USER SYS$INPUT '__INPUT'
|
||||||
$ X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
|
$ X509 -x509toreq -in newreq.pem -signkey newreq.pem -out tmp.pem
|
||||||
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
$ DEFINE/USER SYS$INPUT '__INPUT'
|
||||||
$ CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
$ CA -policy policy_anything -out newcert.pem -infiles tmp.pem
|
||||||
y
|
y
|
||||||
y
|
y
|
||||||
@@ -192,17 +182,17 @@ $!
|
|||||||
$ i = i + 1
|
$ i = i + 1
|
||||||
$ IF (p'i' .EQS. "")
|
$ IF (p'i' .EQS. "")
|
||||||
$ THEN
|
$ THEN
|
||||||
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
$ DEFINE/USER SYS$INPUT '__INPUT'
|
||||||
$ VERIFY "-CAfile" 'CACERT' newcert.pem
|
$ VERIFY "-CAfile" 'CATOP''CACERT' newcert.pem
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ j = i
|
$ j = i
|
||||||
$ verify_opt_loop:
|
$ verify_opt_loop:
|
||||||
$ IF j .GT. 8 THEN GOTO verify_opt_loop_end
|
$ IF j .GT. 8 THEN GOTO verify_opt_loop_end
|
||||||
$ IF p'j' .NES. ""
|
$ IF p'j' .NES. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ DEFINE /USER_MODE SYS$INPUT '__INPUT'
|
$ DEFINE/USER SYS$INPUT '__INPUT'
|
||||||
$ __tmp = p'j'
|
$ __tmp = p'j'
|
||||||
$ VERIFY "-CAfile" 'CACERT' '__tmp'
|
$ VERIFY "-CAfile" 'CATOP''CACERT' '__tmp'
|
||||||
$ tmp=$STATUS
|
$ tmp=$STATUS
|
||||||
$ IF tmp .NE. 0 THEN RET=tmp
|
$ IF tmp .NE. 0 THEN RET=tmp
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
@@ -218,8 +208,8 @@ $ IF (prog_opt .NES. "")
|
|||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$ echo "Unknown argument ''prog_opt'"
|
$ echo "Unknown argument ''prog_opt'"
|
||||||
$ RET = 3
|
$
|
||||||
$ goto clean_up
|
$ EXIT 3
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$
|
$
|
||||||
$opt_loop_continue:
|
$opt_loop_continue:
|
||||||
@@ -227,10 +217,4 @@ $ i = i + 1
|
|||||||
$ GOTO opt_loop
|
$ GOTO opt_loop
|
||||||
$
|
$
|
||||||
$opt_loop_end:
|
$opt_loop_end:
|
||||||
$!
|
|
||||||
$clean_up:
|
|
||||||
$!
|
|
||||||
$ if f$trnlnm( "CATOP", "LNM$PROCESS") .nes. "" then -
|
|
||||||
deassign /process CATOP
|
|
||||||
$!
|
|
||||||
$ EXIT 'RET'
|
$ EXIT 'RET'
|
||||||
|
|||||||
1068
apps/Makefile
1068
apps/Makefile
File diff suppressed because it is too large
Load Diff
188
apps/app_rand.c
188
apps/app_rand.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -63,7 +63,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -115,104 +115,106 @@
|
|||||||
#include <openssl/bio.h>
|
#include <openssl/bio.h>
|
||||||
#include <openssl/rand.h>
|
#include <openssl/rand.h>
|
||||||
|
|
||||||
|
|
||||||
static int seeded = 0;
|
static int seeded = 0;
|
||||||
static int egdsocket = 0;
|
static int egdsocket = 0;
|
||||||
|
|
||||||
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
|
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
|
||||||
{
|
{
|
||||||
int consider_randfile = (file == NULL);
|
int consider_randfile = (file == NULL);
|
||||||
char buffer[200];
|
char buffer[200];
|
||||||
|
|
||||||
#ifdef OPENSSL_SYS_WINDOWS
|
#ifdef OPENSSL_SYS_WINDOWS
|
||||||
BIO_printf(bio_e,"Loading 'screen' into random state -");
|
BIO_printf(bio_e, "Loading 'screen' into random state -");
|
||||||
BIO_flush(bio_e);
|
BIO_flush(bio_e);
|
||||||
RAND_screen();
|
RAND_screen();
|
||||||
BIO_printf(bio_e," done\n");
|
BIO_printf(bio_e, " done\n");
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (file == NULL)
|
if (file == NULL)
|
||||||
file = RAND_file_name(buffer, sizeof buffer);
|
file = RAND_file_name(buffer, sizeof buffer);
|
||||||
else if (RAND_egd(file) > 0)
|
else if (RAND_egd(file) > 0) {
|
||||||
{
|
/*
|
||||||
/* we try if the given filename is an EGD socket.
|
* we try if the given filename is an EGD socket. if it is, we don't
|
||||||
if it is, we don't write anything back to the file. */
|
* write anything back to the file.
|
||||||
egdsocket = 1;
|
*/
|
||||||
return 1;
|
egdsocket = 1;
|
||||||
}
|
return 1;
|
||||||
if (file == NULL || !RAND_load_file(file, -1))
|
}
|
||||||
{
|
if (file == NULL || !RAND_load_file(file, -1)) {
|
||||||
if (RAND_status() == 0)
|
if (RAND_status() == 0) {
|
||||||
{
|
if (!dont_warn) {
|
||||||
if (!dont_warn)
|
BIO_printf(bio_e, "unable to load 'random state'\n");
|
||||||
{
|
BIO_printf(bio_e,
|
||||||
BIO_printf(bio_e,"unable to load 'random state'\n");
|
"This means that the random number generator has not been seeded\n");
|
||||||
BIO_printf(bio_e,"This means that the random number generator has not been seeded\n");
|
BIO_printf(bio_e, "with much random data.\n");
|
||||||
BIO_printf(bio_e,"with much random data.\n");
|
if (consider_randfile) { /* explanation does not apply when a
|
||||||
if (consider_randfile) /* explanation does not apply when a file is explicitly named */
|
* file is explicitly named */
|
||||||
{
|
BIO_printf(bio_e,
|
||||||
BIO_printf(bio_e,"Consider setting the RANDFILE environment variable to point at a file that\n");
|
"Consider setting the RANDFILE environment variable to point at a file that\n");
|
||||||
BIO_printf(bio_e,"'random' data can be kept in (the file will be overwritten).\n");
|
BIO_printf(bio_e,
|
||||||
}
|
"'random' data can be kept in (the file will be overwritten).\n");
|
||||||
}
|
}
|
||||||
return 0;
|
}
|
||||||
}
|
return 0;
|
||||||
}
|
}
|
||||||
seeded = 1;
|
}
|
||||||
return 1;
|
seeded = 1;
|
||||||
}
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
long app_RAND_load_files(char *name)
|
long app_RAND_load_files(char *name)
|
||||||
{
|
{
|
||||||
char *p,*n;
|
char *p, *n;
|
||||||
int last;
|
int last;
|
||||||
long tot=0;
|
long tot = 0;
|
||||||
int egd;
|
int egd;
|
||||||
|
|
||||||
for (;;)
|
|
||||||
{
|
|
||||||
last=0;
|
|
||||||
for (p=name; ((*p != '\0') && (*p != LIST_SEPARATOR_CHAR)); p++);
|
|
||||||
if (*p == '\0') last=1;
|
|
||||||
*p='\0';
|
|
||||||
n=name;
|
|
||||||
name=p+1;
|
|
||||||
if (*n == '\0') break;
|
|
||||||
|
|
||||||
egd=RAND_egd(n);
|
for (;;) {
|
||||||
if (egd > 0)
|
last = 0;
|
||||||
tot+=egd;
|
for (p = name; ((*p != '\0') && (*p != LIST_SEPARATOR_CHAR)); p++) ;
|
||||||
else
|
if (*p == '\0')
|
||||||
tot+=RAND_load_file(n,-1);
|
last = 1;
|
||||||
if (last) break;
|
*p = '\0';
|
||||||
}
|
n = name;
|
||||||
if (tot > 512)
|
name = p + 1;
|
||||||
app_RAND_allow_write_file();
|
if (*n == '\0')
|
||||||
return(tot);
|
break;
|
||||||
}
|
|
||||||
|
egd = RAND_egd(n);
|
||||||
|
if (egd > 0)
|
||||||
|
tot += egd;
|
||||||
|
else
|
||||||
|
tot += RAND_load_file(n, -1);
|
||||||
|
if (last)
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
if (tot > 512)
|
||||||
|
app_RAND_allow_write_file();
|
||||||
|
return (tot);
|
||||||
|
}
|
||||||
|
|
||||||
int app_RAND_write_file(const char *file, BIO *bio_e)
|
int app_RAND_write_file(const char *file, BIO *bio_e)
|
||||||
{
|
{
|
||||||
char buffer[200];
|
char buffer[200];
|
||||||
|
|
||||||
if (egdsocket || !seeded)
|
|
||||||
/* If we did not manage to read the seed file,
|
|
||||||
* we should not write a low-entropy seed file back --
|
|
||||||
* it would suppress a crucial warning the next time
|
|
||||||
* we want to use it. */
|
|
||||||
return 0;
|
|
||||||
|
|
||||||
if (file == NULL)
|
if (egdsocket || !seeded)
|
||||||
file = RAND_file_name(buffer, sizeof buffer);
|
/*
|
||||||
if (file == NULL || !RAND_write_file(file))
|
* If we did not manage to read the seed file, we should not write a
|
||||||
{
|
* low-entropy seed file back -- it would suppress a crucial warning
|
||||||
BIO_printf(bio_e,"unable to write 'random state'\n");
|
* the next time we want to use it.
|
||||||
return 0;
|
*/
|
||||||
}
|
return 0;
|
||||||
return 1;
|
|
||||||
}
|
if (file == NULL)
|
||||||
|
file = RAND_file_name(buffer, sizeof buffer);
|
||||||
|
if (file == NULL || !RAND_write_file(file)) {
|
||||||
|
BIO_printf(bio_e, "unable to write 'random state'\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
void app_RAND_allow_write_file(void)
|
void app_RAND_allow_write_file(void)
|
||||||
{
|
{
|
||||||
seeded = 1;
|
seeded = 1;
|
||||||
}
|
}
|
||||||
|
|||||||
4519
apps/apps.c
4519
apps/apps.c
File diff suppressed because it is too large
Load Diff
362
apps/apps.h
362
apps/apps.h
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -63,7 +63,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -110,120 +110,149 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#ifndef HEADER_APPS_H
|
#ifndef HEADER_APPS_H
|
||||||
#define HEADER_APPS_H
|
# define HEADER_APPS_H
|
||||||
|
|
||||||
#include "e_os.h"
|
# include "e_os.h"
|
||||||
|
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/lhash.h>
|
# include <openssl/lhash.h>
|
||||||
#include <openssl/conf.h>
|
# include <openssl/conf.h>
|
||||||
#include <openssl/txt_db.h>
|
# include <openssl/txt_db.h>
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
#include <openssl/engine.h>
|
# include <openssl/engine.h>
|
||||||
#endif
|
# endif
|
||||||
#ifndef OPENSSL_NO_OCSP
|
# ifndef OPENSSL_NO_OCSP
|
||||||
#include <openssl/ocsp.h>
|
# include <openssl/ocsp.h>
|
||||||
#endif
|
# endif
|
||||||
#include <openssl/ossl_typ.h>
|
# include <openssl/ossl_typ.h>
|
||||||
|
|
||||||
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn);
|
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn);
|
||||||
int app_RAND_write_file(const char *file, BIO *bio_e);
|
int app_RAND_write_file(const char *file, BIO *bio_e);
|
||||||
/* When `file' is NULL, use defaults.
|
/*
|
||||||
* `bio_e' is for error messages. */
|
* When `file' is NULL, use defaults. `bio_e' is for error messages.
|
||||||
|
*/
|
||||||
void app_RAND_allow_write_file(void);
|
void app_RAND_allow_write_file(void);
|
||||||
long app_RAND_load_files(char *file); /* `file' is a list of files to read,
|
long app_RAND_load_files(char *file); /* `file' is a list of files to read,
|
||||||
* separated by LIST_SEPARATOR_CHAR
|
* separated by LIST_SEPARATOR_CHAR
|
||||||
* (see e_os.h). The string is
|
* (see e_os.h). The string is
|
||||||
* destroyed! */
|
* destroyed! */
|
||||||
|
|
||||||
#ifndef MONOLITH
|
# ifdef OPENSSL_SYS_WIN32
|
||||||
|
# define rename(from,to) WIN32_rename((from),(to))
|
||||||
|
int WIN32_rename(const char *oldname, const char *newname);
|
||||||
|
# endif
|
||||||
|
|
||||||
#define MAIN(a,v) main(a,v)
|
# ifndef MONOLITH
|
||||||
|
|
||||||
#ifndef NON_MAIN
|
# define MAIN(a,v) main(a,v)
|
||||||
CONF *config=NULL;
|
|
||||||
BIO *bio_err=NULL;
|
# ifndef NON_MAIN
|
||||||
#else
|
CONF *config = NULL;
|
||||||
|
BIO *bio_err = NULL;
|
||||||
|
int in_FIPS_mode = 0;
|
||||||
|
# else
|
||||||
extern CONF *config;
|
extern CONF *config;
|
||||||
extern BIO *bio_err;
|
extern BIO *bio_err;
|
||||||
#endif
|
extern int in_FIPS_mode;
|
||||||
|
# endif
|
||||||
|
|
||||||
#else
|
# else
|
||||||
|
|
||||||
#define MAIN(a,v) PROG(a,v)
|
# define MAIN(a,v) PROG(a,v)
|
||||||
extern CONF *config;
|
extern CONF *config;
|
||||||
extern char *default_config_file;
|
extern char *default_config_file;
|
||||||
extern BIO *bio_err;
|
extern BIO *bio_err;
|
||||||
|
extern int in_FIPS_mode;
|
||||||
|
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#ifndef OPENSSL_SYS_NETWARE
|
# ifndef OPENSSL_SYS_NETWARE
|
||||||
#include <signal.h>
|
# include <signal.h>
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#ifdef SIGPIPE
|
# ifdef SIGPIPE
|
||||||
#define do_pipe_sig() signal(SIGPIPE,SIG_IGN)
|
# define do_pipe_sig() signal(SIGPIPE,SIG_IGN)
|
||||||
#else
|
# else
|
||||||
#define do_pipe_sig()
|
# define do_pipe_sig()
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#ifdef OPENSSL_NO_COMP
|
# if defined(MONOLITH) && !defined(OPENSSL_C)
|
||||||
#define zlib_cleanup()
|
|
||||||
#else
|
|
||||||
#define zlib_cleanup() COMP_zlib_cleanup()
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MONOLITH) && !defined(OPENSSL_C)
|
|
||||||
# define apps_startup() \
|
# define apps_startup() \
|
||||||
do_pipe_sig()
|
do_pipe_sig()
|
||||||
# define apps_shutdown()
|
# define apps_shutdown()
|
||||||
#else
|
# else
|
||||||
# ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
# if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
|
||||||
|
defined(OPENSSL_SYS_WIN32)
|
||||||
|
# ifdef _O_BINARY
|
||||||
|
# define apps_startup() \
|
||||||
|
do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||||
|
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||||
|
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
||||||
|
# else
|
||||||
|
# define apps_startup() \
|
||||||
|
do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||||
|
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||||
|
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
||||||
|
# endif
|
||||||
|
# else
|
||||||
# define apps_startup() \
|
# define apps_startup() \
|
||||||
do { do_pipe_sig(); CRYPTO_malloc_init(); \
|
do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
ERR_load_crypto_strings(); ENGINE_load_builtin_engines(); \
|
||||||
ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
|
setup_ui_method(); } while(0)
|
||||||
# define apps_shutdown() \
|
# endif
|
||||||
do { CONF_modules_unload(1); destroy_ui_method(); \
|
# define apps_shutdown() \
|
||||||
OBJ_cleanup(); EVP_cleanup(); ENGINE_cleanup(); \
|
do { CONF_modules_unload(1); destroy_ui_method(); \
|
||||||
CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
|
EVP_cleanup(); ENGINE_cleanup(); \
|
||||||
ERR_free_strings(); zlib_cleanup();} while(0)
|
CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
|
||||||
|
ERR_free_strings(); } while(0)
|
||||||
# else
|
# else
|
||||||
|
# if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
|
||||||
|
defined(OPENSSL_SYS_WIN32)
|
||||||
|
# ifdef _O_BINARY
|
||||||
|
# define apps_startup() \
|
||||||
|
do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||||
|
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||||
|
setup_ui_method(); } while(0)
|
||||||
|
# else
|
||||||
|
# define apps_startup() \
|
||||||
|
do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
|
||||||
|
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
||||||
|
setup_ui_method(); } while(0)
|
||||||
|
# endif
|
||||||
|
# else
|
||||||
# define apps_startup() \
|
# define apps_startup() \
|
||||||
do { do_pipe_sig(); CRYPTO_malloc_init(); \
|
do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
|
||||||
ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
|
ERR_load_crypto_strings(); \
|
||||||
setup_ui_method(); } while(0)
|
setup_ui_method(); } while(0)
|
||||||
# define apps_shutdown() \
|
# endif
|
||||||
do { CONF_modules_unload(1); destroy_ui_method(); \
|
# define apps_shutdown() \
|
||||||
OBJ_cleanup(); EVP_cleanup(); \
|
do { CONF_modules_unload(1); destroy_ui_method(); \
|
||||||
CRYPTO_cleanup_all_ex_data(); ERR_remove_thread_state(NULL); \
|
EVP_cleanup(); \
|
||||||
ERR_free_strings(); zlib_cleanup(); } while(0)
|
CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
|
||||||
|
ERR_free_strings(); } while(0)
|
||||||
# endif
|
# endif
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#ifdef OPENSSL_SYSNAME_WIN32
|
# ifdef OPENSSL_SYSNAME_WIN32
|
||||||
# define openssl_fdset(a,b) FD_SET((unsigned int)a, b)
|
# define openssl_fdset(a,b) FD_SET((unsigned int)a, b)
|
||||||
#else
|
# else
|
||||||
# define openssl_fdset(a,b) FD_SET(a, b)
|
# define openssl_fdset(a,b) FD_SET(a, b)
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
|
typedef struct args_st {
|
||||||
|
char **data;
|
||||||
|
int count;
|
||||||
|
} ARGS;
|
||||||
|
|
||||||
typedef struct args_st
|
# define PW_MIN_LENGTH 4
|
||||||
{
|
typedef struct pw_cb_data {
|
||||||
char **data;
|
const void *password;
|
||||||
int count;
|
const char *prompt_info;
|
||||||
} ARGS;
|
} PW_CB_DATA;
|
||||||
|
|
||||||
#define PW_MIN_LENGTH 4
|
int password_callback(char *buf, int bufsiz, int verify, PW_CB_DATA *cb_data);
|
||||||
typedef struct pw_cb_data
|
|
||||||
{
|
|
||||||
const void *password;
|
|
||||||
const char *prompt_info;
|
|
||||||
} PW_CB_DATA;
|
|
||||||
|
|
||||||
int password_callback(char *buf, int bufsiz, int verify,
|
|
||||||
PW_CB_DATA *cb_data);
|
|
||||||
|
|
||||||
int setup_ui_method(void);
|
int setup_ui_method(void);
|
||||||
void destroy_ui_method(void);
|
void destroy_ui_method(void);
|
||||||
@@ -231,12 +260,13 @@ void destroy_ui_method(void);
|
|||||||
int should_retry(int i);
|
int should_retry(int i);
|
||||||
int args_from_file(char *file, int *argc, char **argv[]);
|
int args_from_file(char *file, int *argc, char **argv[]);
|
||||||
int str2fmt(char *s);
|
int str2fmt(char *s);
|
||||||
void program_name(char *in,char *out,int size);
|
void program_name(char *in, char *out, int size);
|
||||||
int chopup_args(ARGS *arg,char *buf, int *argc, char **argv[]);
|
int chopup_args(ARGS *arg, char *buf, int *argc, char **argv[]);
|
||||||
#ifdef HEADER_X509_H
|
# ifdef HEADER_X509_H
|
||||||
int dump_cert_text(BIO *out, X509 *x);
|
int dump_cert_text(BIO *out, X509 *x);
|
||||||
void print_name(BIO *out, const char *title, X509_NAME *nm, unsigned long lflags);
|
void print_name(BIO *out, const char *title, X509_NAME *nm,
|
||||||
#endif
|
unsigned long lflags);
|
||||||
|
# endif
|
||||||
int set_cert_ex(unsigned long *flags, const char *arg);
|
int set_cert_ex(unsigned long *flags, const char *arg);
|
||||||
int set_name_ex(unsigned long *flags, const char *arg);
|
int set_name_ex(unsigned long *flags, const char *arg);
|
||||||
int set_ext_copy(int *copy_type, const char *arg);
|
int set_ext_copy(int *copy_type, const char *arg);
|
||||||
@@ -244,129 +274,95 @@ int copy_extensions(X509 *x, X509_REQ *req, int copy_type);
|
|||||||
int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2);
|
int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2);
|
||||||
int add_oid_section(BIO *err, CONF *conf);
|
int add_oid_section(BIO *err, CONF *conf);
|
||||||
X509 *load_cert(BIO *err, const char *file, int format,
|
X509 *load_cert(BIO *err, const char *file, int format,
|
||||||
const char *pass, ENGINE *e, const char *cert_descrip);
|
const char *pass, ENGINE *e, const char *cert_descrip);
|
||||||
EVP_PKEY *load_key(BIO *err, const char *file, int format, int maybe_stdin,
|
EVP_PKEY *load_key(BIO *err, const char *file, int format, int maybe_stdin,
|
||||||
const char *pass, ENGINE *e, const char *key_descrip);
|
const char *pass, ENGINE *e, const char *key_descrip);
|
||||||
EVP_PKEY *load_pubkey(BIO *err, const char *file, int format, int maybe_stdin,
|
EVP_PKEY *load_pubkey(BIO *err, const char *file, int format, int maybe_stdin,
|
||||||
const char *pass, ENGINE *e, const char *key_descrip);
|
const char *pass, ENGINE *e, const char *key_descrip);
|
||||||
STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
|
STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
|
||||||
const char *pass, ENGINE *e, const char *cert_descrip);
|
const char *pass, ENGINE *e,
|
||||||
STACK_OF(X509_CRL) *load_crls(BIO *err, const char *file, int format,
|
const char *cert_descrip);
|
||||||
const char *pass, ENGINE *e, const char *cert_descrip);
|
|
||||||
X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
ENGINE *setup_engine(BIO *err, const char *engine, int debug);
|
ENGINE *setup_engine(BIO *err, const char *engine, int debug);
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_OCSP
|
# ifndef OPENSSL_NO_OCSP
|
||||||
OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
|
OCSP_RESPONSE *process_responder(BIO *err, OCSP_REQUEST *req,
|
||||||
char *host, char *path, char *port, int use_ssl,
|
char *host, char *path, char *port,
|
||||||
STACK_OF(CONF_VALUE) *headers,
|
int use_ssl, int req_timeout);
|
||||||
int req_timeout);
|
# endif
|
||||||
#endif
|
|
||||||
|
|
||||||
int load_config(BIO *err, CONF *cnf);
|
int load_config(BIO *err, CONF *cnf);
|
||||||
char *make_config_name(void);
|
char *make_config_name(void);
|
||||||
|
|
||||||
/* Functions defined in ca.c and also used in ocsp.c */
|
/* Functions defined in ca.c and also used in ocsp.c */
|
||||||
int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
|
int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
|
||||||
ASN1_GENERALIZEDTIME **pinvtm, const char *str);
|
ASN1_GENERALIZEDTIME **pinvtm, const char *str);
|
||||||
|
|
||||||
#define DB_type 0
|
# define DB_type 0
|
||||||
#define DB_exp_date 1
|
# define DB_exp_date 1
|
||||||
#define DB_rev_date 2
|
# define DB_rev_date 2
|
||||||
#define DB_serial 3 /* index - unique */
|
# define DB_serial 3 /* index - unique */
|
||||||
#define DB_file 4
|
# define DB_file 4
|
||||||
#define DB_name 5 /* index - unique when active and not disabled */
|
# define DB_name 5 /* index - unique when active and not
|
||||||
#define DB_NUMBER 6
|
* disabled */
|
||||||
|
# define DB_NUMBER 6
|
||||||
|
|
||||||
#define DB_TYPE_REV 'R'
|
# define DB_TYPE_REV 'R'
|
||||||
#define DB_TYPE_EXP 'E'
|
# define DB_TYPE_EXP 'E'
|
||||||
#define DB_TYPE_VAL 'V'
|
# define DB_TYPE_VAL 'V'
|
||||||
|
|
||||||
typedef struct db_attr_st
|
typedef struct db_attr_st {
|
||||||
{
|
int unique_subject;
|
||||||
int unique_subject;
|
} DB_ATTR;
|
||||||
} DB_ATTR;
|
typedef struct ca_db_st {
|
||||||
typedef struct ca_db_st
|
DB_ATTR attributes;
|
||||||
{
|
TXT_DB *db;
|
||||||
DB_ATTR attributes;
|
} CA_DB;
|
||||||
TXT_DB *db;
|
|
||||||
} CA_DB;
|
|
||||||
|
|
||||||
BIGNUM *load_serial(char *serialfile, int create, ASN1_INTEGER **retai);
|
BIGNUM *load_serial(char *serialfile, int create, ASN1_INTEGER **retai);
|
||||||
int save_serial(char *serialfile, char *suffix, BIGNUM *serial, ASN1_INTEGER **retai);
|
int save_serial(char *serialfile, char *suffix, BIGNUM *serial,
|
||||||
|
ASN1_INTEGER **retai);
|
||||||
int rotate_serial(char *serialfile, char *new_suffix, char *old_suffix);
|
int rotate_serial(char *serialfile, char *new_suffix, char *old_suffix);
|
||||||
int rand_serial(BIGNUM *b, ASN1_INTEGER *ai);
|
int rand_serial(BIGNUM *b, ASN1_INTEGER *ai);
|
||||||
CA_DB *load_index(char *dbfile, DB_ATTR *dbattr);
|
CA_DB *load_index(char *dbfile, DB_ATTR *dbattr);
|
||||||
int index_index(CA_DB *db);
|
int index_index(CA_DB *db);
|
||||||
int save_index(const char *dbfile, const char *suffix, CA_DB *db);
|
int save_index(const char *dbfile, const char *suffix, CA_DB *db);
|
||||||
int rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix);
|
int rotate_index(const char *dbfile, const char *new_suffix,
|
||||||
|
const char *old_suffix);
|
||||||
void free_index(CA_DB *db);
|
void free_index(CA_DB *db);
|
||||||
#define index_name_cmp_noconst(a, b) \
|
int index_name_cmp(const char **a, const char **b);
|
||||||
index_name_cmp((const OPENSSL_CSTRING *)CHECKED_PTR_OF(OPENSSL_STRING, a), \
|
|
||||||
(const OPENSSL_CSTRING *)CHECKED_PTR_OF(OPENSSL_STRING, b))
|
|
||||||
int index_name_cmp(const OPENSSL_CSTRING *a, const OPENSSL_CSTRING *b);
|
|
||||||
int parse_yesno(const char *str, int def);
|
int parse_yesno(const char *str, int def);
|
||||||
|
|
||||||
X509_NAME *parse_name(char *str, long chtype, int multirdn);
|
X509_NAME *parse_name(char *str, long chtype, int multirdn);
|
||||||
int args_verify(char ***pargs, int *pargc,
|
int args_verify(char ***pargs, int *pargc,
|
||||||
int *badarg, BIO *err, X509_VERIFY_PARAM **pm);
|
int *badarg, BIO *err, X509_VERIFY_PARAM **pm);
|
||||||
void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
void policies_print(BIO *out, X509_STORE_CTX *ctx);
|
||||||
int bio_to_mem(unsigned char **out, int maxlen, BIO *in);
|
# ifndef OPENSSL_NO_JPAKE
|
||||||
int pkey_ctrl_string(EVP_PKEY_CTX *ctx, char *value);
|
|
||||||
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
|
|
||||||
const char *algname, ENGINE *e, int do_param);
|
|
||||||
int do_X509_sign(BIO *err, X509 *x, EVP_PKEY *pkey, const EVP_MD *md,
|
|
||||||
STACK_OF(OPENSSL_STRING) *sigopts);
|
|
||||||
int do_X509_REQ_sign(BIO *err, X509_REQ *x, EVP_PKEY *pkey, const EVP_MD *md,
|
|
||||||
STACK_OF(OPENSSL_STRING) *sigopts);
|
|
||||||
int do_X509_CRL_sign(BIO *err, X509_CRL *x, EVP_PKEY *pkey, const EVP_MD *md,
|
|
||||||
STACK_OF(OPENSSL_STRING) *sigopts);
|
|
||||||
#ifndef OPENSSL_NO_PSK
|
|
||||||
extern char *psk_key;
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_JPAKE
|
|
||||||
void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
|
void jpake_client_auth(BIO *out, BIO *conn, const char *secret);
|
||||||
void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
|
void jpake_server_auth(BIO *out, BIO *conn, const char *secret);
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#define FORMAT_UNDEF 0
|
# define FORMAT_UNDEF 0
|
||||||
#define FORMAT_ASN1 1
|
# define FORMAT_ASN1 1
|
||||||
#define FORMAT_TEXT 2
|
# define FORMAT_TEXT 2
|
||||||
#define FORMAT_PEM 3
|
# define FORMAT_PEM 3
|
||||||
#define FORMAT_NETSCAPE 4
|
# define FORMAT_NETSCAPE 4
|
||||||
#define FORMAT_PKCS12 5
|
# define FORMAT_PKCS12 5
|
||||||
#define FORMAT_SMIME 6
|
# define FORMAT_SMIME 6
|
||||||
#define FORMAT_ENGINE 7
|
# define FORMAT_ENGINE 7
|
||||||
#define FORMAT_IISSGC 8 /* XXX this stupid macro helps us to avoid
|
# define FORMAT_IISSGC 8 /* XXX this stupid macro helps us to avoid
|
||||||
* adding yet another param to load_*key() */
|
* adding yet another param to load_*key() */
|
||||||
#define FORMAT_PEMRSA 9 /* PEM RSAPubicKey format */
|
|
||||||
#define FORMAT_ASN1RSA 10 /* DER RSAPubicKey format */
|
# define EXT_COPY_NONE 0
|
||||||
#define FORMAT_MSBLOB 11 /* MS Key blob format */
|
# define EXT_COPY_ADD 1
|
||||||
#define FORMAT_PVK 12 /* MS PVK file format */
|
# define EXT_COPY_ALL 2
|
||||||
|
|
||||||
#define EXT_COPY_NONE 0
|
# define NETSCAPE_CERT_HDR "certificate"
|
||||||
#define EXT_COPY_ADD 1
|
|
||||||
#define EXT_COPY_ALL 2
|
# define APP_PASS_LEN 1024
|
||||||
|
|
||||||
#define NETSCAPE_CERT_HDR "certificate"
|
# define SERIAL_RAND_BITS 64
|
||||||
|
|
||||||
#define APP_PASS_LEN 1024
|
|
||||||
|
|
||||||
#define SERIAL_RAND_BITS 64
|
|
||||||
|
|
||||||
int app_isdir(const char *);
|
|
||||||
int raw_read_stdin(void *,int);
|
|
||||||
int raw_write_stdout(const void *,int);
|
|
||||||
|
|
||||||
#define TM_START 0
|
|
||||||
#define TM_STOP 1
|
|
||||||
double app_tminterval (int stop,int usertime);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#define OPENSSL_NO_SSL_INTERN
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_NEXTPROTONEG
|
|
||||||
unsigned char *next_protos_parse(unsigned short *outlen, const char *in);
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
651
apps/asn1pars.c
651
apps/asn1pars.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,15 +49,16 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* A nice addition from Dr Stephen Henson <steve@openssl.org> to
|
/*
|
||||||
* add the -strparse option which parses nested binary structures
|
* A nice addition from Dr Stephen Henson <steve@openssl.org> to add the
|
||||||
|
* -strparse option which parses nested binary structures
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
@@ -69,377 +70,361 @@
|
|||||||
#include <openssl/x509.h>
|
#include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
* -in arg - input file - default stdin
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -i - indent the details by depth
|
* -in arg - input file - default stdin
|
||||||
* -offset - where in the file to start
|
* -i - indent the details by depth
|
||||||
* -length - how many bytes to use
|
* -offset - where in the file to start
|
||||||
* -oid file - extra oid description file
|
* -length - how many bytes to use
|
||||||
|
* -oid file - extra oid description file
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG asn1parse_main
|
#define PROG asn1parse_main
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf);
|
static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int i,badops=0,offset=0,ret=1,j;
|
int i, badops = 0, offset = 0, ret = 1, j;
|
||||||
unsigned int length=0;
|
unsigned int length = 0;
|
||||||
long num,tmplen;
|
long num, tmplen;
|
||||||
BIO *in=NULL,*out=NULL,*b64=NULL, *derout = NULL;
|
BIO *in = NULL, *out = NULL, *b64 = NULL, *derout = NULL;
|
||||||
int informat,indent=0, noout = 0, dump = 0;
|
int informat, indent = 0, noout = 0, dump = 0;
|
||||||
char *infile=NULL,*str=NULL,*prog,*oidfile=NULL, *derfile=NULL;
|
char *infile = NULL, *str = NULL, *prog, *oidfile = NULL, *derfile = NULL;
|
||||||
char *genstr=NULL, *genconf=NULL;
|
char *genstr = NULL, *genconf = NULL;
|
||||||
unsigned char *tmpbuf;
|
unsigned char *tmpbuf;
|
||||||
const unsigned char *ctmpbuf;
|
const unsigned char *ctmpbuf;
|
||||||
BUF_MEM *buf=NULL;
|
BUF_MEM *buf = NULL;
|
||||||
STACK_OF(OPENSSL_STRING) *osk=NULL;
|
STACK *osk = NULL;
|
||||||
ASN1_TYPE *at=NULL;
|
ASN1_TYPE *at = NULL;
|
||||||
|
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
prog=argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
if ((osk=sk_OPENSSL_STRING_new_null()) == NULL)
|
if ((osk = sk_new_null()) == NULL) {
|
||||||
{
|
BIO_printf(bio_err, "Memory allocation failure\n");
|
||||||
BIO_printf(bio_err,"Memory allocation failure\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
while (argc >= 1) {
|
||||||
while (argc >= 1)
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
goto bad;
|
||||||
{
|
informat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
informat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
derfile = *(++argv);
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
} else if (strcmp(*argv, "-i") == 0) {
|
||||||
{
|
indent = 1;
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-noout") == 0)
|
||||||
derfile= *(++argv);
|
noout = 1;
|
||||||
}
|
else if (strcmp(*argv, "-oid") == 0) {
|
||||||
else if (strcmp(*argv,"-i") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
indent=1;
|
oidfile = *(++argv);
|
||||||
}
|
} else if (strcmp(*argv, "-offset") == 0) {
|
||||||
else if (strcmp(*argv,"-noout") == 0) noout = 1;
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-oid") == 0)
|
goto bad;
|
||||||
{
|
offset = atoi(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-length") == 0) {
|
||||||
oidfile= *(++argv);
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-offset") == 0)
|
length = atoi(*(++argv));
|
||||||
{
|
if (length == 0)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
offset= atoi(*(++argv));
|
} else if (strcmp(*argv, "-dump") == 0) {
|
||||||
}
|
dump = -1;
|
||||||
else if (strcmp(*argv,"-length") == 0)
|
} else if (strcmp(*argv, "-dlimit") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
length= atoi(*(++argv));
|
dump = atoi(*(++argv));
|
||||||
if (length == 0) goto bad;
|
if (dump <= 0)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-dump") == 0)
|
} else if (strcmp(*argv, "-strparse") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
dump= -1;
|
goto bad;
|
||||||
}
|
sk_push(osk, *(++argv));
|
||||||
else if (strcmp(*argv,"-dlimit") == 0)
|
} else if (strcmp(*argv, "-genstr") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
dump= atoi(*(++argv));
|
genstr = *(++argv);
|
||||||
if (dump <= 0) goto bad;
|
} else if (strcmp(*argv, "-genconf") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-strparse") == 0)
|
goto bad;
|
||||||
{
|
genconf = *(++argv);
|
||||||
if (--argc < 1) goto bad;
|
} else {
|
||||||
sk_OPENSSL_STRING_push(osk,*(++argv));
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
}
|
badops = 1;
|
||||||
else if (strcmp(*argv,"-genstr") == 0)
|
break;
|
||||||
{
|
}
|
||||||
if (--argc < 1) goto bad;
|
argc--;
|
||||||
genstr= *(++argv);
|
argv++;
|
||||||
}
|
}
|
||||||
else if (strcmp(*argv,"-genconf") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
genconf= *(++argv);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] <infile\n", prog);
|
||||||
BIO_printf(bio_err,"%s [options] <infile\n",prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err,"where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - one of DER PEM\n");
|
||||||
BIO_printf(bio_err," -inform arg input format - one of DER PEM\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -out arg output file (output format is always DER\n");
|
" -out arg output file (output format is always DER\n");
|
||||||
BIO_printf(bio_err," -noout arg don't produce any output\n");
|
BIO_printf(bio_err, " -noout arg don't produce any output\n");
|
||||||
BIO_printf(bio_err," -offset arg offset into file\n");
|
BIO_printf(bio_err, " -offset arg offset into file\n");
|
||||||
BIO_printf(bio_err," -length arg length of section in file\n");
|
BIO_printf(bio_err, " -length arg length of section in file\n");
|
||||||
BIO_printf(bio_err," -i indent entries\n");
|
BIO_printf(bio_err, " -i indent entries\n");
|
||||||
BIO_printf(bio_err," -dump dump unknown data in hex form\n");
|
BIO_printf(bio_err, " -dump dump unknown data in hex form\n");
|
||||||
BIO_printf(bio_err," -dlimit arg dump the first arg bytes of unknown data in hex form\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -oid file file of extra oid definitions\n");
|
" -dlimit arg dump the first arg bytes of unknown data in hex form\n");
|
||||||
BIO_printf(bio_err," -strparse offset\n");
|
BIO_printf(bio_err, " -oid file file of extra oid definitions\n");
|
||||||
BIO_printf(bio_err," a series of these can be used to 'dig' into multiple\n");
|
BIO_printf(bio_err, " -strparse offset\n");
|
||||||
BIO_printf(bio_err," ASN1 blob wrappings\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -genstr str string to generate ASN1 structure from\n");
|
" a series of these can be used to 'dig' into multiple\n");
|
||||||
BIO_printf(bio_err," -genconf file file to generate ASN1 structure from\n");
|
BIO_printf(bio_err, " ASN1 blob wrappings\n");
|
||||||
goto end;
|
BIO_printf(bio_err,
|
||||||
}
|
" -genstr str string to generate ASN1 structure from\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -genconf file file to generate ASN1 structure from\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
out=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (out == NULL))
|
if ((in == NULL) || (out == NULL)) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (oidfile != NULL)
|
if (oidfile != NULL) {
|
||||||
{
|
if (BIO_read_filename(in, oidfile) <= 0) {
|
||||||
if (BIO_read_filename(in,oidfile) <= 0)
|
BIO_printf(bio_err, "problems opening %s\n", oidfile);
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
BIO_printf(bio_err,"problems opening %s\n",oidfile);
|
goto end;
|
||||||
ERR_print_errors(bio_err);
|
}
|
||||||
goto end;
|
OBJ_create_objects(in);
|
||||||
}
|
}
|
||||||
OBJ_create_objects(in);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
if (infile == NULL)
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
else
|
else {
|
||||||
{
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
perror(infile);
|
||||||
{
|
goto end;
|
||||||
perror(infile);
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (derfile) {
|
if (derfile) {
|
||||||
if(!(derout = BIO_new_file(derfile, "wb"))) {
|
if (!(derout = BIO_new_file(derfile, "wb"))) {
|
||||||
BIO_printf(bio_err,"problems opening %s\n",derfile);
|
BIO_printf(bio_err, "problems opening %s\n", derfile);
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if ((buf=BUF_MEM_new()) == NULL) goto end;
|
if ((buf = BUF_MEM_new()) == NULL)
|
||||||
if (!BUF_MEM_grow(buf,BUFSIZ*8)) goto end; /* Pre-allocate :-) */
|
goto end;
|
||||||
|
if (!BUF_MEM_grow(buf, BUFSIZ * 8))
|
||||||
|
goto end; /* Pre-allocate :-) */
|
||||||
|
|
||||||
if (genstr || genconf)
|
if (genstr || genconf) {
|
||||||
{
|
num = do_generate(bio_err, genstr, genconf, buf);
|
||||||
num = do_generate(bio_err, genstr, genconf, buf);
|
if (num < 0) {
|
||||||
if (num < 0)
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
ERR_print_errors(bio_err);
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
else
|
else {
|
||||||
{
|
|
||||||
|
|
||||||
if (informat == FORMAT_PEM)
|
if (informat == FORMAT_PEM) {
|
||||||
{
|
BIO *tmp;
|
||||||
BIO *tmp;
|
|
||||||
|
|
||||||
if ((b64=BIO_new(BIO_f_base64())) == NULL)
|
if ((b64 = BIO_new(BIO_f_base64())) == NULL)
|
||||||
goto end;
|
goto end;
|
||||||
BIO_push(b64,in);
|
BIO_push(b64, in);
|
||||||
tmp=in;
|
tmp = in;
|
||||||
in=b64;
|
in = b64;
|
||||||
b64=tmp;
|
b64 = tmp;
|
||||||
}
|
}
|
||||||
|
|
||||||
num=0;
|
num = 0;
|
||||||
for (;;)
|
for (;;) {
|
||||||
{
|
if (!BUF_MEM_grow(buf, (int)num + BUFSIZ))
|
||||||
if (!BUF_MEM_grow(buf,(int)num+BUFSIZ)) goto end;
|
goto end;
|
||||||
i=BIO_read(in,&(buf->data[num]),BUFSIZ);
|
i = BIO_read(in, &(buf->data[num]), BUFSIZ);
|
||||||
if (i <= 0) break;
|
if (i <= 0)
|
||||||
num+=i;
|
break;
|
||||||
}
|
num += i;
|
||||||
}
|
}
|
||||||
str=buf->data;
|
}
|
||||||
|
str = buf->data;
|
||||||
|
|
||||||
/* If any structs to parse go through in sequence */
|
/* If any structs to parse go through in sequence */
|
||||||
|
|
||||||
if (sk_OPENSSL_STRING_num(osk))
|
if (sk_num(osk)) {
|
||||||
{
|
tmpbuf = (unsigned char *)str;
|
||||||
tmpbuf=(unsigned char *)str;
|
tmplen = num;
|
||||||
tmplen=num;
|
for (i = 0; i < sk_num(osk); i++) {
|
||||||
for (i=0; i<sk_OPENSSL_STRING_num(osk); i++)
|
ASN1_TYPE *atmp;
|
||||||
{
|
int typ;
|
||||||
ASN1_TYPE *atmp;
|
j = atoi(sk_value(osk, i));
|
||||||
int typ;
|
if (j == 0) {
|
||||||
j=atoi(sk_OPENSSL_STRING_value(osk,i));
|
BIO_printf(bio_err, "'%s' is an invalid number\n",
|
||||||
if (j == 0)
|
sk_value(osk, i));
|
||||||
{
|
continue;
|
||||||
BIO_printf(bio_err,"'%s' is an invalid number\n",sk_OPENSSL_STRING_value(osk,i));
|
}
|
||||||
continue;
|
tmpbuf += j;
|
||||||
}
|
tmplen -= j;
|
||||||
tmpbuf+=j;
|
atmp = at;
|
||||||
tmplen-=j;
|
ctmpbuf = tmpbuf;
|
||||||
atmp = at;
|
at = d2i_ASN1_TYPE(NULL, &ctmpbuf, tmplen);
|
||||||
ctmpbuf = tmpbuf;
|
ASN1_TYPE_free(atmp);
|
||||||
at = d2i_ASN1_TYPE(NULL,&ctmpbuf,tmplen);
|
if (!at) {
|
||||||
ASN1_TYPE_free(atmp);
|
BIO_printf(bio_err, "Error parsing structure\n");
|
||||||
if(!at)
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
BIO_printf(bio_err,"Error parsing structure\n");
|
}
|
||||||
ERR_print_errors(bio_err);
|
typ = ASN1_TYPE_get(at);
|
||||||
goto end;
|
if ((typ == V_ASN1_OBJECT)
|
||||||
}
|
|| (typ == V_ASN1_NULL)) {
|
||||||
typ = ASN1_TYPE_get(at);
|
BIO_printf(bio_err, "Can't parse %s type\n",
|
||||||
if ((typ == V_ASN1_OBJECT)
|
typ == V_ASN1_NULL ? "NULL" : "OBJECT");
|
||||||
|| (typ == V_ASN1_NULL))
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
BIO_printf(bio_err, "Can't parse %s type\n",
|
}
|
||||||
typ == V_ASN1_NULL ? "NULL" : "OBJECT");
|
/* hmm... this is a little evil but it works */
|
||||||
ERR_print_errors(bio_err);
|
tmpbuf = at->value.asn1_string->data;
|
||||||
goto end;
|
tmplen = at->value.asn1_string->length;
|
||||||
}
|
}
|
||||||
/* hmm... this is a little evil but it works */
|
str = (char *)tmpbuf;
|
||||||
tmpbuf=at->value.asn1_string->data;
|
num = tmplen;
|
||||||
tmplen=at->value.asn1_string->length;
|
}
|
||||||
}
|
|
||||||
str=(char *)tmpbuf;
|
|
||||||
num=tmplen;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (offset >= num)
|
if (offset >= num) {
|
||||||
{
|
BIO_printf(bio_err, "Error: offset too large\n");
|
||||||
BIO_printf(bio_err, "Error: offset too large\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
num -= offset;
|
num -= offset;
|
||||||
|
|
||||||
if ((length == 0) || ((long)length > num)) length=(unsigned int)num;
|
if ((length == 0) || ((long)length > num))
|
||||||
if(derout) {
|
length = (unsigned int)num;
|
||||||
if(BIO_write(derout, str + offset, length) != (int)length) {
|
if (derout) {
|
||||||
BIO_printf(bio_err, "Error writing output\n");
|
if (BIO_write(derout, str + offset, length) != (int)length) {
|
||||||
ERR_print_errors(bio_err);
|
BIO_printf(bio_err, "Error writing output\n");
|
||||||
goto end;
|
ERR_print_errors(bio_err);
|
||||||
}
|
goto end;
|
||||||
}
|
}
|
||||||
if (!noout &&
|
}
|
||||||
!ASN1_parse_dump(out,(unsigned char *)&(str[offset]),length,
|
if (!noout &&
|
||||||
indent,dump))
|
!ASN1_parse_dump(out, (unsigned char *)&(str[offset]), length,
|
||||||
{
|
indent, dump)) {
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
ret=0;
|
ret = 0;
|
||||||
end:
|
end:
|
||||||
BIO_free(derout);
|
BIO_free(derout);
|
||||||
if (in != NULL) BIO_free(in);
|
if (in != NULL)
|
||||||
if (out != NULL) BIO_free_all(out);
|
BIO_free(in);
|
||||||
if (b64 != NULL) BIO_free(b64);
|
if (out != NULL)
|
||||||
if (ret != 0)
|
BIO_free_all(out);
|
||||||
ERR_print_errors(bio_err);
|
if (b64 != NULL)
|
||||||
if (buf != NULL) BUF_MEM_free(buf);
|
BIO_free(b64);
|
||||||
if (at != NULL) ASN1_TYPE_free(at);
|
if (ret != 0)
|
||||||
if (osk != NULL) sk_OPENSSL_STRING_free(osk);
|
ERR_print_errors(bio_err);
|
||||||
OBJ_cleanup();
|
if (buf != NULL)
|
||||||
apps_shutdown();
|
BUF_MEM_free(buf);
|
||||||
OPENSSL_EXIT(ret);
|
if (at != NULL)
|
||||||
}
|
ASN1_TYPE_free(at);
|
||||||
|
if (osk != NULL)
|
||||||
|
sk_free(osk);
|
||||||
|
OBJ_cleanup();
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf)
|
static int do_generate(BIO *bio, char *genstr, char *genconf, BUF_MEM *buf)
|
||||||
{
|
{
|
||||||
CONF *cnf = NULL;
|
CONF *cnf = NULL;
|
||||||
int len;
|
int len;
|
||||||
long errline;
|
long errline;
|
||||||
unsigned char *p;
|
unsigned char *p;
|
||||||
ASN1_TYPE *atyp = NULL;
|
ASN1_TYPE *atyp = NULL;
|
||||||
|
|
||||||
if (genconf)
|
if (genconf) {
|
||||||
{
|
cnf = NCONF_new(NULL);
|
||||||
cnf = NCONF_new(NULL);
|
if (!NCONF_load(cnf, genconf, &errline))
|
||||||
if (!NCONF_load(cnf, genconf, &errline))
|
goto conferr;
|
||||||
goto conferr;
|
if (!genstr)
|
||||||
if (!genstr)
|
genstr = NCONF_get_string(cnf, "default", "asn1");
|
||||||
genstr = NCONF_get_string(cnf, "default", "asn1");
|
if (!genstr) {
|
||||||
if (!genstr)
|
BIO_printf(bio, "Can't find 'asn1' in '%s'\n", genconf);
|
||||||
{
|
goto err;
|
||||||
BIO_printf(bio, "Can't find 'asn1' in '%s'\n", genconf);
|
}
|
||||||
goto err;
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
atyp = ASN1_generate_nconf(genstr, cnf);
|
atyp = ASN1_generate_nconf(genstr, cnf);
|
||||||
NCONF_free(cnf);
|
NCONF_free(cnf);
|
||||||
cnf = NULL;
|
cnf = NULL;
|
||||||
|
|
||||||
if (!atyp)
|
if (!atyp)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
len = i2d_ASN1_TYPE(atyp, NULL);
|
len = i2d_ASN1_TYPE(atyp, NULL);
|
||||||
|
|
||||||
if (len <= 0)
|
if (len <= 0)
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
if (!BUF_MEM_grow(buf,len))
|
if (!BUF_MEM_grow(buf, len))
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
p=(unsigned char *)buf->data;
|
p = (unsigned char *)buf->data;
|
||||||
|
|
||||||
i2d_ASN1_TYPE(atyp, &p);
|
i2d_ASN1_TYPE(atyp, &p);
|
||||||
|
|
||||||
ASN1_TYPE_free(atyp);
|
ASN1_TYPE_free(atyp);
|
||||||
return len;
|
return len;
|
||||||
|
|
||||||
conferr:
|
conferr:
|
||||||
|
|
||||||
if (errline > 0)
|
if (errline > 0)
|
||||||
BIO_printf(bio, "Error on line %ld of config file '%s'\n",
|
BIO_printf(bio, "Error on line %ld of config file '%s'\n",
|
||||||
errline, genconf);
|
errline, genconf);
|
||||||
else
|
else
|
||||||
BIO_printf(bio, "Error loading config file '%s'\n", genconf);
|
BIO_printf(bio, "Error loading config file '%s'\n", genconf);
|
||||||
|
|
||||||
err:
|
err:
|
||||||
NCONF_free(cnf);
|
NCONF_free(cnf);
|
||||||
ASN1_TYPE_free(atyp);
|
ASN1_TYPE_free(atyp);
|
||||||
|
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
252
apps/ciphers.c
252
apps/ciphers.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -60,172 +60,142 @@
|
|||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#ifdef OPENSSL_NO_STDIO
|
#ifdef OPENSSL_NO_STDIO
|
||||||
#define APPS_WIN16
|
# define APPS_WIN16
|
||||||
#endif
|
#endif
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
#include <openssl/ssl.h>
|
#include <openssl/ssl.h>
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG ciphers_main
|
#define PROG ciphers_main
|
||||||
|
|
||||||
static const char *ciphers_usage[]={
|
static const char *ciphers_usage[] = {
|
||||||
"usage: ciphers args\n",
|
"usage: ciphers args\n",
|
||||||
" -v - verbose mode, a textual listing of the SSL/TLS ciphers in OpenSSL\n",
|
" -v - verbose mode, a textual listing of the ciphers in SSLeay\n",
|
||||||
" -V - even more verbose\n",
|
" -ssl2 - SSL2 mode\n",
|
||||||
" -ssl2 - SSL2 mode\n",
|
" -ssl3 - SSL3 mode\n",
|
||||||
" -ssl3 - SSL3 mode\n",
|
" -tls1 - TLS1 mode\n",
|
||||||
" -tls1 - TLS1 mode\n",
|
NULL
|
||||||
NULL
|
|
||||||
};
|
};
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int ret=1,i;
|
int ret = 1, i;
|
||||||
int verbose=0,Verbose=0;
|
int verbose = 0;
|
||||||
const char **pp;
|
const char **pp;
|
||||||
const char *p;
|
const char *p;
|
||||||
int badops=0;
|
int badops = 0;
|
||||||
SSL_CTX *ctx=NULL;
|
SSL_CTX *ctx = NULL;
|
||||||
SSL *ssl=NULL;
|
SSL *ssl = NULL;
|
||||||
char *ciphers=NULL;
|
char *ciphers = NULL;
|
||||||
const SSL_METHOD *meth=NULL;
|
SSL_METHOD *meth = NULL;
|
||||||
STACK_OF(SSL_CIPHER) *sk;
|
STACK_OF(SSL_CIPHER) *sk;
|
||||||
char buf[512];
|
char buf[512];
|
||||||
BIO *STDout=NULL;
|
BIO *STDout = NULL;
|
||||||
|
|
||||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
|
||||||
meth=SSLv23_server_method();
|
meth = SSLv23_server_method();
|
||||||
#elif !defined(OPENSSL_NO_SSL3)
|
#elif !defined(OPENSSL_NO_SSL3)
|
||||||
meth=SSLv3_server_method();
|
meth = SSLv3_server_method();
|
||||||
#elif !defined(OPENSSL_NO_SSL2)
|
#elif !defined(OPENSSL_NO_SSL2)
|
||||||
meth=SSLv2_server_method();
|
meth = SSLv2_server_method();
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
STDout=BIO_new_fp(stdout,BIO_NOCLOSE);
|
STDout = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
STDout = BIO_push(tmpbio, STDout);
|
STDout = BIO_push(tmpbio, STDout);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-v") == 0)
|
||||||
if (strcmp(*argv,"-v") == 0)
|
verbose = 1;
|
||||||
verbose=1;
|
|
||||||
else if (strcmp(*argv,"-V") == 0)
|
|
||||||
verbose=Verbose=1;
|
|
||||||
#ifndef OPENSSL_NO_SSL2
|
#ifndef OPENSSL_NO_SSL2
|
||||||
else if (strcmp(*argv,"-ssl2") == 0)
|
else if (strcmp(*argv, "-ssl2") == 0)
|
||||||
meth=SSLv2_client_method();
|
meth = SSLv2_client_method();
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SSL3
|
#ifndef OPENSSL_NO_SSL3
|
||||||
else if (strcmp(*argv,"-ssl3") == 0)
|
else if (strcmp(*argv, "-ssl3") == 0)
|
||||||
meth=SSLv3_client_method();
|
meth = SSLv3_client_method();
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_TLS1
|
#ifndef OPENSSL_NO_TLS1
|
||||||
else if (strcmp(*argv,"-tls1") == 0)
|
else if (strcmp(*argv, "-tls1") == 0)
|
||||||
meth=TLSv1_client_method();
|
meth = TLSv1_client_method();
|
||||||
#endif
|
#endif
|
||||||
else if ((strncmp(*argv,"-h",2) == 0) ||
|
else if ((strncmp(*argv, "-h", 2) == 0) || (strcmp(*argv, "-?") == 0)) {
|
||||||
(strcmp(*argv,"-?") == 0))
|
badops = 1;
|
||||||
{
|
break;
|
||||||
badops=1;
|
} else {
|
||||||
break;
|
ciphers = *argv;
|
||||||
}
|
}
|
||||||
else
|
argc--;
|
||||||
{
|
argv++;
|
||||||
ciphers= *argv;
|
}
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
for (pp = ciphers_usage; (*pp != NULL); pp++)
|
||||||
for (pp=ciphers_usage; (*pp != NULL); pp++)
|
BIO_printf(bio_err, "%s", *pp);
|
||||||
BIO_printf(bio_err,"%s",*pp);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
OpenSSL_add_ssl_algorithms();
|
OpenSSL_add_ssl_algorithms();
|
||||||
|
|
||||||
ctx=SSL_CTX_new(meth);
|
ctx = SSL_CTX_new(meth);
|
||||||
if (ctx == NULL) goto err;
|
if (ctx == NULL)
|
||||||
if (ciphers != NULL) {
|
goto err;
|
||||||
if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
|
if (ciphers != NULL) {
|
||||||
BIO_printf(bio_err, "Error in cipher list\n");
|
if (!SSL_CTX_set_cipher_list(ctx, ciphers)) {
|
||||||
goto err;
|
BIO_printf(bio_err, "Error in cipher list\n");
|
||||||
}
|
goto err;
|
||||||
}
|
}
|
||||||
ssl=SSL_new(ctx);
|
}
|
||||||
if (ssl == NULL) goto err;
|
ssl = SSL_new(ctx);
|
||||||
|
if (ssl == NULL)
|
||||||
|
goto err;
|
||||||
|
|
||||||
|
if (!verbose) {
|
||||||
|
for (i = 0;; i++) {
|
||||||
|
p = SSL_get_cipher_list(ssl, i);
|
||||||
|
if (p == NULL)
|
||||||
|
break;
|
||||||
|
if (i != 0)
|
||||||
|
BIO_printf(STDout, ":");
|
||||||
|
BIO_printf(STDout, "%s", p);
|
||||||
|
}
|
||||||
|
BIO_printf(STDout, "\n");
|
||||||
|
} else {
|
||||||
|
sk = SSL_get_ciphers(ssl);
|
||||||
|
|
||||||
if (!verbose)
|
for (i = 0; i < sk_SSL_CIPHER_num(sk); i++) {
|
||||||
{
|
BIO_puts(STDout,
|
||||||
for (i=0; ; i++)
|
SSL_CIPHER_description(sk_SSL_CIPHER_value(sk, i), buf,
|
||||||
{
|
sizeof buf));
|
||||||
p=SSL_get_cipher_list(ssl,i);
|
}
|
||||||
if (p == NULL) break;
|
}
|
||||||
if (i != 0) BIO_printf(STDout,":");
|
|
||||||
BIO_printf(STDout,"%s",p);
|
|
||||||
}
|
|
||||||
BIO_printf(STDout,"\n");
|
|
||||||
}
|
|
||||||
else /* verbose */
|
|
||||||
{
|
|
||||||
sk=SSL_get_ciphers(ssl);
|
|
||||||
|
|
||||||
for (i=0; i<sk_SSL_CIPHER_num(sk); i++)
|
|
||||||
{
|
|
||||||
SSL_CIPHER *c;
|
|
||||||
|
|
||||||
c = sk_SSL_CIPHER_value(sk,i);
|
|
||||||
|
|
||||||
if (Verbose)
|
|
||||||
{
|
|
||||||
unsigned long id = SSL_CIPHER_get_id(c);
|
|
||||||
int id0 = (int)(id >> 24);
|
|
||||||
int id1 = (int)((id >> 16) & 0xffL);
|
|
||||||
int id2 = (int)((id >> 8) & 0xffL);
|
|
||||||
int id3 = (int)(id & 0xffL);
|
|
||||||
|
|
||||||
if ((id & 0xff000000L) == 0x02000000L)
|
|
||||||
BIO_printf(STDout, " 0x%02X,0x%02X,0x%02X - ", id1, id2, id3); /* SSL2 cipher */
|
|
||||||
else if ((id & 0xff000000L) == 0x03000000L)
|
|
||||||
BIO_printf(STDout, " 0x%02X,0x%02X - ", id2, id3); /* SSL3 cipher */
|
|
||||||
else
|
|
||||||
BIO_printf(STDout, "0x%02X,0x%02X,0x%02X,0x%02X - ", id0, id1, id2, id3); /* whatever */
|
|
||||||
}
|
|
||||||
|
|
||||||
BIO_puts(STDout,SSL_CIPHER_description(c,buf,sizeof buf));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
ret=0;
|
|
||||||
if (0)
|
|
||||||
{
|
|
||||||
err:
|
|
||||||
SSL_load_error_strings();
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
end:
|
|
||||||
if (ctx != NULL) SSL_CTX_free(ctx);
|
|
||||||
if (ssl != NULL) SSL_free(ssl);
|
|
||||||
if (STDout != NULL) BIO_free_all(STDout);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
if (0) {
|
||||||
|
err:
|
||||||
|
SSL_load_error_strings();
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
}
|
||||||
|
end:
|
||||||
|
if (ctx != NULL)
|
||||||
|
SSL_CTX_free(ctx);
|
||||||
|
if (ssl != NULL)
|
||||||
|
SSL_free(ssl);
|
||||||
|
if (STDout != NULL)
|
||||||
|
BIO_free_all(STDout);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|||||||
2304
apps/cms.c
2304
apps/cms.c
File diff suppressed because it is too large
Load Diff
660
apps/crl.c
660
apps/crl.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -67,380 +67,352 @@
|
|||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG crl_main
|
#define PROG crl_main
|
||||||
|
|
||||||
#undef POSTFIX
|
#undef POSTFIX
|
||||||
#define POSTFIX ".rvk"
|
#define POSTFIX ".rvk"
|
||||||
|
|
||||||
static const char *crl_usage[]={
|
static const char *crl_usage[] = {
|
||||||
"usage: crl args\n",
|
"usage: crl args\n",
|
||||||
"\n",
|
"\n",
|
||||||
" -inform arg - input format - default PEM (DER or PEM)\n",
|
" -inform arg - input format - default PEM (DER or PEM)\n",
|
||||||
" -outform arg - output format - default PEM\n",
|
" -outform arg - output format - default PEM\n",
|
||||||
" -text - print out a text format version\n",
|
" -text - print out a text format version\n",
|
||||||
" -in arg - input file - default stdin\n",
|
" -in arg - input file - default stdin\n",
|
||||||
" -out arg - output file - default stdout\n",
|
" -out arg - output file - default stdout\n",
|
||||||
" -hash - print hash value\n",
|
" -hash - print hash value\n",
|
||||||
" -fingerprint - print the crl fingerprint\n",
|
" -fingerprint - print the crl fingerprint\n",
|
||||||
" -issuer - print issuer DN\n",
|
" -issuer - print issuer DN\n",
|
||||||
" -lastupdate - lastUpdate field\n",
|
" -lastupdate - lastUpdate field\n",
|
||||||
" -nextupdate - nextUpdate field\n",
|
" -nextupdate - nextUpdate field\n",
|
||||||
" -crlnumber - print CRL number\n",
|
" -crlnumber - print CRL number\n",
|
||||||
" -noout - no CRL output\n",
|
" -noout - no CRL output\n",
|
||||||
" -CAfile name - verify CRL using certificates in file \"name\"\n",
|
" -CAfile name - verify CRL using certificates in file \"name\"\n",
|
||||||
" -CApath dir - verify CRL using certificates in \"dir\"\n",
|
" -CApath dir - verify CRL using certificates in \"dir\"\n",
|
||||||
" -nameopt arg - various certificate name options\n",
|
" -nameopt arg - various certificate name options\n",
|
||||||
NULL
|
NULL
|
||||||
};
|
};
|
||||||
|
|
||||||
static X509_CRL *load_crl(char *file, int format);
|
static X509_CRL *load_crl(char *file, int format);
|
||||||
static BIO *bio_out=NULL;
|
static BIO *bio_out = NULL;
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
unsigned long nmflag = 0;
|
unsigned long nmflag = 0;
|
||||||
X509_CRL *x=NULL;
|
X509_CRL *x = NULL;
|
||||||
char *CAfile = NULL, *CApath = NULL;
|
char *CAfile = NULL, *CApath = NULL;
|
||||||
int ret=1,i,num,badops=0;
|
int ret = 1, i, num, badops = 0;
|
||||||
BIO *out=NULL;
|
BIO *out = NULL;
|
||||||
int informat,outformat;
|
int informat, outformat;
|
||||||
char *infile=NULL,*outfile=NULL;
|
char *infile = NULL, *outfile = NULL;
|
||||||
int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
|
int hash = 0, issuer = 0, lastupdate = 0, nextupdate = 0, noout =
|
||||||
int fingerprint = 0, crlnumber = 0;
|
0, text = 0;
|
||||||
const char **pp;
|
int fingerprint = 0, crlnumber = 0;
|
||||||
X509_STORE *store = NULL;
|
const char **pp;
|
||||||
X509_STORE_CTX ctx;
|
X509_STORE *store = NULL;
|
||||||
X509_LOOKUP *lookup = NULL;
|
X509_STORE_CTX ctx;
|
||||||
X509_OBJECT xobj;
|
X509_LOOKUP *lookup = NULL;
|
||||||
EVP_PKEY *pkey;
|
X509_OBJECT xobj;
|
||||||
int do_ver = 0;
|
EVP_PKEY *pkey;
|
||||||
const EVP_MD *md_alg,*digest=EVP_sha1();
|
int do_ver = 0;
|
||||||
|
const EVP_MD *md_alg, *digest = EVP_sha1();
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
if (bio_out == NULL)
|
if (bio_out == NULL)
|
||||||
if ((bio_out=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_out = BIO_new(BIO_s_file())) != NULL) {
|
||||||
{
|
BIO_set_fp(bio_out, stdout, BIO_NOCLOSE);
|
||||||
BIO_set_fp(bio_out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
bio_out = BIO_push(tmpbio, bio_out);
|
bio_out = BIO_push(tmpbio, bio_out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat=FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
num=0;
|
num = 0;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
|
||||||
#ifdef undef
|
#ifdef undef
|
||||||
if (strcmp(*argv,"-p") == 0)
|
if (strcmp(*argv, "-p") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
if (!args_from_file(++argv,Nargc,Nargv)) { goto end; }*/
|
if (!args_from_file(++argv, Nargc, Nargv)) {
|
||||||
}
|
goto end;
|
||||||
|
}
|
||||||
|
*/}
|
||||||
#endif
|
#endif
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
informat=str2fmt(*(++argv));
|
informat = str2fmt(*(++argv));
|
||||||
}
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
outformat = str2fmt(*(++argv));
|
||||||
outformat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
goto bad;
|
||||||
{
|
infile = *(++argv);
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
infile= *(++argv);
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
outfile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-CApath") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
outfile= *(++argv);
|
goto bad;
|
||||||
}
|
CApath = *(++argv);
|
||||||
else if (strcmp(*argv,"-CApath") == 0)
|
do_ver = 1;
|
||||||
{
|
} else if (strcmp(*argv, "-CAfile") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
CApath = *(++argv);
|
goto bad;
|
||||||
do_ver = 1;
|
CAfile = *(++argv);
|
||||||
}
|
do_ver = 1;
|
||||||
else if (strcmp(*argv,"-CAfile") == 0)
|
} else if (strcmp(*argv, "-verify") == 0)
|
||||||
{
|
do_ver = 1;
|
||||||
if (--argc < 1) goto bad;
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
CAfile = *(++argv);
|
text = 1;
|
||||||
do_ver = 1;
|
else if (strcmp(*argv, "-hash") == 0)
|
||||||
}
|
hash = ++num;
|
||||||
else if (strcmp(*argv,"-verify") == 0)
|
else if (strcmp(*argv, "-nameopt") == 0) {
|
||||||
do_ver = 1;
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
goto bad;
|
||||||
text = 1;
|
if (!set_name_ex(&nmflag, *(++argv)))
|
||||||
else if (strcmp(*argv,"-hash") == 0)
|
goto bad;
|
||||||
hash= ++num;
|
} else if (strcmp(*argv, "-issuer") == 0)
|
||||||
else if (strcmp(*argv,"-nameopt") == 0)
|
issuer = ++num;
|
||||||
{
|
else if (strcmp(*argv, "-lastupdate") == 0)
|
||||||
if (--argc < 1) goto bad;
|
lastupdate = ++num;
|
||||||
if (!set_name_ex(&nmflag, *(++argv))) goto bad;
|
else if (strcmp(*argv, "-nextupdate") == 0)
|
||||||
}
|
nextupdate = ++num;
|
||||||
else if (strcmp(*argv,"-issuer") == 0)
|
else if (strcmp(*argv, "-noout") == 0)
|
||||||
issuer= ++num;
|
noout = ++num;
|
||||||
else if (strcmp(*argv,"-lastupdate") == 0)
|
else if (strcmp(*argv, "-fingerprint") == 0)
|
||||||
lastupdate= ++num;
|
fingerprint = ++num;
|
||||||
else if (strcmp(*argv,"-nextupdate") == 0)
|
else if (strcmp(*argv, "-crlnumber") == 0)
|
||||||
nextupdate= ++num;
|
crlnumber = ++num;
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
else if ((md_alg = EVP_get_digestbyname(*argv + 1))) {
|
||||||
noout= ++num;
|
/* ok */
|
||||||
else if (strcmp(*argv,"-fingerprint") == 0)
|
digest = md_alg;
|
||||||
fingerprint= ++num;
|
} else {
|
||||||
else if (strcmp(*argv,"-crlnumber") == 0)
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
crlnumber= ++num;
|
badops = 1;
|
||||||
else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
|
break;
|
||||||
{
|
}
|
||||||
/* ok */
|
argc--;
|
||||||
digest=md_alg;
|
argv++;
|
||||||
}
|
}
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
for (pp = crl_usage; (*pp != NULL); pp++)
|
||||||
for (pp=crl_usage; (*pp != NULL); pp++)
|
BIO_printf(bio_err, "%s", *pp);
|
||||||
BIO_printf(bio_err,"%s",*pp);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
x=load_crl(infile,informat);
|
x = load_crl(infile, informat);
|
||||||
if (x == NULL) { goto end; }
|
if (x == NULL) {
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if(do_ver) {
|
if (do_ver) {
|
||||||
store = X509_STORE_new();
|
store = X509_STORE_new();
|
||||||
lookup=X509_STORE_add_lookup(store,X509_LOOKUP_file());
|
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
|
||||||
if (lookup == NULL) goto end;
|
if (lookup == NULL)
|
||||||
if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
|
goto end;
|
||||||
X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
|
if (!X509_LOOKUP_load_file(lookup, CAfile, X509_FILETYPE_PEM))
|
||||||
|
X509_LOOKUP_load_file(lookup, NULL, X509_FILETYPE_DEFAULT);
|
||||||
lookup=X509_STORE_add_lookup(store,X509_LOOKUP_hash_dir());
|
|
||||||
if (lookup == NULL) goto end;
|
|
||||||
if (!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM))
|
|
||||||
X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
|
|
||||||
ERR_clear_error();
|
|
||||||
|
|
||||||
if(!X509_STORE_CTX_init(&ctx, store, NULL, NULL)) {
|
lookup = X509_STORE_add_lookup(store, X509_LOOKUP_hash_dir());
|
||||||
BIO_printf(bio_err,
|
if (lookup == NULL)
|
||||||
"Error initialising X509 store\n");
|
goto end;
|
||||||
goto end;
|
if (!X509_LOOKUP_add_dir(lookup, CApath, X509_FILETYPE_PEM))
|
||||||
}
|
X509_LOOKUP_add_dir(lookup, NULL, X509_FILETYPE_DEFAULT);
|
||||||
|
ERR_clear_error();
|
||||||
|
|
||||||
i = X509_STORE_get_by_subject(&ctx, X509_LU_X509,
|
if (!X509_STORE_CTX_init(&ctx, store, NULL, NULL)) {
|
||||||
X509_CRL_get_issuer(x), &xobj);
|
BIO_printf(bio_err, "Error initialising X509 store\n");
|
||||||
if(i <= 0) {
|
goto end;
|
||||||
BIO_printf(bio_err,
|
}
|
||||||
"Error getting CRL issuer certificate\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
pkey = X509_get_pubkey(xobj.data.x509);
|
|
||||||
X509_OBJECT_free_contents(&xobj);
|
|
||||||
if(!pkey) {
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Error getting CRL issuer public key\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
i = X509_CRL_verify(x, pkey);
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
if(i < 0) goto end;
|
|
||||||
if(i == 0) BIO_printf(bio_err, "verify failure\n");
|
|
||||||
else BIO_printf(bio_err, "verify OK\n");
|
|
||||||
}
|
|
||||||
|
|
||||||
if (num)
|
i = X509_STORE_get_by_subject(&ctx, X509_LU_X509,
|
||||||
{
|
X509_CRL_get_issuer(x), &xobj);
|
||||||
for (i=1; i<=num; i++)
|
if (i <= 0) {
|
||||||
{
|
BIO_printf(bio_err, "Error getting CRL issuer certificate\n");
|
||||||
if (issuer == i)
|
goto end;
|
||||||
{
|
}
|
||||||
print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), nmflag);
|
pkey = X509_get_pubkey(xobj.data.x509);
|
||||||
}
|
X509_OBJECT_free_contents(&xobj);
|
||||||
if (crlnumber == i)
|
if (!pkey) {
|
||||||
{
|
BIO_printf(bio_err, "Error getting CRL issuer public key\n");
|
||||||
ASN1_INTEGER *crlnum;
|
goto end;
|
||||||
crlnum = X509_CRL_get_ext_d2i(x, NID_crl_number,
|
}
|
||||||
NULL, NULL);
|
i = X509_CRL_verify(x, pkey);
|
||||||
BIO_printf(bio_out,"crlNumber=");
|
EVP_PKEY_free(pkey);
|
||||||
if (crlnum)
|
if (i < 0)
|
||||||
{
|
goto end;
|
||||||
i2a_ASN1_INTEGER(bio_out, crlnum);
|
if (i == 0)
|
||||||
ASN1_INTEGER_free(crlnum);
|
BIO_printf(bio_err, "verify failure\n");
|
||||||
}
|
else
|
||||||
else
|
BIO_printf(bio_err, "verify OK\n");
|
||||||
BIO_puts(bio_out, "<NONE>");
|
}
|
||||||
BIO_printf(bio_out,"\n");
|
|
||||||
}
|
|
||||||
if (hash == i)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out,"%08lx\n",
|
|
||||||
X509_NAME_hash(X509_CRL_get_issuer(x)));
|
|
||||||
}
|
|
||||||
if (lastupdate == i)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out,"lastUpdate=");
|
|
||||||
ASN1_TIME_print(bio_out,
|
|
||||||
X509_CRL_get_lastUpdate(x));
|
|
||||||
BIO_printf(bio_out,"\n");
|
|
||||||
}
|
|
||||||
if (nextupdate == i)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out,"nextUpdate=");
|
|
||||||
if (X509_CRL_get_nextUpdate(x))
|
|
||||||
ASN1_TIME_print(bio_out,
|
|
||||||
X509_CRL_get_nextUpdate(x));
|
|
||||||
else
|
|
||||||
BIO_printf(bio_out,"NONE");
|
|
||||||
BIO_printf(bio_out,"\n");
|
|
||||||
}
|
|
||||||
if (fingerprint == i)
|
|
||||||
{
|
|
||||||
int j;
|
|
||||||
unsigned int n;
|
|
||||||
unsigned char md[EVP_MAX_MD_SIZE];
|
|
||||||
|
|
||||||
if (!X509_CRL_digest(x,digest,md,&n))
|
if (num) {
|
||||||
{
|
for (i = 1; i <= num; i++) {
|
||||||
BIO_printf(bio_err,"out of memory\n");
|
if (issuer == i) {
|
||||||
goto end;
|
print_name(bio_out, "issuer=", X509_CRL_get_issuer(x),
|
||||||
}
|
nmflag);
|
||||||
BIO_printf(bio_out,"%s Fingerprint=",
|
}
|
||||||
OBJ_nid2sn(EVP_MD_type(digest)));
|
if (crlnumber == i) {
|
||||||
for (j=0; j<(int)n; j++)
|
ASN1_INTEGER *crlnum;
|
||||||
{
|
crlnum = X509_CRL_get_ext_d2i(x, NID_crl_number, NULL, NULL);
|
||||||
BIO_printf(bio_out,"%02X%c",md[j],
|
BIO_printf(bio_out, "crlNumber=");
|
||||||
(j+1 == (int)n)
|
if (crlnum) {
|
||||||
?'\n':':');
|
i2a_ASN1_INTEGER(bio_out, crlnum);
|
||||||
}
|
ASN1_INTEGER_free(crlnum);
|
||||||
}
|
} else
|
||||||
}
|
BIO_puts(bio_out, "<NONE>");
|
||||||
}
|
BIO_printf(bio_out, "\n");
|
||||||
|
}
|
||||||
|
if (hash == i) {
|
||||||
|
BIO_printf(bio_out, "%08lx\n",
|
||||||
|
X509_NAME_hash(X509_CRL_get_issuer(x)));
|
||||||
|
}
|
||||||
|
if (lastupdate == i) {
|
||||||
|
BIO_printf(bio_out, "lastUpdate=");
|
||||||
|
ASN1_TIME_print(bio_out, X509_CRL_get_lastUpdate(x));
|
||||||
|
BIO_printf(bio_out, "\n");
|
||||||
|
}
|
||||||
|
if (nextupdate == i) {
|
||||||
|
BIO_printf(bio_out, "nextUpdate=");
|
||||||
|
if (X509_CRL_get_nextUpdate(x))
|
||||||
|
ASN1_TIME_print(bio_out, X509_CRL_get_nextUpdate(x));
|
||||||
|
else
|
||||||
|
BIO_printf(bio_out, "NONE");
|
||||||
|
BIO_printf(bio_out, "\n");
|
||||||
|
}
|
||||||
|
if (fingerprint == i) {
|
||||||
|
int j;
|
||||||
|
unsigned int n;
|
||||||
|
unsigned char md[EVP_MAX_MD_SIZE];
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
if (!X509_CRL_digest(x, digest, md, &n)) {
|
||||||
if (out == NULL)
|
BIO_printf(bio_err, "out of memory\n");
|
||||||
{
|
goto end;
|
||||||
ERR_print_errors(bio_err);
|
}
|
||||||
goto end;
|
BIO_printf(bio_out, "%s Fingerprint=",
|
||||||
}
|
OBJ_nid2sn(EVP_MD_type(digest)));
|
||||||
|
for (j = 0; j < (int)n; j++) {
|
||||||
|
BIO_printf(bio_out, "%02X%c", md[j], (j + 1 == (int)n)
|
||||||
|
? '\n' : ':');
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (outfile == NULL)
|
out = BIO_new(BIO_s_file());
|
||||||
{
|
if (out == NULL) {
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile == NULL) {
|
||||||
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
} else {
|
||||||
else
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
{
|
perror(outfile);
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
goto end;
|
||||||
{
|
}
|
||||||
perror(outfile);
|
}
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (text) X509_CRL_print(out, x);
|
if (text)
|
||||||
|
X509_CRL_print(out, x);
|
||||||
|
|
||||||
if (noout)
|
if (noout) {
|
||||||
{
|
ret = 0;
|
||||||
ret = 0;
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (outformat == FORMAT_ASN1)
|
if (outformat == FORMAT_ASN1)
|
||||||
i=(int)i2d_X509_CRL_bio(out,x);
|
i = (int)i2d_X509_CRL_bio(out, x);
|
||||||
else if (outformat == FORMAT_PEM)
|
else if (outformat == FORMAT_PEM)
|
||||||
i=PEM_write_bio_X509_CRL(out,x);
|
i = PEM_write_bio_X509_CRL(out, x);
|
||||||
else
|
else {
|
||||||
{
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
if (!i) {
|
||||||
if (!i) { BIO_printf(bio_err,"unable to write CRL\n"); goto end; }
|
BIO_printf(bio_err, "unable to write CRL\n");
|
||||||
ret=0;
|
goto end;
|
||||||
end:
|
}
|
||||||
BIO_free_all(out);
|
ret = 0;
|
||||||
BIO_free_all(bio_out);
|
end:
|
||||||
bio_out=NULL;
|
BIO_free_all(out);
|
||||||
X509_CRL_free(x);
|
BIO_free_all(bio_out);
|
||||||
if(store) {
|
bio_out = NULL;
|
||||||
X509_STORE_CTX_cleanup(&ctx);
|
X509_CRL_free(x);
|
||||||
X509_STORE_free(store);
|
if (store) {
|
||||||
}
|
X509_STORE_CTX_cleanup(&ctx);
|
||||||
apps_shutdown();
|
X509_STORE_free(store);
|
||||||
OPENSSL_EXIT(ret);
|
}
|
||||||
}
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
static X509_CRL *load_crl(char *infile, int format)
|
static X509_CRL *load_crl(char *infile, int format)
|
||||||
{
|
{
|
||||||
X509_CRL *x=NULL;
|
X509_CRL *x = NULL;
|
||||||
BIO *in=NULL;
|
BIO *in = NULL;
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
if (in == NULL)
|
if (in == NULL) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
if (infile == NULL)
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
else
|
else {
|
||||||
{
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
perror(infile);
|
||||||
{
|
goto end;
|
||||||
perror(infile);
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
if (format == FORMAT_ASN1)
|
||||||
}
|
x = d2i_X509_CRL_bio(in, NULL);
|
||||||
if (format == FORMAT_ASN1)
|
else if (format == FORMAT_PEM)
|
||||||
x=d2i_X509_CRL_bio(in,NULL);
|
x = PEM_read_bio_X509_CRL(in, NULL, NULL, NULL);
|
||||||
else if (format == FORMAT_PEM)
|
else {
|
||||||
x=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL);
|
BIO_printf(bio_err, "bad input format specified for input crl\n");
|
||||||
else {
|
goto end;
|
||||||
BIO_printf(bio_err,"bad input format specified for input crl\n");
|
}
|
||||||
goto end;
|
if (x == NULL) {
|
||||||
}
|
BIO_printf(bio_err, "unable to load CRL\n");
|
||||||
if (x == NULL)
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
BIO_printf(bio_err,"unable to load CRL\n");
|
}
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
end:
|
|
||||||
BIO_free(in);
|
|
||||||
return(x);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
end:
|
||||||
|
BIO_free(in);
|
||||||
|
return (x);
|
||||||
|
}
|
||||||
|
|||||||
468
apps/crl2p7.c
468
apps/crl2p7.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,20 +49,23 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
/* This was written by Gordon Chaffee <chaffee@plateau.cs.berkeley.edu>
|
/*
|
||||||
* and donated 'to the cause' along with lots and lots of other fixes to
|
* This was written by Gordon Chaffee <chaffee@plateau.cs.berkeley.edu> and
|
||||||
* the library. */
|
* donated 'to the cause' along with lots and lots of other fixes to the
|
||||||
|
* library.
|
||||||
|
*/
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <sys/types.h>
|
#include <sys/types.h>
|
||||||
|
#include <sys/stat.h>
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
#include <openssl/evp.h>
|
#include <openssl/evp.h>
|
||||||
@@ -73,265 +76,266 @@
|
|||||||
|
|
||||||
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
|
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG crl2pkcs7_main
|
#define PROG crl2pkcs7_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int i,badops=0;
|
int i, badops = 0;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat,outformat;
|
int informat, outformat;
|
||||||
char *infile,*outfile,*prog,*certfile;
|
char *infile, *outfile, *prog, *certfile;
|
||||||
PKCS7 *p7 = NULL;
|
PKCS7 *p7 = NULL;
|
||||||
PKCS7_SIGNED *p7s = NULL;
|
PKCS7_SIGNED *p7s = NULL;
|
||||||
X509_CRL *crl=NULL;
|
X509_CRL *crl = NULL;
|
||||||
STACK_OF(OPENSSL_STRING) *certflst=NULL;
|
STACK *certflst = NULL;
|
||||||
STACK_OF(X509_CRL) *crl_stack=NULL;
|
STACK_OF(X509_CRL) *crl_stack = NULL;
|
||||||
STACK_OF(X509) *cert_stack=NULL;
|
STACK_OF(X509) *cert_stack = NULL;
|
||||||
int ret=1,nocrl=0;
|
int ret = 1, nocrl = 0;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
infile=NULL;
|
infile = NULL;
|
||||||
outfile=NULL;
|
outfile = NULL;
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat=FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
prog=argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
informat = str2fmt(*(++argv));
|
||||||
informat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
goto bad;
|
||||||
{
|
outformat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-nocrl") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
nocrl = 1;
|
||||||
infile= *(++argv);
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-nocrl") == 0)
|
goto bad;
|
||||||
{
|
outfile = *(++argv);
|
||||||
nocrl=1;
|
} else if (strcmp(*argv, "-certfile") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
goto bad;
|
||||||
{
|
if (!certflst)
|
||||||
if (--argc < 1) goto bad;
|
certflst = sk_new_null();
|
||||||
outfile= *(++argv);
|
if (!certflst)
|
||||||
}
|
goto end;
|
||||||
else if (strcmp(*argv,"-certfile") == 0)
|
if (!sk_push(certflst, *(++argv))) {
|
||||||
{
|
sk_free(certflst);
|
||||||
if (--argc < 1) goto bad;
|
goto end;
|
||||||
if(!certflst) certflst = sk_OPENSSL_STRING_new_null();
|
}
|
||||||
sk_OPENSSL_STRING_push(certflst,*(++argv));
|
} else {
|
||||||
}
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
else
|
badops = 1;
|
||||||
{
|
break;
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
}
|
||||||
badops=1;
|
argc--;
|
||||||
break;
|
argv++;
|
||||||
}
|
}
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err,"where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - DER or PEM\n");
|
||||||
BIO_printf(bio_err," -inform arg input format - DER or PEM\n");
|
BIO_printf(bio_err, " -outform arg output format - DER or PEM\n");
|
||||||
BIO_printf(bio_err," -outform arg output format - DER or PEM\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -certfile arg certificates file of chain to a trusted CA\n");
|
" -certfile arg certificates file of chain to a trusted CA\n");
|
||||||
BIO_printf(bio_err," (can be used more than once)\n");
|
BIO_printf(bio_err, " (can be used more than once)\n");
|
||||||
BIO_printf(bio_err," -nocrl no crl to load, just certs from '-certfile'\n");
|
BIO_printf(bio_err,
|
||||||
ret = 1;
|
" -nocrl no crl to load, just certs from '-certfile'\n");
|
||||||
goto end;
|
ret = 1;
|
||||||
}
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
out=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (out == NULL))
|
if ((in == NULL) || (out == NULL)) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (!nocrl)
|
if (!nocrl) {
|
||||||
{
|
if (infile == NULL)
|
||||||
if (infile == NULL)
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
else {
|
||||||
else
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
{
|
perror(infile);
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
goto end;
|
||||||
{
|
}
|
||||||
perror(infile);
|
}
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (informat == FORMAT_ASN1)
|
if (informat == FORMAT_ASN1)
|
||||||
crl=d2i_X509_CRL_bio(in,NULL);
|
crl = d2i_X509_CRL_bio(in, NULL);
|
||||||
else if (informat == FORMAT_PEM)
|
else if (informat == FORMAT_PEM)
|
||||||
crl=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL);
|
crl = PEM_read_bio_X509_CRL(in, NULL, NULL, NULL);
|
||||||
else {
|
else {
|
||||||
BIO_printf(bio_err,"bad input format specified for input crl\n");
|
BIO_printf(bio_err, "bad input format specified for input crl\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (crl == NULL)
|
if (crl == NULL) {
|
||||||
{
|
BIO_printf(bio_err, "unable to load CRL\n");
|
||||||
BIO_printf(bio_err,"unable to load CRL\n");
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if ((p7=PKCS7_new()) == NULL) goto end;
|
|
||||||
if ((p7s=PKCS7_SIGNED_new()) == NULL) goto end;
|
|
||||||
p7->type=OBJ_nid2obj(NID_pkcs7_signed);
|
|
||||||
p7->d.sign=p7s;
|
|
||||||
p7s->contents->type=OBJ_nid2obj(NID_pkcs7_data);
|
|
||||||
|
|
||||||
if (!ASN1_INTEGER_set(p7s->version,1)) goto end;
|
if ((p7 = PKCS7_new()) == NULL)
|
||||||
if ((crl_stack=sk_X509_CRL_new_null()) == NULL) goto end;
|
goto end;
|
||||||
p7s->crl=crl_stack;
|
if ((p7s = PKCS7_SIGNED_new()) == NULL)
|
||||||
if (crl != NULL)
|
goto end;
|
||||||
{
|
p7->type = OBJ_nid2obj(NID_pkcs7_signed);
|
||||||
sk_X509_CRL_push(crl_stack,crl);
|
p7->d.sign = p7s;
|
||||||
crl=NULL; /* now part of p7 for OPENSSL_freeing */
|
p7s->contents->type = OBJ_nid2obj(NID_pkcs7_data);
|
||||||
}
|
|
||||||
|
|
||||||
if ((cert_stack=sk_X509_new_null()) == NULL) goto end;
|
if (!ASN1_INTEGER_set(p7s->version, 1))
|
||||||
p7s->cert=cert_stack;
|
goto end;
|
||||||
|
if ((crl_stack = sk_X509_CRL_new_null()) == NULL)
|
||||||
|
goto end;
|
||||||
|
p7s->crl = crl_stack;
|
||||||
|
if (crl != NULL) {
|
||||||
|
sk_X509_CRL_push(crl_stack, crl);
|
||||||
|
crl = NULL; /* now part of p7 for OPENSSL_freeing */
|
||||||
|
}
|
||||||
|
|
||||||
if(certflst) for(i = 0; i < sk_OPENSSL_STRING_num(certflst); i++) {
|
if ((cert_stack = sk_X509_new_null()) == NULL)
|
||||||
certfile = sk_OPENSSL_STRING_value(certflst, i);
|
goto end;
|
||||||
if (add_certs_from_file(cert_stack,certfile) < 0)
|
p7s->cert = cert_stack;
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "error loading certificates\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
sk_OPENSSL_STRING_free(certflst);
|
if (certflst)
|
||||||
|
for (i = 0; i < sk_num(certflst); i++) {
|
||||||
|
certfile = sk_value(certflst, i);
|
||||||
|
if (add_certs_from_file(cert_stack, certfile) < 0) {
|
||||||
|
BIO_printf(bio_err, "error loading certificates\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (outfile == NULL)
|
sk_free(certflst);
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
if (outfile == NULL) {
|
||||||
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
} else {
|
||||||
else
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
{
|
perror(outfile);
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
goto end;
|
||||||
{
|
}
|
||||||
perror(outfile);
|
}
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outformat == FORMAT_ASN1)
|
if (outformat == FORMAT_ASN1)
|
||||||
i=i2d_PKCS7_bio(out,p7);
|
i = i2d_PKCS7_bio(out, p7);
|
||||||
else if (outformat == FORMAT_PEM)
|
else if (outformat == FORMAT_PEM)
|
||||||
i=PEM_write_bio_PKCS7(out,p7);
|
i = PEM_write_bio_PKCS7(out, p7);
|
||||||
else {
|
else {
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
if (!i)
|
if (!i) {
|
||||||
{
|
BIO_printf(bio_err, "unable to write pkcs7 object\n");
|
||||||
BIO_printf(bio_err,"unable to write pkcs7 object\n");
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
ret = 0;
|
||||||
ret=0;
|
end:
|
||||||
end:
|
if (in != NULL)
|
||||||
if (in != NULL) BIO_free(in);
|
BIO_free(in);
|
||||||
if (out != NULL) BIO_free_all(out);
|
if (out != NULL)
|
||||||
if (p7 != NULL) PKCS7_free(p7);
|
BIO_free_all(out);
|
||||||
if (crl != NULL) X509_CRL_free(crl);
|
if (p7 != NULL)
|
||||||
|
PKCS7_free(p7);
|
||||||
|
if (crl != NULL)
|
||||||
|
X509_CRL_free(crl);
|
||||||
|
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*-
|
||||||
*----------------------------------------------------------------------
|
*----------------------------------------------------------------------
|
||||||
* int add_certs_from_file
|
* int add_certs_from_file
|
||||||
*
|
*
|
||||||
* Read a list of certificates to be checked from a file.
|
* Read a list of certificates to be checked from a file.
|
||||||
*
|
*
|
||||||
* Results:
|
* Results:
|
||||||
* number of certs added if successful, -1 if not.
|
* number of certs added if successful, -1 if not.
|
||||||
*----------------------------------------------------------------------
|
*----------------------------------------------------------------------
|
||||||
*/
|
*/
|
||||||
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
|
static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
|
||||||
{
|
{
|
||||||
BIO *in=NULL;
|
struct stat st;
|
||||||
int count=0;
|
BIO *in = NULL;
|
||||||
int ret= -1;
|
int count = 0;
|
||||||
STACK_OF(X509_INFO) *sk=NULL;
|
int ret = -1;
|
||||||
X509_INFO *xi;
|
STACK_OF(X509_INFO) *sk = NULL;
|
||||||
|
X509_INFO *xi;
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
if ((stat(certfile, &st) != 0)) {
|
||||||
if ((in == NULL) || (BIO_read_filename(in,certfile) <= 0))
|
BIO_printf(bio_err, "unable to load the file, %s\n", certfile);
|
||||||
{
|
goto end;
|
||||||
BIO_printf(bio_err,"error opening the file, %s\n",certfile);
|
}
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* This loads from a file, a stack of x509/crl/pkey sets */
|
in = BIO_new(BIO_s_file());
|
||||||
sk=PEM_X509_INFO_read_bio(in,NULL,NULL,NULL);
|
if ((in == NULL) || (BIO_read_filename(in, certfile) <= 0)) {
|
||||||
if (sk == NULL) {
|
BIO_printf(bio_err, "error opening the file, %s\n", certfile);
|
||||||
BIO_printf(bio_err,"error reading the file, %s\n",certfile);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
/* scan over it and pull out the CRL's */
|
/* This loads from a file, a stack of x509/crl/pkey sets */
|
||||||
while (sk_X509_INFO_num(sk))
|
sk = PEM_X509_INFO_read_bio(in, NULL, NULL, NULL);
|
||||||
{
|
if (sk == NULL) {
|
||||||
xi=sk_X509_INFO_shift(sk);
|
BIO_printf(bio_err, "error reading the file, %s\n", certfile);
|
||||||
if (xi->x509 != NULL)
|
goto end;
|
||||||
{
|
}
|
||||||
sk_X509_push(stack,xi->x509);
|
|
||||||
xi->x509=NULL;
|
|
||||||
count++;
|
|
||||||
}
|
|
||||||
X509_INFO_free(xi);
|
|
||||||
}
|
|
||||||
|
|
||||||
ret=count;
|
/* scan over it and pull out the CRL's */
|
||||||
end:
|
while (sk_X509_INFO_num(sk)) {
|
||||||
/* never need to OPENSSL_free x */
|
xi = sk_X509_INFO_shift(sk);
|
||||||
if (in != NULL) BIO_free(in);
|
if (xi->x509 != NULL) {
|
||||||
if (sk != NULL) sk_X509_INFO_free(sk);
|
sk_X509_push(stack, xi->x509);
|
||||||
return(ret);
|
xi->x509 = NULL;
|
||||||
}
|
count++;
|
||||||
|
}
|
||||||
|
X509_INFO_free(xi);
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = count;
|
||||||
|
end:
|
||||||
|
/* never need to OPENSSL_free x */
|
||||||
|
if (in != NULL)
|
||||||
|
BIO_free(in);
|
||||||
|
if (sk != NULL)
|
||||||
|
sk_X509_INFO_free(sk);
|
||||||
|
return (ret);
|
||||||
|
}
|
||||||
|
|||||||
@@ -1,6 +0,0 @@
|
|||||||
# This is a file that will be filled by the openssl srp routine.
|
|
||||||
# You can initialize the file with additional groups, these are
|
|
||||||
# records starting with a I followed by the g and N values and the id.
|
|
||||||
# The exact values ... you have to dig this out from the source of srp.c
|
|
||||||
# or srp_vfy.c
|
|
||||||
# The last value of an I is used as the default group for new users.
|
|
||||||
@@ -1 +0,0 @@
|
|||||||
unique_subject = yes
|
|
||||||
947
apps/dgst.c
947
apps/dgst.c
File diff suppressed because it is too large
Load Diff
550
apps/dh.c
550
apps/dh.c
@@ -6,21 +6,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -35,10 +35,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -50,35 +50,36 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DH */
|
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DH */
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <time.h>
|
# include <time.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/dh.h>
|
# include <openssl/dh.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG dh_main
|
# define PROG dh_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -check - check the parameters are ok
|
* -check - check the parameters are ok
|
||||||
* -noout
|
* -noout
|
||||||
* -text
|
* -text
|
||||||
* -C
|
* -C
|
||||||
@@ -87,269 +88,244 @@
|
|||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
DH *dh=NULL;
|
DH *dh = NULL;
|
||||||
int i,badops=0,text=0;
|
int i, badops = 0, text = 0;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat,outformat,check=0,noout=0,C=0,ret=1;
|
int informat, outformat, check = 0, noout = 0, C = 0, ret = 1;
|
||||||
char *infile,*outfile,*prog;
|
char *infile, *outfile, *prog;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine;
|
char *engine;
|
||||||
#endif
|
|
||||||
|
|
||||||
apps_startup();
|
|
||||||
|
|
||||||
if (bio_err == NULL)
|
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
engine=NULL;
|
|
||||||
#endif
|
|
||||||
infile=NULL;
|
|
||||||
outfile=NULL;
|
|
||||||
informat=FORMAT_PEM;
|
|
||||||
outformat=FORMAT_PEM;
|
|
||||||
|
|
||||||
prog=argv[0];
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
while (argc >= 1)
|
|
||||||
{
|
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
informat=str2fmt(*(++argv));
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
outformat=str2fmt(*(++argv));
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
infile= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
outfile= *(++argv);
|
|
||||||
}
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) goto bad;
|
|
||||||
engine= *(++argv);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
else if (strcmp(*argv,"-check") == 0)
|
|
||||||
check=1;
|
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
|
||||||
text=1;
|
|
||||||
else if (strcmp(*argv,"-C") == 0)
|
|
||||||
C=1;
|
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
|
||||||
noout=1;
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
|
||||||
{
|
|
||||||
bad:
|
|
||||||
BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
|
|
||||||
BIO_printf(bio_err,"where options are\n");
|
|
||||||
BIO_printf(bio_err," -inform arg input format - one of DER PEM\n");
|
|
||||||
BIO_printf(bio_err," -outform arg output format - one of DER PEM\n");
|
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
|
||||||
BIO_printf(bio_err," -check check the DH parameters\n");
|
|
||||||
BIO_printf(bio_err," -text print a text form of the DH parameters\n");
|
|
||||||
BIO_printf(bio_err," -C Output C code\n");
|
|
||||||
BIO_printf(bio_err," -noout no output\n");
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
|
||||||
#endif
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
setup_engine(bio_err, engine, 0);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
|
||||||
out=BIO_new(BIO_s_file());
|
|
||||||
if ((in == NULL) || (out == NULL))
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
|
||||||
{
|
|
||||||
perror(infile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (informat == FORMAT_ASN1)
|
|
||||||
dh=d2i_DHparams_bio(in,NULL);
|
|
||||||
else if (informat == FORMAT_PEM)
|
|
||||||
dh=PEM_read_bio_DHparams(in,NULL,NULL,NULL);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"bad input format specified\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (dh == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load DH parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
if (text)
|
|
||||||
{
|
|
||||||
DHparams_print(out,dh);
|
|
||||||
#ifdef undef
|
|
||||||
printf("p=");
|
|
||||||
BN_print(stdout,dh->p);
|
|
||||||
printf("\ng=");
|
|
||||||
BN_print(stdout,dh->g);
|
|
||||||
printf("\n");
|
|
||||||
if (dh->length != 0)
|
|
||||||
printf("recommended private length=%ld\n",dh->length);
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
if (check)
|
|
||||||
{
|
|
||||||
if (!DH_check(dh,&i))
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (i & DH_CHECK_P_NOT_PRIME)
|
|
||||||
printf("p value is not prime\n");
|
|
||||||
if (i & DH_CHECK_P_NOT_SAFE_PRIME)
|
|
||||||
printf("p value is not a safe prime\n");
|
|
||||||
if (i & DH_UNABLE_TO_CHECK_GENERATOR)
|
|
||||||
printf("unable to check the generator value\n");
|
|
||||||
if (i & DH_NOT_SUITABLE_GENERATOR)
|
|
||||||
printf("the g value is not a generator\n");
|
|
||||||
if (i == 0)
|
|
||||||
printf("DH parameters appear to be ok.\n");
|
|
||||||
}
|
|
||||||
if (C)
|
|
||||||
{
|
|
||||||
unsigned char *data;
|
|
||||||
int len,l,bits;
|
|
||||||
|
|
||||||
len=BN_num_bytes(dh->p);
|
|
||||||
bits=BN_num_bits(dh->p);
|
|
||||||
data=(unsigned char *)OPENSSL_malloc(len);
|
|
||||||
if (data == NULL)
|
|
||||||
{
|
|
||||||
perror("OPENSSL_malloc");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
l=BN_bn2bin(dh->p,data);
|
|
||||||
printf("static unsigned char dh%d_p[]={",bits);
|
|
||||||
for (i=0; i<l; i++)
|
|
||||||
{
|
|
||||||
if ((i%12) == 0) printf("\n\t");
|
|
||||||
printf("0x%02X,",data[i]);
|
|
||||||
}
|
|
||||||
printf("\n\t};\n");
|
|
||||||
|
|
||||||
l=BN_bn2bin(dh->g,data);
|
|
||||||
printf("static unsigned char dh%d_g[]={",bits);
|
|
||||||
for (i=0; i<l; i++)
|
|
||||||
{
|
|
||||||
if ((i%12) == 0) printf("\n\t");
|
|
||||||
printf("0x%02X,",data[i]);
|
|
||||||
}
|
|
||||||
printf("\n\t};\n\n");
|
|
||||||
|
|
||||||
printf("DH *get_dh%d()\n\t{\n",bits);
|
|
||||||
printf("\tDH *dh;\n\n");
|
|
||||||
printf("\tif ((dh=DH_new()) == NULL) return(NULL);\n");
|
|
||||||
printf("\tdh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);\n",
|
|
||||||
bits,bits);
|
|
||||||
printf("\tdh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);\n",
|
|
||||||
bits,bits);
|
|
||||||
printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
|
|
||||||
printf("\t\treturn(NULL);\n");
|
|
||||||
printf("\treturn(dh);\n\t}\n");
|
|
||||||
OPENSSL_free(data);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
if (!noout)
|
|
||||||
{
|
|
||||||
if (outformat == FORMAT_ASN1)
|
|
||||||
i=i2d_DHparams_bio(out,dh);
|
|
||||||
else if (outformat == FORMAT_PEM)
|
|
||||||
i=PEM_write_bio_DHparams(out,dh);
|
|
||||||
else {
|
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (!i)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to write DH parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if (in != NULL) BIO_free(in);
|
|
||||||
if (out != NULL) BIO_free_all(out);
|
|
||||||
if (dh != NULL) DH_free(dh);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
#else /* !OPENSSL_NO_DH */
|
|
||||||
|
|
||||||
# if PEDANTIC
|
|
||||||
static void *dummy=&dummy;
|
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
|
apps_startup();
|
||||||
|
|
||||||
|
if (bio_err == NULL)
|
||||||
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
|
if (!load_config(bio_err, NULL))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
engine = NULL;
|
||||||
|
# endif
|
||||||
|
infile = NULL;
|
||||||
|
outfile = NULL;
|
||||||
|
informat = FORMAT_PEM;
|
||||||
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
|
prog = argv[0];
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
while (argc >= 1) {
|
||||||
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
informat = str2fmt(*(++argv));
|
||||||
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
outformat = str2fmt(*(++argv));
|
||||||
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
infile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
outfile = *(++argv);
|
||||||
|
}
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
engine = *(++argv);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
else if (strcmp(*argv, "-check") == 0)
|
||||||
|
check = 1;
|
||||||
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
|
text = 1;
|
||||||
|
else if (strcmp(*argv, "-C") == 0)
|
||||||
|
C = 1;
|
||||||
|
else if (strcmp(*argv, "-noout") == 0)
|
||||||
|
noout = 1;
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
|
badops = 1;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (badops) {
|
||||||
|
bad:
|
||||||
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
|
BIO_printf(bio_err, "where options are\n");
|
||||||
|
BIO_printf(bio_err, " -inform arg input format - one of DER PEM\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -outform arg output format - one of DER PEM\n");
|
||||||
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
|
BIO_printf(bio_err, " -check check the DH parameters\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -text print a text form of the DH parameters\n");
|
||||||
|
BIO_printf(bio_err, " -C Output C code\n");
|
||||||
|
BIO_printf(bio_err, " -noout no output\n");
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
|
# endif
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
|
in = BIO_new(BIO_s_file());
|
||||||
|
out = BIO_new(BIO_s_file());
|
||||||
|
if ((in == NULL) || (out == NULL)) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (infile == NULL)
|
||||||
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
|
else {
|
||||||
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
|
perror(infile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (outfile == NULL) {
|
||||||
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
|
# ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (informat == FORMAT_ASN1)
|
||||||
|
dh = d2i_DHparams_bio(in, NULL);
|
||||||
|
else if (informat == FORMAT_PEM)
|
||||||
|
dh = PEM_read_bio_DHparams(in, NULL, NULL, NULL);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "bad input format specified\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (dh == NULL) {
|
||||||
|
BIO_printf(bio_err, "unable to load DH parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text) {
|
||||||
|
DHparams_print(out, dh);
|
||||||
|
# ifdef undef
|
||||||
|
printf("p=");
|
||||||
|
BN_print(stdout, dh->p);
|
||||||
|
printf("\ng=");
|
||||||
|
BN_print(stdout, dh->g);
|
||||||
|
printf("\n");
|
||||||
|
if (dh->length != 0)
|
||||||
|
printf("recommended private length=%ld\n", dh->length);
|
||||||
|
# endif
|
||||||
|
}
|
||||||
|
|
||||||
|
if (check) {
|
||||||
|
if (!DH_check(dh, &i)) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (i & DH_CHECK_P_NOT_PRIME)
|
||||||
|
printf("p value is not prime\n");
|
||||||
|
if (i & DH_CHECK_P_NOT_SAFE_PRIME)
|
||||||
|
printf("p value is not a safe prime\n");
|
||||||
|
if (i & DH_UNABLE_TO_CHECK_GENERATOR)
|
||||||
|
printf("unable to check the generator value\n");
|
||||||
|
if (i & DH_NOT_SUITABLE_GENERATOR)
|
||||||
|
printf("the g value is not a generator\n");
|
||||||
|
if (i == 0)
|
||||||
|
printf("DH parameters appear to be ok.\n");
|
||||||
|
}
|
||||||
|
if (C) {
|
||||||
|
unsigned char *data;
|
||||||
|
int len, l, bits;
|
||||||
|
|
||||||
|
len = BN_num_bytes(dh->p);
|
||||||
|
bits = BN_num_bits(dh->p);
|
||||||
|
data = (unsigned char *)OPENSSL_malloc(len);
|
||||||
|
if (data == NULL) {
|
||||||
|
perror("OPENSSL_malloc");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
l = BN_bn2bin(dh->p, data);
|
||||||
|
printf("static unsigned char dh%d_p[]={", bits);
|
||||||
|
for (i = 0; i < l; i++) {
|
||||||
|
if ((i % 12) == 0)
|
||||||
|
printf("\n\t");
|
||||||
|
printf("0x%02X,", data[i]);
|
||||||
|
}
|
||||||
|
printf("\n\t};\n");
|
||||||
|
|
||||||
|
l = BN_bn2bin(dh->g, data);
|
||||||
|
printf("static unsigned char dh%d_g[]={", bits);
|
||||||
|
for (i = 0; i < l; i++) {
|
||||||
|
if ((i % 12) == 0)
|
||||||
|
printf("\n\t");
|
||||||
|
printf("0x%02X,", data[i]);
|
||||||
|
}
|
||||||
|
printf("\n\t};\n\n");
|
||||||
|
|
||||||
|
printf("DH *get_dh%d()\n\t{\n", bits);
|
||||||
|
printf("\tDH *dh;\n\n");
|
||||||
|
printf("\tif ((dh=DH_new()) == NULL) return(NULL);\n");
|
||||||
|
printf("\tdh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);\n",
|
||||||
|
bits, bits);
|
||||||
|
printf("\tdh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);\n",
|
||||||
|
bits, bits);
|
||||||
|
printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
|
||||||
|
printf("\t\treturn(NULL);\n");
|
||||||
|
printf("\treturn(dh);\n\t}\n");
|
||||||
|
OPENSSL_free(data);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!noout) {
|
||||||
|
if (outformat == FORMAT_ASN1)
|
||||||
|
i = i2d_DHparams_bio(out, dh);
|
||||||
|
else if (outformat == FORMAT_PEM)
|
||||||
|
i = PEM_write_bio_DHparams(out, dh);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (!i) {
|
||||||
|
BIO_printf(bio_err, "unable to write DH parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (in != NULL)
|
||||||
|
BIO_free(in);
|
||||||
|
if (out != NULL)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (dh != NULL)
|
||||||
|
DH_free(dh);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
789
apps/dhparam.c
789
apps/dhparam.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -63,7 +63,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -109,35 +109,36 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DH */
|
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DH */
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <time.h>
|
# include <time.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/dh.h>
|
# include <openssl/dh.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
# ifndef OPENSSL_NO_DSA
|
||||||
#include <openssl/dsa.h>
|
# include <openssl/dsa.h>
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG dhparam_main
|
# define PROG dhparam_main
|
||||||
|
|
||||||
#define DEFBITS 512
|
# define DEFBITS 512
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -dsaparam - read or generate DSA parameters, convert to DH
|
* -dsaparam - read or generate DSA parameters, convert to DH
|
||||||
* -check - check the parameters are ok
|
* -check - check the parameters are ok
|
||||||
* -noout
|
* -noout
|
||||||
* -text
|
* -text
|
||||||
* -C
|
* -C
|
||||||
@@ -148,413 +149,389 @@ static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb);
|
|||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
DH *dh=NULL;
|
DH *dh = NULL;
|
||||||
int i,badops=0,text=0;
|
int i, badops = 0, text = 0;
|
||||||
#ifndef OPENSSL_NO_DSA
|
# ifndef OPENSSL_NO_DSA
|
||||||
int dsaparam=0;
|
int dsaparam = 0;
|
||||||
#endif
|
# endif
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat,outformat,check=0,noout=0,C=0,ret=1;
|
int informat, outformat, check = 0, noout = 0, C = 0, ret = 1;
|
||||||
char *infile,*outfile,*prog;
|
char *infile, *outfile, *prog;
|
||||||
char *inrand=NULL;
|
char *inrand = NULL;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine = NULL;
|
||||||
#endif
|
# endif
|
||||||
int num = 0, g = 0;
|
int num = 0, g = 0;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
infile=NULL;
|
infile = NULL;
|
||||||
outfile=NULL;
|
outfile = NULL;
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat=FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
prog=argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
informat = str2fmt(*(++argv));
|
||||||
informat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
goto bad;
|
||||||
{
|
outformat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
outfile = *(++argv);
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
}
|
||||||
{
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
if (--argc < 1) goto bad;
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
outfile= *(++argv);
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
engine = *(++argv);
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
}
|
||||||
{
|
# endif
|
||||||
if (--argc < 1) goto bad;
|
else if (strcmp(*argv, "-check") == 0)
|
||||||
engine= *(++argv);
|
check = 1;
|
||||||
}
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
#endif
|
text = 1;
|
||||||
else if (strcmp(*argv,"-check") == 0)
|
# ifndef OPENSSL_NO_DSA
|
||||||
check=1;
|
else if (strcmp(*argv, "-dsaparam") == 0)
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
dsaparam = 1;
|
||||||
text=1;
|
# endif
|
||||||
#ifndef OPENSSL_NO_DSA
|
else if (strcmp(*argv, "-C") == 0)
|
||||||
else if (strcmp(*argv,"-dsaparam") == 0)
|
C = 1;
|
||||||
dsaparam=1;
|
else if (strcmp(*argv, "-noout") == 0)
|
||||||
#endif
|
noout = 1;
|
||||||
else if (strcmp(*argv,"-C") == 0)
|
else if (strcmp(*argv, "-2") == 0)
|
||||||
C=1;
|
g = 2;
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
else if (strcmp(*argv, "-5") == 0)
|
||||||
noout=1;
|
g = 5;
|
||||||
else if (strcmp(*argv,"-2") == 0)
|
else if (strcmp(*argv, "-rand") == 0) {
|
||||||
g=2;
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-5") == 0)
|
goto bad;
|
||||||
g=5;
|
inrand = *(++argv);
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
} else if (((sscanf(*argv, "%d", &num) == 0) || (num <= 0)))
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
argv++;
|
||||||
inrand= *(++argv);
|
argc--;
|
||||||
}
|
}
|
||||||
else if (((sscanf(*argv,"%d",&num) == 0) || (num <= 0)))
|
|
||||||
goto bad;
|
|
||||||
argv++;
|
|
||||||
argc--;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] [numbits]\n", prog);
|
||||||
BIO_printf(bio_err,"%s [options] [numbits]\n",prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err,"where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - one of DER PEM\n");
|
||||||
BIO_printf(bio_err," -inform arg input format - one of DER PEM\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -outform arg output format - one of DER PEM\n");
|
" -outform arg output format - one of DER PEM\n");
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
#ifndef OPENSSL_NO_DSA
|
# ifndef OPENSSL_NO_DSA
|
||||||
BIO_printf(bio_err," -dsaparam read or generate DSA parameters, convert to DH\n");
|
BIO_printf(bio_err,
|
||||||
#endif
|
" -dsaparam read or generate DSA parameters, convert to DH\n");
|
||||||
BIO_printf(bio_err," -check check the DH parameters\n");
|
# endif
|
||||||
BIO_printf(bio_err," -text print a text form of the DH parameters\n");
|
BIO_printf(bio_err, " -check check the DH parameters\n");
|
||||||
BIO_printf(bio_err," -C Output C code\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -2 generate parameters using 2 as the generator value\n");
|
" -text print a text form of the DH parameters\n");
|
||||||
BIO_printf(bio_err," -5 generate parameters using 5 as the generator value\n");
|
BIO_printf(bio_err, " -C Output C code\n");
|
||||||
BIO_printf(bio_err," numbits number of bits in to generate (default 512)\n");
|
BIO_printf(bio_err,
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
" -2 generate parameters using 2 as the generator value\n");
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err,
|
||||||
#endif
|
" -5 generate parameters using 5 as the generator value\n");
|
||||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," - load the file (or the files in the directory) into\n");
|
" numbits number of bits in to generate (default 512)\n");
|
||||||
BIO_printf(bio_err," the random number generator\n");
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err," -noout no output\n");
|
BIO_printf(bio_err,
|
||||||
goto end;
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
}
|
# endif
|
||||||
|
BIO_printf(bio_err, " -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR,
|
||||||
|
LIST_SEPARATOR_CHAR);
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" - load the file (or the files in the directory) into\n");
|
||||||
|
BIO_printf(bio_err, " the random number generator\n");
|
||||||
|
BIO_printf(bio_err, " -noout no output\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
if (g && !num)
|
if (g && !num)
|
||||||
num = DEFBITS;
|
num = DEFBITS;
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
# ifndef OPENSSL_NO_DSA
|
||||||
if (dsaparam)
|
if (dsaparam) {
|
||||||
{
|
if (g) {
|
||||||
if (g)
|
BIO_printf(bio_err,
|
||||||
{
|
"generator may not be chosen for DSA parameters\n");
|
||||||
BIO_printf(bio_err, "generator may not be chosen for DSA parameters\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
} else
|
||||||
}
|
# endif
|
||||||
else
|
{
|
||||||
#endif
|
/* DH parameters */
|
||||||
{
|
if (num && !g)
|
||||||
/* DH parameters */
|
g = 2;
|
||||||
if (num && !g)
|
}
|
||||||
g = 2;
|
|
||||||
}
|
|
||||||
|
|
||||||
if(num) {
|
if (num) {
|
||||||
|
|
||||||
BN_GENCB cb;
|
BN_GENCB cb;
|
||||||
BN_GENCB_set(&cb, dh_cb, bio_err);
|
BN_GENCB_set(&cb, dh_cb, bio_err);
|
||||||
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
|
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL) {
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
"warning, not much extra random data, consider using the -rand option\n");
|
||||||
}
|
}
|
||||||
if (inrand != NULL)
|
if (inrand != NULL)
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
app_RAND_load_files(inrand));
|
app_RAND_load_files(inrand));
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
# ifndef OPENSSL_NO_DSA
|
||||||
if (dsaparam)
|
if (dsaparam) {
|
||||||
{
|
DSA *dsa = DSA_new();
|
||||||
DSA *dsa = DSA_new();
|
|
||||||
|
|
||||||
BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
|
|
||||||
if(!dsa || !DSA_generate_parameters_ex(dsa, num,
|
|
||||||
NULL, 0, NULL, NULL, &cb))
|
|
||||||
{
|
|
||||||
if(dsa) DSA_free(dsa);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
dh = DSA_dup_DH(dsa);
|
BIO_printf(bio_err,
|
||||||
DSA_free(dsa);
|
"Generating DSA parameters, %d bit long prime\n", num);
|
||||||
if (dh == NULL)
|
if (!dsa
|
||||||
{
|
|| !DSA_generate_parameters_ex(dsa, num, NULL, 0, NULL, NULL,
|
||||||
ERR_print_errors(bio_err);
|
&cb)) {
|
||||||
goto end;
|
if (dsa)
|
||||||
}
|
DSA_free(dsa);
|
||||||
}
|
ERR_print_errors(bio_err);
|
||||||
else
|
goto end;
|
||||||
#endif
|
}
|
||||||
{
|
|
||||||
dh = DH_new();
|
|
||||||
BIO_printf(bio_err,"Generating DH parameters, %d bit long safe prime, generator %d\n",num,g);
|
|
||||||
BIO_printf(bio_err,"This is going to take a long time\n");
|
|
||||||
if(!dh || !DH_generate_parameters_ex(dh, num, g, &cb))
|
|
||||||
{
|
|
||||||
if(dh) DH_free(dh);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
dh = DSA_dup_DH(dsa);
|
||||||
} else {
|
DSA_free(dsa);
|
||||||
|
if (dh == NULL) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
} else
|
||||||
|
# endif
|
||||||
|
{
|
||||||
|
dh = DH_new();
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Generating DH parameters, %d bit long safe prime, generator %d\n",
|
||||||
|
num, g);
|
||||||
|
BIO_printf(bio_err, "This is going to take a long time\n");
|
||||||
|
if (!dh || !DH_generate_parameters_ex(dh, num, g, &cb)) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
app_RAND_write_file(NULL, bio_err);
|
||||||
if (in == NULL)
|
} else {
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (infile == NULL)
|
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
|
||||||
{
|
|
||||||
perror(infile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (informat != FORMAT_ASN1 && informat != FORMAT_PEM)
|
in = BIO_new(BIO_s_file());
|
||||||
{
|
if (in == NULL) {
|
||||||
BIO_printf(bio_err,"bad input format specified\n");
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
if (infile == NULL)
|
||||||
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
|
else {
|
||||||
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
|
perror(infile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
if (informat != FORMAT_ASN1 && informat != FORMAT_PEM) {
|
||||||
if (dsaparam)
|
BIO_printf(bio_err, "bad input format specified\n");
|
||||||
{
|
goto end;
|
||||||
DSA *dsa;
|
}
|
||||||
|
# ifndef OPENSSL_NO_DSA
|
||||||
if (informat == FORMAT_ASN1)
|
if (dsaparam) {
|
||||||
dsa=d2i_DSAparams_bio(in,NULL);
|
DSA *dsa;
|
||||||
else /* informat == FORMAT_PEM */
|
|
||||||
dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL);
|
|
||||||
|
|
||||||
if (dsa == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load DSA parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
dh = DSA_dup_DH(dsa);
|
|
||||||
DSA_free(dsa);
|
|
||||||
if (dh == NULL)
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
#endif
|
|
||||||
{
|
|
||||||
if (informat == FORMAT_ASN1)
|
|
||||||
dh=d2i_DHparams_bio(in,NULL);
|
|
||||||
else /* informat == FORMAT_PEM */
|
|
||||||
dh=PEM_read_bio_DHparams(in,NULL,NULL,NULL);
|
|
||||||
|
|
||||||
if (dh == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load DH parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/* dh != NULL */
|
|
||||||
}
|
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
|
||||||
if (out == NULL)
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
|
if (informat == FORMAT_ASN1)
|
||||||
|
dsa = d2i_DSAparams_bio(in, NULL);
|
||||||
|
else /* informat == FORMAT_PEM */
|
||||||
|
dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL);
|
||||||
|
|
||||||
if (text)
|
if (dsa == NULL) {
|
||||||
{
|
BIO_printf(bio_err, "unable to load DSA parameters\n");
|
||||||
DHparams_print(out,dh);
|
ERR_print_errors(bio_err);
|
||||||
}
|
goto end;
|
||||||
|
}
|
||||||
if (check)
|
|
||||||
{
|
|
||||||
if (!DH_check(dh,&i))
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (i & DH_CHECK_P_NOT_PRIME)
|
|
||||||
printf("p value is not prime\n");
|
|
||||||
if (i & DH_CHECK_P_NOT_SAFE_PRIME)
|
|
||||||
printf("p value is not a safe prime\n");
|
|
||||||
if (i & DH_UNABLE_TO_CHECK_GENERATOR)
|
|
||||||
printf("unable to check the generator value\n");
|
|
||||||
if (i & DH_NOT_SUITABLE_GENERATOR)
|
|
||||||
printf("the g value is not a generator\n");
|
|
||||||
if (i == 0)
|
|
||||||
printf("DH parameters appear to be ok.\n");
|
|
||||||
}
|
|
||||||
if (C)
|
|
||||||
{
|
|
||||||
unsigned char *data;
|
|
||||||
int len,l,bits;
|
|
||||||
|
|
||||||
len=BN_num_bytes(dh->p);
|
dh = DSA_dup_DH(dsa);
|
||||||
bits=BN_num_bits(dh->p);
|
DSA_free(dsa);
|
||||||
data=(unsigned char *)OPENSSL_malloc(len);
|
if (dh == NULL) {
|
||||||
if (data == NULL)
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
perror("OPENSSL_malloc");
|
}
|
||||||
goto end;
|
} else
|
||||||
}
|
# endif
|
||||||
printf("#ifndef HEADER_DH_H\n"
|
{
|
||||||
"#include <openssl/dh.h>\n"
|
if (informat == FORMAT_ASN1)
|
||||||
"#endif\n");
|
dh = d2i_DHparams_bio(in, NULL);
|
||||||
printf("DH *get_dh%d()\n\t{\n",bits);
|
else /* informat == FORMAT_PEM */
|
||||||
|
dh = PEM_read_bio_DHparams(in, NULL, NULL, NULL);
|
||||||
|
|
||||||
l=BN_bn2bin(dh->p,data);
|
if (dh == NULL) {
|
||||||
printf("\tstatic unsigned char dh%d_p[]={",bits);
|
BIO_printf(bio_err, "unable to load DH parameters\n");
|
||||||
for (i=0; i<l; i++)
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
if ((i%12) == 0) printf("\n\t\t");
|
}
|
||||||
printf("0x%02X,",data[i]);
|
}
|
||||||
}
|
|
||||||
printf("\n\t\t};\n");
|
|
||||||
|
|
||||||
l=BN_bn2bin(dh->g,data);
|
/* dh != NULL */
|
||||||
printf("\tstatic unsigned char dh%d_g[]={",bits);
|
}
|
||||||
for (i=0; i<l; i++)
|
|
||||||
{
|
|
||||||
if ((i%12) == 0) printf("\n\t\t");
|
|
||||||
printf("0x%02X,",data[i]);
|
|
||||||
}
|
|
||||||
printf("\n\t\t};\n");
|
|
||||||
|
|
||||||
printf("\tDH *dh;\n\n");
|
out = BIO_new(BIO_s_file());
|
||||||
printf("\tif ((dh=DH_new()) == NULL) return(NULL);\n");
|
if (out == NULL) {
|
||||||
printf("\tdh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);\n",
|
ERR_print_errors(bio_err);
|
||||||
bits,bits);
|
goto end;
|
||||||
printf("\tdh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);\n",
|
}
|
||||||
bits,bits);
|
if (outfile == NULL) {
|
||||||
printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
printf("\t\t{ DH_free(dh); return(NULL); }\n");
|
# ifdef OPENSSL_SYS_VMS
|
||||||
if (dh->length)
|
{
|
||||||
printf("\tdh->length = %ld;\n", dh->length);
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
printf("\treturn(dh);\n\t}\n");
|
out = BIO_push(tmpbio, out);
|
||||||
OPENSSL_free(data);
|
}
|
||||||
}
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text) {
|
||||||
|
DHparams_print(out, dh);
|
||||||
|
}
|
||||||
|
|
||||||
if (!noout)
|
if (check) {
|
||||||
{
|
if (!DH_check(dh, &i)) {
|
||||||
if (outformat == FORMAT_ASN1)
|
ERR_print_errors(bio_err);
|
||||||
i=i2d_DHparams_bio(out,dh);
|
goto end;
|
||||||
else if (outformat == FORMAT_PEM)
|
}
|
||||||
i=PEM_write_bio_DHparams(out,dh);
|
if (i & DH_CHECK_P_NOT_PRIME)
|
||||||
else {
|
printf("p value is not prime\n");
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
if (i & DH_CHECK_P_NOT_SAFE_PRIME)
|
||||||
goto end;
|
printf("p value is not a safe prime\n");
|
||||||
}
|
if (i & DH_UNABLE_TO_CHECK_GENERATOR)
|
||||||
if (!i)
|
printf("unable to check the generator value\n");
|
||||||
{
|
if (i & DH_NOT_SUITABLE_GENERATOR)
|
||||||
BIO_printf(bio_err,"unable to write DH parameters\n");
|
printf("the g value is not a generator\n");
|
||||||
ERR_print_errors(bio_err);
|
if (i == 0)
|
||||||
goto end;
|
printf("DH parameters appear to be ok.\n");
|
||||||
}
|
}
|
||||||
}
|
if (C) {
|
||||||
ret=0;
|
unsigned char *data;
|
||||||
end:
|
int len, l, bits;
|
||||||
if (in != NULL) BIO_free(in);
|
|
||||||
if (out != NULL) BIO_free_all(out);
|
len = BN_num_bytes(dh->p);
|
||||||
if (dh != NULL) DH_free(dh);
|
bits = BN_num_bits(dh->p);
|
||||||
apps_shutdown();
|
data = (unsigned char *)OPENSSL_malloc(len);
|
||||||
OPENSSL_EXIT(ret);
|
if (data == NULL) {
|
||||||
}
|
perror("OPENSSL_malloc");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
printf("#ifndef HEADER_DH_H\n"
|
||||||
|
"#include <openssl/dh.h>\n" "#endif\n");
|
||||||
|
printf("DH *get_dh%d()\n\t{\n", bits);
|
||||||
|
|
||||||
|
l = BN_bn2bin(dh->p, data);
|
||||||
|
printf("\tstatic unsigned char dh%d_p[]={", bits);
|
||||||
|
for (i = 0; i < l; i++) {
|
||||||
|
if ((i % 12) == 0)
|
||||||
|
printf("\n\t\t");
|
||||||
|
printf("0x%02X,", data[i]);
|
||||||
|
}
|
||||||
|
printf("\n\t\t};\n");
|
||||||
|
|
||||||
|
l = BN_bn2bin(dh->g, data);
|
||||||
|
printf("\tstatic unsigned char dh%d_g[]={", bits);
|
||||||
|
for (i = 0; i < l; i++) {
|
||||||
|
if ((i % 12) == 0)
|
||||||
|
printf("\n\t\t");
|
||||||
|
printf("0x%02X,", data[i]);
|
||||||
|
}
|
||||||
|
printf("\n\t\t};\n");
|
||||||
|
|
||||||
|
printf("\tDH *dh;\n\n");
|
||||||
|
printf("\tif ((dh=DH_new()) == NULL) return(NULL);\n");
|
||||||
|
printf("\tdh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);\n",
|
||||||
|
bits, bits);
|
||||||
|
printf("\tdh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);\n",
|
||||||
|
bits, bits);
|
||||||
|
printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
|
||||||
|
printf("\t\t{ DH_free(dh); return(NULL); }\n");
|
||||||
|
if (dh->length)
|
||||||
|
printf("\tdh->length = %ld;\n", dh->length);
|
||||||
|
printf("\treturn(dh);\n\t}\n");
|
||||||
|
OPENSSL_free(data);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!noout) {
|
||||||
|
if (outformat == FORMAT_ASN1)
|
||||||
|
i = i2d_DHparams_bio(out, dh);
|
||||||
|
else if (outformat == FORMAT_PEM)
|
||||||
|
i = PEM_write_bio_DHparams(out, dh);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (!i) {
|
||||||
|
BIO_printf(bio_err, "unable to write DH parameters\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (in != NULL)
|
||||||
|
BIO_free(in);
|
||||||
|
if (out != NULL)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (dh != NULL)
|
||||||
|
DH_free(dh);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
/* dh_cb is identical to dsa_cb in apps/dsaparam.c */
|
/* dh_cb is identical to dsa_cb in apps/dsaparam.c */
|
||||||
static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
|
static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
|
||||||
{
|
{
|
||||||
char c='*';
|
char c = '*';
|
||||||
|
|
||||||
if (p == 0) c='.';
|
if (p == 0)
|
||||||
if (p == 1) c='+';
|
c = '.';
|
||||||
if (p == 2) c='*';
|
if (p == 1)
|
||||||
if (p == 3) c='\n';
|
c = '+';
|
||||||
BIO_write(cb->arg,&c,1);
|
if (p == 2)
|
||||||
(void)BIO_flush(cb->arg);
|
c = '*';
|
||||||
#ifdef LINT
|
if (p == 3)
|
||||||
p=n;
|
c = '\n';
|
||||||
#endif
|
BIO_write(cb->arg, &c, 1);
|
||||||
return 1;
|
(void)BIO_flush(cb->arg);
|
||||||
}
|
# ifdef LINT
|
||||||
|
p = n;
|
||||||
#else /* !OPENSSL_NO_DH */
|
|
||||||
|
|
||||||
# if PEDANTIC
|
|
||||||
static void *dummy=&dummy;
|
|
||||||
# endif
|
# endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
558
apps/dsa.c
558
apps/dsa.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,328 +49,286 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
|
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <time.h>
|
# include <time.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/dsa.h>
|
# include <openssl/evp.h>
|
||||||
#include <openssl/evp.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/pem.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/dsa.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG dsa_main
|
# define PROG dsa_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -des - encrypt output if PEM format with DES in cbc mode
|
* -des - encrypt output if PEM format with DES in cbc mode
|
||||||
* -des3 - encrypt output if PEM format
|
* -des3 - encrypt output if PEM format
|
||||||
* -idea - encrypt output if PEM format
|
* -idea - encrypt output if PEM format
|
||||||
* -aes128 - encrypt output if PEM format
|
* -aes128 - encrypt output if PEM format
|
||||||
* -aes192 - encrypt output if PEM format
|
* -aes192 - encrypt output if PEM format
|
||||||
* -aes256 - encrypt output if PEM format
|
* -aes256 - encrypt output if PEM format
|
||||||
* -camellia128 - encrypt output if PEM format
|
* -camellia128 - encrypt output if PEM format
|
||||||
* -camellia192 - encrypt output if PEM format
|
* -camellia192 - encrypt output if PEM format
|
||||||
* -camellia256 - encrypt output if PEM format
|
* -camellia256 - encrypt output if PEM format
|
||||||
* -seed - encrypt output if PEM format
|
* -seed - encrypt output if PEM format
|
||||||
* -text - print a text version
|
* -text - print a text version
|
||||||
* -modulus - print the DSA public key
|
* -modulus - print the DSA public key
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
int ret=1;
|
int ret = 1;
|
||||||
DSA *dsa=NULL;
|
DSA *dsa = NULL;
|
||||||
int i,badops=0;
|
int i, badops = 0;
|
||||||
const EVP_CIPHER *enc=NULL;
|
const EVP_CIPHER *enc = NULL;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat,outformat,text=0,noout=0;
|
int informat, outformat, text = 0, noout = 0;
|
||||||
int pubin = 0, pubout = 0;
|
int pubin = 0, pubout = 0;
|
||||||
char *infile,*outfile,*prog;
|
char *infile, *outfile, *prog;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine;
|
char *engine;
|
||||||
#endif
|
# endif
|
||||||
char *passargin = NULL, *passargout = NULL;
|
char *passargin = NULL, *passargout = NULL;
|
||||||
char *passin = NULL, *passout = NULL;
|
char *passin = NULL, *passout = NULL;
|
||||||
int modulus=0;
|
int modulus = 0;
|
||||||
|
|
||||||
int pvk_encr = 2;
|
apps_startup();
|
||||||
|
|
||||||
apps_startup();
|
if (bio_err == NULL)
|
||||||
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (!load_config(bio_err, NULL))
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
goto end;
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
goto end;
|
engine = NULL;
|
||||||
|
# endif
|
||||||
|
infile = NULL;
|
||||||
|
outfile = NULL;
|
||||||
|
informat = FORMAT_PEM;
|
||||||
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
prog = argv[0];
|
||||||
engine=NULL;
|
argc--;
|
||||||
#endif
|
argv++;
|
||||||
infile=NULL;
|
while (argc >= 1) {
|
||||||
outfile=NULL;
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
informat=FORMAT_PEM;
|
if (--argc < 1)
|
||||||
outformat=FORMAT_PEM;
|
goto bad;
|
||||||
|
informat = str2fmt(*(++argv));
|
||||||
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
outformat = str2fmt(*(++argv));
|
||||||
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
infile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
outfile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-passin") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
passargin = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-passout") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
passargout = *(++argv);
|
||||||
|
}
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
engine = *(++argv);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
else if (strcmp(*argv, "-noout") == 0)
|
||||||
|
noout = 1;
|
||||||
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
|
text = 1;
|
||||||
|
else if (strcmp(*argv, "-modulus") == 0)
|
||||||
|
modulus = 1;
|
||||||
|
else if (strcmp(*argv, "-pubin") == 0)
|
||||||
|
pubin = 1;
|
||||||
|
else if (strcmp(*argv, "-pubout") == 0)
|
||||||
|
pubout = 1;
|
||||||
|
else if ((enc = EVP_get_cipherbyname(&(argv[0][1]))) == NULL) {
|
||||||
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
|
badops = 1;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
prog=argv[0];
|
if (badops) {
|
||||||
argc--;
|
bad:
|
||||||
argv++;
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
while (argc >= 1)
|
BIO_printf(bio_err, "where options are\n");
|
||||||
{
|
BIO_printf(bio_err, " -inform arg input format - DER or PEM\n");
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
BIO_printf(bio_err, " -outform arg output format - DER or PEM\n");
|
||||||
{
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
if (--argc < 1) goto bad;
|
BIO_printf(bio_err,
|
||||||
informat=str2fmt(*(++argv));
|
" -passin arg input file pass phrase source\n");
|
||||||
}
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
BIO_printf(bio_err,
|
||||||
{
|
" -passout arg output file pass phrase source\n");
|
||||||
if (--argc < 1) goto bad;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
outformat=str2fmt(*(++argv));
|
BIO_printf(bio_err,
|
||||||
}
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
# endif
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
if (--argc < 1) goto bad;
|
" -des encrypt PEM output with cbc des\n");
|
||||||
infile= *(++argv);
|
BIO_printf(bio_err,
|
||||||
}
|
" -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
# ifndef OPENSSL_NO_IDEA
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
if (--argc < 1) goto bad;
|
" -idea encrypt PEM output with cbc idea\n");
|
||||||
outfile= *(++argv);
|
# endif
|
||||||
}
|
# ifndef OPENSSL_NO_AES
|
||||||
else if (strcmp(*argv,"-passin") == 0)
|
BIO_printf(bio_err, " -aes128, -aes192, -aes256\n");
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
if (--argc < 1) goto bad;
|
" encrypt PEM output with cbc aes\n");
|
||||||
passargin= *(++argv);
|
# endif
|
||||||
}
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
else if (strcmp(*argv,"-passout") == 0)
|
BIO_printf(bio_err, " -camellia128, -camellia192, -camellia256\n");
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
if (--argc < 1) goto bad;
|
" encrypt PEM output with cbc camellia\n");
|
||||||
passargout= *(++argv);
|
# endif
|
||||||
}
|
# ifndef OPENSSL_NO_SEED
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
BIO_printf(bio_err,
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
" -seed encrypt PEM output with cbc seed\n");
|
||||||
{
|
# endif
|
||||||
if (--argc < 1) goto bad;
|
BIO_printf(bio_err, " -text print the key in text\n");
|
||||||
engine= *(++argv);
|
BIO_printf(bio_err, " -noout don't print key out\n");
|
||||||
}
|
BIO_printf(bio_err, " -modulus print the DSA public value\n");
|
||||||
#endif
|
goto end;
|
||||||
else if (strcmp(*argv,"-pvk-strong") == 0)
|
}
|
||||||
pvk_encr=2;
|
|
||||||
else if (strcmp(*argv,"-pvk-weak") == 0)
|
|
||||||
pvk_encr=1;
|
|
||||||
else if (strcmp(*argv,"-pvk-none") == 0)
|
|
||||||
pvk_encr=0;
|
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
|
||||||
noout=1;
|
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
|
||||||
text=1;
|
|
||||||
else if (strcmp(*argv,"-modulus") == 0)
|
|
||||||
modulus=1;
|
|
||||||
else if (strcmp(*argv,"-pubin") == 0)
|
|
||||||
pubin=1;
|
|
||||||
else if (strcmp(*argv,"-pubout") == 0)
|
|
||||||
pubout=1;
|
|
||||||
else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
ERR_load_crypto_strings();
|
||||||
{
|
|
||||||
bad:
|
|
||||||
BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
|
|
||||||
BIO_printf(bio_err,"where options are\n");
|
|
||||||
BIO_printf(bio_err," -inform arg input format - DER or PEM\n");
|
|
||||||
BIO_printf(bio_err," -outform arg output format - DER or PEM\n");
|
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
|
||||||
BIO_printf(bio_err," -passin arg input file pass phrase source\n");
|
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
|
||||||
BIO_printf(bio_err," -passout arg output file pass phrase source\n");
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err," -des encrypt PEM output with cbc des\n");
|
|
||||||
BIO_printf(bio_err," -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
|
||||||
#ifndef OPENSSL_NO_IDEA
|
|
||||||
BIO_printf(bio_err," -idea encrypt PEM output with cbc idea\n");
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_AES
|
|
||||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
|
||||||
BIO_printf(bio_err," -camellia128, -camellia192, -camellia256\n");
|
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc camellia\n");
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_SEED
|
|
||||||
BIO_printf(bio_err," -seed encrypt PEM output with cbc seed\n");
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err," -text print the key in text\n");
|
|
||||||
BIO_printf(bio_err," -noout don't print key out\n");
|
|
||||||
BIO_printf(bio_err," -modulus print the DSA public value\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
|
||||||
out=BIO_new(BIO_s_file());
|
|
||||||
if ((in == NULL) || (out == NULL))
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
|
||||||
{
|
|
||||||
perror(infile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
BIO_printf(bio_err,"read DSA key\n");
|
|
||||||
|
|
||||||
{
|
|
||||||
EVP_PKEY *pkey;
|
|
||||||
|
|
||||||
if (pubin)
|
|
||||||
pkey = load_pubkey(bio_err, infile, informat, 1,
|
|
||||||
passin, e, "Public Key");
|
|
||||||
else
|
|
||||||
pkey = load_key(bio_err, infile, informat, 1,
|
|
||||||
passin, e, "Private Key");
|
|
||||||
|
|
||||||
if (pkey)
|
|
||||||
{
|
|
||||||
dsa = EVP_PKEY_get1_DSA(pkey);
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if (dsa == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load Key\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (text)
|
|
||||||
if (!DSA_print(out,dsa,0))
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (modulus)
|
|
||||||
{
|
|
||||||
fprintf(stdout,"Public Key=");
|
|
||||||
BN_print(out,dsa->pub_key);
|
|
||||||
fprintf(stdout,"\n");
|
|
||||||
}
|
|
||||||
|
|
||||||
if (noout) goto end;
|
|
||||||
BIO_printf(bio_err,"writing DSA key\n");
|
|
||||||
if (outformat == FORMAT_ASN1) {
|
|
||||||
if(pubin || pubout) i=i2d_DSA_PUBKEY_bio(out,dsa);
|
|
||||||
else i=i2d_DSAPrivateKey_bio(out,dsa);
|
|
||||||
} else if (outformat == FORMAT_PEM) {
|
|
||||||
if(pubin || pubout)
|
|
||||||
i=PEM_write_bio_DSA_PUBKEY(out,dsa);
|
|
||||||
else i=PEM_write_bio_DSAPrivateKey(out,dsa,enc,
|
|
||||||
NULL,0,NULL, passout);
|
|
||||||
#if !defined(OPENSSL_NO_RSA) && !defined(OPENSSL_NO_RC4)
|
|
||||||
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
|
|
||||||
EVP_PKEY *pk;
|
|
||||||
pk = EVP_PKEY_new();
|
|
||||||
EVP_PKEY_set1_DSA(pk, dsa);
|
|
||||||
if (outformat == FORMAT_PVK)
|
|
||||||
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
|
|
||||||
else if (pubin || pubout)
|
|
||||||
i = i2b_PublicKey_bio(out, pk);
|
|
||||||
else
|
|
||||||
i = i2b_PrivateKey_bio(out, pk);
|
|
||||||
EVP_PKEY_free(pk);
|
|
||||||
#endif
|
|
||||||
} else {
|
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (i <= 0)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to write private key\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if(in != NULL) BIO_free(in);
|
|
||||||
if(out != NULL) BIO_free_all(out);
|
|
||||||
if(dsa != NULL) DSA_free(dsa);
|
|
||||||
if(passin) OPENSSL_free(passin);
|
|
||||||
if(passout) OPENSSL_free(passout);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
#else /* !OPENSSL_NO_DSA */
|
|
||||||
|
|
||||||
# if PEDANTIC
|
|
||||||
static void *dummy=&dummy;
|
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||||
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
out = BIO_new(BIO_s_file());
|
||||||
|
if (out == NULL) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
BIO_printf(bio_err, "read DSA key\n");
|
||||||
|
{
|
||||||
|
EVP_PKEY *pkey;
|
||||||
|
if (pubin)
|
||||||
|
pkey = load_pubkey(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "Public Key");
|
||||||
|
else
|
||||||
|
pkey = load_key(bio_err, infile, informat, 1,
|
||||||
|
passin, e, "Private Key");
|
||||||
|
|
||||||
|
if (pkey != NULL)
|
||||||
|
dsa = pkey == NULL ? NULL : EVP_PKEY_get1_DSA(pkey);
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
}
|
||||||
|
if (dsa == NULL) {
|
||||||
|
BIO_printf(bio_err, "unable to load Key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile == NULL) {
|
||||||
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
|
# ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (text)
|
||||||
|
if (!DSA_print(out, dsa, 0)) {
|
||||||
|
perror(outfile);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (modulus) {
|
||||||
|
fprintf(stdout, "Public Key=");
|
||||||
|
BN_print(out, dsa->pub_key);
|
||||||
|
fprintf(stdout, "\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
if (noout)
|
||||||
|
goto end;
|
||||||
|
BIO_printf(bio_err, "writing DSA key\n");
|
||||||
|
if (outformat == FORMAT_ASN1) {
|
||||||
|
if (pubin || pubout)
|
||||||
|
i = i2d_DSA_PUBKEY_bio(out, dsa);
|
||||||
|
else
|
||||||
|
i = i2d_DSAPrivateKey_bio(out, dsa);
|
||||||
|
} else if (outformat == FORMAT_PEM) {
|
||||||
|
if (pubin || pubout)
|
||||||
|
i = PEM_write_bio_DSA_PUBKEY(out, dsa);
|
||||||
|
else
|
||||||
|
i = PEM_write_bio_DSAPrivateKey(out, dsa, enc,
|
||||||
|
NULL, 0, NULL, passout);
|
||||||
|
} else {
|
||||||
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (!i) {
|
||||||
|
BIO_printf(bio_err, "unable to write private key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
} else
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (in != NULL)
|
||||||
|
BIO_free(in);
|
||||||
|
if (out != NULL)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (dsa != NULL)
|
||||||
|
DSA_free(dsa);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
741
apps/dsaparam.c
741
apps/dsaparam.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,41 +49,44 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
|
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
|
||||||
/* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
/*
|
||||||
* deprecated functions for openssl-internal code */
|
* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
||||||
|
* deprecated functions for openssl-internal code
|
||||||
|
*/
|
||||||
#ifdef OPENSSL_NO_DEPRECATED
|
#ifdef OPENSSL_NO_DEPRECATED
|
||||||
#undef OPENSSL_NO_DEPRECATED
|
# undef OPENSSL_NO_DEPRECATED
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
#include <assert.h>
|
# include <assert.h>
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <time.h>
|
# include <time.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/dsa.h>
|
# include <openssl/dsa.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG dsaparam_main
|
# define PROG dsaparam_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -noout
|
* -noout
|
||||||
* -text
|
* -text
|
||||||
* -C
|
* -C
|
||||||
@@ -94,400 +97,368 @@
|
|||||||
* #endif
|
* #endif
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#ifdef GENCB_TEST
|
# ifdef GENCB_TEST
|
||||||
|
|
||||||
static int stop_keygen_flag = 0;
|
static int stop_keygen_flag = 0;
|
||||||
|
|
||||||
static void timebomb_sigalarm(int foo)
|
static void timebomb_sigalarm(int foo)
|
||||||
{
|
{
|
||||||
stop_keygen_flag = 1;
|
stop_keygen_flag = 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb);
|
static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb);
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
DSA *dsa=NULL;
|
DSA *dsa = NULL;
|
||||||
int i,badops=0,text=0;
|
int i, badops = 0, text = 0;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat,outformat,noout=0,C=0,ret=1;
|
int informat, outformat, noout = 0, C = 0, ret = 1;
|
||||||
char *infile,*outfile,*prog,*inrand=NULL;
|
char *infile, *outfile, *prog, *inrand = NULL;
|
||||||
int numbits= -1,num,genkey=0;
|
int numbits = -1, num, genkey = 0;
|
||||||
int need_rand=0;
|
int need_rand = 0;
|
||||||
int non_fips_allow = 0;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
char *engine = NULL;
|
||||||
char *engine=NULL;
|
# endif
|
||||||
#endif
|
# ifdef GENCB_TEST
|
||||||
#ifdef GENCB_TEST
|
int timebomb = 0;
|
||||||
int timebomb=0;
|
# endif
|
||||||
#endif
|
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
infile=NULL;
|
infile = NULL;
|
||||||
outfile=NULL;
|
outfile = NULL;
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat=FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
prog=argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
informat = str2fmt(*(++argv));
|
||||||
informat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
goto bad;
|
||||||
{
|
outformat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
outfile = *(++argv);
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
}
|
||||||
{
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
if (--argc < 1) goto bad;
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
outfile= *(++argv);
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
engine = *(++argv);
|
||||||
else if(strcmp(*argv, "-engine") == 0)
|
}
|
||||||
{
|
# endif
|
||||||
if (--argc < 1) goto bad;
|
# ifdef GENCB_TEST
|
||||||
engine = *(++argv);
|
else if (strcmp(*argv, "-timebomb") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
#endif
|
goto bad;
|
||||||
#ifdef GENCB_TEST
|
timebomb = atoi(*(++argv));
|
||||||
else if(strcmp(*argv, "-timebomb") == 0)
|
}
|
||||||
{
|
# endif
|
||||||
if (--argc < 1) goto bad;
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
timebomb = atoi(*(++argv));
|
text = 1;
|
||||||
}
|
else if (strcmp(*argv, "-C") == 0)
|
||||||
#endif
|
C = 1;
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
else if (strcmp(*argv, "-genkey") == 0) {
|
||||||
text=1;
|
genkey = 1;
|
||||||
else if (strcmp(*argv,"-C") == 0)
|
need_rand = 1;
|
||||||
C=1;
|
} else if (strcmp(*argv, "-rand") == 0) {
|
||||||
else if (strcmp(*argv,"-genkey") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
genkey=1;
|
inrand = *(++argv);
|
||||||
need_rand=1;
|
need_rand = 1;
|
||||||
}
|
} else if (strcmp(*argv, "-noout") == 0)
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
noout = 1;
|
||||||
{
|
else if (sscanf(*argv, "%d", &num) == 1) {
|
||||||
if (--argc < 1) goto bad;
|
/* generate a key */
|
||||||
inrand= *(++argv);
|
numbits = num;
|
||||||
need_rand=1;
|
need_rand = 1;
|
||||||
}
|
} else {
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
noout=1;
|
badops = 1;
|
||||||
else if (strcmp(*argv,"-non-fips-allow") == 0)
|
break;
|
||||||
non_fips_allow = 1;
|
}
|
||||||
else if (sscanf(*argv,"%d",&num) == 1)
|
argc--;
|
||||||
{
|
argv++;
|
||||||
/* generate a key */
|
}
|
||||||
numbits=num;
|
|
||||||
need_rand=1;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] [bits] <infile >outfile\n", prog);
|
||||||
BIO_printf(bio_err,"%s [options] [bits] <infile >outfile\n",prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err,"where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - DER or PEM\n");
|
||||||
BIO_printf(bio_err," -inform arg input format - DER or PEM\n");
|
BIO_printf(bio_err, " -outform arg output format - DER or PEM\n");
|
||||||
BIO_printf(bio_err," -outform arg output format - DER or PEM\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
BIO_printf(bio_err, " -text print as text\n");
|
||||||
BIO_printf(bio_err," -text print as text\n");
|
BIO_printf(bio_err, " -C Output C code\n");
|
||||||
BIO_printf(bio_err," -C Output C code\n");
|
BIO_printf(bio_err, " -noout no output\n");
|
||||||
BIO_printf(bio_err," -noout no output\n");
|
BIO_printf(bio_err, " -genkey generate a DSA key\n");
|
||||||
BIO_printf(bio_err," -genkey generate a DSA key\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -rand files to use for random number input\n");
|
" -rand files to use for random number input\n");
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err,
|
||||||
#endif
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
#ifdef GENCB_TEST
|
# endif
|
||||||
BIO_printf(bio_err," -timebomb n interrupt keygen after <n> seconds\n");
|
# ifdef GENCB_TEST
|
||||||
#endif
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," number number of bits to use for generating private key\n");
|
" -timebomb n interrupt keygen after <n> seconds\n");
|
||||||
goto end;
|
# endif
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
|
" number number of bits to use for generating private key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
out=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (out == NULL))
|
if ((in == NULL) || (out == NULL)) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
if (infile == NULL)
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
else
|
else {
|
||||||
{
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
perror(infile);
|
||||||
{
|
goto end;
|
||||||
perror(infile);
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
if (outfile == NULL) {
|
||||||
}
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
if (outfile == NULL)
|
# ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
#ifdef OPENSSL_SYS_VMS
|
out = BIO_push(tmpbio, out);
|
||||||
{
|
}
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
# endif
|
||||||
out = BIO_push(tmpbio, out);
|
} else {
|
||||||
}
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
#endif
|
perror(outfile);
|
||||||
}
|
goto end;
|
||||||
else
|
}
|
||||||
{
|
}
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
if (need_rand)
|
if (need_rand) {
|
||||||
{
|
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
||||||
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
if (inrand != NULL)
|
||||||
if (inrand != NULL)
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
app_RAND_load_files(inrand));
|
||||||
app_RAND_load_files(inrand));
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (numbits > 0)
|
if (numbits > 0) {
|
||||||
{
|
BN_GENCB cb;
|
||||||
BN_GENCB cb;
|
BN_GENCB_set(&cb, dsa_cb, bio_err);
|
||||||
BN_GENCB_set(&cb, dsa_cb, bio_err);
|
assert(need_rand);
|
||||||
assert(need_rand);
|
dsa = DSA_new();
|
||||||
dsa = DSA_new();
|
if (!dsa) {
|
||||||
if(!dsa)
|
BIO_printf(bio_err, "Error allocating DSA object\n");
|
||||||
{
|
goto end;
|
||||||
BIO_printf(bio_err,"Error allocating DSA object\n");
|
}
|
||||||
goto end;
|
BIO_printf(bio_err, "Generating DSA parameters, %d bit long prime\n",
|
||||||
}
|
num);
|
||||||
if (non_fips_allow)
|
BIO_printf(bio_err, "This could take some time\n");
|
||||||
dsa->flags |= DSA_FLAG_NON_FIPS_ALLOW;
|
# ifdef GENCB_TEST
|
||||||
BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
|
if (timebomb > 0) {
|
||||||
BIO_printf(bio_err,"This could take some time\n");
|
struct sigaction act;
|
||||||
#ifdef GENCB_TEST
|
act.sa_handler = timebomb_sigalarm;
|
||||||
if(timebomb > 0)
|
act.sa_flags = 0;
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
struct sigaction act;
|
"(though I'll stop it if not done within %d secs)\n",
|
||||||
act.sa_handler = timebomb_sigalarm;
|
timebomb);
|
||||||
act.sa_flags = 0;
|
if (sigaction(SIGALRM, &act, NULL) != 0) {
|
||||||
BIO_printf(bio_err,"(though I'll stop it if not done within %d secs)\n",
|
BIO_printf(bio_err, "Error, couldn't set SIGALRM handler\n");
|
||||||
timebomb);
|
goto end;
|
||||||
if(sigaction(SIGALRM, &act, NULL) != 0)
|
}
|
||||||
{
|
alarm(timebomb);
|
||||||
BIO_printf(bio_err,"Error, couldn't set SIGALRM handler\n");
|
}
|
||||||
goto end;
|
# endif
|
||||||
}
|
if (!DSA_generate_parameters_ex(dsa, num, NULL, 0, NULL, NULL, &cb)) {
|
||||||
alarm(timebomb);
|
# ifdef GENCB_TEST
|
||||||
}
|
if (stop_keygen_flag) {
|
||||||
#endif
|
BIO_printf(bio_err, "DSA key generation time-stopped\n");
|
||||||
if(!DSA_generate_parameters_ex(dsa,num,NULL,0,NULL,NULL, &cb))
|
/* This is an asked-for behaviour! */
|
||||||
{
|
ret = 0;
|
||||||
#ifdef GENCB_TEST
|
goto end;
|
||||||
if(stop_keygen_flag)
|
}
|
||||||
{
|
# endif
|
||||||
BIO_printf(bio_err,"DSA key generation time-stopped\n");
|
BIO_printf(bio_err, "Error, DSA key generation failed\n");
|
||||||
/* This is an asked-for behaviour! */
|
goto end;
|
||||||
ret = 0;
|
}
|
||||||
goto end;
|
} else if (informat == FORMAT_ASN1)
|
||||||
}
|
dsa = d2i_DSAparams_bio(in, NULL);
|
||||||
#endif
|
else if (informat == FORMAT_PEM)
|
||||||
ERR_print_errors(bio_err);
|
dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL);
|
||||||
BIO_printf(bio_err,"Error, DSA key generation failed\n");
|
else {
|
||||||
goto end;
|
BIO_printf(bio_err, "bad input format specified\n");
|
||||||
}
|
goto end;
|
||||||
}
|
}
|
||||||
else if (informat == FORMAT_ASN1)
|
if (dsa == NULL) {
|
||||||
dsa=d2i_DSAparams_bio(in,NULL);
|
BIO_printf(bio_err, "unable to load DSA parameters\n");
|
||||||
else if (informat == FORMAT_PEM)
|
ERR_print_errors(bio_err);
|
||||||
dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL);
|
goto end;
|
||||||
else
|
}
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"bad input format specified\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (dsa == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load DSA parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (text)
|
if (text) {
|
||||||
{
|
DSAparams_print(out, dsa);
|
||||||
DSAparams_print(out,dsa);
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (C)
|
|
||||||
{
|
|
||||||
unsigned char *data;
|
|
||||||
int l,len,bits_p;
|
|
||||||
|
|
||||||
len=BN_num_bytes(dsa->p);
|
if (C) {
|
||||||
bits_p=BN_num_bits(dsa->p);
|
unsigned char *data;
|
||||||
data=(unsigned char *)OPENSSL_malloc(len+20);
|
int l, len, bits_p;
|
||||||
if (data == NULL)
|
|
||||||
{
|
|
||||||
perror("OPENSSL_malloc");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
l=BN_bn2bin(dsa->p,data);
|
|
||||||
printf("static unsigned char dsa%d_p[]={",bits_p);
|
|
||||||
for (i=0; i<l; i++)
|
|
||||||
{
|
|
||||||
if ((i%12) == 0) printf("\n\t");
|
|
||||||
printf("0x%02X,",data[i]);
|
|
||||||
}
|
|
||||||
printf("\n\t};\n");
|
|
||||||
|
|
||||||
l=BN_bn2bin(dsa->q,data);
|
len = BN_num_bytes(dsa->p);
|
||||||
printf("static unsigned char dsa%d_q[]={",bits_p);
|
bits_p = BN_num_bits(dsa->p);
|
||||||
for (i=0; i<l; i++)
|
data = (unsigned char *)OPENSSL_malloc(len + 20);
|
||||||
{
|
if (data == NULL) {
|
||||||
if ((i%12) == 0) printf("\n\t");
|
perror("OPENSSL_malloc");
|
||||||
printf("0x%02X,",data[i]);
|
goto end;
|
||||||
}
|
}
|
||||||
printf("\n\t};\n");
|
l = BN_bn2bin(dsa->p, data);
|
||||||
|
printf("static unsigned char dsa%d_p[]={", bits_p);
|
||||||
|
for (i = 0; i < l; i++) {
|
||||||
|
if ((i % 12) == 0)
|
||||||
|
printf("\n\t");
|
||||||
|
printf("0x%02X,", data[i]);
|
||||||
|
}
|
||||||
|
printf("\n\t};\n");
|
||||||
|
|
||||||
l=BN_bn2bin(dsa->g,data);
|
l = BN_bn2bin(dsa->q, data);
|
||||||
printf("static unsigned char dsa%d_g[]={",bits_p);
|
printf("static unsigned char dsa%d_q[]={", bits_p);
|
||||||
for (i=0; i<l; i++)
|
for (i = 0; i < l; i++) {
|
||||||
{
|
if ((i % 12) == 0)
|
||||||
if ((i%12) == 0) printf("\n\t");
|
printf("\n\t");
|
||||||
printf("0x%02X,",data[i]);
|
printf("0x%02X,", data[i]);
|
||||||
}
|
}
|
||||||
printf("\n\t};\n\n");
|
printf("\n\t};\n");
|
||||||
|
|
||||||
printf("DSA *get_dsa%d()\n\t{\n",bits_p);
|
l = BN_bn2bin(dsa->g, data);
|
||||||
printf("\tDSA *dsa;\n\n");
|
printf("static unsigned char dsa%d_g[]={", bits_p);
|
||||||
printf("\tif ((dsa=DSA_new()) == NULL) return(NULL);\n");
|
for (i = 0; i < l; i++) {
|
||||||
printf("\tdsa->p=BN_bin2bn(dsa%d_p,sizeof(dsa%d_p),NULL);\n",
|
if ((i % 12) == 0)
|
||||||
bits_p,bits_p);
|
printf("\n\t");
|
||||||
printf("\tdsa->q=BN_bin2bn(dsa%d_q,sizeof(dsa%d_q),NULL);\n",
|
printf("0x%02X,", data[i]);
|
||||||
bits_p,bits_p);
|
}
|
||||||
printf("\tdsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);\n",
|
printf("\n\t};\n\n");
|
||||||
bits_p,bits_p);
|
|
||||||
printf("\tif ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))\n");
|
|
||||||
printf("\t\t{ DSA_free(dsa); return(NULL); }\n");
|
|
||||||
printf("\treturn(dsa);\n\t}\n");
|
|
||||||
}
|
|
||||||
|
|
||||||
|
printf("DSA *get_dsa%d()\n\t{\n", bits_p);
|
||||||
|
printf("\tDSA *dsa;\n\n");
|
||||||
|
printf("\tif ((dsa=DSA_new()) == NULL) return(NULL);\n");
|
||||||
|
printf("\tdsa->p=BN_bin2bn(dsa%d_p,sizeof(dsa%d_p),NULL);\n",
|
||||||
|
bits_p, bits_p);
|
||||||
|
printf("\tdsa->q=BN_bin2bn(dsa%d_q,sizeof(dsa%d_q),NULL);\n",
|
||||||
|
bits_p, bits_p);
|
||||||
|
printf("\tdsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);\n",
|
||||||
|
bits_p, bits_p);
|
||||||
|
printf
|
||||||
|
("\tif ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))\n");
|
||||||
|
printf("\t\t{ DSA_free(dsa); return(NULL); }\n");
|
||||||
|
printf("\treturn(dsa);\n\t}\n");
|
||||||
|
}
|
||||||
|
|
||||||
if (!noout)
|
if (!noout) {
|
||||||
{
|
if (outformat == FORMAT_ASN1)
|
||||||
if (outformat == FORMAT_ASN1)
|
i = i2d_DSAparams_bio(out, dsa);
|
||||||
i=i2d_DSAparams_bio(out,dsa);
|
else if (outformat == FORMAT_PEM)
|
||||||
else if (outformat == FORMAT_PEM)
|
i = PEM_write_bio_DSAparams(out, dsa);
|
||||||
i=PEM_write_bio_DSAparams(out,dsa);
|
else {
|
||||||
else {
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
if (!i) {
|
||||||
if (!i)
|
BIO_printf(bio_err, "unable to write DSA parameters\n");
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
BIO_printf(bio_err,"unable to write DSA parameters\n");
|
goto end;
|
||||||
ERR_print_errors(bio_err);
|
}
|
||||||
goto end;
|
}
|
||||||
}
|
if (genkey) {
|
||||||
}
|
DSA *dsakey;
|
||||||
if (genkey)
|
|
||||||
{
|
|
||||||
DSA *dsakey;
|
|
||||||
|
|
||||||
assert(need_rand);
|
assert(need_rand);
|
||||||
if ((dsakey=DSAparams_dup(dsa)) == NULL) goto end;
|
if ((dsakey = DSAparams_dup(dsa)) == NULL)
|
||||||
if (non_fips_allow)
|
goto end;
|
||||||
dsakey->flags |= DSA_FLAG_NON_FIPS_ALLOW;
|
if (!DSA_generate_key(dsakey))
|
||||||
if (!DSA_generate_key(dsakey))
|
goto end;
|
||||||
{
|
if (outformat == FORMAT_ASN1)
|
||||||
ERR_print_errors(bio_err);
|
i = i2d_DSAPrivateKey_bio(out, dsakey);
|
||||||
DSA_free(dsakey);
|
else if (outformat == FORMAT_PEM)
|
||||||
goto end;
|
i = PEM_write_bio_DSAPrivateKey(out, dsakey, NULL, NULL, 0, NULL,
|
||||||
}
|
NULL);
|
||||||
if (outformat == FORMAT_ASN1)
|
else {
|
||||||
i=i2d_DSAPrivateKey_bio(out,dsakey);
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
else if (outformat == FORMAT_PEM)
|
goto end;
|
||||||
i=PEM_write_bio_DSAPrivateKey(out,dsakey,NULL,NULL,0,NULL,NULL);
|
}
|
||||||
else {
|
DSA_free(dsakey);
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
}
|
||||||
DSA_free(dsakey);
|
if (need_rand)
|
||||||
goto end;
|
app_RAND_write_file(NULL, bio_err);
|
||||||
}
|
ret = 0;
|
||||||
DSA_free(dsakey);
|
end:
|
||||||
}
|
if (in != NULL)
|
||||||
if (need_rand)
|
BIO_free(in);
|
||||||
app_RAND_write_file(NULL, bio_err);
|
if (out != NULL)
|
||||||
ret=0;
|
BIO_free_all(out);
|
||||||
end:
|
if (dsa != NULL)
|
||||||
if (in != NULL) BIO_free(in);
|
DSA_free(dsa);
|
||||||
if (out != NULL) BIO_free_all(out);
|
apps_shutdown();
|
||||||
if (dsa != NULL) DSA_free(dsa);
|
OPENSSL_EXIT(ret);
|
||||||
apps_shutdown();
|
}
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb)
|
static int MS_CALLBACK dsa_cb(int p, int n, BN_GENCB *cb)
|
||||||
{
|
{
|
||||||
char c='*';
|
char c = '*';
|
||||||
|
|
||||||
if (p == 0) c='.';
|
if (p == 0)
|
||||||
if (p == 1) c='+';
|
c = '.';
|
||||||
if (p == 2) c='*';
|
if (p == 1)
|
||||||
if (p == 3) c='\n';
|
c = '+';
|
||||||
BIO_write(cb->arg,&c,1);
|
if (p == 2)
|
||||||
(void)BIO_flush(cb->arg);
|
c = '*';
|
||||||
#ifdef LINT
|
if (p == 3)
|
||||||
p=n;
|
c = '\n';
|
||||||
#endif
|
BIO_write(cb->arg, &c, 1);
|
||||||
#ifdef GENCB_TEST
|
(void)BIO_flush(cb->arg);
|
||||||
if(stop_keygen_flag)
|
# ifdef LINT
|
||||||
return 0;
|
p = n;
|
||||||
#endif
|
# endif
|
||||||
return 1;
|
# ifdef GENCB_TEST
|
||||||
}
|
if (stop_keygen_flag)
|
||||||
#else /* !OPENSSL_NO_DSA */
|
return 0;
|
||||||
|
# endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
# if PEDANTIC
|
# if PEDANTIC
|
||||||
static void *dummy=&dummy;
|
static void *dummy = &dummy;
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
593
apps/ec.c
593
apps/ec.c
@@ -10,7 +10,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -58,19 +58,20 @@
|
|||||||
|
|
||||||
#include <openssl/opensslconf.h>
|
#include <openssl/opensslconf.h>
|
||||||
#ifndef OPENSSL_NO_EC
|
#ifndef OPENSSL_NO_EC
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/evp.h>
|
# include <openssl/evp.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG ec_main
|
# define PROG ec_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
@@ -85,322 +86,274 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int ret = 1;
|
int ret = 1;
|
||||||
EC_KEY *eckey = NULL;
|
EC_KEY *eckey = NULL;
|
||||||
const EC_GROUP *group;
|
const EC_GROUP *group;
|
||||||
int i, badops = 0;
|
int i, badops = 0;
|
||||||
const EVP_CIPHER *enc = NULL;
|
const EVP_CIPHER *enc = NULL;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat, outformat, text=0, noout=0;
|
int informat, outformat, text = 0, noout = 0;
|
||||||
int pubin = 0, pubout = 0, param_out = 0;
|
int pubin = 0, pubout = 0, param_out = 0;
|
||||||
char *infile, *outfile, *prog, *engine;
|
char *infile, *outfile, *prog, *engine;
|
||||||
char *passargin = NULL, *passargout = NULL;
|
char *passargin = NULL, *passargout = NULL;
|
||||||
char *passin = NULL, *passout = NULL;
|
char *passin = NULL, *passout = NULL;
|
||||||
point_conversion_form_t form = POINT_CONVERSION_UNCOMPRESSED;
|
point_conversion_form_t form = POINT_CONVERSION_UNCOMPRESSED;
|
||||||
int new_form = 0;
|
int new_form = 0;
|
||||||
int asn1_flag = OPENSSL_EC_NAMED_CURVE;
|
int asn1_flag = OPENSSL_EC_NAMED_CURVE;
|
||||||
int new_asn1_flag = 0;
|
int new_asn1_flag = 0;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
engine = NULL;
|
engine = NULL;
|
||||||
infile = NULL;
|
infile = NULL;
|
||||||
outfile = NULL;
|
outfile = NULL;
|
||||||
informat = FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat = FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
prog = argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
informat = str2fmt(*(++argv));
|
||||||
informat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
goto bad;
|
||||||
{
|
outformat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
outfile = *(++argv);
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
} else if (strcmp(*argv, "-passin") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
outfile= *(++argv);
|
passargin = *(++argv);
|
||||||
}
|
} else if (strcmp(*argv, "-passout") == 0) {
|
||||||
else if (strcmp(*argv,"-passin") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
passargout = *(++argv);
|
||||||
passargin= *(++argv);
|
} else if (strcmp(*argv, "-engine") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-passout") == 0)
|
goto bad;
|
||||||
{
|
engine = *(++argv);
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-noout") == 0)
|
||||||
passargout= *(++argv);
|
noout = 1;
|
||||||
}
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
else if (strcmp(*argv, "-engine") == 0)
|
text = 1;
|
||||||
{
|
else if (strcmp(*argv, "-conv_form") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
engine= *(++argv);
|
goto bad;
|
||||||
}
|
++argv;
|
||||||
else if (strcmp(*argv, "-noout") == 0)
|
new_form = 1;
|
||||||
noout = 1;
|
if (strcmp(*argv, "compressed") == 0)
|
||||||
else if (strcmp(*argv, "-text") == 0)
|
form = POINT_CONVERSION_COMPRESSED;
|
||||||
text = 1;
|
else if (strcmp(*argv, "uncompressed") == 0)
|
||||||
else if (strcmp(*argv, "-conv_form") == 0)
|
form = POINT_CONVERSION_UNCOMPRESSED;
|
||||||
{
|
else if (strcmp(*argv, "hybrid") == 0)
|
||||||
if (--argc < 1)
|
form = POINT_CONVERSION_HYBRID;
|
||||||
goto bad;
|
else
|
||||||
++argv;
|
goto bad;
|
||||||
new_form = 1;
|
} else if (strcmp(*argv, "-param_enc") == 0) {
|
||||||
if (strcmp(*argv, "compressed") == 0)
|
if (--argc < 1)
|
||||||
form = POINT_CONVERSION_COMPRESSED;
|
goto bad;
|
||||||
else if (strcmp(*argv, "uncompressed") == 0)
|
++argv;
|
||||||
form = POINT_CONVERSION_UNCOMPRESSED;
|
new_asn1_flag = 1;
|
||||||
else if (strcmp(*argv, "hybrid") == 0)
|
if (strcmp(*argv, "named_curve") == 0)
|
||||||
form = POINT_CONVERSION_HYBRID;
|
asn1_flag = OPENSSL_EC_NAMED_CURVE;
|
||||||
else
|
else if (strcmp(*argv, "explicit") == 0)
|
||||||
goto bad;
|
asn1_flag = 0;
|
||||||
}
|
else
|
||||||
else if (strcmp(*argv, "-param_enc") == 0)
|
goto bad;
|
||||||
{
|
} else if (strcmp(*argv, "-param_out") == 0)
|
||||||
if (--argc < 1)
|
param_out = 1;
|
||||||
goto bad;
|
else if (strcmp(*argv, "-pubin") == 0)
|
||||||
++argv;
|
pubin = 1;
|
||||||
new_asn1_flag = 1;
|
else if (strcmp(*argv, "-pubout") == 0)
|
||||||
if (strcmp(*argv, "named_curve") == 0)
|
pubout = 1;
|
||||||
asn1_flag = OPENSSL_EC_NAMED_CURVE;
|
else if ((enc = EVP_get_cipherbyname(&(argv[0][1]))) == NULL) {
|
||||||
else if (strcmp(*argv, "explicit") == 0)
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
asn1_flag = 0;
|
badops = 1;
|
||||||
else
|
break;
|
||||||
goto bad;
|
}
|
||||||
}
|
argc--;
|
||||||
else if (strcmp(*argv, "-param_out") == 0)
|
argv++;
|
||||||
param_out = 1;
|
}
|
||||||
else if (strcmp(*argv, "-pubin") == 0)
|
|
||||||
pubin=1;
|
|
||||||
else if (strcmp(*argv, "-pubout") == 0)
|
|
||||||
pubout=1;
|
|
||||||
else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err, "where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - "
|
||||||
BIO_printf(bio_err, " -inform arg input format - "
|
"DER or PEM\n");
|
||||||
"DER or PEM\n");
|
BIO_printf(bio_err, " -outform arg output format - "
|
||||||
BIO_printf(bio_err, " -outform arg output format - "
|
"DER or PEM\n");
|
||||||
"DER or PEM\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err, " -in arg input file\n");
|
BIO_printf(bio_err, " -passin arg input file pass "
|
||||||
BIO_printf(bio_err, " -passin arg input file pass "
|
"phrase source\n");
|
||||||
"phrase source\n");
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
BIO_printf(bio_err, " -out arg output file\n");
|
BIO_printf(bio_err, " -passout arg output file pass "
|
||||||
BIO_printf(bio_err, " -passout arg output file pass "
|
"phrase source\n");
|
||||||
"phrase source\n");
|
BIO_printf(bio_err, " -engine e use engine e, "
|
||||||
BIO_printf(bio_err, " -engine e use engine e, "
|
"possibly a hardware device.\n");
|
||||||
"possibly a hardware device.\n");
|
BIO_printf(bio_err, " -des encrypt PEM output, "
|
||||||
BIO_printf(bio_err, " -des encrypt PEM output, "
|
"instead of 'des' every other \n"
|
||||||
"instead of 'des' every other \n"
|
" cipher "
|
||||||
" cipher "
|
"supported by OpenSSL can be used\n");
|
||||||
"supported by OpenSSL can be used\n");
|
BIO_printf(bio_err, " -text print the key\n");
|
||||||
BIO_printf(bio_err, " -text print the key\n");
|
BIO_printf(bio_err, " -noout don't print key out\n");
|
||||||
BIO_printf(bio_err, " -noout don't print key out\n");
|
BIO_printf(bio_err, " -param_out print the elliptic "
|
||||||
BIO_printf(bio_err, " -param_out print the elliptic "
|
"curve parameters\n");
|
||||||
"curve parameters\n");
|
BIO_printf(bio_err, " -conv_form arg specifies the "
|
||||||
BIO_printf(bio_err, " -conv_form arg specifies the "
|
"point conversion form \n");
|
||||||
"point conversion form \n");
|
BIO_printf(bio_err, " possible values:"
|
||||||
BIO_printf(bio_err, " possible values:"
|
" compressed\n");
|
||||||
" compressed\n");
|
BIO_printf(bio_err, " "
|
||||||
BIO_printf(bio_err, " "
|
" uncompressed (default)\n");
|
||||||
" uncompressed (default)\n");
|
BIO_printf(bio_err, " " " hybrid\n");
|
||||||
BIO_printf(bio_err, " "
|
BIO_printf(bio_err, " -param_enc arg specifies the way"
|
||||||
" hybrid\n");
|
" the ec parameters are encoded\n");
|
||||||
BIO_printf(bio_err, " -param_enc arg specifies the way"
|
BIO_printf(bio_err, " in the asn1 der " "encoding\n");
|
||||||
" the ec parameters are encoded\n");
|
BIO_printf(bio_err, " possible values:"
|
||||||
BIO_printf(bio_err, " in the asn1 der "
|
" named_curve (default)\n");
|
||||||
"encoding\n");
|
BIO_printf(bio_err, " "
|
||||||
BIO_printf(bio_err, " possible values:"
|
"explicit\n");
|
||||||
" named_curve (default)\n");
|
goto end;
|
||||||
BIO_printf(bio_err," "
|
}
|
||||||
"explicit\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
|
||||||
|
|
||||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
in = BIO_new(BIO_s_file());
|
|
||||||
out = BIO_new(BIO_s_file());
|
|
||||||
if ((in == NULL) || (out == NULL))
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (infile == NULL)
|
|
||||||
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_read_filename(in, infile) <= 0)
|
|
||||||
{
|
|
||||||
perror(infile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
BIO_printf(bio_err, "read EC key\n");
|
|
||||||
if (informat == FORMAT_ASN1)
|
|
||||||
{
|
|
||||||
if (pubin)
|
|
||||||
eckey = d2i_EC_PUBKEY_bio(in, NULL);
|
|
||||||
else
|
|
||||||
eckey = d2i_ECPrivateKey_bio(in, NULL);
|
|
||||||
}
|
|
||||||
else if (informat == FORMAT_PEM)
|
|
||||||
{
|
|
||||||
if (pubin)
|
|
||||||
eckey = PEM_read_bio_EC_PUBKEY(in, NULL, NULL,
|
|
||||||
NULL);
|
|
||||||
else
|
|
||||||
eckey = PEM_read_bio_ECPrivateKey(in, NULL, NULL,
|
|
||||||
passin);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "bad input format specified for key\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (eckey == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load Key\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out, outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
group = EC_KEY_get0_group(eckey);
|
|
||||||
|
|
||||||
if (new_form)
|
|
||||||
EC_KEY_set_conv_form(eckey, form);
|
|
||||||
|
|
||||||
if (new_asn1_flag)
|
|
||||||
EC_KEY_set_asn1_flag(eckey, asn1_flag);
|
|
||||||
|
|
||||||
if (text)
|
|
||||||
if (!EC_KEY_print(out, eckey, 0))
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (noout)
|
|
||||||
{
|
|
||||||
ret = 0;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
BIO_printf(bio_err, "writing EC key\n");
|
|
||||||
if (outformat == FORMAT_ASN1)
|
|
||||||
{
|
|
||||||
if (param_out)
|
|
||||||
i = i2d_ECPKParameters_bio(out, group);
|
|
||||||
else if (pubin || pubout)
|
|
||||||
i = i2d_EC_PUBKEY_bio(out, eckey);
|
|
||||||
else
|
|
||||||
i = i2d_ECPrivateKey_bio(out, eckey);
|
|
||||||
}
|
|
||||||
else if (outformat == FORMAT_PEM)
|
|
||||||
{
|
|
||||||
if (param_out)
|
|
||||||
i = PEM_write_bio_ECPKParameters(out, group);
|
|
||||||
else if (pubin || pubout)
|
|
||||||
i = PEM_write_bio_EC_PUBKEY(out, eckey);
|
|
||||||
else
|
|
||||||
i = PEM_write_bio_ECPrivateKey(out, eckey, enc,
|
|
||||||
NULL, 0, NULL, passout);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "bad output format specified for "
|
|
||||||
"outfile\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!i)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "unable to write private key\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if (in)
|
|
||||||
BIO_free(in);
|
|
||||||
if (out)
|
|
||||||
BIO_free_all(out);
|
|
||||||
if (eckey)
|
|
||||||
EC_KEY_free(eckey);
|
|
||||||
if (passin)
|
|
||||||
OPENSSL_free(passin);
|
|
||||||
if (passout)
|
|
||||||
OPENSSL_free(passout);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
#else /* !OPENSSL_NO_EC */
|
|
||||||
|
|
||||||
# if PEDANTIC
|
|
||||||
static void *dummy=&dummy;
|
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||||
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
in = BIO_new(BIO_s_file());
|
||||||
|
out = BIO_new(BIO_s_file());
|
||||||
|
if ((in == NULL) || (out == NULL)) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (infile == NULL)
|
||||||
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
|
else {
|
||||||
|
if (BIO_read_filename(in, infile) <= 0) {
|
||||||
|
perror(infile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
BIO_printf(bio_err, "read EC key\n");
|
||||||
|
if (informat == FORMAT_ASN1) {
|
||||||
|
if (pubin)
|
||||||
|
eckey = d2i_EC_PUBKEY_bio(in, NULL);
|
||||||
|
else
|
||||||
|
eckey = d2i_ECPrivateKey_bio(in, NULL);
|
||||||
|
} else if (informat == FORMAT_PEM) {
|
||||||
|
if (pubin)
|
||||||
|
eckey = PEM_read_bio_EC_PUBKEY(in, NULL, NULL, NULL);
|
||||||
|
else
|
||||||
|
eckey = PEM_read_bio_ECPrivateKey(in, NULL, NULL, passin);
|
||||||
|
} else {
|
||||||
|
BIO_printf(bio_err, "bad input format specified for key\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
if (eckey == NULL) {
|
||||||
|
BIO_printf(bio_err, "unable to load Key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile == NULL) {
|
||||||
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
|
# ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
group = EC_KEY_get0_group(eckey);
|
||||||
|
|
||||||
|
if (new_form)
|
||||||
|
EC_KEY_set_conv_form(eckey, form);
|
||||||
|
|
||||||
|
if (new_asn1_flag)
|
||||||
|
EC_KEY_set_asn1_flag(eckey, asn1_flag);
|
||||||
|
|
||||||
|
if (text)
|
||||||
|
if (!EC_KEY_print(out, eckey, 0)) {
|
||||||
|
perror(outfile);
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (noout) {
|
||||||
|
ret = 0;
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
BIO_printf(bio_err, "writing EC key\n");
|
||||||
|
if (outformat == FORMAT_ASN1) {
|
||||||
|
if (param_out)
|
||||||
|
i = i2d_ECPKParameters_bio(out, group);
|
||||||
|
else if (pubin || pubout)
|
||||||
|
i = i2d_EC_PUBKEY_bio(out, eckey);
|
||||||
|
else
|
||||||
|
i = i2d_ECPrivateKey_bio(out, eckey);
|
||||||
|
} else if (outformat == FORMAT_PEM) {
|
||||||
|
if (param_out)
|
||||||
|
i = PEM_write_bio_ECPKParameters(out, group);
|
||||||
|
else if (pubin || pubout)
|
||||||
|
i = PEM_write_bio_EC_PUBKEY(out, eckey);
|
||||||
|
else
|
||||||
|
i = PEM_write_bio_ECPrivateKey(out, eckey, enc,
|
||||||
|
NULL, 0, NULL, passout);
|
||||||
|
} else {
|
||||||
|
BIO_printf(bio_err, "bad output format specified for " "outfile\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!i) {
|
||||||
|
BIO_printf(bio_err, "unable to write private key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
} else
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (in)
|
||||||
|
BIO_free(in);
|
||||||
|
if (out)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (eckey)
|
||||||
|
EC_KEY_free(eckey);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
1082
apps/ecparam.c
1082
apps/ecparam.c
File diff suppressed because it is too large
Load Diff
1120
apps/enc.c
1120
apps/enc.c
File diff suppressed because it is too large
Load Diff
845
apps/engine.c
845
apps/engine.c
@@ -1,6 +1,7 @@
|
|||||||
/* apps/engine.c -*- mode: C; c-file-style: "eay" -*- */
|
/* apps/engine.c -*- mode: C; c-file-style: "eay" -*- */
|
||||||
/* Written by Richard Levitte <richard@levitte.org> for the OpenSSL
|
/*
|
||||||
* project 2000.
|
* Written by Richard Levitte <richard@levitte.org> for the OpenSSL project
|
||||||
|
* 2000.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 2000 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 2000 The OpenSSL Project. All rights reserved.
|
||||||
@@ -10,7 +11,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -56,494 +57,454 @@
|
|||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#ifdef OPENSSL_NO_STDIO
|
#ifdef OPENSSL_NO_STDIO
|
||||||
#define APPS_WIN16
|
# define APPS_WIN16
|
||||||
#endif
|
#endif
|
||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/err.h>
|
#include <openssl/err.h>
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
#include <openssl/engine.h>
|
# include <openssl/engine.h>
|
||||||
#include <openssl/ssl.h>
|
# include <openssl/ssl.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG engine_main
|
# define PROG engine_main
|
||||||
|
|
||||||
static const char *engine_usage[]={
|
static const char *engine_usage[] = {
|
||||||
"usage: engine opts [engine ...]\n",
|
"usage: engine opts [engine ...]\n",
|
||||||
" -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands'\n",
|
" -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands'\n",
|
||||||
" -vv will additionally display each command's description\n",
|
" -vv will additionally display each command's description\n",
|
||||||
" -vvv will also add the input flags for each command\n",
|
" -vvv will also add the input flags for each command\n",
|
||||||
" -vvvv will also show internal input flags\n",
|
" -vvvv will also show internal input flags\n",
|
||||||
" -c - for each engine, also list the capabilities\n",
|
" -c - for each engine, also list the capabilities\n",
|
||||||
" -t[t] - for each engine, check that they are really available\n",
|
" -t[t] - for each engine, check that they are really available\n",
|
||||||
" -tt will display error trace for unavailable engines\n",
|
" -tt will display error trace for unavailable engines\n",
|
||||||
" -pre <cmd> - runs command 'cmd' against the ENGINE before any attempts\n",
|
" -pre <cmd> - runs command 'cmd' against the ENGINE before any attempts\n",
|
||||||
" to load it (if -t is used)\n",
|
" to load it (if -t is used)\n",
|
||||||
" -post <cmd> - runs command 'cmd' against the ENGINE after loading it\n",
|
" -post <cmd> - runs command 'cmd' against the ENGINE after loading it\n",
|
||||||
" (only used if -t is also provided)\n",
|
" (only used if -t is also provided)\n",
|
||||||
" NB: -pre and -post will be applied to all ENGINEs supplied on the command\n",
|
" NB: -pre and -post will be applied to all ENGINEs supplied on the command\n",
|
||||||
" line, or all supported ENGINEs if none are specified.\n",
|
" line, or all supported ENGINEs if none are specified.\n",
|
||||||
" Eg. '-pre \"SO_PATH:/lib/libdriver.so\"' calls command \"SO_PATH\" with\n",
|
" Eg. '-pre \"SO_PATH:/lib/libdriver.so\"' calls command \"SO_PATH\" with\n",
|
||||||
" argument \"/lib/libdriver.so\".\n",
|
" argument \"/lib/libdriver.so\".\n",
|
||||||
NULL
|
NULL
|
||||||
};
|
};
|
||||||
|
|
||||||
static void identity(char *ptr)
|
static void identity(void *ptr)
|
||||||
{
|
{
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int append_buf(char **buf, const char *s, int *size, int step)
|
static int append_buf(char **buf, const char *s, int *size, int step)
|
||||||
{
|
{
|
||||||
int l = strlen(s);
|
int l = strlen(s);
|
||||||
|
|
||||||
if (*buf == NULL)
|
if (*buf == NULL) {
|
||||||
{
|
*size = step;
|
||||||
*size = step;
|
*buf = OPENSSL_malloc(*size);
|
||||||
*buf = OPENSSL_malloc(*size);
|
if (*buf == NULL)
|
||||||
if (*buf == NULL)
|
return 0;
|
||||||
return 0;
|
**buf = '\0';
|
||||||
**buf = '\0';
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (**buf != '\0')
|
if (**buf != '\0')
|
||||||
l += 2; /* ", " */
|
l += 2; /* ", " */
|
||||||
|
|
||||||
if (strlen(*buf) + strlen(s) >= (unsigned int)*size)
|
if (strlen(*buf) + strlen(s) >= (unsigned int)*size) {
|
||||||
{
|
*size += step;
|
||||||
*size += step;
|
*buf = OPENSSL_realloc(*buf, *size);
|
||||||
*buf = OPENSSL_realloc(*buf, *size);
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (*buf == NULL)
|
if (*buf == NULL)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
if (**buf != '\0')
|
if (**buf != '\0')
|
||||||
BUF_strlcat(*buf, ", ", *size);
|
BUF_strlcat(*buf, ", ", *size);
|
||||||
BUF_strlcat(*buf, s, *size);
|
BUF_strlcat(*buf, s, *size);
|
||||||
|
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int util_flags(BIO *bio_out, unsigned int flags, const char *indent)
|
static int util_flags(BIO *bio_out, unsigned int flags, const char *indent)
|
||||||
{
|
{
|
||||||
int started = 0, err = 0;
|
int started = 0, err = 0;
|
||||||
/* Indent before displaying input flags */
|
/* Indent before displaying input flags */
|
||||||
BIO_printf(bio_out, "%s%s(input flags): ", indent, indent);
|
BIO_printf(bio_out, "%s%s(input flags): ", indent, indent);
|
||||||
if(flags == 0)
|
if (flags == 0) {
|
||||||
{
|
BIO_printf(bio_out, "<no flags>\n");
|
||||||
BIO_printf(bio_out, "<no flags>\n");
|
return 1;
|
||||||
return 1;
|
}
|
||||||
}
|
/*
|
||||||
/* If the object is internal, mark it in a way that shows instead of
|
* If the object is internal, mark it in a way that shows instead of
|
||||||
* having it part of all the other flags, even if it really is. */
|
* having it part of all the other flags, even if it really is.
|
||||||
if(flags & ENGINE_CMD_FLAG_INTERNAL)
|
*/
|
||||||
{
|
if (flags & ENGINE_CMD_FLAG_INTERNAL) {
|
||||||
BIO_printf(bio_out, "[Internal] ");
|
BIO_printf(bio_out, "[Internal] ");
|
||||||
}
|
}
|
||||||
|
|
||||||
if(flags & ENGINE_CMD_FLAG_NUMERIC)
|
if (flags & ENGINE_CMD_FLAG_NUMERIC) {
|
||||||
{
|
if (started) {
|
||||||
BIO_printf(bio_out, "NUMERIC");
|
BIO_printf(bio_out, "|");
|
||||||
started = 1;
|
err = 1;
|
||||||
}
|
}
|
||||||
/* Now we check that no combinations of the mutually exclusive NUMERIC,
|
BIO_printf(bio_out, "NUMERIC");
|
||||||
* STRING, and NO_INPUT flags have been used. Future flags that can be
|
started = 1;
|
||||||
* OR'd together with these would need to added after these to preserve
|
}
|
||||||
* the testing logic. */
|
/*
|
||||||
if(flags & ENGINE_CMD_FLAG_STRING)
|
* Now we check that no combinations of the mutually exclusive NUMERIC,
|
||||||
{
|
* STRING, and NO_INPUT flags have been used. Future flags that can be
|
||||||
if(started)
|
* OR'd together with these would need to added after these to preserve
|
||||||
{
|
* the testing logic.
|
||||||
BIO_printf(bio_out, "|");
|
*/
|
||||||
err = 1;
|
if (flags & ENGINE_CMD_FLAG_STRING) {
|
||||||
}
|
if (started) {
|
||||||
BIO_printf(bio_out, "STRING");
|
BIO_printf(bio_out, "|");
|
||||||
started = 1;
|
err = 1;
|
||||||
}
|
}
|
||||||
if(flags & ENGINE_CMD_FLAG_NO_INPUT)
|
BIO_printf(bio_out, "STRING");
|
||||||
{
|
started = 1;
|
||||||
if(started)
|
}
|
||||||
{
|
if (flags & ENGINE_CMD_FLAG_NO_INPUT) {
|
||||||
BIO_printf(bio_out, "|");
|
if (started) {
|
||||||
err = 1;
|
BIO_printf(bio_out, "|");
|
||||||
}
|
err = 1;
|
||||||
BIO_printf(bio_out, "NO_INPUT");
|
}
|
||||||
started = 1;
|
BIO_printf(bio_out, "NO_INPUT");
|
||||||
}
|
started = 1;
|
||||||
/* Check for unknown flags */
|
}
|
||||||
flags = flags & ~ENGINE_CMD_FLAG_NUMERIC &
|
/* Check for unknown flags */
|
||||||
~ENGINE_CMD_FLAG_STRING &
|
flags = flags & ~ENGINE_CMD_FLAG_NUMERIC &
|
||||||
~ENGINE_CMD_FLAG_NO_INPUT &
|
~ENGINE_CMD_FLAG_STRING &
|
||||||
~ENGINE_CMD_FLAG_INTERNAL;
|
~ENGINE_CMD_FLAG_NO_INPUT & ~ENGINE_CMD_FLAG_INTERNAL;
|
||||||
if(flags)
|
if (flags) {
|
||||||
{
|
if (started)
|
||||||
if(started) BIO_printf(bio_out, "|");
|
BIO_printf(bio_out, "|");
|
||||||
BIO_printf(bio_out, "<0x%04X>", flags);
|
BIO_printf(bio_out, "<0x%04X>", flags);
|
||||||
}
|
}
|
||||||
if(err)
|
if (err)
|
||||||
BIO_printf(bio_out, " <illegal flags!>");
|
BIO_printf(bio_out, " <illegal flags!>");
|
||||||
BIO_printf(bio_out, "\n");
|
BIO_printf(bio_out, "\n");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent)
|
static int util_verbose(ENGINE *e, int verbose, BIO *bio_out,
|
||||||
{
|
const char *indent)
|
||||||
static const int line_wrap = 78;
|
{
|
||||||
int num;
|
static const int line_wrap = 78;
|
||||||
int ret = 0;
|
int num;
|
||||||
char *name = NULL;
|
int ret = 0;
|
||||||
char *desc = NULL;
|
char *name = NULL;
|
||||||
int flags;
|
char *desc = NULL;
|
||||||
int xpos = 0;
|
int flags;
|
||||||
STACK_OF(OPENSSL_STRING) *cmds = NULL;
|
int xpos = 0;
|
||||||
if(!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
STACK *cmds = NULL;
|
||||||
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
if (!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
|
||||||
0, NULL, NULL)) <= 0))
|
((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
|
||||||
{
|
0, NULL, NULL)) <= 0)) {
|
||||||
#if 0
|
# if 0
|
||||||
BIO_printf(bio_out, "%s<no control commands>\n", indent);
|
BIO_printf(bio_out, "%s<no control commands>\n", indent);
|
||||||
#endif
|
# endif
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
cmds = sk_OPENSSL_STRING_new_null();
|
cmds = sk_new_null();
|
||||||
|
|
||||||
if(!cmds)
|
if (!cmds)
|
||||||
goto err;
|
goto err;
|
||||||
do {
|
do {
|
||||||
int len;
|
int len;
|
||||||
/* Get the command input flags */
|
/* Get the command input flags */
|
||||||
if((flags = ENGINE_ctrl(e, ENGINE_CTRL_GET_CMD_FLAGS, num,
|
if ((flags = ENGINE_ctrl(e, ENGINE_CTRL_GET_CMD_FLAGS, num,
|
||||||
NULL, NULL)) < 0)
|
NULL, NULL)) < 0)
|
||||||
goto err;
|
goto err;
|
||||||
if (!(flags & ENGINE_CMD_FLAG_INTERNAL) || verbose >= 4)
|
if (!(flags & ENGINE_CMD_FLAG_INTERNAL) || verbose >= 4) {
|
||||||
{
|
/* Get the command name */
|
||||||
/* Get the command name */
|
if ((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_LEN_FROM_CMD, num,
|
||||||
if((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_LEN_FROM_CMD, num,
|
NULL, NULL)) <= 0)
|
||||||
NULL, NULL)) <= 0)
|
goto err;
|
||||||
goto err;
|
if ((name = OPENSSL_malloc(len + 1)) == NULL)
|
||||||
if((name = OPENSSL_malloc(len + 1)) == NULL)
|
goto err;
|
||||||
goto err;
|
if (ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_FROM_CMD, num, name,
|
||||||
if(ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_FROM_CMD, num, name,
|
NULL) <= 0)
|
||||||
|
goto err;
|
||||||
|
/* Get the command description */
|
||||||
|
if ((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_LEN_FROM_CMD, num,
|
||||||
|
NULL, NULL)) < 0)
|
||||||
|
goto err;
|
||||||
|
if (len > 0) {
|
||||||
|
if ((desc = OPENSSL_malloc(len + 1)) == NULL)
|
||||||
|
goto err;
|
||||||
|
if (ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_FROM_CMD, num, desc,
|
||||||
NULL) <= 0)
|
NULL) <= 0)
|
||||||
goto err;
|
goto err;
|
||||||
/* Get the command description */
|
}
|
||||||
if((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_LEN_FROM_CMD, num,
|
/* Now decide on the output */
|
||||||
NULL, NULL)) < 0)
|
if (xpos == 0)
|
||||||
goto err;
|
/* Do an indent */
|
||||||
if(len > 0)
|
xpos = BIO_puts(bio_out, indent);
|
||||||
{
|
else
|
||||||
if((desc = OPENSSL_malloc(len + 1)) == NULL)
|
/* Otherwise prepend a ", " */
|
||||||
goto err;
|
xpos += BIO_printf(bio_out, ", ");
|
||||||
if(ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_FROM_CMD, num, desc,
|
if (verbose == 1) {
|
||||||
NULL) <= 0)
|
/*
|
||||||
goto err;
|
* We're just listing names, comma-delimited
|
||||||
}
|
*/
|
||||||
/* Now decide on the output */
|
if ((xpos > (int)strlen(indent)) &&
|
||||||
if(xpos == 0)
|
(xpos + (int)strlen(name) > line_wrap)) {
|
||||||
/* Do an indent */
|
BIO_printf(bio_out, "\n");
|
||||||
xpos = BIO_puts(bio_out, indent);
|
xpos = BIO_puts(bio_out, indent);
|
||||||
else
|
}
|
||||||
/* Otherwise prepend a ", " */
|
xpos += BIO_printf(bio_out, "%s", name);
|
||||||
xpos += BIO_printf(bio_out, ", ");
|
} else {
|
||||||
if(verbose == 1)
|
/* We're listing names plus descriptions */
|
||||||
{
|
BIO_printf(bio_out, "%s: %s\n", name,
|
||||||
/* We're just listing names, comma-delimited */
|
(desc == NULL) ? "<no description>" : desc);
|
||||||
if((xpos > (int)strlen(indent)) &&
|
/* ... and sometimes input flags */
|
||||||
(xpos + (int)strlen(name) > line_wrap))
|
if ((verbose >= 3) && !util_flags(bio_out, flags, indent))
|
||||||
{
|
goto err;
|
||||||
BIO_printf(bio_out, "\n");
|
xpos = 0;
|
||||||
xpos = BIO_puts(bio_out, indent);
|
}
|
||||||
}
|
}
|
||||||
xpos += BIO_printf(bio_out, "%s", name);
|
OPENSSL_free(name);
|
||||||
}
|
name = NULL;
|
||||||
else
|
if (desc) {
|
||||||
{
|
OPENSSL_free(desc);
|
||||||
/* We're listing names plus descriptions */
|
desc = NULL;
|
||||||
BIO_printf(bio_out, "%s: %s\n", name,
|
}
|
||||||
(desc == NULL) ? "<no description>" : desc);
|
/* Move to the next command */
|
||||||
/* ... and sometimes input flags */
|
num = ENGINE_ctrl(e, ENGINE_CTRL_GET_NEXT_CMD_TYPE, num, NULL, NULL);
|
||||||
if((verbose >= 3) && !util_flags(bio_out, flags,
|
} while (num > 0);
|
||||||
indent))
|
if (xpos > 0)
|
||||||
goto err;
|
BIO_printf(bio_out, "\n");
|
||||||
xpos = 0;
|
ret = 1;
|
||||||
}
|
err:
|
||||||
}
|
if (cmds)
|
||||||
OPENSSL_free(name); name = NULL;
|
sk_pop_free(cmds, identity);
|
||||||
if(desc) { OPENSSL_free(desc); desc = NULL; }
|
if (name)
|
||||||
/* Move to the next command */
|
OPENSSL_free(name);
|
||||||
num = ENGINE_ctrl(e, ENGINE_CTRL_GET_NEXT_CMD_TYPE,
|
if (desc)
|
||||||
num, NULL, NULL);
|
OPENSSL_free(desc);
|
||||||
} while(num > 0);
|
return ret;
|
||||||
if(xpos > 0)
|
}
|
||||||
BIO_printf(bio_out, "\n");
|
|
||||||
ret = 1;
|
|
||||||
err:
|
|
||||||
if(cmds) sk_OPENSSL_STRING_pop_free(cmds, identity);
|
|
||||||
if(name) OPENSSL_free(name);
|
|
||||||
if(desc) OPENSSL_free(desc);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void util_do_cmds(ENGINE *e, STACK_OF(OPENSSL_STRING) *cmds,
|
static void util_do_cmds(ENGINE *e, STACK * cmds, BIO *bio_out,
|
||||||
BIO *bio_out, const char *indent)
|
const char *indent)
|
||||||
{
|
{
|
||||||
int loop, res, num = sk_OPENSSL_STRING_num(cmds);
|
int loop, res, num = sk_num(cmds);
|
||||||
|
if (num < 0) {
|
||||||
if(num < 0)
|
BIO_printf(bio_out, "[Error]: internal stack error\n");
|
||||||
{
|
return;
|
||||||
BIO_printf(bio_out, "[Error]: internal stack error\n");
|
}
|
||||||
return;
|
for (loop = 0; loop < num; loop++) {
|
||||||
}
|
char buf[256];
|
||||||
for(loop = 0; loop < num; loop++)
|
const char *cmd, *arg;
|
||||||
{
|
cmd = sk_value(cmds, loop);
|
||||||
char buf[256];
|
res = 1; /* assume success */
|
||||||
const char *cmd, *arg;
|
/* Check if this command has no ":arg" */
|
||||||
cmd = sk_OPENSSL_STRING_value(cmds, loop);
|
if ((arg = strstr(cmd, ":")) == NULL) {
|
||||||
res = 1; /* assume success */
|
if (!ENGINE_ctrl_cmd_string(e, cmd, NULL, 0))
|
||||||
/* Check if this command has no ":arg" */
|
res = 0;
|
||||||
if((arg = strstr(cmd, ":")) == NULL)
|
} else {
|
||||||
{
|
if ((int)(arg - cmd) > 254) {
|
||||||
if(!ENGINE_ctrl_cmd_string(e, cmd, NULL, 0))
|
BIO_printf(bio_out, "[Error]: command name too long\n");
|
||||||
res = 0;
|
return;
|
||||||
}
|
}
|
||||||
else
|
memcpy(buf, cmd, (int)(arg - cmd));
|
||||||
{
|
buf[arg - cmd] = '\0';
|
||||||
if((int)(arg - cmd) > 254)
|
arg++; /* Move past the ":" */
|
||||||
{
|
/* Call the command with the argument */
|
||||||
BIO_printf(bio_out,"[Error]: command name too long\n");
|
if (!ENGINE_ctrl_cmd_string(e, buf, arg, 0))
|
||||||
return;
|
res = 0;
|
||||||
}
|
}
|
||||||
memcpy(buf, cmd, (int)(arg - cmd));
|
if (res)
|
||||||
buf[arg-cmd] = '\0';
|
BIO_printf(bio_out, "[Success]: %s\n", cmd);
|
||||||
arg++; /* Move past the ":" */
|
else {
|
||||||
/* Call the command with the argument */
|
BIO_printf(bio_out, "[Failure]: %s\n", cmd);
|
||||||
if(!ENGINE_ctrl_cmd_string(e, buf, arg, 0))
|
ERR_print_errors(bio_out);
|
||||||
res = 0;
|
}
|
||||||
}
|
}
|
||||||
if(res)
|
}
|
||||||
BIO_printf(bio_out, "[Success]: %s\n", cmd);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_out, "[Failure]: %s\n", cmd);
|
|
||||||
ERR_print_errors(bio_out);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int ret=1,i;
|
int ret = 1, i;
|
||||||
const char **pp;
|
const char **pp;
|
||||||
int verbose=0, list_cap=0, test_avail=0, test_avail_noise = 0;
|
int verbose = 0, list_cap = 0, test_avail = 0, test_avail_noise = 0;
|
||||||
ENGINE *e;
|
ENGINE *e;
|
||||||
STACK_OF(OPENSSL_STRING) *engines = sk_OPENSSL_STRING_new_null();
|
STACK *engines = sk_new_null();
|
||||||
STACK_OF(OPENSSL_STRING) *pre_cmds = sk_OPENSSL_STRING_new_null();
|
STACK *pre_cmds = sk_new_null();
|
||||||
STACK_OF(OPENSSL_STRING) *post_cmds = sk_OPENSSL_STRING_new_null();
|
STACK *post_cmds = sk_new_null();
|
||||||
int badops=1;
|
int badops = 1;
|
||||||
BIO *bio_out=NULL;
|
BIO *bio_out = NULL;
|
||||||
const char *indent = " ";
|
const char *indent = " ";
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
SSL_load_error_strings();
|
SSL_load_error_strings();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
bio_out=BIO_new_fp(stdout,BIO_NOCLOSE);
|
bio_out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
#ifdef OPENSSL_SYS_VMS
|
# ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
bio_out = BIO_push(tmpbio, bio_out);
|
bio_out = BIO_push(tmpbio, bio_out);
|
||||||
}
|
}
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strncmp(*argv, "-v", 2) == 0) {
|
||||||
if (strncmp(*argv,"-v",2) == 0)
|
if (strspn(*argv + 1, "v") < strlen(*argv + 1))
|
||||||
{
|
goto skip_arg_loop;
|
||||||
if(strspn(*argv + 1, "v") < strlen(*argv + 1))
|
if ((verbose = strlen(*argv + 1)) > 4)
|
||||||
goto skip_arg_loop;
|
goto skip_arg_loop;
|
||||||
if((verbose=strlen(*argv + 1)) > 4)
|
} else if (strcmp(*argv, "-c") == 0)
|
||||||
goto skip_arg_loop;
|
list_cap = 1;
|
||||||
}
|
else if (strncmp(*argv, "-t", 2) == 0) {
|
||||||
else if (strcmp(*argv,"-c") == 0)
|
test_avail = 1;
|
||||||
list_cap=1;
|
if (strspn(*argv + 1, "t") < strlen(*argv + 1))
|
||||||
else if (strncmp(*argv,"-t",2) == 0)
|
goto skip_arg_loop;
|
||||||
{
|
if ((test_avail_noise = strlen(*argv + 1) - 1) > 1)
|
||||||
test_avail=1;
|
goto skip_arg_loop;
|
||||||
if(strspn(*argv + 1, "t") < strlen(*argv + 1))
|
} else if (strcmp(*argv, "-pre") == 0) {
|
||||||
goto skip_arg_loop;
|
argc--;
|
||||||
if((test_avail_noise = strlen(*argv + 1) - 1) > 1)
|
argv++;
|
||||||
goto skip_arg_loop;
|
if (argc == 0)
|
||||||
}
|
goto skip_arg_loop;
|
||||||
else if (strcmp(*argv,"-pre") == 0)
|
sk_push(pre_cmds, *argv);
|
||||||
{
|
} else if (strcmp(*argv, "-post") == 0) {
|
||||||
argc--; argv++;
|
argc--;
|
||||||
if (argc == 0)
|
argv++;
|
||||||
goto skip_arg_loop;
|
if (argc == 0)
|
||||||
sk_OPENSSL_STRING_push(pre_cmds,*argv);
|
goto skip_arg_loop;
|
||||||
}
|
sk_push(post_cmds, *argv);
|
||||||
else if (strcmp(*argv,"-post") == 0)
|
} else if ((strncmp(*argv, "-h", 2) == 0) ||
|
||||||
{
|
(strcmp(*argv, "-?") == 0))
|
||||||
argc--; argv++;
|
goto skip_arg_loop;
|
||||||
if (argc == 0)
|
else
|
||||||
goto skip_arg_loop;
|
sk_push(engines, *argv);
|
||||||
sk_OPENSSL_STRING_push(post_cmds,*argv);
|
argc--;
|
||||||
}
|
argv++;
|
||||||
else if ((strncmp(*argv,"-h",2) == 0) ||
|
}
|
||||||
(strcmp(*argv,"-?") == 0))
|
/* Looks like everything went OK */
|
||||||
goto skip_arg_loop;
|
badops = 0;
|
||||||
else
|
skip_arg_loop:
|
||||||
sk_OPENSSL_STRING_push(engines,*argv);
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
/* Looks like everything went OK */
|
|
||||||
badops = 0;
|
|
||||||
skip_arg_loop:
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
for (pp = engine_usage; (*pp != NULL); pp++)
|
||||||
for (pp=engine_usage; (*pp != NULL); pp++)
|
BIO_printf(bio_err, "%s", *pp);
|
||||||
BIO_printf(bio_err,"%s",*pp);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (sk_OPENSSL_STRING_num(engines) == 0)
|
if (sk_num(engines) == 0) {
|
||||||
{
|
for (e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e)) {
|
||||||
for(e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e))
|
sk_push(engines, (char *)ENGINE_get_id(e));
|
||||||
{
|
}
|
||||||
sk_OPENSSL_STRING_push(engines,(char *)ENGINE_get_id(e));
|
}
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
for (i=0; i<sk_OPENSSL_STRING_num(engines); i++)
|
for (i = 0; i < sk_num(engines); i++) {
|
||||||
{
|
const char *id = sk_value(engines, i);
|
||||||
const char *id = sk_OPENSSL_STRING_value(engines,i);
|
if ((e = ENGINE_by_id(id)) != NULL) {
|
||||||
if ((e = ENGINE_by_id(id)) != NULL)
|
const char *name = ENGINE_get_name(e);
|
||||||
{
|
/*
|
||||||
const char *name = ENGINE_get_name(e);
|
* Do "id" first, then "name". Easier to auto-parse.
|
||||||
/* Do "id" first, then "name". Easier to auto-parse. */
|
*/
|
||||||
BIO_printf(bio_out, "(%s) %s\n", id, name);
|
BIO_printf(bio_out, "(%s) %s\n", id, name);
|
||||||
util_do_cmds(e, pre_cmds, bio_out, indent);
|
util_do_cmds(e, pre_cmds, bio_out, indent);
|
||||||
if (strcmp(ENGINE_get_id(e), id) != 0)
|
if (strcmp(ENGINE_get_id(e), id) != 0) {
|
||||||
{
|
BIO_printf(bio_out, "Loaded: (%s) %s\n",
|
||||||
BIO_printf(bio_out, "Loaded: (%s) %s\n",
|
ENGINE_get_id(e), ENGINE_get_name(e));
|
||||||
ENGINE_get_id(e), ENGINE_get_name(e));
|
}
|
||||||
}
|
if (list_cap) {
|
||||||
if (list_cap)
|
int cap_size = 256;
|
||||||
{
|
char *cap_buf = NULL;
|
||||||
int cap_size = 256;
|
int k, n;
|
||||||
char *cap_buf = NULL;
|
const int *nids;
|
||||||
int k,n;
|
ENGINE_CIPHERS_PTR fn_c;
|
||||||
const int *nids;
|
ENGINE_DIGESTS_PTR fn_d;
|
||||||
ENGINE_CIPHERS_PTR fn_c;
|
|
||||||
ENGINE_DIGESTS_PTR fn_d;
|
|
||||||
ENGINE_PKEY_METHS_PTR fn_pk;
|
|
||||||
|
|
||||||
if (ENGINE_get_RSA(e) != NULL
|
if (ENGINE_get_RSA(e) != NULL
|
||||||
&& !append_buf(&cap_buf, "RSA",
|
&& !append_buf(&cap_buf, "RSA", &cap_size, 256))
|
||||||
&cap_size, 256))
|
goto end;
|
||||||
goto end;
|
if (ENGINE_get_DSA(e) != NULL
|
||||||
if (ENGINE_get_DSA(e) != NULL
|
&& !append_buf(&cap_buf, "DSA", &cap_size, 256))
|
||||||
&& !append_buf(&cap_buf, "DSA",
|
goto end;
|
||||||
&cap_size, 256))
|
if (ENGINE_get_DH(e) != NULL
|
||||||
goto end;
|
&& !append_buf(&cap_buf, "DH", &cap_size, 256))
|
||||||
if (ENGINE_get_DH(e) != NULL
|
goto end;
|
||||||
&& !append_buf(&cap_buf, "DH",
|
if (ENGINE_get_RAND(e) != NULL
|
||||||
&cap_size, 256))
|
&& !append_buf(&cap_buf, "RAND", &cap_size, 256))
|
||||||
goto end;
|
goto end;
|
||||||
if (ENGINE_get_RAND(e) != NULL
|
|
||||||
&& !append_buf(&cap_buf, "RAND",
|
|
||||||
&cap_size, 256))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
fn_c = ENGINE_get_ciphers(e);
|
fn_c = ENGINE_get_ciphers(e);
|
||||||
if(!fn_c) goto skip_ciphers;
|
if (!fn_c)
|
||||||
n = fn_c(e, NULL, &nids, 0);
|
goto skip_ciphers;
|
||||||
for(k=0 ; k < n ; ++k)
|
n = fn_c(e, NULL, &nids, 0);
|
||||||
if(!append_buf(&cap_buf,
|
for (k = 0; k < n; ++k)
|
||||||
OBJ_nid2sn(nids[k]),
|
if (!append_buf(&cap_buf,
|
||||||
&cap_size, 256))
|
OBJ_nid2sn(nids[k]), &cap_size, 256))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
skip_ciphers:
|
skip_ciphers:
|
||||||
fn_d = ENGINE_get_digests(e);
|
fn_d = ENGINE_get_digests(e);
|
||||||
if(!fn_d) goto skip_digests;
|
if (!fn_d)
|
||||||
n = fn_d(e, NULL, &nids, 0);
|
goto skip_digests;
|
||||||
for(k=0 ; k < n ; ++k)
|
n = fn_d(e, NULL, &nids, 0);
|
||||||
if(!append_buf(&cap_buf,
|
for (k = 0; k < n; ++k)
|
||||||
OBJ_nid2sn(nids[k]),
|
if (!append_buf(&cap_buf,
|
||||||
&cap_size, 256))
|
OBJ_nid2sn(nids[k]), &cap_size, 256))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
skip_digests:
|
skip_digests:
|
||||||
fn_pk = ENGINE_get_pkey_meths(e);
|
if (cap_buf && (*cap_buf != '\0'))
|
||||||
if(!fn_pk) goto skip_pmeths;
|
BIO_printf(bio_out, " [%s]\n", cap_buf);
|
||||||
n = fn_pk(e, NULL, &nids, 0);
|
|
||||||
for(k=0 ; k < n ; ++k)
|
|
||||||
if(!append_buf(&cap_buf,
|
|
||||||
OBJ_nid2sn(nids[k]),
|
|
||||||
&cap_size, 256))
|
|
||||||
goto end;
|
|
||||||
skip_pmeths:
|
|
||||||
if (cap_buf && (*cap_buf != '\0'))
|
|
||||||
BIO_printf(bio_out, " [%s]\n", cap_buf);
|
|
||||||
|
|
||||||
OPENSSL_free(cap_buf);
|
OPENSSL_free(cap_buf);
|
||||||
}
|
}
|
||||||
if(test_avail)
|
if (test_avail) {
|
||||||
{
|
BIO_printf(bio_out, "%s", indent);
|
||||||
BIO_printf(bio_out, "%s", indent);
|
if (ENGINE_init(e)) {
|
||||||
if (ENGINE_init(e))
|
BIO_printf(bio_out, "[ available ]\n");
|
||||||
{
|
util_do_cmds(e, post_cmds, bio_out, indent);
|
||||||
BIO_printf(bio_out, "[ available ]\n");
|
ENGINE_finish(e);
|
||||||
util_do_cmds(e, post_cmds, bio_out, indent);
|
} else {
|
||||||
ENGINE_finish(e);
|
BIO_printf(bio_out, "[ unavailable ]\n");
|
||||||
}
|
if (test_avail_noise)
|
||||||
else
|
ERR_print_errors_fp(stdout);
|
||||||
{
|
ERR_clear_error();
|
||||||
BIO_printf(bio_out, "[ unavailable ]\n");
|
}
|
||||||
if(test_avail_noise)
|
}
|
||||||
ERR_print_errors_fp(stdout);
|
if ((verbose > 0) && !util_verbose(e, verbose, bio_out, indent))
|
||||||
ERR_clear_error();
|
goto end;
|
||||||
}
|
ENGINE_free(e);
|
||||||
}
|
} else
|
||||||
if((verbose > 0) && !util_verbose(e, verbose, bio_out, indent))
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
}
|
||||||
ENGINE_free(e);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
|
|
||||||
ret=0;
|
ret = 0;
|
||||||
end:
|
end:
|
||||||
|
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
sk_OPENSSL_STRING_pop_free(engines, identity);
|
sk_pop_free(engines, identity);
|
||||||
sk_OPENSSL_STRING_pop_free(pre_cmds, identity);
|
sk_pop_free(pre_cmds, identity);
|
||||||
sk_OPENSSL_STRING_pop_free(post_cmds, identity);
|
sk_pop_free(post_cmds, identity);
|
||||||
if (bio_out != NULL) BIO_free_all(bio_out);
|
if (bio_out != NULL)
|
||||||
apps_shutdown();
|
BIO_free_all(bio_out);
|
||||||
OPENSSL_EXIT(ret);
|
apps_shutdown();
|
||||||
}
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
#else
|
#else
|
||||||
|
|
||||||
# if PEDANTIC
|
# if PEDANTIC
|
||||||
static void *dummy=&dummy;
|
static void *dummy = &dummy;
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
101
apps/errstr.c
101
apps/errstr.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -66,63 +66,56 @@
|
|||||||
#include <openssl/ssl.h>
|
#include <openssl/ssl.h>
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG errstr_main
|
#define PROG errstr_main
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int i,ret=0;
|
int i, ret = 0;
|
||||||
char buf[256];
|
char buf[256];
|
||||||
unsigned long l;
|
unsigned long l;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
SSL_load_error_strings();
|
SSL_load_error_strings();
|
||||||
|
|
||||||
if ((argc > 1) && (strcmp(argv[1],"-stats") == 0))
|
if ((argc > 1) && (strcmp(argv[1], "-stats") == 0)) {
|
||||||
{
|
BIO *out = NULL;
|
||||||
BIO *out=NULL;
|
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((out != NULL) && BIO_set_fp(out,stdout,BIO_NOCLOSE))
|
if ((out != NULL) && BIO_set_fp(out, stdout, BIO_NOCLOSE)) {
|
||||||
{
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
lh_ERR_STRING_DATA_node_stats_bio(
|
lh_node_stats_bio((LHASH *)ERR_get_string_table(), out);
|
||||||
ERR_get_string_table(), out);
|
lh_stats_bio((LHASH *)ERR_get_string_table(), out);
|
||||||
lh_ERR_STRING_DATA_stats_bio(ERR_get_string_table(),
|
lh_node_usage_stats_bio((LHASH *)
|
||||||
out);
|
ERR_get_string_table(), out);
|
||||||
lh_ERR_STRING_DATA_node_usage_stats_bio(
|
}
|
||||||
ERR_get_string_table(),out);
|
if (out != NULL)
|
||||||
}
|
BIO_free_all(out);
|
||||||
if (out != NULL) BIO_free_all(out);
|
argc--;
|
||||||
argc--;
|
argv++;
|
||||||
argv++;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
for (i=1; i<argc; i++)
|
for (i = 1; i < argc; i++) {
|
||||||
{
|
if (sscanf(argv[i], "%lx", &l)) {
|
||||||
if (sscanf(argv[i],"%lx",&l))
|
ERR_error_string_n(l, buf, sizeof buf);
|
||||||
{
|
printf("%s\n", buf);
|
||||||
ERR_error_string_n(l, buf, sizeof buf);
|
} else {
|
||||||
printf("%s\n",buf);
|
printf("%s: bad error code\n", argv[i]);
|
||||||
}
|
printf("usage: errstr [-stats] <errno> ...\n");
|
||||||
else
|
ret++;
|
||||||
{
|
}
|
||||||
printf("%s: bad error code\n",argv[i]);
|
}
|
||||||
printf("usage: errstr [-stats] <errno> ...\n");
|
apps_shutdown();
|
||||||
ret++;
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
}
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|||||||
339
apps/gendh.c
339
apps/gendh.c
@@ -6,21 +6,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -35,10 +35,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -50,7 +50,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -58,184 +58,185 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include <openssl/opensslconf.h>
|
#include <openssl/opensslconf.h>
|
||||||
/* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
/*
|
||||||
* deprecated functions for openssl-internal code */
|
* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
||||||
|
* deprecated functions for openssl-internal code
|
||||||
|
*/
|
||||||
#ifdef OPENSSL_NO_DEPRECATED
|
#ifdef OPENSSL_NO_DEPRECATED
|
||||||
#undef OPENSSL_NO_DEPRECATED
|
# undef OPENSSL_NO_DEPRECATED
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <sys/types.h>
|
# include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
# include <sys/stat.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/rand.h>
|
# include <openssl/rand.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/dh.h>
|
# include <openssl/dh.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#define DEFBITS 512
|
# define DEFBITS 512
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG gendh_main
|
# define PROG gendh_main
|
||||||
|
|
||||||
static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb);
|
static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb);
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
BN_GENCB cb;
|
BN_GENCB cb;
|
||||||
DH *dh=NULL;
|
DH *dh = NULL;
|
||||||
int ret=1,num=DEFBITS;
|
int ret = 1, num = DEFBITS;
|
||||||
int g=2;
|
int g = 2;
|
||||||
char *outfile=NULL;
|
char *outfile = NULL;
|
||||||
char *inrand=NULL;
|
char *inrand = NULL;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine = NULL;
|
||||||
#endif
|
# endif
|
||||||
BIO *out=NULL;
|
BIO *out = NULL;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
BN_GENCB_set(&cb, dh_cb, bio_err);
|
BN_GENCB_set(&cb, dh_cb, bio_err);
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
argv++;
|
argv++;
|
||||||
argc--;
|
argc--;
|
||||||
for (;;)
|
for (;;) {
|
||||||
{
|
if (argc <= 0)
|
||||||
if (argc <= 0) break;
|
break;
|
||||||
if (strcmp(*argv,"-out") == 0)
|
if (strcmp(*argv, "-out") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
outfile= *(++argv);
|
outfile = *(++argv);
|
||||||
}
|
} else if (strcmp(*argv, "-2") == 0)
|
||||||
else if (strcmp(*argv,"-2") == 0)
|
g = 2;
|
||||||
g=2;
|
/*- else if (strcmp(*argv,"-3") == 0)
|
||||||
/* else if (strcmp(*argv,"-3") == 0)
|
g=3; */
|
||||||
g=3; */
|
else if (strcmp(*argv, "-5") == 0)
|
||||||
else if (strcmp(*argv,"-5") == 0)
|
g = 5;
|
||||||
g=5;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
engine = *(++argv);
|
||||||
engine= *(++argv);
|
}
|
||||||
}
|
# endif
|
||||||
#endif
|
else if (strcmp(*argv, "-rand") == 0) {
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
inrand = *(++argv);
|
||||||
inrand= *(++argv);
|
} else
|
||||||
}
|
break;
|
||||||
else
|
argv++;
|
||||||
break;
|
argc--;
|
||||||
argv++;
|
}
|
||||||
argc--;
|
if ((argc >= 1) && ((sscanf(*argv, "%d", &num) == 0) || (num < 0))) {
|
||||||
}
|
bad:
|
||||||
if ((argc >= 1) && ((sscanf(*argv,"%d",&num) == 0) || (num < 0)))
|
BIO_printf(bio_err, "usage: gendh [args] [numbits]\n");
|
||||||
{
|
BIO_printf(bio_err, " -out file - output the key to 'file\n");
|
||||||
bad:
|
BIO_printf(bio_err, " -2 - use 2 as the generator value\n");
|
||||||
BIO_printf(bio_err,"usage: gendh [args] [numbits]\n");
|
/*
|
||||||
BIO_printf(bio_err," -out file - output the key to 'file\n");
|
* BIO_printf(bio_err," -3 - use 3 as the generator value\n");
|
||||||
BIO_printf(bio_err," -2 - use 2 as the generator value\n");
|
*/
|
||||||
/* BIO_printf(bio_err," -3 - use 3 as the generator value\n"); */
|
BIO_printf(bio_err, " -5 - use 5 as the generator value\n");
|
||||||
BIO_printf(bio_err," -5 - use 5 as the generator value\n");
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
|
" -engine e - use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
# endif
|
||||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
BIO_printf(bio_err, " -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR,
|
||||||
BIO_printf(bio_err," - load the file (or the files in the directory) into\n");
|
LIST_SEPARATOR_CHAR);
|
||||||
BIO_printf(bio_err," the random number generator\n");
|
BIO_printf(bio_err,
|
||||||
goto end;
|
" - load the file (or the files in the directory) into\n");
|
||||||
}
|
BIO_printf(bio_err, " the random number generator\n");
|
||||||
|
goto end;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
}
|
||||||
setup_engine(bio_err, engine, 0);
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
#endif
|
setup_engine(bio_err, engine, 0);
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
|
||||||
if (out == NULL)
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
|
||||||
}
|
|
||||||
if (inrand != NULL)
|
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
|
||||||
app_RAND_load_files(inrand));
|
|
||||||
|
|
||||||
BIO_printf(bio_err,"Generating DH parameters, %d bit long safe prime, generator %d\n",num,g);
|
|
||||||
BIO_printf(bio_err,"This is going to take a long time\n");
|
|
||||||
|
|
||||||
if(((dh = DH_new()) == NULL) || !DH_generate_parameters_ex(dh, num, g, &cb))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
|
||||||
|
|
||||||
if (!PEM_write_bio_DHparams(out,dh))
|
|
||||||
goto end;
|
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if (ret != 0)
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
if (out != NULL) BIO_free_all(out);
|
|
||||||
if (dh != NULL) DH_free(dh);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
|
|
||||||
{
|
|
||||||
char c='*';
|
|
||||||
|
|
||||||
if (p == 0) c='.';
|
|
||||||
if (p == 1) c='+';
|
|
||||||
if (p == 2) c='*';
|
|
||||||
if (p == 3) c='\n';
|
|
||||||
BIO_write(cb->arg,&c,1);
|
|
||||||
(void)BIO_flush(cb->arg);
|
|
||||||
#ifdef LINT
|
|
||||||
p=n;
|
|
||||||
#endif
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
#else /* !OPENSSL_NO_DH */
|
|
||||||
|
|
||||||
# if PEDANTIC
|
|
||||||
static void *dummy=&dummy;
|
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
|
out = BIO_new(BIO_s_file());
|
||||||
|
if (out == NULL) {
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (outfile == NULL) {
|
||||||
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
|
# ifdef OPENSSL_SYS_VMS
|
||||||
|
{
|
||||||
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL) {
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"warning, not much extra random data, consider using the -rand option\n");
|
||||||
|
}
|
||||||
|
if (inrand != NULL)
|
||||||
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
|
app_RAND_load_files(inrand));
|
||||||
|
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Generating DH parameters, %d bit long safe prime, generator %d\n",
|
||||||
|
num, g);
|
||||||
|
BIO_printf(bio_err, "This is going to take a long time\n");
|
||||||
|
|
||||||
|
if (((dh = DH_new()) == NULL)
|
||||||
|
|| !DH_generate_parameters_ex(dh, num, g, &cb))
|
||||||
|
goto end;
|
||||||
|
|
||||||
|
app_RAND_write_file(NULL, bio_err);
|
||||||
|
|
||||||
|
if (!PEM_write_bio_DHparams(out, dh))
|
||||||
|
goto end;
|
||||||
|
ret = 0;
|
||||||
|
end:
|
||||||
|
if (ret != 0)
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
if (out != NULL)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (dh != NULL)
|
||||||
|
DH_free(dh);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int MS_CALLBACK dh_cb(int p, int n, BN_GENCB *cb)
|
||||||
|
{
|
||||||
|
char c = '*';
|
||||||
|
|
||||||
|
if (p == 0)
|
||||||
|
c = '.';
|
||||||
|
if (p == 1)
|
||||||
|
c = '+';
|
||||||
|
if (p == 2)
|
||||||
|
c = '*';
|
||||||
|
if (p == 3)
|
||||||
|
c = '\n';
|
||||||
|
BIO_write(cb->arg, &c, 1);
|
||||||
|
(void)BIO_flush(cb->arg);
|
||||||
|
# ifdef LINT
|
||||||
|
p = n;
|
||||||
|
# endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
418
apps/gendsa.c
418
apps/gendsa.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,237 +49,239 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
* [including the GNU Public Licence.]
|
* [including the GNU Public Licence.]
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
|
#include <openssl/opensslconf.h> /* for OPENSSL_NO_DSA */
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <sys/types.h>
|
# include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
# include <sys/stat.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/dsa.h>
|
# include <openssl/dsa.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
|
|
||||||
#define DEFBITS 512
|
# define DEFBITS 512
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG gendsa_main
|
# define PROG gendsa_main
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
DSA *dsa=NULL;
|
DSA *dsa = NULL;
|
||||||
int ret=1;
|
int ret = 1;
|
||||||
char *outfile=NULL;
|
char *outfile = NULL;
|
||||||
char *inrand=NULL,*dsaparams=NULL;
|
char *inrand = NULL, *dsaparams = NULL;
|
||||||
char *passargout = NULL, *passout = NULL;
|
char *passargout = NULL, *passout = NULL;
|
||||||
BIO *out=NULL,*in=NULL;
|
BIO *out = NULL, *in = NULL;
|
||||||
const EVP_CIPHER *enc=NULL;
|
const EVP_CIPHER *enc = NULL;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine = NULL;
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
argv++;
|
argv++;
|
||||||
argc--;
|
argc--;
|
||||||
for (;;)
|
for (;;) {
|
||||||
{
|
if (argc <= 0)
|
||||||
if (argc <= 0) break;
|
break;
|
||||||
if (strcmp(*argv,"-out") == 0)
|
if (strcmp(*argv, "-out") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
outfile= *(++argv);
|
outfile = *(++argv);
|
||||||
}
|
} else if (strcmp(*argv, "-passout") == 0) {
|
||||||
else if (strcmp(*argv,"-passout") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
passargout = *(++argv);
|
||||||
passargout= *(++argv);
|
}
|
||||||
}
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
engine = *(++argv);
|
||||||
engine= *(++argv);
|
}
|
||||||
}
|
# endif
|
||||||
#endif
|
else if (strcmp(*argv, "-rand") == 0) {
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
inrand = *(++argv);
|
||||||
inrand= *(++argv);
|
} else if (strcmp(*argv, "-") == 0)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-") == 0)
|
# ifndef OPENSSL_NO_DES
|
||||||
goto bad;
|
else if (strcmp(*argv, "-des") == 0)
|
||||||
#ifndef OPENSSL_NO_DES
|
enc = EVP_des_cbc();
|
||||||
else if (strcmp(*argv,"-des") == 0)
|
else if (strcmp(*argv, "-des3") == 0)
|
||||||
enc=EVP_des_cbc();
|
enc = EVP_des_ede3_cbc();
|
||||||
else if (strcmp(*argv,"-des3") == 0)
|
# endif
|
||||||
enc=EVP_des_ede3_cbc();
|
# ifndef OPENSSL_NO_IDEA
|
||||||
#endif
|
else if (strcmp(*argv, "-idea") == 0)
|
||||||
#ifndef OPENSSL_NO_IDEA
|
enc = EVP_idea_cbc();
|
||||||
else if (strcmp(*argv,"-idea") == 0)
|
# endif
|
||||||
enc=EVP_idea_cbc();
|
# ifndef OPENSSL_NO_SEED
|
||||||
#endif
|
else if (strcmp(*argv, "-seed") == 0)
|
||||||
#ifndef OPENSSL_NO_SEED
|
enc = EVP_seed_cbc();
|
||||||
else if (strcmp(*argv,"-seed") == 0)
|
# endif
|
||||||
enc=EVP_seed_cbc();
|
# ifndef OPENSSL_NO_AES
|
||||||
#endif
|
else if (strcmp(*argv, "-aes128") == 0)
|
||||||
#ifndef OPENSSL_NO_AES
|
enc = EVP_aes_128_cbc();
|
||||||
else if (strcmp(*argv,"-aes128") == 0)
|
else if (strcmp(*argv, "-aes192") == 0)
|
||||||
enc=EVP_aes_128_cbc();
|
enc = EVP_aes_192_cbc();
|
||||||
else if (strcmp(*argv,"-aes192") == 0)
|
else if (strcmp(*argv, "-aes256") == 0)
|
||||||
enc=EVP_aes_192_cbc();
|
enc = EVP_aes_256_cbc();
|
||||||
else if (strcmp(*argv,"-aes256") == 0)
|
# endif
|
||||||
enc=EVP_aes_256_cbc();
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
#endif
|
else if (strcmp(*argv, "-camellia128") == 0)
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
enc = EVP_camellia_128_cbc();
|
||||||
else if (strcmp(*argv,"-camellia128") == 0)
|
else if (strcmp(*argv, "-camellia192") == 0)
|
||||||
enc=EVP_camellia_128_cbc();
|
enc = EVP_camellia_192_cbc();
|
||||||
else if (strcmp(*argv,"-camellia192") == 0)
|
else if (strcmp(*argv, "-camellia256") == 0)
|
||||||
enc=EVP_camellia_192_cbc();
|
enc = EVP_camellia_256_cbc();
|
||||||
else if (strcmp(*argv,"-camellia256") == 0)
|
# endif
|
||||||
enc=EVP_camellia_256_cbc();
|
else if (**argv != '-' && dsaparams == NULL) {
|
||||||
#endif
|
dsaparams = *argv;
|
||||||
else if (**argv != '-' && dsaparams == NULL)
|
} else
|
||||||
{
|
goto bad;
|
||||||
dsaparams = *argv;
|
argv++;
|
||||||
}
|
argc--;
|
||||||
else
|
}
|
||||||
goto bad;
|
|
||||||
argv++;
|
|
||||||
argc--;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (dsaparams == NULL)
|
if (dsaparams == NULL) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "usage: gendsa [args] dsaparam-file\n");
|
||||||
BIO_printf(bio_err,"usage: gendsa [args] dsaparam-file\n");
|
BIO_printf(bio_err, " -out file - output the key to 'file'\n");
|
||||||
BIO_printf(bio_err," -out file - output the key to 'file'\n");
|
# ifndef OPENSSL_NO_DES
|
||||||
#ifndef OPENSSL_NO_DES
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -des - encrypt the generated key with DES in cbc mode\n");
|
" -des - encrypt the generated key with DES in cbc mode\n");
|
||||||
BIO_printf(bio_err," -des3 - encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
|
BIO_printf(bio_err,
|
||||||
#endif
|
" -des3 - encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
|
||||||
#ifndef OPENSSL_NO_IDEA
|
# endif
|
||||||
BIO_printf(bio_err," -idea - encrypt the generated key with IDEA in cbc mode\n");
|
# ifndef OPENSSL_NO_IDEA
|
||||||
#endif
|
BIO_printf(bio_err,
|
||||||
#ifndef OPENSSL_NO_SEED
|
" -idea - encrypt the generated key with IDEA in cbc mode\n");
|
||||||
BIO_printf(bio_err," -seed\n");
|
# endif
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc seed\n");
|
# ifndef OPENSSL_NO_SEED
|
||||||
#endif
|
BIO_printf(bio_err, " -seed\n");
|
||||||
#ifndef OPENSSL_NO_AES
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
" encrypt PEM output with cbc seed\n");
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
# endif
|
||||||
#endif
|
# ifndef OPENSSL_NO_AES
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
BIO_printf(bio_err, " -aes128, -aes192, -aes256\n");
|
||||||
BIO_printf(bio_err," -camellia128, -camellia192, -camellia256\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc camellia\n");
|
" encrypt PEM output with cbc aes\n");
|
||||||
#endif
|
# endif
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err, " -camellia128, -camellia192, -camellia256\n");
|
||||||
#endif
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
" encrypt PEM output with cbc camellia\n");
|
||||||
BIO_printf(bio_err," - load the file (or the files in the directory) into\n");
|
# endif
|
||||||
BIO_printf(bio_err," the random number generator\n");
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err," dsaparam-file\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," - a DSA parameter file as generated by the dsaparam command\n");
|
" -engine e - use engine e, possibly a hardware device.\n");
|
||||||
goto end;
|
# endif
|
||||||
}
|
BIO_printf(bio_err, " -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR,
|
||||||
|
LIST_SEPARATOR_CHAR);
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" - load the file (or the files in the directory) into\n");
|
||||||
|
BIO_printf(bio_err, " the random number generator\n");
|
||||||
|
BIO_printf(bio_err, " dsaparam-file\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" - a DSA parameter file as generated by the dsaparam command\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
if (!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
||||||
setup_engine(bio_err, engine, 0);
|
BIO_printf(bio_err, "Error getting password\n");
|
||||||
#endif
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
in = BIO_new(BIO_s_file());
|
||||||
BIO_printf(bio_err, "Error getting password\n");
|
if (!(BIO_read_filename(in, dsaparams))) {
|
||||||
goto end;
|
perror(dsaparams);
|
||||||
}
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if ((dsa = PEM_read_bio_DSAparams(in, NULL, NULL, NULL)) == NULL) {
|
||||||
|
BIO_printf(bio_err, "unable to load DSA parameter file\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
BIO_free(in);
|
||||||
|
in = NULL;
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if (!(BIO_read_filename(in,dsaparams)))
|
if (out == NULL)
|
||||||
{
|
goto end;
|
||||||
perror(dsaparams);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL)
|
if (outfile == NULL) {
|
||||||
{
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
BIO_printf(bio_err,"unable to load DSA parameter file\n");
|
# ifdef OPENSSL_SYS_VMS
|
||||||
goto end;
|
{
|
||||||
}
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
BIO_free(in);
|
out = BIO_push(tmpbio, out);
|
||||||
in = NULL;
|
}
|
||||||
|
# endif
|
||||||
out=BIO_new(BIO_s_file());
|
} else {
|
||||||
if (out == NULL) goto end;
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (outfile == NULL)
|
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL) {
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
"warning, not much extra random data, consider using the -rand option\n");
|
||||||
#ifdef OPENSSL_SYS_VMS
|
}
|
||||||
{
|
if (inrand != NULL)
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
out = BIO_push(tmpbio, out);
|
app_RAND_load_files(inrand));
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
|
BIO_printf(bio_err, "Generating DSA key, %d bits\n", BN_num_bits(dsa->p));
|
||||||
{
|
if (!DSA_generate_key(dsa))
|
||||||
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
goto end;
|
||||||
}
|
|
||||||
if (inrand != NULL)
|
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
|
||||||
app_RAND_load_files(inrand));
|
|
||||||
|
|
||||||
BIO_printf(bio_err,"Generating DSA key, %d bits\n",
|
app_RAND_write_file(NULL, bio_err);
|
||||||
BN_num_bits(dsa->p));
|
|
||||||
if (!DSA_generate_key(dsa)) goto end;
|
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
if (!PEM_write_bio_DSAPrivateKey(out, dsa, enc, NULL, 0, NULL, passout))
|
||||||
|
goto end;
|
||||||
if (!PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL, passout))
|
ret = 0;
|
||||||
goto end;
|
end:
|
||||||
ret=0;
|
if (ret != 0)
|
||||||
end:
|
ERR_print_errors(bio_err);
|
||||||
if (ret != 0)
|
if (in != NULL)
|
||||||
ERR_print_errors(bio_err);
|
BIO_free(in);
|
||||||
if (in != NULL) BIO_free(in);
|
if (out != NULL)
|
||||||
if (out != NULL) BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
if (dsa != NULL) DSA_free(dsa);
|
if (dsa != NULL)
|
||||||
if(passout) OPENSSL_free(passout);
|
DSA_free(dsa);
|
||||||
apps_shutdown();
|
if (passout)
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_free(passout);
|
||||||
}
|
apps_shutdown();
|
||||||
#else /* !OPENSSL_NO_DSA */
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
#else /* !OPENSSL_NO_DSA */
|
||||||
|
|
||||||
# if PEDANTIC
|
# if PEDANTIC
|
||||||
static void *dummy=&dummy;
|
static void *dummy = &dummy;
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
440
apps/genpkey.c
440
apps/genpkey.c
@@ -1,440 +0,0 @@
|
|||||||
/* apps/genpkey.c */
|
|
||||||
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
|
||||||
* project 2006
|
|
||||||
*/
|
|
||||||
/* ====================================================================
|
|
||||||
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
*
|
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
*
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in
|
|
||||||
* the documentation and/or other materials provided with the
|
|
||||||
* distribution.
|
|
||||||
*
|
|
||||||
* 3. All advertising materials mentioning features or use of this
|
|
||||||
* software must display the following acknowledgment:
|
|
||||||
* "This product includes software developed by the OpenSSL Project
|
|
||||||
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
|
||||||
*
|
|
||||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
||||||
* endorse or promote products derived from this software without
|
|
||||||
* prior written permission. For written permission, please contact
|
|
||||||
* licensing@OpenSSL.org.
|
|
||||||
*
|
|
||||||
* 5. Products derived from this software may not be called "OpenSSL"
|
|
||||||
* nor may "OpenSSL" appear in their names without prior written
|
|
||||||
* permission of the OpenSSL Project.
|
|
||||||
*
|
|
||||||
* 6. Redistributions of any form whatsoever must retain the following
|
|
||||||
* acknowledgment:
|
|
||||||
* "This product includes software developed by the OpenSSL Project
|
|
||||||
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
||||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
||||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
||||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
||||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
||||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
||||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
||||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
||||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
||||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
* ====================================================================
|
|
||||||
*
|
|
||||||
* This product includes cryptographic software written by Eric Young
|
|
||||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
||||||
* Hudson (tjh@cryptsoft.com).
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <string.h>
|
|
||||||
#include "apps.h"
|
|
||||||
#include <openssl/pem.h>
|
|
||||||
#include <openssl/err.h>
|
|
||||||
#include <openssl/evp.h>
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
#include <openssl/engine.h>
|
|
||||||
#endif
|
|
||||||
|
|
||||||
static int init_keygen_file(BIO *err, EVP_PKEY_CTX **pctx,
|
|
||||||
const char *file, ENGINE *e);
|
|
||||||
static int genpkey_cb(EVP_PKEY_CTX *ctx);
|
|
||||||
|
|
||||||
#define PROG genpkey_main
|
|
||||||
|
|
||||||
int MAIN(int, char **);
|
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
|
||||||
{
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
char **args, *outfile = NULL;
|
|
||||||
char *passarg = NULL;
|
|
||||||
BIO *in = NULL, *out = NULL;
|
|
||||||
const EVP_CIPHER *cipher = NULL;
|
|
||||||
int outformat;
|
|
||||||
int text = 0;
|
|
||||||
EVP_PKEY *pkey=NULL;
|
|
||||||
EVP_PKEY_CTX *ctx = NULL;
|
|
||||||
char *pass = NULL;
|
|
||||||
int badarg = 0;
|
|
||||||
int ret = 1, rv;
|
|
||||||
|
|
||||||
int do_param = 0;
|
|
||||||
|
|
||||||
if (bio_err == NULL)
|
|
||||||
bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
outformat=FORMAT_PEM;
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
|
||||||
OpenSSL_add_all_algorithms();
|
|
||||||
args = argv + 1;
|
|
||||||
while (!badarg && *args && *args[0] == '-')
|
|
||||||
{
|
|
||||||
if (!strcmp(*args,"-outform"))
|
|
||||||
{
|
|
||||||
if (args[1])
|
|
||||||
{
|
|
||||||
args++;
|
|
||||||
outformat=str2fmt(*args);
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
}
|
|
||||||
else if (!strcmp(*args,"-pass"))
|
|
||||||
{
|
|
||||||
if (!args[1]) goto bad;
|
|
||||||
passarg= *(++args);
|
|
||||||
}
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
else if (strcmp(*args,"-engine") == 0)
|
|
||||||
{
|
|
||||||
if (!args[1])
|
|
||||||
goto bad;
|
|
||||||
e = setup_engine(bio_err, *(++args), 0);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
else if (!strcmp (*args, "-paramfile"))
|
|
||||||
{
|
|
||||||
if (!args[1])
|
|
||||||
goto bad;
|
|
||||||
args++;
|
|
||||||
if (do_param == 1)
|
|
||||||
goto bad;
|
|
||||||
if (!init_keygen_file(bio_err, &ctx, *args, e))
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
else if (!strcmp (*args, "-out"))
|
|
||||||
{
|
|
||||||
if (args[1])
|
|
||||||
{
|
|
||||||
args++;
|
|
||||||
outfile = *args;
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
}
|
|
||||||
else if (strcmp(*args,"-algorithm") == 0)
|
|
||||||
{
|
|
||||||
if (!args[1])
|
|
||||||
goto bad;
|
|
||||||
if (!init_gen_str(bio_err, &ctx, *(++args),e, do_param))
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
else if (strcmp(*args,"-pkeyopt") == 0)
|
|
||||||
{
|
|
||||||
if (!args[1])
|
|
||||||
goto bad;
|
|
||||||
if (!ctx)
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err, "No keytype specified\n");
|
|
||||||
goto bad;
|
|
||||||
}
|
|
||||||
else if (pkey_ctrl_string(ctx, *(++args)) <= 0)
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err, "parameter setting error\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else if (strcmp(*args,"-genparam") == 0)
|
|
||||||
{
|
|
||||||
if (ctx)
|
|
||||||
goto bad;
|
|
||||||
do_param = 1;
|
|
||||||
}
|
|
||||||
else if (strcmp(*args,"-text") == 0)
|
|
||||||
text=1;
|
|
||||||
else
|
|
||||||
{
|
|
||||||
cipher = EVP_get_cipherbyname(*args + 1);
|
|
||||||
if (!cipher)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Unknown cipher %s\n",
|
|
||||||
*args + 1);
|
|
||||||
badarg = 1;
|
|
||||||
}
|
|
||||||
if (do_param == 1)
|
|
||||||
badarg = 1;
|
|
||||||
}
|
|
||||||
args++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!ctx)
|
|
||||||
badarg = 1;
|
|
||||||
|
|
||||||
if (badarg)
|
|
||||||
{
|
|
||||||
bad:
|
|
||||||
BIO_printf(bio_err, "Usage: genpkey [options]\n");
|
|
||||||
BIO_printf(bio_err, "where options may be\n");
|
|
||||||
BIO_printf(bio_err, "-out file output file\n");
|
|
||||||
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
|
||||||
BIO_printf(bio_err, "-pass arg output file pass phrase source\n");
|
|
||||||
BIO_printf(bio_err, "-<cipher> use cipher <cipher> to encrypt the key\n");
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err, "-paramfile file parameters file\n");
|
|
||||||
BIO_printf(bio_err, "-algorithm alg the public key algorithm\n");
|
|
||||||
BIO_printf(bio_err, "-pkeyopt opt:value set the public key algorithm option <opt>\n"
|
|
||||||
" to value <value>\n");
|
|
||||||
BIO_printf(bio_err, "-genparam generate parameters, not key\n");
|
|
||||||
BIO_printf(bio_err, "-text print the in text\n");
|
|
||||||
BIO_printf(bio_err, "NB: options order may be important! See the manual page.\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!app_passwd(bio_err, passarg, NULL, &pass, NULL))
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err, "Error getting password\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outfile)
|
|
||||||
{
|
|
||||||
if (!(out = BIO_new_file (outfile, "wb")))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Can't open output file %s\n", outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
EVP_PKEY_CTX_set_cb(ctx, genpkey_cb);
|
|
||||||
EVP_PKEY_CTX_set_app_data(ctx, bio_err);
|
|
||||||
|
|
||||||
if (do_param)
|
|
||||||
{
|
|
||||||
if (EVP_PKEY_paramgen(ctx, &pkey) <= 0)
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err, "Error generating parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (EVP_PKEY_keygen(ctx, &pkey) <= 0)
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err, "Error generating key\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (do_param)
|
|
||||||
rv = PEM_write_bio_Parameters(out, pkey);
|
|
||||||
else if (outformat == FORMAT_PEM)
|
|
||||||
rv = PEM_write_bio_PrivateKey(out, pkey, cipher, NULL, 0,
|
|
||||||
NULL, pass);
|
|
||||||
else if (outformat == FORMAT_ASN1)
|
|
||||||
rv = i2d_PrivateKey_bio(out, pkey);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (rv <= 0)
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err, "Error writing key\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (text)
|
|
||||||
{
|
|
||||||
if (do_param)
|
|
||||||
rv = EVP_PKEY_print_params(out, pkey, 0, NULL);
|
|
||||||
else
|
|
||||||
rv = EVP_PKEY_print_private(out, pkey, 0, NULL);
|
|
||||||
|
|
||||||
if (rv <= 0)
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err, "Error printing key\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = 0;
|
|
||||||
|
|
||||||
end:
|
|
||||||
if (pkey)
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
if (ctx)
|
|
||||||
EVP_PKEY_CTX_free(ctx);
|
|
||||||
if (out)
|
|
||||||
BIO_free_all(out);
|
|
||||||
BIO_free(in);
|
|
||||||
if (pass)
|
|
||||||
OPENSSL_free(pass);
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int init_keygen_file(BIO *err, EVP_PKEY_CTX **pctx,
|
|
||||||
const char *file, ENGINE *e)
|
|
||||||
{
|
|
||||||
BIO *pbio;
|
|
||||||
EVP_PKEY *pkey = NULL;
|
|
||||||
EVP_PKEY_CTX *ctx = NULL;
|
|
||||||
if (*pctx)
|
|
||||||
{
|
|
||||||
BIO_puts(err, "Parameters already set!\n");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
pbio = BIO_new_file(file, "r");
|
|
||||||
if (!pbio)
|
|
||||||
{
|
|
||||||
BIO_printf(err, "Can't open parameter file %s\n", file);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
pkey = PEM_read_bio_Parameters(pbio, NULL);
|
|
||||||
BIO_free(pbio);
|
|
||||||
|
|
||||||
if (!pkey)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error reading parameter file %s\n", file);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
ctx = EVP_PKEY_CTX_new(pkey, e);
|
|
||||||
if (!ctx)
|
|
||||||
goto err;
|
|
||||||
if (EVP_PKEY_keygen_init(ctx) <= 0)
|
|
||||||
goto err;
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
*pctx = ctx;
|
|
||||||
return 1;
|
|
||||||
|
|
||||||
err:
|
|
||||||
BIO_puts(err, "Error initializing context\n");
|
|
||||||
ERR_print_errors(err);
|
|
||||||
if (ctx)
|
|
||||||
EVP_PKEY_CTX_free(ctx);
|
|
||||||
if (pkey)
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
return 0;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
int init_gen_str(BIO *err, EVP_PKEY_CTX **pctx,
|
|
||||||
const char *algname, ENGINE *e, int do_param)
|
|
||||||
{
|
|
||||||
EVP_PKEY_CTX *ctx = NULL;
|
|
||||||
const EVP_PKEY_ASN1_METHOD *ameth;
|
|
||||||
ENGINE *tmpeng = NULL;
|
|
||||||
int pkey_id;
|
|
||||||
|
|
||||||
if (*pctx)
|
|
||||||
{
|
|
||||||
BIO_puts(err, "Algorithm already set!\n");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
ameth = EVP_PKEY_asn1_find_str(&tmpeng, algname, -1);
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
if (!ameth && e)
|
|
||||||
ameth = ENGINE_get_pkey_asn1_meth_str(e, algname, -1);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
if (!ameth)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Algorithm %s not found\n", algname);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
ERR_clear_error();
|
|
||||||
|
|
||||||
EVP_PKEY_asn1_get0_info(&pkey_id, NULL, NULL, NULL, NULL, ameth);
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
if (tmpeng)
|
|
||||||
ENGINE_finish(tmpeng);
|
|
||||||
#endif
|
|
||||||
ctx = EVP_PKEY_CTX_new_id(pkey_id, e);
|
|
||||||
|
|
||||||
if (!ctx)
|
|
||||||
goto err;
|
|
||||||
if (do_param)
|
|
||||||
{
|
|
||||||
if (EVP_PKEY_paramgen_init(ctx) <= 0)
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (EVP_PKEY_keygen_init(ctx) <= 0)
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
|
|
||||||
*pctx = ctx;
|
|
||||||
return 1;
|
|
||||||
|
|
||||||
err:
|
|
||||||
BIO_printf(err, "Error initializing %s context\n", algname);
|
|
||||||
ERR_print_errors(err);
|
|
||||||
if (ctx)
|
|
||||||
EVP_PKEY_CTX_free(ctx);
|
|
||||||
return 0;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
static int genpkey_cb(EVP_PKEY_CTX *ctx)
|
|
||||||
{
|
|
||||||
char c='*';
|
|
||||||
BIO *b = EVP_PKEY_CTX_get_app_data(ctx);
|
|
||||||
int p;
|
|
||||||
p = EVP_PKEY_CTX_get_keygen_info(ctx, 0);
|
|
||||||
if (p == 0) c='.';
|
|
||||||
if (p == 1) c='+';
|
|
||||||
if (p == 2) c='*';
|
|
||||||
if (p == 3) c='\n';
|
|
||||||
BIO_write(b,&c,1);
|
|
||||||
(void)BIO_flush(b);
|
|
||||||
#ifdef LINT
|
|
||||||
p=n;
|
|
||||||
#endif
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
525
apps/genrsa.c
525
apps/genrsa.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -57,285 +57,300 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
#include <openssl/opensslconf.h>
|
#include <openssl/opensslconf.h>
|
||||||
/* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
/*
|
||||||
* deprecated functions for openssl-internal code */
|
* Until the key-gen callbacks are modified to use newer prototypes, we allow
|
||||||
|
* deprecated functions for openssl-internal code
|
||||||
|
*/
|
||||||
#ifdef OPENSSL_NO_DEPRECATED
|
#ifdef OPENSSL_NO_DEPRECATED
|
||||||
#undef OPENSSL_NO_DEPRECATED
|
# undef OPENSSL_NO_DEPRECATED
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <sys/types.h>
|
# include <sys/types.h>
|
||||||
#include <sys/stat.h>
|
# include <sys/stat.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
#include <openssl/rsa.h>
|
# include <openssl/rsa.h>
|
||||||
#include <openssl/evp.h>
|
# include <openssl/evp.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
#include <openssl/rand.h>
|
# include <openssl/rand.h>
|
||||||
|
|
||||||
#define DEFBITS 512
|
# define DEFBITS 512
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG genrsa_main
|
# define PROG genrsa_main
|
||||||
|
|
||||||
static int MS_CALLBACK genrsa_cb(int p, int n, BN_GENCB *cb);
|
static int MS_CALLBACK genrsa_cb(int p, int n, BN_GENCB *cb);
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
BN_GENCB cb;
|
BN_GENCB cb;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
int ret = 1;
|
||||||
ENGINE *e = NULL;
|
int i, num = DEFBITS;
|
||||||
#endif
|
long l;
|
||||||
int ret=1;
|
int use_x931 = 0;
|
||||||
int non_fips_allow = 0;
|
const EVP_CIPHER *enc = NULL;
|
||||||
int i,num=DEFBITS;
|
unsigned long f4 = RSA_F4;
|
||||||
long l;
|
char *outfile = NULL;
|
||||||
const EVP_CIPHER *enc=NULL;
|
char *passargout = NULL, *passout = NULL;
|
||||||
unsigned long f4=RSA_F4;
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *outfile=NULL;
|
char *engine = NULL;
|
||||||
char *passargout = NULL, *passout = NULL;
|
# endif
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
char *inrand = NULL;
|
||||||
char *engine=NULL;
|
BIO *out = NULL;
|
||||||
#endif
|
BIGNUM *bn = BN_new();
|
||||||
char *inrand=NULL;
|
RSA *rsa = NULL;
|
||||||
BIO *out=NULL;
|
|
||||||
BIGNUM *bn = BN_new();
|
|
||||||
RSA *rsa = NULL;
|
|
||||||
|
|
||||||
if(!bn) goto err;
|
if (!bn)
|
||||||
|
goto err;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
BN_GENCB_set(&cb, genrsa_cb, bio_err);
|
BN_GENCB_set(&cb, genrsa_cb, bio_err);
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto err;
|
goto err;
|
||||||
if ((out=BIO_new(BIO_s_file())) == NULL)
|
if ((out = BIO_new(BIO_s_file())) == NULL) {
|
||||||
{
|
BIO_printf(bio_err, "unable to create BIO for output\n");
|
||||||
BIO_printf(bio_err,"unable to create BIO for output\n");
|
goto err;
|
||||||
goto err;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
argv++;
|
argv++;
|
||||||
argc--;
|
argc--;
|
||||||
for (;;)
|
for (;;) {
|
||||||
{
|
if (argc <= 0)
|
||||||
if (argc <= 0) break;
|
break;
|
||||||
if (strcmp(*argv,"-out") == 0)
|
if (strcmp(*argv, "-out") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
outfile= *(++argv);
|
outfile = *(++argv);
|
||||||
}
|
} else if (strcmp(*argv, "-3") == 0)
|
||||||
else if (strcmp(*argv,"-3") == 0)
|
f4 = 3;
|
||||||
f4=3;
|
else if (strcmp(*argv, "-F4") == 0 || strcmp(*argv, "-f4") == 0)
|
||||||
else if (strcmp(*argv,"-F4") == 0 || strcmp(*argv,"-f4") == 0)
|
f4 = RSA_F4;
|
||||||
f4=RSA_F4;
|
else if (strcmp(*argv, "-x931") == 0)
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
use_x931 = 1;
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
{
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
engine= *(++argv);
|
goto bad;
|
||||||
}
|
engine = *(++argv);
|
||||||
#endif
|
}
|
||||||
else if (strcmp(*argv,"-rand") == 0)
|
# endif
|
||||||
{
|
else if (strcmp(*argv, "-rand") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
inrand= *(++argv);
|
goto bad;
|
||||||
}
|
inrand = *(++argv);
|
||||||
#ifndef OPENSSL_NO_DES
|
}
|
||||||
else if (strcmp(*argv,"-des") == 0)
|
# ifndef OPENSSL_NO_DES
|
||||||
enc=EVP_des_cbc();
|
else if (strcmp(*argv, "-des") == 0)
|
||||||
else if (strcmp(*argv,"-des3") == 0)
|
enc = EVP_des_cbc();
|
||||||
enc=EVP_des_ede3_cbc();
|
else if (strcmp(*argv, "-des3") == 0)
|
||||||
#endif
|
enc = EVP_des_ede3_cbc();
|
||||||
#ifndef OPENSSL_NO_IDEA
|
# endif
|
||||||
else if (strcmp(*argv,"-idea") == 0)
|
# ifndef OPENSSL_NO_IDEA
|
||||||
enc=EVP_idea_cbc();
|
else if (strcmp(*argv, "-idea") == 0)
|
||||||
#endif
|
enc = EVP_idea_cbc();
|
||||||
#ifndef OPENSSL_NO_SEED
|
# endif
|
||||||
else if (strcmp(*argv,"-seed") == 0)
|
# ifndef OPENSSL_NO_SEED
|
||||||
enc=EVP_seed_cbc();
|
else if (strcmp(*argv, "-seed") == 0)
|
||||||
#endif
|
enc = EVP_seed_cbc();
|
||||||
#ifndef OPENSSL_NO_AES
|
# endif
|
||||||
else if (strcmp(*argv,"-aes128") == 0)
|
# ifndef OPENSSL_NO_AES
|
||||||
enc=EVP_aes_128_cbc();
|
else if (strcmp(*argv, "-aes128") == 0)
|
||||||
else if (strcmp(*argv,"-aes192") == 0)
|
enc = EVP_aes_128_cbc();
|
||||||
enc=EVP_aes_192_cbc();
|
else if (strcmp(*argv, "-aes192") == 0)
|
||||||
else if (strcmp(*argv,"-aes256") == 0)
|
enc = EVP_aes_192_cbc();
|
||||||
enc=EVP_aes_256_cbc();
|
else if (strcmp(*argv, "-aes256") == 0)
|
||||||
#endif
|
enc = EVP_aes_256_cbc();
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
# endif
|
||||||
else if (strcmp(*argv,"-camellia128") == 0)
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
enc=EVP_camellia_128_cbc();
|
else if (strcmp(*argv, "-camellia128") == 0)
|
||||||
else if (strcmp(*argv,"-camellia192") == 0)
|
enc = EVP_camellia_128_cbc();
|
||||||
enc=EVP_camellia_192_cbc();
|
else if (strcmp(*argv, "-camellia192") == 0)
|
||||||
else if (strcmp(*argv,"-camellia256") == 0)
|
enc = EVP_camellia_192_cbc();
|
||||||
enc=EVP_camellia_256_cbc();
|
else if (strcmp(*argv, "-camellia256") == 0)
|
||||||
#endif
|
enc = EVP_camellia_256_cbc();
|
||||||
else if (strcmp(*argv,"-passout") == 0)
|
# endif
|
||||||
{
|
else if (strcmp(*argv, "-passout") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
passargout= *(++argv);
|
goto bad;
|
||||||
}
|
passargout = *(++argv);
|
||||||
else if (strcmp(*argv,"-non-fips-allow") == 0)
|
} else
|
||||||
non_fips_allow = 1;
|
break;
|
||||||
else
|
argv++;
|
||||||
break;
|
argc--;
|
||||||
argv++;
|
}
|
||||||
argc--;
|
if ((argc >= 1) && ((sscanf(*argv, "%d", &num) == 0) || (num < 0))) {
|
||||||
}
|
bad:
|
||||||
if ((argc >= 1) && ((sscanf(*argv,"%d",&num) == 0) || (num < 0)))
|
BIO_printf(bio_err, "usage: genrsa [args] [numbits]\n");
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
bad:
|
" -des encrypt the generated key with DES in cbc mode\n");
|
||||||
BIO_printf(bio_err,"usage: genrsa [args] [numbits]\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -des encrypt the generated key with DES in cbc mode\n");
|
" -des3 encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
|
||||||
BIO_printf(bio_err," -des3 encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
|
# ifndef OPENSSL_NO_IDEA
|
||||||
#ifndef OPENSSL_NO_IDEA
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -idea encrypt the generated key with IDEA in cbc mode\n");
|
" -idea encrypt the generated key with IDEA in cbc mode\n");
|
||||||
#endif
|
# endif
|
||||||
#ifndef OPENSSL_NO_SEED
|
# ifndef OPENSSL_NO_SEED
|
||||||
BIO_printf(bio_err," -seed\n");
|
BIO_printf(bio_err, " -seed\n");
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc seed\n");
|
BIO_printf(bio_err,
|
||||||
#endif
|
" encrypt PEM output with cbc seed\n");
|
||||||
#ifndef OPENSSL_NO_AES
|
# endif
|
||||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
# ifndef OPENSSL_NO_AES
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
BIO_printf(bio_err, " -aes128, -aes192, -aes256\n");
|
||||||
#endif
|
BIO_printf(bio_err,
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
" encrypt PEM output with cbc aes\n");
|
||||||
BIO_printf(bio_err," -camellia128, -camellia192, -camellia256\n");
|
# endif
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc camellia\n");
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
#endif
|
BIO_printf(bio_err, " -camellia128, -camellia192, -camellia256\n");
|
||||||
BIO_printf(bio_err," -out file output the key to 'file\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -passout arg output file pass phrase source\n");
|
" encrypt PEM output with cbc camellia\n");
|
||||||
BIO_printf(bio_err," -f4 use F4 (0x10001) for the E value\n");
|
# endif
|
||||||
BIO_printf(bio_err," -3 use 3 for the E value\n");
|
BIO_printf(bio_err, " -out file output the key to 'file\n");
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
" -passout arg output file pass phrase source\n");
|
||||||
#endif
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
" -f4 use F4 (0x10001) for the E value\n");
|
||||||
BIO_printf(bio_err," load the file (or the files in the directory) into\n");
|
BIO_printf(bio_err, " -3 use 3 for the E value\n");
|
||||||
BIO_printf(bio_err," the random number generator\n");
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
goto err;
|
BIO_printf(bio_err,
|
||||||
}
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
|
# endif
|
||||||
ERR_load_crypto_strings();
|
BIO_printf(bio_err, " -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR,
|
||||||
|
LIST_SEPARATOR_CHAR);
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
" load the file (or the files in the directory) into\n");
|
||||||
|
BIO_printf(bio_err, " the random number generator\n");
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
ERR_load_crypto_strings();
|
||||||
BIO_printf(bio_err, "Error getting password\n");
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
if (!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
|
||||||
e = setup_engine(bio_err, engine, 0);
|
BIO_printf(bio_err, "Error getting password\n");
|
||||||
#endif
|
goto err;
|
||||||
|
}
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
if (outfile == NULL)
|
if (outfile == NULL) {
|
||||||
{
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
# ifdef OPENSSL_SYS_VMS
|
||||||
#ifdef OPENSSL_SYS_VMS
|
{
|
||||||
{
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
out = BIO_push(tmpbio, out);
|
||||||
out = BIO_push(tmpbio, out);
|
}
|
||||||
}
|
# endif
|
||||||
#endif
|
} else {
|
||||||
}
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
else
|
perror(outfile);
|
||||||
{
|
goto err;
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
}
|
||||||
{
|
}
|
||||||
perror(outfile);
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
|
if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
|
||||||
&& !RAND_status())
|
&& !RAND_status()) {
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
|
"warning, not much extra random data, consider using the -rand option\n");
|
||||||
}
|
}
|
||||||
if (inrand != NULL)
|
if (inrand != NULL)
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
app_RAND_load_files(inrand));
|
app_RAND_load_files(inrand));
|
||||||
|
|
||||||
BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
|
BIO_printf(bio_err, "Generating RSA private key, %d bit long modulus\n",
|
||||||
num);
|
num);
|
||||||
#ifdef OPENSSL_NO_ENGINE
|
|
||||||
rsa = RSA_new();
|
|
||||||
#else
|
|
||||||
rsa = RSA_new_method(e);
|
|
||||||
#endif
|
|
||||||
if (!rsa)
|
|
||||||
goto err;
|
|
||||||
|
|
||||||
if (non_fips_allow)
|
rsa = RSA_new();
|
||||||
rsa->flags |= RSA_FLAG_NON_FIPS_ALLOW;
|
if (!rsa)
|
||||||
|
goto err;
|
||||||
|
|
||||||
if(!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb))
|
if (use_x931) {
|
||||||
goto err;
|
BIGNUM *pubexp;
|
||||||
|
pubexp = BN_new();
|
||||||
app_RAND_write_file(NULL, bio_err);
|
if (!BN_set_word(pubexp, f4))
|
||||||
|
goto err;
|
||||||
|
if (!RSA_X931_generate_key_ex(rsa, num, pubexp, &cb))
|
||||||
|
goto err;
|
||||||
|
BN_free(pubexp);
|
||||||
|
} else if (!BN_set_word(bn, f4)
|
||||||
|
|| !RSA_generate_key_ex(rsa, num, bn, &cb))
|
||||||
|
goto err;
|
||||||
|
|
||||||
/* We need to do the following for when the base number size is <
|
app_RAND_write_file(NULL, bio_err);
|
||||||
* long, esp windows 3.1 :-(. */
|
|
||||||
l=0L;
|
|
||||||
for (i=0; i<rsa->e->top; i++)
|
|
||||||
{
|
|
||||||
#ifndef SIXTY_FOUR_BIT
|
|
||||||
l<<=BN_BITS4;
|
|
||||||
l<<=BN_BITS4;
|
|
||||||
#endif
|
|
||||||
l+=rsa->e->d[i];
|
|
||||||
}
|
|
||||||
BIO_printf(bio_err,"e is %ld (0x%lX)\n",l,l);
|
|
||||||
{
|
|
||||||
PW_CB_DATA cb_data;
|
|
||||||
cb_data.password = passout;
|
|
||||||
cb_data.prompt_info = outfile;
|
|
||||||
if (!PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0,
|
|
||||||
(pem_password_cb *)password_callback,&cb_data))
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret=0;
|
/*
|
||||||
err:
|
* We need to do the following for when the base number size is < long,
|
||||||
if (bn) BN_free(bn);
|
* esp windows 3.1 :-(.
|
||||||
if (rsa) RSA_free(rsa);
|
*/
|
||||||
if (out) BIO_free_all(out);
|
l = 0L;
|
||||||
if(passout) OPENSSL_free(passout);
|
for (i = 0; i < rsa->e->top; i++) {
|
||||||
if (ret != 0)
|
# ifndef SIXTY_FOUR_BIT
|
||||||
ERR_print_errors(bio_err);
|
l <<= BN_BITS4;
|
||||||
apps_shutdown();
|
l <<= BN_BITS4;
|
||||||
OPENSSL_EXIT(ret);
|
# endif
|
||||||
}
|
l += rsa->e->d[i];
|
||||||
|
}
|
||||||
|
BIO_printf(bio_err, "e is %ld (0x%lX)\n", l, l);
|
||||||
|
{
|
||||||
|
PW_CB_DATA cb_data;
|
||||||
|
cb_data.password = passout;
|
||||||
|
cb_data.prompt_info = outfile;
|
||||||
|
if (!PEM_write_bio_RSAPrivateKey(out, rsa, enc, NULL, 0,
|
||||||
|
(pem_password_cb *)password_callback,
|
||||||
|
&cb_data))
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = 0;
|
||||||
|
err:
|
||||||
|
if (bn)
|
||||||
|
BN_free(bn);
|
||||||
|
if (rsa)
|
||||||
|
RSA_free(rsa);
|
||||||
|
if (out)
|
||||||
|
BIO_free_all(out);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
if (ret != 0)
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
static int MS_CALLBACK genrsa_cb(int p, int n, BN_GENCB *cb)
|
static int MS_CALLBACK genrsa_cb(int p, int n, BN_GENCB *cb)
|
||||||
{
|
{
|
||||||
char c='*';
|
char c = '*';
|
||||||
|
|
||||||
if (p == 0) c='.';
|
if (p == 0)
|
||||||
if (p == 1) c='+';
|
c = '.';
|
||||||
if (p == 2) c='*';
|
if (p == 1)
|
||||||
if (p == 3) c='\n';
|
c = '+';
|
||||||
BIO_write(cb->arg,&c,1);
|
if (p == 2)
|
||||||
(void)BIO_flush(cb->arg);
|
c = '*';
|
||||||
#ifdef LINT
|
if (p == 3)
|
||||||
p=n;
|
c = '\n';
|
||||||
#endif
|
BIO_write(cb->arg, &c, 1);
|
||||||
return 1;
|
(void)BIO_flush(cb->arg);
|
||||||
}
|
# ifdef LINT
|
||||||
#else /* !OPENSSL_NO_RSA */
|
p = n;
|
||||||
|
# endif
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
#else /* !OPENSSL_NO_RSA */
|
||||||
|
|
||||||
# if PEDANTIC
|
# if PEDANTIC
|
||||||
static void *dummy=&dummy;
|
static void *dummy = &dummy;
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -1,107 +0,0 @@
|
|||||||
$! INSTALL.COM -- Installs the files in a given directory tree
|
|
||||||
$!
|
|
||||||
$! Author: Richard Levitte <richard@levitte.org>
|
|
||||||
$! Time of creation: 22-MAY-1998 10:13
|
|
||||||
$!
|
|
||||||
$! P1 root of the directory tree
|
|
||||||
$! P2 "64" for 64-bit pointers.
|
|
||||||
$!
|
|
||||||
$!
|
|
||||||
$! Announce/identify.
|
|
||||||
$!
|
|
||||||
$ proc = f$environment( "procedure")
|
|
||||||
$ write sys$output "@@@ "+ -
|
|
||||||
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
|
||||||
$!
|
|
||||||
$ on error then goto tidy
|
|
||||||
$ on control_c then goto tidy
|
|
||||||
$!
|
|
||||||
$ if (p1 .eqs. "")
|
|
||||||
$ then
|
|
||||||
$ write sys$output "First argument missing."
|
|
||||||
$ write sys$output -
|
|
||||||
"It should be the directory where you want things installed."
|
|
||||||
$ exit
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$ if (f$getsyi("cpu") .lt. 128)
|
|
||||||
$ then
|
|
||||||
$ arch = "VAX"
|
|
||||||
$ else
|
|
||||||
$ arch = f$edit( f$getsyi( "arch_name"), "upcase")
|
|
||||||
$ if (arch .eqs. "") then arch = "UNK"
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$ archd = arch
|
|
||||||
$!
|
|
||||||
$ if (p2 .nes. "")
|
|
||||||
$ then
|
|
||||||
$ if (p2 .eqs. "64")
|
|
||||||
$ then
|
|
||||||
$ archd = arch+ "_64"
|
|
||||||
$ else
|
|
||||||
$ if (p2 .nes. "32")
|
|
||||||
$ then
|
|
||||||
$ write sys$output "Second argument invalid."
|
|
||||||
$ write sys$output "It should be "32", "64", or nothing."
|
|
||||||
$ exit
|
|
||||||
$ endif
|
|
||||||
$ endif
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$ root = f$parse( p1, "[]A.;0", , , "syntax_only, no_conceal") - "A.;0"
|
|
||||||
$ root_dev = f$parse(root,,,"device","syntax_only")
|
|
||||||
$ root_dir = f$parse(root,,,"directory","syntax_only") - -
|
|
||||||
"[000000." - "][" - "[" - "]"
|
|
||||||
$ root = root_dev + "[" + root_dir
|
|
||||||
$!
|
|
||||||
$ define /nolog wrk_sslroot 'root'.] /trans=conc
|
|
||||||
$ define /nolog wrk_sslxexe wrk_sslroot:['archd'_exe]
|
|
||||||
$!
|
|
||||||
$ if f$parse("wrk_sslroot:[000000]") .eqs. "" then -
|
|
||||||
create /directory /log wrk_sslroot:[000000]
|
|
||||||
$ if f$parse("wrk_sslxexe:") .eqs. "" then -
|
|
||||||
create /directory /log wrk_sslxexe:
|
|
||||||
$!
|
|
||||||
$ exe := openssl
|
|
||||||
$!
|
|
||||||
$ exe_dir := [-.'archd'.exe.apps]
|
|
||||||
$!
|
|
||||||
$! Executables.
|
|
||||||
$!
|
|
||||||
$ i = 0
|
|
||||||
$ loop_exe:
|
|
||||||
$ e = f$edit(f$element( i, ",", exe), "trim")
|
|
||||||
$ i = i + 1
|
|
||||||
$ if e .eqs. "," then goto loop_exe_end
|
|
||||||
$ set noon
|
|
||||||
$ file = exe_dir+ e+ ".exe"
|
|
||||||
$ if f$search( file) .nes. ""
|
|
||||||
$ then
|
|
||||||
$ copy /protection = w:re 'file' wrk_sslxexe: /log
|
|
||||||
$ endif
|
|
||||||
$ set on
|
|
||||||
$ goto loop_exe
|
|
||||||
$ loop_exe_end:
|
|
||||||
$!
|
|
||||||
$! Miscellaneous.
|
|
||||||
$!
|
|
||||||
$ set noon
|
|
||||||
$ copy /protection = w:re ca.com wrk_sslxexe:ca.com /log
|
|
||||||
$ copy /protection = w:re openssl-vms.cnf wrk_sslroot:[000000]openssl.cnf /log
|
|
||||||
$ set on
|
|
||||||
$!
|
|
||||||
$ tidy:
|
|
||||||
$!
|
|
||||||
$ call deass wrk_sslroot
|
|
||||||
$ call deass wrk_sslxexe
|
|
||||||
$!
|
|
||||||
$ exit
|
|
||||||
$!
|
|
||||||
$ deass: subroutine
|
|
||||||
$ if (f$trnlnm( p1, "LNM$PROCESS") .nes. "")
|
|
||||||
$ then
|
|
||||||
$ deassign /process 'p1'
|
|
||||||
$ endif
|
|
||||||
$ endsubroutine
|
|
||||||
$!
|
|
||||||
65
apps/install.com
Normal file
65
apps/install.com
Normal file
@@ -0,0 +1,65 @@
|
|||||||
|
$! INSTALL.COM -- Installs the files in a given directory tree
|
||||||
|
$!
|
||||||
|
$! Author: Richard Levitte <richard@levitte.org>
|
||||||
|
$! Time of creation: 22-MAY-1998 10:13
|
||||||
|
$!
|
||||||
|
$! P1 root of the directory tree
|
||||||
|
$!
|
||||||
|
$
|
||||||
|
$ IF P1 .EQS. ""
|
||||||
|
$ THEN
|
||||||
|
$ WRITE SYS$OUTPUT "First argument missing."
|
||||||
|
$ WRITE SYS$OUTPUT -
|
||||||
|
"Should be the directory where you want things installed."
|
||||||
|
$ EXIT
|
||||||
|
$ ENDIF
|
||||||
|
$
|
||||||
|
$ IF (F$GETSYI("CPU").LT.128)
|
||||||
|
$ THEN
|
||||||
|
$ ARCH := VAX
|
||||||
|
$ ELSE
|
||||||
|
$ ARCH = F$EDIT( F$GETSYI( "ARCH_NAME"), "UPCASE")
|
||||||
|
$ IF (ARCH .EQS. "") THEN ARCH = "UNK"
|
||||||
|
$ ENDIF
|
||||||
|
$
|
||||||
|
$ ROOT = F$PARSE(P1,"[]A.;0",,,"SYNTAX_ONLY,NO_CONCEAL") - "A.;0"
|
||||||
|
$ ROOT_DEV = F$PARSE(ROOT,,,"DEVICE","SYNTAX_ONLY")
|
||||||
|
$ ROOT_DIR = F$PARSE(ROOT,,,"DIRECTORY","SYNTAX_ONLY") -
|
||||||
|
- "[000000." - "][" - "[" - "]"
|
||||||
|
$ ROOT = ROOT_DEV + "[" + ROOT_DIR
|
||||||
|
$
|
||||||
|
$ DEFINE/NOLOG WRK_SSLROOT 'ROOT'.] /TRANS=CONC
|
||||||
|
$ DEFINE/NOLOG WRK_SSLEXE WRK_SSLROOT:['ARCH'_EXE]
|
||||||
|
$
|
||||||
|
$ IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
|
||||||
|
CREATE/DIR/LOG WRK_SSLROOT:[000000]
|
||||||
|
$ IF F$PARSE("WRK_SSLEXE:") .EQS. "" THEN -
|
||||||
|
CREATE/DIR/LOG WRK_SSLEXE:
|
||||||
|
$
|
||||||
|
$ EXE := openssl
|
||||||
|
$
|
||||||
|
$ EXE_DIR := [-.'ARCH'.EXE.APPS]
|
||||||
|
$
|
||||||
|
$ I = 0
|
||||||
|
$ LOOP_EXE:
|
||||||
|
$ E = F$EDIT(F$ELEMENT(I, ",", EXE),"TRIM")
|
||||||
|
$ I = I + 1
|
||||||
|
$ IF E .EQS. "," THEN GOTO LOOP_EXE_END
|
||||||
|
$ SET NOON
|
||||||
|
$ IF F$SEARCH(EXE_DIR+E+".EXE") .NES. ""
|
||||||
|
$ THEN
|
||||||
|
$ COPY 'EXE_DIR''E'.EXE WRK_SSLEXE:'E'.EXE/log
|
||||||
|
$ SET FILE/PROT=W:RE WRK_SSLEXE:'E'.EXE
|
||||||
|
$ ENDIF
|
||||||
|
$ SET ON
|
||||||
|
$ GOTO LOOP_EXE
|
||||||
|
$ LOOP_EXE_END:
|
||||||
|
$
|
||||||
|
$ SET NOON
|
||||||
|
$ COPY CA.COM WRK_SSLEXE:CA.COM/LOG
|
||||||
|
$ SET FILE/PROT=W:RE WRK_SSLEXE:CA.COM
|
||||||
|
$ COPY OPENSSL-VMS.CNF WRK_SSLROOT:[000000]OPENSSL.CNF/LOG
|
||||||
|
$ SET FILE/PROT=W:R WRK_SSLROOT:[000000]OPENSSL.CNF
|
||||||
|
$ SET ON
|
||||||
|
$
|
||||||
|
$ EXIT
|
||||||
@@ -25,7 +25,7 @@ $! VAXC For VAX C.
|
|||||||
$! DECC For DEC C.
|
$! DECC For DEC C.
|
||||||
$! GNUC For GNU C.
|
$! GNUC For GNU C.
|
||||||
$!
|
$!
|
||||||
$! If you don't specify a compiler, it will try to determine which
|
$! If you don't speficy a compiler, it will try to determine which
|
||||||
$! "C" compiler to use.
|
$! "C" compiler to use.
|
||||||
$!
|
$!
|
||||||
$! P3, if defined, sets a TCP/IP library to use, through one of the following
|
$! P3, if defined, sets a TCP/IP library to use, through one of the following
|
||||||
@@ -39,35 +39,11 @@ $! P4, if defined, sets a compiler thread NOT needed on OpenVMS 7.1 (and up)
|
|||||||
$!
|
$!
|
||||||
$! P5, if defined, sets a choice of programs to compile.
|
$! P5, if defined, sets a choice of programs to compile.
|
||||||
$!
|
$!
|
||||||
$! P6, if defined, specifies the C pointer size. Ignored on VAX.
|
|
||||||
$! ("64=ARGV" gives more efficient code with HP C V7.3 or newer.)
|
|
||||||
$! Supported values are:
|
|
||||||
$!
|
|
||||||
$! "" Compile with default (/NOPOINTER_SIZE)
|
|
||||||
$! 32 Compile with /POINTER_SIZE=32 (SHORT)
|
|
||||||
$! 64 Compile with /POINTER_SIZE=64[=ARGV] (LONG[=ARGV])
|
|
||||||
$! (Automatically select ARGV if compiler supports it.)
|
|
||||||
$! 64= Compile with /POINTER_SIZE=64 (LONG).
|
|
||||||
$! 64=ARGV Compile with /POINTER_SIZE=64=ARGV (LONG=ARGV).
|
|
||||||
$!
|
|
||||||
$! P7, if defined, specifies a directory where ZLIB files (zlib.h,
|
|
||||||
$! libz.olb) may be found. Optionally, a non-default object library
|
|
||||||
$! name may be included ("dev:[dir]libz_64.olb", for example).
|
|
||||||
$!
|
|
||||||
$!
|
|
||||||
$! Announce/identify.
|
|
||||||
$!
|
|
||||||
$ proc = f$environment( "procedure")
|
|
||||||
$ write sys$output "@@@ "+ -
|
|
||||||
f$parse( proc, , , "name")+ f$parse( proc, , , "type")
|
|
||||||
$!
|
|
||||||
$ on control_c then goto exit
|
|
||||||
$!
|
$!
|
||||||
$! Define A TCP/IP Library That We Will Need To Link To.
|
$! Define A TCP/IP Library That We Will Need To Link To.
|
||||||
$! (That Is, If We Need To Link To One.)
|
$! (That Is, If We Need To Link To One.)
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = ""
|
$ TCPIP_LIB = ""
|
||||||
$ ZLIB_LIB = ""
|
|
||||||
$!
|
$!
|
||||||
$! Check What Architecture We Are Using.
|
$! Check What Architecture We Are Using.
|
||||||
$!
|
$!
|
||||||
@@ -76,7 +52,7 @@ $ THEN
|
|||||||
$!
|
$!
|
||||||
$! The Architecture Is VAX.
|
$! The Architecture Is VAX.
|
||||||
$!
|
$!
|
||||||
$ ARCH = "VAX"
|
$ ARCH := VAX
|
||||||
$!
|
$!
|
||||||
$! Else...
|
$! Else...
|
||||||
$!
|
$!
|
||||||
@@ -91,45 +67,29 @@ $! End The Architecture Check.
|
|||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$ ARCHD = ARCH
|
|
||||||
$ LIB32 = "32"
|
|
||||||
$ OPT_FILE = ""
|
|
||||||
$ POINTER_SIZE = ""
|
|
||||||
$!
|
|
||||||
$! Define what programs should be compiled
|
$! Define what programs should be compiled
|
||||||
$!
|
$!
|
||||||
$ PROGRAMS := OPENSSL
|
$ PROGRAMS := OPENSSL
|
||||||
$!
|
$!
|
||||||
$! Check To Make Sure We Have Valid Command Line Parameters.
|
|
||||||
$!
|
|
||||||
$ GOSUB CHECK_OPTIONS
|
|
||||||
$!
|
|
||||||
$! Define The CRYPTO Library.
|
$! Define The CRYPTO Library.
|
||||||
$!
|
$!
|
||||||
$ CRYPTO_LIB := SYS$DISK:[-.'ARCHD'.EXE.CRYPTO]SSL_LIBCRYPTO'LIB32'.OLB
|
$ CRYPTO_LIB := SYS$DISK:[-.'ARCH'.EXE.CRYPTO]LIBCRYPTO.OLB
|
||||||
$!
|
$!
|
||||||
$! Define The SSL Library.
|
$! Define The SSL Library.
|
||||||
$!
|
$!
|
||||||
$ SSL_LIB := SYS$DISK:[-.'ARCHD'.EXE.SSL]SSL_LIBSSL'LIB32'.OLB
|
$ SSL_LIB := SYS$DISK:[-.'ARCH'.EXE.SSL]LIBSSL.OLB
|
||||||
$!
|
$!
|
||||||
$! Define The OBJ and EXE Directories.
|
$! Define The OBJ Directory.
|
||||||
$!
|
$!
|
||||||
$ OBJ_DIR := SYS$DISK:[-.'ARCHD'.OBJ.APPS]
|
$ OBJ_DIR := SYS$DISK:[-.'ARCH'.OBJ.APPS]
|
||||||
$ EXE_DIR := SYS$DISK:[-.'ARCHD'.EXE.APPS]
|
|
||||||
$!
|
$!
|
||||||
$! Specify the destination directory in any /MAP option.
|
$! Define The EXE Directory.
|
||||||
$!
|
$!
|
||||||
$ if (LINKMAP .eqs. "MAP")
|
$ EXE_DIR := SYS$DISK:[-.'ARCH'.EXE.APPS]
|
||||||
$ then
|
|
||||||
$ LINKMAP = LINKMAP+ "=''EXE_DIR'"
|
|
||||||
$ endif
|
|
||||||
$!
|
$!
|
||||||
$! Add the location prefix to the linker options file name.
|
$! Check To Make Sure We Have Valid Command Line Parameters.
|
||||||
$!
|
$!
|
||||||
$ if (OPT_FILE .nes. "")
|
$ GOSUB CHECK_OPTIONS
|
||||||
$ then
|
|
||||||
$ OPT_FILE = EXE_DIR+ OPT_FILE
|
|
||||||
$ endif
|
|
||||||
$!
|
$!
|
||||||
$! Initialise logical names and such
|
$! Initialise logical names and such
|
||||||
$!
|
$!
|
||||||
@@ -137,7 +97,7 @@ $ GOSUB INITIALISE
|
|||||||
$!
|
$!
|
||||||
$! Tell The User What Kind of Machine We Run On.
|
$! Tell The User What Kind of Machine We Run On.
|
||||||
$!
|
$!
|
||||||
$ WRITE SYS$OUTPUT "Host system architecture: ''ARCHD'"
|
$ WRITE SYS$OUTPUT "Compiling On A ",ARCH," Machine."
|
||||||
$!
|
$!
|
||||||
$! Check To See If The OBJ Directory Exists.
|
$! Check To See If The OBJ Directory Exists.
|
||||||
$!
|
$!
|
||||||
@@ -179,15 +139,12 @@ $! reflect the E_OBJ variable in Makefile as closely as possible, thereby
|
|||||||
$! making it fairly easy to verify that the lists are the same.
|
$! making it fairly easy to verify that the lists are the same.
|
||||||
$!
|
$!
|
||||||
$ LIB_OPENSSL = "VERIFY,ASN1PARS,REQ,DGST,DH,DHPARAM,ENC,PASSWD,GENDH,ERRSTR,"+-
|
$ LIB_OPENSSL = "VERIFY,ASN1PARS,REQ,DGST,DH,DHPARAM,ENC,PASSWD,GENDH,ERRSTR,"+-
|
||||||
"CA,PKCS7,CRL2P7,CRL,"+-
|
"CA,PKCS7,CRL2P7,CRL,"+-
|
||||||
"RSA,RSAUTL,DSA,DSAPARAM,EC,ECPARAM,"+-
|
"RSA,RSAUTL,DSA,DSAPARAM,EC,ECPARAM,"+-
|
||||||
"X509,GENRSA,GENDSA,GENPKEY,S_SERVER,S_CLIENT,SPEED,"+-
|
"X509,GENRSA,GENDSA,S_SERVER,S_CLIENT,SPEED,"+-
|
||||||
"S_TIME,APPS,S_CB,S_SOCKET,APP_RAND,VERSION,SESS_ID,"+-
|
"S_TIME,APPS,S_CB,S_SOCKET,APP_RAND,VERSION,SESS_ID,"+-
|
||||||
"CIPHERS,NSEQ,PKCS12,PKCS8,PKEY,PKEYPARAM,PKEYUTL,"+ -
|
"CIPHERS,NSEQ,PKCS12,PKCS8,SPKAC,SMIME,RAND,ENGINE,"+-
|
||||||
"SPKAC,SMIME,CMS,RAND,ENGINE,OCSP,PRIME,TS,SRP"
|
"OCSP,PRIME,CMS"
|
||||||
$!
|
|
||||||
$ LIB_OPENSSL = LIB_OPENSSL+ ",VMS_DECC_INIT"
|
|
||||||
$!
|
|
||||||
$ TCPIP_PROGRAMS = ",,"
|
$ TCPIP_PROGRAMS = ",,"
|
||||||
$ IF COMPILER .EQS. "VAXC" THEN -
|
$ IF COMPILER .EQS. "VAXC" THEN -
|
||||||
TCPIP_PROGRAMS = ",OPENSSL,"
|
TCPIP_PROGRAMS = ",OPENSSL,"
|
||||||
@@ -245,7 +202,7 @@ $ LIB_COUNTER = -1
|
|||||||
$!
|
$!
|
||||||
$! Create a .OPT file for the object files
|
$! Create a .OPT file for the object files
|
||||||
$!
|
$!
|
||||||
$ OPEN /WRITE OBJECTS 'EXE_DIR''CURRENT_APP'.OPT
|
$ OPEN/WRITE OBJECTS 'EXE_DIR''CURRENT_APP'.OPT
|
||||||
$!
|
$!
|
||||||
$! Top Of The File Loop.
|
$! Top Of The File Loop.
|
||||||
$!
|
$!
|
||||||
@@ -332,18 +289,34 @@ $ GOTO NEXT_APP
|
|||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Link The Program.
|
$! Link The Program.
|
||||||
|
$! Check To See If We Are To Link With A Specific TCP/IP Library.
|
||||||
$!
|
$!
|
||||||
$ ON WARNING THEN GOTO NEXT_APP
|
$ ON WARNING THEN GOTO NEXT_APP
|
||||||
$!
|
$!
|
||||||
|
$ IF (TCPIP_LIB.NES."")
|
||||||
|
$ THEN
|
||||||
|
$!
|
||||||
$! Don't Link With The RSAREF Routines And TCP/IP Library.
|
$! Don't Link With The RSAREF Routines And TCP/IP Library.
|
||||||
$!
|
$!
|
||||||
$ LINK /'DEBUGGER' /'LINKMAP' /'TRACEBACK' /EXE='EXE_FILE' -
|
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
||||||
'EXE_DIR''CURRENT_APP'.OPT /OPTIONS, -
|
'EXE_DIR''CURRENT_APP'.OPT/OPTION, -
|
||||||
'SSL_LIB' /LIBRARY, -
|
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
||||||
'CRYPTO_LIB' /LIBRARY -
|
'TCPIP_LIB','OPT_FILE'/OPTION
|
||||||
'TCPIP_LIB' -
|
$!
|
||||||
'ZLIB_LIB' -
|
$! Else...
|
||||||
,'OPT_FILE' /OPTIONS
|
$!
|
||||||
|
$ ELSE
|
||||||
|
$!
|
||||||
|
$! Don't Link With The RSAREF Routines And Link With A TCP/IP Library.
|
||||||
|
$!
|
||||||
|
$ LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
|
||||||
|
'EXE_DIR''CURRENT_APP'.OPT/OPTION, -
|
||||||
|
'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY, -
|
||||||
|
'OPT_FILE'/OPTION
|
||||||
|
$!
|
||||||
|
$! End The TCP/IP Library Check.
|
||||||
|
$!
|
||||||
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Go Back And Do It Again.
|
$! Go Back And Do It Again.
|
||||||
$!
|
$!
|
||||||
@@ -378,7 +351,7 @@ $!
|
|||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File To Link Against
|
! Default System Options File To Link Agianst
|
||||||
! The Sharable VAX C Runtime Library.
|
! The Sharable VAX C Runtime Library.
|
||||||
!
|
!
|
||||||
SYS$SHARE:VAXCRTL.EXE/SHARE
|
SYS$SHARE:VAXCRTL.EXE/SHARE
|
||||||
@@ -407,7 +380,7 @@ $!
|
|||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File To Link Against
|
! Default System Options File To Link Agianst
|
||||||
! The Sharable C Runtime Library.
|
! The Sharable C Runtime Library.
|
||||||
!
|
!
|
||||||
GNU_CC:[000000]GCCLIB/LIBRARY
|
GNU_CC:[000000]GCCLIB/LIBRARY
|
||||||
@@ -442,7 +415,7 @@ $!
|
|||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File To Link Against
|
! Default System Options File To Link Agianst
|
||||||
! The Sharable DEC C Runtime Library.
|
! The Sharable DEC C Runtime Library.
|
||||||
!
|
!
|
||||||
SYS$SHARE:DECC$SHR.EXE/SHARE
|
SYS$SHARE:DECC$SHR.EXE/SHARE
|
||||||
@@ -457,7 +430,7 @@ $!
|
|||||||
$ CREATE 'OPT_FILE'
|
$ CREATE 'OPT_FILE'
|
||||||
$DECK
|
$DECK
|
||||||
!
|
!
|
||||||
! Default System Options File For non-VAX To Link Against
|
! Default System Options File For non-VAX To Link Agianst
|
||||||
! The Sharable C Runtime Library.
|
! The Sharable C Runtime Library.
|
||||||
!
|
!
|
||||||
SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
|
SYS$SHARE:CMA$OPEN_LIB_SHR/SHARE
|
||||||
@@ -541,15 +514,14 @@ $!
|
|||||||
$ IF (P1.EQS."NODEBUG")
|
$ IF (P1.EQS."NODEBUG")
|
||||||
$ THEN
|
$ THEN
|
||||||
$!
|
$!
|
||||||
$! P1 Is NODEBUG, So Compile Without Debugger Information.
|
$! P1 Is NODEBUG, So Compile Without Debugger Information.
|
||||||
$!
|
$!
|
||||||
$ DEBUGGER = "NODEBUG"
|
$ DEBUGGER = "NODEBUG"
|
||||||
$ LINKMAP = "NOMAP"
|
$ TRACEBACK = "NOTRACEBACK"
|
||||||
$ TRACEBACK = "NOTRACEBACK"
|
$ GCC_OPTIMIZE = "OPTIMIZE"
|
||||||
$ GCC_OPTIMIZE = "OPTIMIZE"
|
$ CC_OPTIMIZE = "OPTIMIZE"
|
||||||
$ CC_OPTIMIZE = "OPTIMIZE"
|
$ WRITE SYS$OUTPUT "No Debugger Information Will Be Produced During Compile."
|
||||||
$ WRITE SYS$OUTPUT "No Debugger Information Will Be Produced During Compile."
|
$ WRITE SYS$OUTPUT "Compiling With Compiler Optimization."
|
||||||
$ WRITE SYS$OUTPUT "Compiling With Compiler Optimization."
|
|
||||||
$!
|
$!
|
||||||
$! Else...
|
$! Else...
|
||||||
$!
|
$!
|
||||||
@@ -563,7 +535,6 @@ $!
|
|||||||
$! Compile With Debugger Information.
|
$! Compile With Debugger Information.
|
||||||
$!
|
$!
|
||||||
$ DEBUGGER = "DEBUG"
|
$ DEBUGGER = "DEBUG"
|
||||||
$ LINKMAP = "MAP"
|
|
||||||
$ TRACEBACK = "TRACEBACK"
|
$ TRACEBACK = "TRACEBACK"
|
||||||
$ GCC_OPTIMIZE = "NOOPTIMIZE"
|
$ GCC_OPTIMIZE = "NOOPTIMIZE"
|
||||||
$ CC_OPTIMIZE = "NOOPTIMIZE"
|
$ CC_OPTIMIZE = "NOOPTIMIZE"
|
||||||
@@ -571,7 +542,7 @@ $ WRITE SYS$OUTPUT "Debugger Information Will Be Produced During Compile."
|
|||||||
$ WRITE SYS$OUTPUT "Compiling Without Compiler Optimization."
|
$ WRITE SYS$OUTPUT "Compiling Without Compiler Optimization."
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
$! Tell The User Entered An Invalid Option.
|
$! Tell The User Entered An Invalid Option..
|
||||||
$!
|
$!
|
||||||
$ WRITE SYS$OUTPUT ""
|
$ WRITE SYS$OUTPUT ""
|
||||||
$ WRITE SYS$OUTPUT "The Option ",P1," Is Invalid. The Valid Options Are:"
|
$ WRITE SYS$OUTPUT "The Option ",P1," Is Invalid. The Valid Options Are:"
|
||||||
@@ -584,7 +555,7 @@ $! Time To EXIT.
|
|||||||
$!
|
$!
|
||||||
$ EXIT
|
$ EXIT
|
||||||
$!
|
$!
|
||||||
$! End The Valid Argument Check.
|
$! End The Valid Arguement Check.
|
||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
@@ -592,87 +563,6 @@ $! End The P1 Check.
|
|||||||
$!
|
$!
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Check P6 (POINTER_SIZE).
|
|
||||||
$!
|
|
||||||
$ IF (P6 .NES. "") .AND. (ARCH .NES. "VAX")
|
|
||||||
$ THEN
|
|
||||||
$!
|
|
||||||
$ IF (P6 .EQS. "32")
|
|
||||||
$ THEN
|
|
||||||
$ POINTER_SIZE = " /POINTER_SIZE=32"
|
|
||||||
$ ELSE
|
|
||||||
$ POINTER_SIZE = F$EDIT( P6, "COLLAPSE, UPCASE")
|
|
||||||
$ IF ((POINTER_SIZE .EQS. "64") .OR. -
|
|
||||||
(POINTER_SIZE .EQS. "64=") .OR. -
|
|
||||||
(POINTER_SIZE .EQS. "64=ARGV"))
|
|
||||||
$ THEN
|
|
||||||
$ ARCHD = ARCH+ "_64"
|
|
||||||
$ LIB32 = ""
|
|
||||||
$ IF (F$EXTRACT( 2, 1, POINTER_SIZE) .EQS. "=")
|
|
||||||
$ THEN
|
|
||||||
$! Explicit user choice: "64" or "64=ARGV".
|
|
||||||
$ IF (POINTER_SIZE .EQS. "64=") THEN POINTER_SIZE = "64"
|
|
||||||
$ ELSE
|
|
||||||
$ SET NOON
|
|
||||||
$ DEFINE /USER_MODE SYS$OUTPUT NL:
|
|
||||||
$ DEFINE /USER_MODE SYS$ERROR NL:
|
|
||||||
$ CC /NOLIST /NOOBJECT /POINTER_SIZE=64=ARGV NL:
|
|
||||||
$ IF ($STATUS .AND. %X0FFF0000) .EQ. %X00030000
|
|
||||||
$ THEN
|
|
||||||
$ ! If we got here, it means DCL complained like this:
|
|
||||||
$ ! %DCL-W-NOVALU, value not allowed - remove value specification
|
|
||||||
$ ! \64=\
|
|
||||||
$ !
|
|
||||||
$ ! If the compiler was run, logicals defined in /USER would
|
|
||||||
$ ! have been deassigned automatically. However, when DCL
|
|
||||||
$ ! complains, they aren't, so we do it here (it might be
|
|
||||||
$ ! unnecessary, but just in case there will be another error
|
|
||||||
$ ! message further on that we don't want to miss)
|
|
||||||
$ DEASSIGN /USER_MODE SYS$ERROR
|
|
||||||
$ DEASSIGN /USER_MODE SYS$OUTPUT
|
|
||||||
$ ELSE
|
|
||||||
$ POINTER_SIZE = POINTER_SIZE + "=ARGV"
|
|
||||||
$ ENDIF
|
|
||||||
$ SET ON
|
|
||||||
$ ENDIF
|
|
||||||
$ POINTER_SIZE = " /POINTER_SIZE=''POINTER_SIZE'"
|
|
||||||
$!
|
|
||||||
$ ELSE
|
|
||||||
$!
|
|
||||||
$! Tell The User Entered An Invalid Option.
|
|
||||||
$!
|
|
||||||
$ WRITE SYS$OUTPUT ""
|
|
||||||
$ WRITE SYS$OUTPUT "The Option ", P6, -
|
|
||||||
" Is Invalid. The Valid Options Are:"
|
|
||||||
$ WRITE SYS$OUTPUT ""
|
|
||||||
$ WRITE SYS$OUTPUT -
|
|
||||||
" """" : Compile with default (short) pointers."
|
|
||||||
$ WRITE SYS$OUTPUT -
|
|
||||||
" 32 : Compile with 32-bit (short) pointers."
|
|
||||||
$ WRITE SYS$OUTPUT -
|
|
||||||
" 64 : Compile with 64-bit (long) pointers (auto ARGV)."
|
|
||||||
$ WRITE SYS$OUTPUT -
|
|
||||||
" 64= : Compile with 64-bit (long) pointers (no ARGV)."
|
|
||||||
$ WRITE SYS$OUTPUT -
|
|
||||||
" 64=ARGV : Compile with 64-bit (long) pointers (ARGV)."
|
|
||||||
$ WRITE SYS$OUTPUT ""
|
|
||||||
$!
|
|
||||||
$! Time To EXIT.
|
|
||||||
$!
|
|
||||||
$ EXIT
|
|
||||||
$!
|
|
||||||
$ ENDIF
|
|
||||||
$!
|
|
||||||
$ ENDIF
|
|
||||||
$!
|
|
||||||
$! End The P6 (POINTER_SIZE) Check.
|
|
||||||
$!
|
|
||||||
$ ENDIF
|
|
||||||
$!
|
|
||||||
$! Set basic C compiler /INCLUDE directories.
|
|
||||||
$!
|
|
||||||
$ CC_INCLUDES = "SYS$DISK:[-],SYS$DISK:[-.CRYPTO]"
|
|
||||||
$!
|
|
||||||
$! Check To See If P2 Is Blank.
|
$! Check To See If P2 Is Blank.
|
||||||
$!
|
$!
|
||||||
$ IF (P2.EQS."")
|
$ IF (P2.EQS."")
|
||||||
@@ -773,64 +663,11 @@ $ CCDEFS = "MONOLITH"
|
|||||||
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
|
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
|
||||||
$ CCEXTRAFLAGS = ""
|
$ CCEXTRAFLAGS = ""
|
||||||
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
|
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
|
||||||
$ CCDISABLEWARNINGS = "" !!! "LONGLONGTYPE,LONGLONGSUFX,FOUNDCR"
|
$ CCDISABLEWARNINGS = "LONGLONGTYPE,LONGLONGSUFX,FOUNDCR"
|
||||||
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. "" THEN -
|
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. "" THEN -
|
||||||
CCDISABLEWARNINGS = CCDISABLEWARNINGS + "," + USER_CCDISABLEWARNINGS
|
CCDISABLEWARNINGS = CCDISABLEWARNINGS + "," + USER_CCDISABLEWARNINGS
|
||||||
$!
|
$!
|
||||||
$! Check To See If We Have A ZLIB Option.
|
$! Check To See If The User Entered A Valid Paramter.
|
||||||
$!
|
|
||||||
$ ZLIB = P7
|
|
||||||
$ IF (ZLIB .NES. "")
|
|
||||||
$ THEN
|
|
||||||
$!
|
|
||||||
$! Check for expected ZLIB files.
|
|
||||||
$!
|
|
||||||
$ err = 0
|
|
||||||
$ file1 = f$parse( "zlib.h", ZLIB, , , "SYNTAX_ONLY")
|
|
||||||
$ if (f$search( file1) .eqs. "")
|
|
||||||
$ then
|
|
||||||
$ WRITE SYS$OUTPUT ""
|
|
||||||
$ WRITE SYS$OUTPUT "The Option ", ZLIB, " Is Invalid."
|
|
||||||
$ WRITE SYS$OUTPUT " Can't find header: ''file1'"
|
|
||||||
$ err = 1
|
|
||||||
$ endif
|
|
||||||
$ file1 = f$parse( "A.;", ZLIB)- "A.;"
|
|
||||||
$!
|
|
||||||
$ file2 = f$parse( ZLIB, "libz.olb", , , "SYNTAX_ONLY")
|
|
||||||
$ if (f$search( file2) .eqs. "")
|
|
||||||
$ then
|
|
||||||
$ if (err .eq. 0)
|
|
||||||
$ then
|
|
||||||
$ WRITE SYS$OUTPUT ""
|
|
||||||
$ WRITE SYS$OUTPUT "The Option ", ZLIB, " Is Invalid."
|
|
||||||
$ endif
|
|
||||||
$ WRITE SYS$OUTPUT " Can't find library: ''file2'"
|
|
||||||
$ WRITE SYS$OUTPUT ""
|
|
||||||
$ err = err+ 2
|
|
||||||
$ endif
|
|
||||||
$ if (err .eq. 1)
|
|
||||||
$ then
|
|
||||||
$ WRITE SYS$OUTPUT ""
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$ if (err .ne. 0)
|
|
||||||
$ then
|
|
||||||
$ EXIT
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$ CCDEFS = """ZLIB=1"", "+ CCDEFS
|
|
||||||
$ CC_INCLUDES = CC_INCLUDES+ ", "+ file1
|
|
||||||
$ ZLIB_LIB = ", ''file2' /library"
|
|
||||||
$!
|
|
||||||
$! Print info
|
|
||||||
$!
|
|
||||||
$ WRITE SYS$OUTPUT "ZLIB library spec: ", file2
|
|
||||||
$!
|
|
||||||
$! End The ZLIB Check.
|
|
||||||
$!
|
|
||||||
$ ENDIF
|
|
||||||
$!
|
|
||||||
$! Check To See If The User Entered A Valid Parameter.
|
|
||||||
$!
|
$!
|
||||||
$ IF (P2.EQS."VAXC").OR.(P2.EQS."DECC").OR.(P2.EQS."GNUC")
|
$ IF (P2.EQS."VAXC").OR.(P2.EQS."DECC").OR.(P2.EQS."GNUC")
|
||||||
$ THEN
|
$ THEN
|
||||||
@@ -853,13 +690,13 @@ $!
|
|||||||
$ CC = "CC"
|
$ CC = "CC"
|
||||||
$ IF ARCH.EQS."VAX" .AND. F$TRNLNM("DECC$CC_DEFAULT").NES."/DECC" -
|
$ IF ARCH.EQS."VAX" .AND. F$TRNLNM("DECC$CC_DEFAULT").NES."/DECC" -
|
||||||
THEN CC = "CC/DECC"
|
THEN CC = "CC/DECC"
|
||||||
$ CC = CC + " /''CC_OPTIMIZE' /''DEBUGGER' /STANDARD=RELAXED"+ -
|
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/STANDARD=ANSI89" + -
|
||||||
"''POINTER_SIZE' /NOLIST /PREFIX=ALL" + -
|
"/NOLIST/PREFIX=ALL" + -
|
||||||
" /INCLUDE=(''CC_INCLUDES') " + CCEXTRAFLAGS
|
"/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
|
||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "VAX_DECC_OPTIONS.OPT"
|
$ OPT_FILE = "''EXE_DIR'VAX_DECC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End DECC Check.
|
$! End DECC Check.
|
||||||
$!
|
$!
|
||||||
@@ -887,7 +724,7 @@ $ EXIT
|
|||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
|
$ IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
|
||||||
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
$ CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
||||||
"/INCLUDE=(''CC_INCLUDES')" + CCEXTRAFLAGS
|
"/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
|
||||||
$ CCDEFS = CCDEFS + ",""VAXC"""
|
$ CCDEFS = CCDEFS + ",""VAXC"""
|
||||||
$!
|
$!
|
||||||
$! Define <sys> As SYS$COMMON:[SYSLIB]
|
$! Define <sys> As SYS$COMMON:[SYSLIB]
|
||||||
@@ -896,7 +733,7 @@ $ DEFINE/NOLOG SYS SYS$COMMON:[SYSLIB]
|
|||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "VAX_VAXC_OPTIONS.OPT"
|
$ OPT_FILE = "''EXE_DIR'VAX_VAXC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End VAXC Check
|
$! End VAXC Check
|
||||||
$!
|
$!
|
||||||
@@ -919,11 +756,11 @@ $! Use GNU C...
|
|||||||
$!
|
$!
|
||||||
$ IF F$TYPE(GCC) .EQS. "" THEN GCC := GCC
|
$ IF F$TYPE(GCC) .EQS. "" THEN GCC := GCC
|
||||||
$ CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
$ CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
|
||||||
"/INCLUDE=(''CC_INCLUDES')" + CCEXTRAFLAGS
|
"/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
|
||||||
$!
|
$!
|
||||||
$! Define The Linker Options File Name.
|
$! Define The Linker Options File Name.
|
||||||
$!
|
$!
|
||||||
$ OPT_FILE = "VAX_GNUC_OPTIONS.OPT"
|
$ OPT_FILE = "''EXE_DIR'VAX_GNUC_OPTIONS.OPT"
|
||||||
$!
|
$!
|
||||||
$! End The GNU C Check.
|
$! End The GNU C Check.
|
||||||
$!
|
$!
|
||||||
@@ -933,7 +770,7 @@ $! Set up default defines
|
|||||||
$!
|
$!
|
||||||
$ CCDEFS = """FLAT_INC=1""," + CCDEFS
|
$ CCDEFS = """FLAT_INC=1""," + CCDEFS
|
||||||
$!
|
$!
|
||||||
$! Else The User Entered An Invalid Argument.
|
$! Else The User Entered An Invalid Arguement.
|
||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
@@ -965,7 +802,7 @@ $ THEN
|
|||||||
$!
|
$!
|
||||||
$! Set the library to use SOCKETSHR
|
$! Set the library to use SOCKETSHR
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]SOCKETSHR_SHR.OPT /OPTIONS"
|
$ TCPIP_LIB = "SYS$DISK:[-.VMS]SOCKETSHR_SHR.OPT/OPT"
|
||||||
$!
|
$!
|
||||||
$! Done with SOCKETSHR
|
$! Done with SOCKETSHR
|
||||||
$!
|
$!
|
||||||
@@ -991,13 +828,13 @@ $ THEN
|
|||||||
$!
|
$!
|
||||||
$! Set the library to use UCX.
|
$! Set the library to use UCX.
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_DECC.OPT /OPTIONS"
|
$ TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC.OPT/OPT"
|
||||||
$ IF F$TRNLNM("UCX$IPC_SHR") .NES. ""
|
$ IF F$TRNLNM("UCX$IPC_SHR") .NES. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_DECC_LOG.OPT /OPTIONS"
|
$ TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC_LOG.OPT/OPT"
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ IF COMPILER .NES. "DECC" .AND. ARCH .EQS. "VAX" THEN -
|
$ IF COMPILER .NES. "DECC" .AND. ARCH .EQS. "VAX" THEN -
|
||||||
TCPIP_LIB = ",SYS$DISK:[-.VMS]UCX_SHR_VAXC.OPT /OPTIONS"
|
TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_VAXC.OPT/OPT"
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$!
|
$!
|
||||||
$! Done with UCX
|
$! Done with UCX
|
||||||
@@ -1011,7 +848,7 @@ $ THEN
|
|||||||
$!
|
$!
|
||||||
$! Set the library to use TCPIP.
|
$! Set the library to use TCPIP.
|
||||||
$!
|
$!
|
||||||
$ TCPIP_LIB = ",SYS$DISK:[-.VMS]TCPIP_SHR_DECC.OPT /OPTIONS"
|
$ TCPIP_LIB = "SYS$DISK:[-.VMS]TCPIP_SHR_DECC.OPT/OPT"
|
||||||
$!
|
$!
|
||||||
$! Done with TCPIP
|
$! Done with TCPIP
|
||||||
$!
|
$!
|
||||||
@@ -1036,9 +873,9 @@ $ CCDEFS = CCDEFS + ",TCPIP_TYPE_''P3'"
|
|||||||
$!
|
$!
|
||||||
$! Print info
|
$! Print info
|
||||||
$!
|
$!
|
||||||
$ WRITE SYS$OUTPUT "TCP/IP library spec: ", TCPIP_LIB- ","
|
$ WRITE SYS$OUTPUT "TCP/IP library spec: ", TCPIP_LIB
|
||||||
$!
|
$!
|
||||||
$! Else The User Entered An Invalid Argument.
|
$! Else The User Entered An Invalid Arguement.
|
||||||
$!
|
$!
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$!
|
$!
|
||||||
@@ -1066,13 +903,13 @@ $ IF COMPILER .EQS. "DECC"
|
|||||||
$ THEN
|
$ THEN
|
||||||
$ IF CCDISABLEWARNINGS .NES. ""
|
$ IF CCDISABLEWARNINGS .NES. ""
|
||||||
$ THEN
|
$ THEN
|
||||||
$ CCDISABLEWARNINGS = " /WARNING=(DISABLE=(" + CCDISABLEWARNINGS + "))"
|
$ CCDISABLEWARNINGS = "/WARNING=(DISABLE=(" + CCDISABLEWARNINGS + "))"
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ ELSE
|
$ ELSE
|
||||||
$ CCDISABLEWARNINGS = ""
|
$ CCDISABLEWARNINGS = ""
|
||||||
$ ENDIF
|
$ ENDIF
|
||||||
$ CC2 = CC + " /DEFINE=(" + CCDEFS + ",_POSIX_C_SOURCE)" + CCDISABLEWARNINGS
|
$ CC2 = CC + "/DEFINE=(" + CCDEFS + ",_POSIX_C_SOURCE)" + CCDISABLEWARNINGS
|
||||||
$ CC = CC + " /DEFINE=(" + CCDEFS + ")" + CCDISABLEWARNINGS
|
$ CC = CC + "/DEFINE=(" + CCDEFS + ")" + CCDISABLEWARNINGS
|
||||||
$!
|
$!
|
||||||
$! Show user the result
|
$! Show user the result
|
||||||
$!
|
$!
|
||||||
@@ -1138,7 +975,7 @@ $ __INCLUDE = __TOP + "INCLUDE.OPENSSL]"
|
|||||||
$!
|
$!
|
||||||
$! Set up the logical name OPENSSL to point at the include directory
|
$! Set up the logical name OPENSSL to point at the include directory
|
||||||
$!
|
$!
|
||||||
$ DEFINE OPENSSL /NOLOG '__INCLUDE'
|
$ DEFINE OPENSSL/NOLOG '__INCLUDE'
|
||||||
$!
|
$!
|
||||||
$! Done
|
$! Done
|
||||||
$!
|
$!
|
||||||
@@ -1146,24 +983,15 @@ $ RETURN
|
|||||||
$!
|
$!
|
||||||
$ CLEANUP:
|
$ CLEANUP:
|
||||||
$!
|
$!
|
||||||
$! Restore the saved logical name OPENSSL, if it had a value.
|
$! Restore the logical name OPENSSL if it had a value
|
||||||
$!
|
$!
|
||||||
$ if (f$type( __SAVE_OPENSSL) .nes. "")
|
$ IF __SAVE_OPENSSL .EQS. ""
|
||||||
$ then
|
$ THEN
|
||||||
$ IF __SAVE_OPENSSL .EQS. ""
|
$ DEASSIGN OPENSSL
|
||||||
$ THEN
|
$ ELSE
|
||||||
$ DEASSIGN OPENSSL
|
$ DEFINE/NOLOG OPENSSL '__SAVE_OPENSSL'
|
||||||
$ ELSE
|
$ ENDIF
|
||||||
$ DEFINE /NOLOG OPENSSL '__SAVE_OPENSSL'
|
|
||||||
$ ENDIF
|
|
||||||
$ endif
|
|
||||||
$!
|
|
||||||
$! Close any open files.
|
|
||||||
$!
|
|
||||||
$ if (f$trnlnm( "objects", "LNM$PROCESS", 0, "SUPERVISOR") .nes. "") then -
|
|
||||||
close objects
|
|
||||||
$!
|
$!
|
||||||
$! Done
|
$! Done
|
||||||
$!
|
$!
|
||||||
$ RETURN
|
$ RETURN
|
||||||
$!
|
|
||||||
|
|||||||
181
apps/nseq.c
181
apps/nseq.c
@@ -1,6 +1,7 @@
|
|||||||
/* nseq.c */
|
/* nseq.c */
|
||||||
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
/*
|
||||||
* project 1999.
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
|
||||||
|
* 1999.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
||||||
@@ -10,7 +11,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -69,99 +70,101 @@ int MAIN(int, char **);
|
|||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
char **args, *infile = NULL, *outfile = NULL;
|
char **args, *infile = NULL, *outfile = NULL;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int toseq = 0;
|
int toseq = 0;
|
||||||
X509 *x509 = NULL;
|
X509 *x509 = NULL;
|
||||||
NETSCAPE_CERT_SEQUENCE *seq = NULL;
|
NETSCAPE_CERT_SEQUENCE *seq = NULL;
|
||||||
int i, ret = 1;
|
int i, ret = 1;
|
||||||
int badarg = 0;
|
int badarg = 0;
|
||||||
if (bio_err == NULL) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
if (bio_err == NULL)
|
||||||
ERR_load_crypto_strings();
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
args = argv + 1;
|
ERR_load_crypto_strings();
|
||||||
while (!badarg && *args && *args[0] == '-') {
|
args = argv + 1;
|
||||||
if (!strcmp (*args, "-toseq")) toseq = 1;
|
while (!badarg && *args && *args[0] == '-') {
|
||||||
else if (!strcmp (*args, "-in")) {
|
if (!strcmp(*args, "-toseq"))
|
||||||
if (args[1]) {
|
toseq = 1;
|
||||||
args++;
|
else if (!strcmp(*args, "-in")) {
|
||||||
infile = *args;
|
if (args[1]) {
|
||||||
} else badarg = 1;
|
args++;
|
||||||
} else if (!strcmp (*args, "-out")) {
|
infile = *args;
|
||||||
if (args[1]) {
|
} else
|
||||||
args++;
|
badarg = 1;
|
||||||
outfile = *args;
|
} else if (!strcmp(*args, "-out")) {
|
||||||
} else badarg = 1;
|
if (args[1]) {
|
||||||
} else badarg = 1;
|
args++;
|
||||||
args++;
|
outfile = *args;
|
||||||
}
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
args++;
|
||||||
|
}
|
||||||
|
|
||||||
if (badarg) {
|
if (badarg) {
|
||||||
BIO_printf (bio_err, "Netscape certificate sequence utility\n");
|
BIO_printf(bio_err, "Netscape certificate sequence utility\n");
|
||||||
BIO_printf (bio_err, "Usage nseq [options]\n");
|
BIO_printf(bio_err, "Usage nseq [options]\n");
|
||||||
BIO_printf (bio_err, "where options are\n");
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf (bio_err, "-in file input file\n");
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
BIO_printf (bio_err, "-out file output file\n");
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
BIO_printf (bio_err, "-toseq output NS Sequence file\n");
|
BIO_printf(bio_err, "-toseq output NS Sequence file\n");
|
||||||
OPENSSL_EXIT(1);
|
OPENSSL_EXIT(1);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (infile) {
|
if (infile) {
|
||||||
if (!(in = BIO_new_file (infile, "r"))) {
|
if (!(in = BIO_new_file(infile, "r"))) {
|
||||||
BIO_printf (bio_err,
|
BIO_printf(bio_err, "Can't open input file %s\n", infile);
|
||||||
"Can't open input file %s\n", infile);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
} else
|
||||||
} else in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
|
|
||||||
if (outfile) {
|
if (outfile) {
|
||||||
if (!(out = BIO_new_file (outfile, "w"))) {
|
if (!(out = BIO_new_file(outfile, "w"))) {
|
||||||
BIO_printf (bio_err,
|
BIO_printf(bio_err, "Can't open output file %s\n", outfile);
|
||||||
"Can't open output file %s\n", outfile);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
} else {
|
||||||
} else {
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
if (toseq) {
|
if (toseq) {
|
||||||
seq = NETSCAPE_CERT_SEQUENCE_new();
|
seq = NETSCAPE_CERT_SEQUENCE_new();
|
||||||
seq->certs = sk_X509_new_null();
|
seq->certs = sk_X509_new_null();
|
||||||
while((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL)))
|
while ((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL)))
|
||||||
sk_X509_push(seq->certs,x509);
|
sk_X509_push(seq->certs, x509);
|
||||||
|
|
||||||
if(!sk_X509_num(seq->certs))
|
if (!sk_X509_num(seq->certs)) {
|
||||||
{
|
BIO_printf(bio_err, "Error reading certs file %s\n", infile);
|
||||||
BIO_printf (bio_err, "Error reading certs file %s\n", infile);
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
PEM_write_bio_NETSCAPE_CERT_SEQUENCE(out, seq);
|
||||||
PEM_write_bio_NETSCAPE_CERT_SEQUENCE(out, seq);
|
ret = 0;
|
||||||
ret = 0;
|
goto end;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (!(seq = PEM_read_bio_NETSCAPE_CERT_SEQUENCE(in, NULL, NULL, NULL))) {
|
if (!(seq = PEM_read_bio_NETSCAPE_CERT_SEQUENCE(in, NULL, NULL, NULL))) {
|
||||||
BIO_printf (bio_err, "Error reading sequence file %s\n", infile);
|
BIO_printf(bio_err, "Error reading sequence file %s\n", infile);
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
for(i = 0; i < sk_X509_num(seq->certs); i++) {
|
for (i = 0; i < sk_X509_num(seq->certs); i++) {
|
||||||
x509 = sk_X509_value(seq->certs, i);
|
x509 = sk_X509_value(seq->certs, i);
|
||||||
dump_cert_text(out, x509);
|
dump_cert_text(out, x509);
|
||||||
PEM_write_bio_X509(out, x509);
|
PEM_write_bio_X509(out, x509);
|
||||||
}
|
}
|
||||||
ret = 0;
|
ret = 0;
|
||||||
end:
|
end:
|
||||||
BIO_free(in);
|
BIO_free(in);
|
||||||
BIO_free_all(out);
|
BIO_free_all(out);
|
||||||
NETSCAPE_CERT_SEQUENCE_free(seq);
|
NETSCAPE_CERT_SEQUENCE_free(seq);
|
||||||
|
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
2317
apps/ocsp.c
2317
apps/ocsp.c
File diff suppressed because it is too large
Load Diff
@@ -21,17 +21,12 @@ oid_section = new_oids
|
|||||||
|
|
||||||
[ new_oids ]
|
[ new_oids ]
|
||||||
|
|
||||||
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
# We can add new OIDs in here for use by 'ca' and 'req'.
|
||||||
# Add a simple OID like this:
|
# Add a simple OID like this:
|
||||||
# testoid1=1.2.3.4
|
# testoid1=1.2.3.4
|
||||||
# Or use config file substitution like this:
|
# Or use config file substitution like this:
|
||||||
# testoid2=${testoid1}.5.6
|
# testoid2=${testoid1}.5.6
|
||||||
|
|
||||||
# Policies used by the TSA examples.
|
|
||||||
tsa_policy1 = 1.2.3.4.1
|
|
||||||
tsa_policy2 = 1.2.3.4.5.6
|
|
||||||
tsa_policy3 = 1.2.3.4.5.7
|
|
||||||
|
|
||||||
####################################################################
|
####################################################################
|
||||||
[ ca ]
|
[ ca ]
|
||||||
default_ca = CA_default # The default ca section
|
default_ca = CA_default # The default ca section
|
||||||
@@ -72,7 +67,7 @@ cert_opt = ca_default # Certificate field options
|
|||||||
|
|
||||||
default_days = 365 # how long to certify for
|
default_days = 365 # how long to certify for
|
||||||
default_crl_days= 30 # how long before next CRL
|
default_crl_days= 30 # how long before next CRL
|
||||||
default_md = default # use public key default MD
|
default_md = sha1 # which md to use.
|
||||||
preserve = no # keep passed DN ordering
|
preserve = no # keep passed DN ordering
|
||||||
|
|
||||||
# A few difference way of specifying how similar the request should look
|
# A few difference way of specifying how similar the request should look
|
||||||
@@ -115,12 +110,13 @@ x509_extensions = v3_ca # The extentions to add to the self signed cert
|
|||||||
|
|
||||||
# This sets a mask for permitted string types. There are several options.
|
# This sets a mask for permitted string types. There are several options.
|
||||||
# default: PrintableString, T61String, BMPString.
|
# default: PrintableString, T61String, BMPString.
|
||||||
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
# pkix : PrintableString, BMPString.
|
||||||
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
# utf8only: only UTF8Strings.
|
||||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||||
# MASK:XXXX a literal mask value.
|
# MASK:XXXX a literal mask value.
|
||||||
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
||||||
string_mask = utf8only
|
# so use this option with caution!
|
||||||
|
string_mask = nombstr
|
||||||
|
|
||||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||||
|
|
||||||
@@ -145,7 +141,7 @@ localityName = Locality Name (eg, city)
|
|||||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||||
#organizationalUnitName_default =
|
#organizationalUnitName_default =
|
||||||
|
|
||||||
commonName = Common Name (eg, YOUR name)
|
commonName = Common Name (e.g. server FQDN or YOUR name)
|
||||||
commonName_max = 64
|
commonName_max = 64
|
||||||
|
|
||||||
emailAddress = Email Address
|
emailAddress = Email Address
|
||||||
@@ -211,9 +207,6 @@ authorityKeyIdentifier=keyid,issuer
|
|||||||
#nsCaPolicyUrl
|
#nsCaPolicyUrl
|
||||||
#nsSslServerName
|
#nsSslServerName
|
||||||
|
|
||||||
# This is required for TSA certificates.
|
|
||||||
# extendedKeyUsage = critical,timeStamping
|
|
||||||
|
|
||||||
[ v3_req ]
|
[ v3_req ]
|
||||||
|
|
||||||
# Extensions to add to a certificate request
|
# Extensions to add to a certificate request
|
||||||
@@ -231,7 +224,7 @@ keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|||||||
|
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
|
|
||||||
authorityKeyIdentifier=keyid:always,issuer
|
authorityKeyIdentifier=keyid:always,issuer:always
|
||||||
|
|
||||||
# This is what PKIX recommends but some broken software chokes on critical
|
# This is what PKIX recommends but some broken software chokes on critical
|
||||||
# extensions.
|
# extensions.
|
||||||
@@ -264,7 +257,7 @@ basicConstraints = CA:true
|
|||||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||||
|
|
||||||
# issuerAltName=issuer:copy
|
# issuerAltName=issuer:copy
|
||||||
authorityKeyIdentifier=keyid:always
|
authorityKeyIdentifier=keyid:always,issuer:always
|
||||||
|
|
||||||
[ proxy_cert_ext ]
|
[ proxy_cert_ext ]
|
||||||
# These extensions should be added when creating a proxy certificate
|
# These extensions should be added when creating a proxy certificate
|
||||||
@@ -297,7 +290,7 @@ nsComment = "OpenSSL Generated Certificate"
|
|||||||
|
|
||||||
# PKIX recommendations harmless if included in all certificates.
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
authorityKeyIdentifier=keyid,issuer
|
authorityKeyIdentifier=keyid,issuer:always
|
||||||
|
|
||||||
# This stuff is for subjectAltName and issuerAltname.
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
# Import the email address.
|
# Import the email address.
|
||||||
@@ -318,33 +311,3 @@ authorityKeyIdentifier=keyid,issuer
|
|||||||
|
|
||||||
# This really needs to be in place for it to be a proxy certificate.
|
# This really needs to be in place for it to be a proxy certificate.
|
||||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
||||||
|
|
||||||
####################################################################
|
|
||||||
[ tsa ]
|
|
||||||
|
|
||||||
default_tsa = tsa_config1 # the default TSA section
|
|
||||||
|
|
||||||
[ tsa_config1 ]
|
|
||||||
|
|
||||||
# These are used by the TSA reply generation only.
|
|
||||||
dir = sys\$disk:[.demoCA # TSA root directory
|
|
||||||
serial = $dir]tsaserial. # The current serial number (mandatory)
|
|
||||||
crypto_device = builtin # OpenSSL engine to use for signing
|
|
||||||
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
|
||||||
# (optional)
|
|
||||||
certs = $dir.cacert.pem] # Certificate chain to include in reply
|
|
||||||
# (optional)
|
|
||||||
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
|
||||||
|
|
||||||
default_policy = tsa_policy1 # Policy if request did not specify it
|
|
||||||
# (optional)
|
|
||||||
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
|
||||||
digests = md5, sha1 # Acceptable message digests (mandatory)
|
|
||||||
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
|
||||||
clock_precision_digits = 0 # number of digits after dot. (optional)
|
|
||||||
ordering = yes # Is ordering defined for timestamps?
|
|
||||||
# (optional, default: no)
|
|
||||||
tsa_name = yes # Must the TSA name be included in the reply?
|
|
||||||
# (optional, default: no)
|
|
||||||
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
|
||||||
# (optional, default: no)
|
|
||||||
|
|||||||
909
apps/openssl.c
909
apps/openssl.c
File diff suppressed because it is too large
Load Diff
@@ -21,17 +21,12 @@ oid_section = new_oids
|
|||||||
|
|
||||||
[ new_oids ]
|
[ new_oids ]
|
||||||
|
|
||||||
# We can add new OIDs in here for use by 'ca', 'req' and 'ts'.
|
# We can add new OIDs in here for use by 'ca' and 'req'.
|
||||||
# Add a simple OID like this:
|
# Add a simple OID like this:
|
||||||
# testoid1=1.2.3.4
|
# testoid1=1.2.3.4
|
||||||
# Or use config file substitution like this:
|
# Or use config file substitution like this:
|
||||||
# testoid2=${testoid1}.5.6
|
# testoid2=${testoid1}.5.6
|
||||||
|
|
||||||
# Policies used by the TSA examples.
|
|
||||||
tsa_policy1 = 1.2.3.4.1
|
|
||||||
tsa_policy2 = 1.2.3.4.5.6
|
|
||||||
tsa_policy3 = 1.2.3.4.5.7
|
|
||||||
|
|
||||||
####################################################################
|
####################################################################
|
||||||
[ ca ]
|
[ ca ]
|
||||||
default_ca = CA_default # The default ca section
|
default_ca = CA_default # The default ca section
|
||||||
@@ -72,7 +67,7 @@ cert_opt = ca_default # Certificate field options
|
|||||||
|
|
||||||
default_days = 365 # how long to certify for
|
default_days = 365 # how long to certify for
|
||||||
default_crl_days= 30 # how long before next CRL
|
default_crl_days= 30 # how long before next CRL
|
||||||
default_md = default # use public key default MD
|
default_md = sha1 # which md to use.
|
||||||
preserve = no # keep passed DN ordering
|
preserve = no # keep passed DN ordering
|
||||||
|
|
||||||
# A few difference way of specifying how similar the request should look
|
# A few difference way of specifying how similar the request should look
|
||||||
@@ -115,12 +110,13 @@ x509_extensions = v3_ca # The extentions to add to the self signed cert
|
|||||||
|
|
||||||
# This sets a mask for permitted string types. There are several options.
|
# This sets a mask for permitted string types. There are several options.
|
||||||
# default: PrintableString, T61String, BMPString.
|
# default: PrintableString, T61String, BMPString.
|
||||||
# pkix : PrintableString, BMPString (PKIX recommendation before 2004)
|
# pkix : PrintableString, BMPString.
|
||||||
# utf8only: only UTF8Strings (PKIX recommendation after 2004).
|
# utf8only: only UTF8Strings.
|
||||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
|
||||||
# MASK:XXXX a literal mask value.
|
# MASK:XXXX a literal mask value.
|
||||||
# WARNING: ancient versions of Netscape crash on BMPStrings or UTF8Strings.
|
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
|
||||||
string_mask = utf8only
|
# so use this option with caution!
|
||||||
|
string_mask = nombstr
|
||||||
|
|
||||||
# req_extensions = v3_req # The extensions to add to a certificate request
|
# req_extensions = v3_req # The extensions to add to a certificate request
|
||||||
|
|
||||||
@@ -145,7 +141,7 @@ localityName = Locality Name (eg, city)
|
|||||||
organizationalUnitName = Organizational Unit Name (eg, section)
|
organizationalUnitName = Organizational Unit Name (eg, section)
|
||||||
#organizationalUnitName_default =
|
#organizationalUnitName_default =
|
||||||
|
|
||||||
commonName = Common Name (eg, YOUR name)
|
commonName = Common Name (e.g. server FQDN or YOUR name)
|
||||||
commonName_max = 64
|
commonName_max = 64
|
||||||
|
|
||||||
emailAddress = Email Address
|
emailAddress = Email Address
|
||||||
@@ -211,9 +207,6 @@ authorityKeyIdentifier=keyid,issuer
|
|||||||
#nsCaPolicyUrl
|
#nsCaPolicyUrl
|
||||||
#nsSslServerName
|
#nsSslServerName
|
||||||
|
|
||||||
# This is required for TSA certificates.
|
|
||||||
# extendedKeyUsage = critical,timeStamping
|
|
||||||
|
|
||||||
[ v3_req ]
|
[ v3_req ]
|
||||||
|
|
||||||
# Extensions to add to a certificate request
|
# Extensions to add to a certificate request
|
||||||
@@ -231,7 +224,7 @@ keyUsage = nonRepudiation, digitalSignature, keyEncipherment
|
|||||||
|
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
|
|
||||||
authorityKeyIdentifier=keyid:always,issuer
|
authorityKeyIdentifier=keyid:always,issuer:always
|
||||||
|
|
||||||
# This is what PKIX recommends but some broken software chokes on critical
|
# This is what PKIX recommends but some broken software chokes on critical
|
||||||
# extensions.
|
# extensions.
|
||||||
@@ -264,7 +257,7 @@ basicConstraints = CA:true
|
|||||||
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.
|
||||||
|
|
||||||
# issuerAltName=issuer:copy
|
# issuerAltName=issuer:copy
|
||||||
authorityKeyIdentifier=keyid:always
|
authorityKeyIdentifier=keyid:always,issuer:always
|
||||||
|
|
||||||
[ proxy_cert_ext ]
|
[ proxy_cert_ext ]
|
||||||
# These extensions should be added when creating a proxy certificate
|
# These extensions should be added when creating a proxy certificate
|
||||||
@@ -297,7 +290,7 @@ nsComment = "OpenSSL Generated Certificate"
|
|||||||
|
|
||||||
# PKIX recommendations harmless if included in all certificates.
|
# PKIX recommendations harmless if included in all certificates.
|
||||||
subjectKeyIdentifier=hash
|
subjectKeyIdentifier=hash
|
||||||
authorityKeyIdentifier=keyid,issuer
|
authorityKeyIdentifier=keyid,issuer:always
|
||||||
|
|
||||||
# This stuff is for subjectAltName and issuerAltname.
|
# This stuff is for subjectAltName and issuerAltname.
|
||||||
# Import the email address.
|
# Import the email address.
|
||||||
@@ -318,33 +311,3 @@ authorityKeyIdentifier=keyid,issuer
|
|||||||
|
|
||||||
# This really needs to be in place for it to be a proxy certificate.
|
# This really needs to be in place for it to be a proxy certificate.
|
||||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
|
||||||
|
|
||||||
####################################################################
|
|
||||||
[ tsa ]
|
|
||||||
|
|
||||||
default_tsa = tsa_config1 # the default TSA section
|
|
||||||
|
|
||||||
[ tsa_config1 ]
|
|
||||||
|
|
||||||
# These are used by the TSA reply generation only.
|
|
||||||
dir = ./demoCA # TSA root directory
|
|
||||||
serial = $dir/tsaserial # The current serial number (mandatory)
|
|
||||||
crypto_device = builtin # OpenSSL engine to use for signing
|
|
||||||
signer_cert = $dir/tsacert.pem # The TSA signing certificate
|
|
||||||
# (optional)
|
|
||||||
certs = $dir/cacert.pem # Certificate chain to include in reply
|
|
||||||
# (optional)
|
|
||||||
signer_key = $dir/private/tsakey.pem # The TSA private key (optional)
|
|
||||||
|
|
||||||
default_policy = tsa_policy1 # Policy if request did not specify it
|
|
||||||
# (optional)
|
|
||||||
other_policies = tsa_policy2, tsa_policy3 # acceptable policies (optional)
|
|
||||||
digests = md5, sha1 # Acceptable message digests (mandatory)
|
|
||||||
accuracy = secs:1, millisecs:500, microsecs:100 # (optional)
|
|
||||||
clock_precision_digits = 0 # number of digits after dot. (optional)
|
|
||||||
ordering = yes # Is ordering defined for timestamps?
|
|
||||||
# (optional, default: no)
|
|
||||||
tsa_name = yes # Must the TSA name be included in the reply?
|
|
||||||
# (optional, default: no)
|
|
||||||
ess_cert_id_chain = no # Must the ESS cert id chain be included?
|
|
||||||
# (optional, default: no)
|
|
||||||
|
|||||||
876
apps/passwd.c
876
apps/passwd.c
@@ -6,44 +6,44 @@
|
|||||||
|
|
||||||
#if !defined(OPENSSL_NO_DES) || !defined(NO_MD5CRYPT_1)
|
#if !defined(OPENSSL_NO_DES) || !defined(NO_MD5CRYPT_1)
|
||||||
|
|
||||||
#include <assert.h>
|
# include <assert.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
|
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
|
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/evp.h>
|
# include <openssl/evp.h>
|
||||||
#include <openssl/rand.h>
|
# include <openssl/rand.h>
|
||||||
#ifndef OPENSSL_NO_DES
|
# ifndef OPENSSL_NO_DES
|
||||||
# include <openssl/des.h>
|
# include <openssl/des.h>
|
||||||
#endif
|
# endif
|
||||||
#ifndef NO_MD5CRYPT_1
|
# ifndef NO_MD5CRYPT_1
|
||||||
# include <openssl/md5.h>
|
# include <openssl/md5.h>
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
|
# undef PROG
|
||||||
|
# define PROG passwd_main
|
||||||
|
|
||||||
#undef PROG
|
static unsigned const char cov_2char[64] = {
|
||||||
#define PROG passwd_main
|
/* from crypto/des/fcrypt.c */
|
||||||
|
0x2E, 0x2F, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35,
|
||||||
|
0x36, 0x37, 0x38, 0x39, 0x41, 0x42, 0x43, 0x44,
|
||||||
static unsigned const char cov_2char[64]={
|
0x45, 0x46, 0x47, 0x48, 0x49, 0x4A, 0x4B, 0x4C,
|
||||||
/* from crypto/des/fcrypt.c */
|
0x4D, 0x4E, 0x4F, 0x50, 0x51, 0x52, 0x53, 0x54,
|
||||||
0x2E,0x2F,0x30,0x31,0x32,0x33,0x34,0x35,
|
0x55, 0x56, 0x57, 0x58, 0x59, 0x5A, 0x61, 0x62,
|
||||||
0x36,0x37,0x38,0x39,0x41,0x42,0x43,0x44,
|
0x63, 0x64, 0x65, 0x66, 0x67, 0x68, 0x69, 0x6A,
|
||||||
0x45,0x46,0x47,0x48,0x49,0x4A,0x4B,0x4C,
|
0x6B, 0x6C, 0x6D, 0x6E, 0x6F, 0x70, 0x71, 0x72,
|
||||||
0x4D,0x4E,0x4F,0x50,0x51,0x52,0x53,0x54,
|
0x73, 0x74, 0x75, 0x76, 0x77, 0x78, 0x79, 0x7A
|
||||||
0x55,0x56,0x57,0x58,0x59,0x5A,0x61,0x62,
|
|
||||||
0x63,0x64,0x65,0x66,0x67,0x68,0x69,0x6A,
|
|
||||||
0x6B,0x6C,0x6D,0x6E,0x6F,0x70,0x71,0x72,
|
|
||||||
0x73,0x74,0x75,0x76,0x77,0x78,0x79,0x7A
|
|
||||||
};
|
};
|
||||||
|
|
||||||
static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
||||||
char *passwd, BIO *out, int quiet, int table, int reverse,
|
char *passwd, BIO *out, int quiet, int table,
|
||||||
size_t pw_maxlen, int usecrypt, int use1, int useapr1);
|
int reverse, size_t pw_maxlen, int usecrypt, int use1,
|
||||||
|
int useapr1);
|
||||||
|
|
||||||
/* -crypt - standard Unix password algorithm (default)
|
/*-
|
||||||
|
* -crypt - standard Unix password algorithm (default)
|
||||||
* -1 - MD5-based password algorithm
|
* -1 - MD5-based password algorithm
|
||||||
* -apr1 - MD5-based password algorithm, Apache variant
|
* -apr1 - MD5-based password algorithm, Apache variant
|
||||||
* -salt string - salt
|
* -salt string - salt
|
||||||
@@ -58,455 +58,437 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
|||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int ret = 1;
|
int ret = 1;
|
||||||
char *infile = NULL;
|
char *infile = NULL;
|
||||||
int in_stdin = 0;
|
int in_stdin = 0;
|
||||||
int in_noverify = 0;
|
int in_noverify = 0;
|
||||||
char *salt = NULL, *passwd = NULL, **passwds = NULL;
|
char *salt = NULL, *passwd = NULL, **passwds = NULL;
|
||||||
char *salt_malloc = NULL, *passwd_malloc = NULL;
|
char *salt_malloc = NULL, *passwd_malloc = NULL;
|
||||||
size_t passwd_malloc_size = 0;
|
size_t passwd_malloc_size = 0;
|
||||||
int pw_source_defined = 0;
|
int pw_source_defined = 0;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int i, badopt, opt_done;
|
int i, badopt, opt_done;
|
||||||
int passed_salt = 0, quiet = 0, table = 0, reverse = 0;
|
int passed_salt = 0, quiet = 0, table = 0, reverse = 0;
|
||||||
int usecrypt = 0, use1 = 0, useapr1 = 0;
|
int usecrypt = 0, use1 = 0, useapr1 = 0;
|
||||||
size_t pw_maxlen = 0;
|
size_t pw_maxlen = 0;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto err;
|
goto err;
|
||||||
out = BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if (out == NULL)
|
if (out == NULL)
|
||||||
goto err;
|
goto err;
|
||||||
BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
#ifdef OPENSSL_SYS_VMS
|
# ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
# endif
|
||||||
|
|
||||||
badopt = 0, opt_done = 0;
|
badopt = 0, opt_done = 0;
|
||||||
i = 0;
|
i = 0;
|
||||||
while (!badopt && !opt_done && argv[++i] != NULL)
|
while (!badopt && !opt_done && argv[++i] != NULL) {
|
||||||
{
|
if (strcmp(argv[i], "-crypt") == 0)
|
||||||
if (strcmp(argv[i], "-crypt") == 0)
|
usecrypt = 1;
|
||||||
usecrypt = 1;
|
else if (strcmp(argv[i], "-1") == 0)
|
||||||
else if (strcmp(argv[i], "-1") == 0)
|
use1 = 1;
|
||||||
use1 = 1;
|
else if (strcmp(argv[i], "-apr1") == 0)
|
||||||
else if (strcmp(argv[i], "-apr1") == 0)
|
useapr1 = 1;
|
||||||
useapr1 = 1;
|
else if (strcmp(argv[i], "-salt") == 0) {
|
||||||
else if (strcmp(argv[i], "-salt") == 0)
|
if ((argv[i + 1] != NULL) && (salt == NULL)) {
|
||||||
{
|
passed_salt = 1;
|
||||||
if ((argv[i+1] != NULL) && (salt == NULL))
|
salt = argv[++i];
|
||||||
{
|
} else
|
||||||
passed_salt = 1;
|
badopt = 1;
|
||||||
salt = argv[++i];
|
} else if (strcmp(argv[i], "-in") == 0) {
|
||||||
}
|
if ((argv[i + 1] != NULL) && !pw_source_defined) {
|
||||||
else
|
pw_source_defined = 1;
|
||||||
badopt = 1;
|
infile = argv[++i];
|
||||||
}
|
} else
|
||||||
else if (strcmp(argv[i], "-in") == 0)
|
badopt = 1;
|
||||||
{
|
} else if (strcmp(argv[i], "-stdin") == 0) {
|
||||||
if ((argv[i+1] != NULL) && !pw_source_defined)
|
if (!pw_source_defined) {
|
||||||
{
|
pw_source_defined = 1;
|
||||||
pw_source_defined = 1;
|
in_stdin = 1;
|
||||||
infile = argv[++i];
|
} else
|
||||||
}
|
badopt = 1;
|
||||||
else
|
} else if (strcmp(argv[i], "-noverify") == 0)
|
||||||
badopt = 1;
|
in_noverify = 1;
|
||||||
}
|
else if (strcmp(argv[i], "-quiet") == 0)
|
||||||
else if (strcmp(argv[i], "-stdin") == 0)
|
quiet = 1;
|
||||||
{
|
else if (strcmp(argv[i], "-table") == 0)
|
||||||
if (!pw_source_defined)
|
table = 1;
|
||||||
{
|
else if (strcmp(argv[i], "-reverse") == 0)
|
||||||
pw_source_defined = 1;
|
reverse = 1;
|
||||||
in_stdin = 1;
|
else if (argv[i][0] == '-')
|
||||||
}
|
badopt = 1;
|
||||||
else
|
else if (!pw_source_defined)
|
||||||
badopt = 1;
|
/* non-option arguments, use as passwords */
|
||||||
}
|
{
|
||||||
else if (strcmp(argv[i], "-noverify") == 0)
|
pw_source_defined = 1;
|
||||||
in_noverify = 1;
|
passwds = &argv[i];
|
||||||
else if (strcmp(argv[i], "-quiet") == 0)
|
opt_done = 1;
|
||||||
quiet = 1;
|
} else
|
||||||
else if (strcmp(argv[i], "-table") == 0)
|
badopt = 1;
|
||||||
table = 1;
|
}
|
||||||
else if (strcmp(argv[i], "-reverse") == 0)
|
|
||||||
reverse = 1;
|
|
||||||
else if (argv[i][0] == '-')
|
|
||||||
badopt = 1;
|
|
||||||
else if (!pw_source_defined)
|
|
||||||
/* non-option arguments, use as passwords */
|
|
||||||
{
|
|
||||||
pw_source_defined = 1;
|
|
||||||
passwds = &argv[i];
|
|
||||||
opt_done = 1;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!usecrypt && !use1 && !useapr1) /* use default */
|
if (!usecrypt && !use1 && !useapr1) /* use default */
|
||||||
usecrypt = 1;
|
usecrypt = 1;
|
||||||
if (usecrypt + use1 + useapr1 > 1) /* conflict */
|
if (usecrypt + use1 + useapr1 > 1) /* conflict */
|
||||||
badopt = 1;
|
badopt = 1;
|
||||||
|
|
||||||
/* reject unsupported algorithms */
|
/* reject unsupported algorithms */
|
||||||
#ifdef OPENSSL_NO_DES
|
# ifdef OPENSSL_NO_DES
|
||||||
if (usecrypt) badopt = 1;
|
if (usecrypt)
|
||||||
#endif
|
badopt = 1;
|
||||||
#ifdef NO_MD5CRYPT_1
|
# endif
|
||||||
if (use1 || useapr1) badopt = 1;
|
# ifdef NO_MD5CRYPT_1
|
||||||
#endif
|
if (use1 || useapr1)
|
||||||
|
badopt = 1;
|
||||||
|
# endif
|
||||||
|
|
||||||
if (badopt)
|
if (badopt) {
|
||||||
{
|
BIO_printf(bio_err, "Usage: passwd [options] [passwords]\n");
|
||||||
BIO_printf(bio_err, "Usage: passwd [options] [passwords]\n");
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err, "where options are\n");
|
# ifndef OPENSSL_NO_DES
|
||||||
#ifndef OPENSSL_NO_DES
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-crypt standard Unix password algorithm (default)\n");
|
"-crypt standard Unix password algorithm (default)\n");
|
||||||
#endif
|
# endif
|
||||||
#ifndef NO_MD5CRYPT_1
|
# ifndef NO_MD5CRYPT_1
|
||||||
BIO_printf(bio_err, "-1 MD5-based password algorithm\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-apr1 MD5-based password algorithm, Apache variant\n");
|
"-1 MD5-based password algorithm\n");
|
||||||
#endif
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-salt string use provided salt\n");
|
"-apr1 MD5-based password algorithm, Apache variant\n");
|
||||||
BIO_printf(bio_err, "-in file read passwords from file\n");
|
# endif
|
||||||
BIO_printf(bio_err, "-stdin read passwords from stdin\n");
|
BIO_printf(bio_err, "-salt string use provided salt\n");
|
||||||
BIO_printf(bio_err, "-noverify never verify when reading password from terminal\n");
|
BIO_printf(bio_err, "-in file read passwords from file\n");
|
||||||
BIO_printf(bio_err, "-quiet no warnings\n");
|
BIO_printf(bio_err, "-stdin read passwords from stdin\n");
|
||||||
BIO_printf(bio_err, "-table format output as table\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-reverse switch table columns\n");
|
"-noverify never verify when reading password from terminal\n");
|
||||||
|
BIO_printf(bio_err, "-quiet no warnings\n");
|
||||||
goto err;
|
BIO_printf(bio_err, "-table format output as table\n");
|
||||||
}
|
BIO_printf(bio_err, "-reverse switch table columns\n");
|
||||||
|
|
||||||
if ((infile != NULL) || in_stdin)
|
goto err;
|
||||||
{
|
}
|
||||||
in = BIO_new(BIO_s_file());
|
|
||||||
if (in == NULL)
|
|
||||||
goto err;
|
|
||||||
if (infile != NULL)
|
|
||||||
{
|
|
||||||
assert(in_stdin == 0);
|
|
||||||
if (BIO_read_filename(in, infile) <= 0)
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
assert(in_stdin);
|
|
||||||
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (usecrypt)
|
|
||||||
pw_maxlen = 8;
|
|
||||||
else if (use1 || useapr1)
|
|
||||||
pw_maxlen = 256; /* arbitrary limit, should be enough for most passwords */
|
|
||||||
|
|
||||||
if (passwds == NULL)
|
if ((infile != NULL) || in_stdin) {
|
||||||
{
|
in = BIO_new(BIO_s_file());
|
||||||
/* no passwords on the command line */
|
if (in == NULL)
|
||||||
|
goto err;
|
||||||
|
if (infile != NULL) {
|
||||||
|
assert(in_stdin == 0);
|
||||||
|
if (BIO_read_filename(in, infile) <= 0)
|
||||||
|
goto err;
|
||||||
|
} else {
|
||||||
|
assert(in_stdin);
|
||||||
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
passwd_malloc_size = pw_maxlen + 2;
|
if (usecrypt)
|
||||||
/* longer than necessary so that we can warn about truncation */
|
pw_maxlen = 8;
|
||||||
passwd = passwd_malloc = OPENSSL_malloc(passwd_malloc_size);
|
else if (use1 || useapr1)
|
||||||
if (passwd_malloc == NULL)
|
pw_maxlen = 256; /* arbitrary limit, should be enough for most
|
||||||
goto err;
|
* passwords */
|
||||||
}
|
|
||||||
|
|
||||||
if ((in == NULL) && (passwds == NULL))
|
if (passwds == NULL) {
|
||||||
{
|
/* no passwords on the command line */
|
||||||
/* build a null-terminated list */
|
|
||||||
static char *passwds_static[2] = {NULL, NULL};
|
|
||||||
|
|
||||||
passwds = passwds_static;
|
|
||||||
if (in == NULL)
|
|
||||||
if (EVP_read_pw_string(passwd_malloc, passwd_malloc_size, "Password: ", !(passed_salt || in_noverify)) != 0)
|
|
||||||
goto err;
|
|
||||||
passwds[0] = passwd_malloc;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (in == NULL)
|
passwd_malloc_size = pw_maxlen + 2;
|
||||||
{
|
/*
|
||||||
assert(passwds != NULL);
|
* longer than necessary so that we can warn about truncation
|
||||||
assert(*passwds != NULL);
|
*/
|
||||||
|
passwd = passwd_malloc = OPENSSL_malloc(passwd_malloc_size);
|
||||||
do /* loop over list of passwords */
|
if (passwd_malloc == NULL)
|
||||||
{
|
goto err;
|
||||||
passwd = *passwds++;
|
}
|
||||||
if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
|
|
||||||
quiet, table, reverse, pw_maxlen, usecrypt, use1, useapr1))
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
while (*passwds != NULL);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
/* in != NULL */
|
|
||||||
{
|
|
||||||
int done;
|
|
||||||
|
|
||||||
assert (passwd != NULL);
|
if ((in == NULL) && (passwds == NULL)) {
|
||||||
do
|
/* build a null-terminated list */
|
||||||
{
|
static char *passwds_static[2] = { NULL, NULL };
|
||||||
int r = BIO_gets(in, passwd, pw_maxlen + 1);
|
|
||||||
if (r > 0)
|
|
||||||
{
|
|
||||||
char *c = (strchr(passwd, '\n')) ;
|
|
||||||
if (c != NULL)
|
|
||||||
*c = 0; /* truncate at newline */
|
|
||||||
else
|
|
||||||
{
|
|
||||||
/* ignore rest of line */
|
|
||||||
char trash[BUFSIZ];
|
|
||||||
do
|
|
||||||
r = BIO_gets(in, trash, sizeof trash);
|
|
||||||
while ((r > 0) && (!strchr(trash, '\n')));
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
|
|
||||||
quiet, table, reverse, pw_maxlen, usecrypt, use1, useapr1))
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
done = (r <= 0);
|
|
||||||
}
|
|
||||||
while (!done);
|
|
||||||
}
|
|
||||||
ret = 0;
|
|
||||||
|
|
||||||
err:
|
passwds = passwds_static;
|
||||||
ERR_print_errors(bio_err);
|
if (in == NULL)
|
||||||
if (salt_malloc)
|
if (EVP_read_pw_string
|
||||||
OPENSSL_free(salt_malloc);
|
(passwd_malloc, passwd_malloc_size, "Password: ",
|
||||||
if (passwd_malloc)
|
!(passed_salt || in_noverify)) != 0)
|
||||||
OPENSSL_free(passwd_malloc);
|
goto err;
|
||||||
if (in)
|
passwds[0] = passwd_malloc;
|
||||||
BIO_free(in);
|
}
|
||||||
if (out)
|
|
||||||
BIO_free_all(out);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
if (in == NULL) {
|
||||||
|
assert(passwds != NULL);
|
||||||
|
assert(*passwds != NULL);
|
||||||
|
|
||||||
#ifndef NO_MD5CRYPT_1
|
do { /* loop over list of passwords */
|
||||||
/* MD5-based password algorithm (should probably be available as a library
|
passwd = *passwds++;
|
||||||
* function; then the static buffer would not be acceptable).
|
if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
|
||||||
* For magic string "1", this should be compatible to the MD5-based BSD
|
quiet, table, reverse, pw_maxlen, usecrypt, use1,
|
||||||
* password algorithm.
|
useapr1))
|
||||||
* For 'magic' string "apr1", this is compatible to the MD5-based Apache
|
goto err;
|
||||||
* password algorithm.
|
}
|
||||||
* (Apparently, the Apache password algorithm is identical except that the
|
while (*passwds != NULL);
|
||||||
* 'magic' string was changed -- the laziest application of the NIH principle
|
} else
|
||||||
* I've ever encountered.)
|
/* in != NULL */
|
||||||
|
{
|
||||||
|
int done;
|
||||||
|
|
||||||
|
assert(passwd != NULL);
|
||||||
|
do {
|
||||||
|
int r = BIO_gets(in, passwd, pw_maxlen + 1);
|
||||||
|
if (r > 0) {
|
||||||
|
char *c = (strchr(passwd, '\n'));
|
||||||
|
if (c != NULL)
|
||||||
|
*c = 0; /* truncate at newline */
|
||||||
|
else {
|
||||||
|
/* ignore rest of line */
|
||||||
|
char trash[BUFSIZ];
|
||||||
|
do
|
||||||
|
r = BIO_gets(in, trash, sizeof trash);
|
||||||
|
while ((r > 0) && (!strchr(trash, '\n')));
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
|
||||||
|
quiet, table, reverse, pw_maxlen, usecrypt,
|
||||||
|
use1, useapr1))
|
||||||
|
goto err;
|
||||||
|
}
|
||||||
|
done = (r <= 0);
|
||||||
|
}
|
||||||
|
while (!done);
|
||||||
|
}
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
err:
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
if (salt_malloc)
|
||||||
|
OPENSSL_free(salt_malloc);
|
||||||
|
if (passwd_malloc)
|
||||||
|
OPENSSL_free(passwd_malloc);
|
||||||
|
if (in)
|
||||||
|
BIO_free(in);
|
||||||
|
if (out)
|
||||||
|
BIO_free_all(out);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|
||||||
|
# ifndef NO_MD5CRYPT_1
|
||||||
|
/*
|
||||||
|
* MD5-based password algorithm (should probably be available as a library
|
||||||
|
* function; then the static buffer would not be acceptable). For magic
|
||||||
|
* string "1", this should be compatible to the MD5-based BSD password
|
||||||
|
* algorithm. For 'magic' string "apr1", this is compatible to the MD5-based
|
||||||
|
* Apache password algorithm. (Apparently, the Apache password algorithm is
|
||||||
|
* identical except that the 'magic' string was changed -- the laziest
|
||||||
|
* application of the NIH principle I've ever encountered.)
|
||||||
*/
|
*/
|
||||||
static char *md5crypt(const char *passwd, const char *magic, const char *salt)
|
static char *md5crypt(const char *passwd, const char *magic, const char *salt)
|
||||||
{
|
{
|
||||||
static char out_buf[6 + 9 + 24 + 2]; /* "$apr1$..salt..$.......md5hash..........\0" */
|
/* "$apr1$..salt..$.......md5hash..........\0" */
|
||||||
unsigned char buf[MD5_DIGEST_LENGTH];
|
static char out_buf[6 + 9 + 24 + 2];
|
||||||
char *salt_out;
|
unsigned char buf[MD5_DIGEST_LENGTH];
|
||||||
int n;
|
char *salt_out;
|
||||||
unsigned int i;
|
int n;
|
||||||
EVP_MD_CTX md,md2;
|
unsigned int i;
|
||||||
size_t passwd_len, salt_len;
|
EVP_MD_CTX md, md2;
|
||||||
|
size_t passwd_len, salt_len;
|
||||||
|
|
||||||
passwd_len = strlen(passwd);
|
passwd_len = strlen(passwd);
|
||||||
out_buf[0] = '$';
|
out_buf[0] = '$';
|
||||||
out_buf[1] = 0;
|
out_buf[1] = 0;
|
||||||
assert(strlen(magic) <= 4); /* "1" or "apr1" */
|
assert(strlen(magic) <= 4); /* "1" or "apr1" */
|
||||||
strncat(out_buf, magic, 4);
|
strncat(out_buf, magic, 4);
|
||||||
strncat(out_buf, "$", 1);
|
strncat(out_buf, "$", 1);
|
||||||
strncat(out_buf, salt, 8);
|
strncat(out_buf, salt, 8);
|
||||||
assert(strlen(out_buf) <= 6 + 8); /* "$apr1$..salt.." */
|
assert(strlen(out_buf) <= 6 + 8); /* "$apr1$..salt.." */
|
||||||
salt_out = out_buf + 2 + strlen(magic);
|
salt_out = out_buf + 2 + strlen(magic);
|
||||||
salt_len = strlen(salt_out);
|
salt_len = strlen(salt_out);
|
||||||
assert(salt_len <= 8);
|
assert(salt_len <= 8);
|
||||||
|
|
||||||
EVP_MD_CTX_init(&md);
|
|
||||||
EVP_DigestInit_ex(&md,EVP_md5(), NULL);
|
|
||||||
EVP_DigestUpdate(&md, passwd, passwd_len);
|
|
||||||
EVP_DigestUpdate(&md, "$", 1);
|
|
||||||
EVP_DigestUpdate(&md, magic, strlen(magic));
|
|
||||||
EVP_DigestUpdate(&md, "$", 1);
|
|
||||||
EVP_DigestUpdate(&md, salt_out, salt_len);
|
|
||||||
|
|
||||||
EVP_MD_CTX_init(&md2);
|
|
||||||
EVP_DigestInit_ex(&md2,EVP_md5(), NULL);
|
|
||||||
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
|
||||||
EVP_DigestUpdate(&md2, salt_out, salt_len);
|
|
||||||
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
|
||||||
EVP_DigestFinal_ex(&md2, buf, NULL);
|
|
||||||
|
|
||||||
for (i = passwd_len; i > sizeof buf; i -= sizeof buf)
|
EVP_MD_CTX_init(&md);
|
||||||
EVP_DigestUpdate(&md, buf, sizeof buf);
|
EVP_DigestInit_ex(&md, EVP_md5(), NULL);
|
||||||
EVP_DigestUpdate(&md, buf, i);
|
EVP_DigestUpdate(&md, passwd, passwd_len);
|
||||||
|
EVP_DigestUpdate(&md, "$", 1);
|
||||||
n = passwd_len;
|
EVP_DigestUpdate(&md, magic, strlen(magic));
|
||||||
while (n)
|
EVP_DigestUpdate(&md, "$", 1);
|
||||||
{
|
EVP_DigestUpdate(&md, salt_out, salt_len);
|
||||||
EVP_DigestUpdate(&md, (n & 1) ? "\0" : passwd, 1);
|
|
||||||
n >>= 1;
|
|
||||||
}
|
|
||||||
EVP_DigestFinal_ex(&md, buf, NULL);
|
|
||||||
|
|
||||||
for (i = 0; i < 1000; i++)
|
EVP_MD_CTX_init(&md2);
|
||||||
{
|
EVP_DigestInit_ex(&md2, EVP_md5(), NULL);
|
||||||
EVP_DigestInit_ex(&md2,EVP_md5(), NULL);
|
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
||||||
EVP_DigestUpdate(&md2, (i & 1) ? (unsigned const char *) passwd : buf,
|
EVP_DigestUpdate(&md2, salt_out, salt_len);
|
||||||
(i & 1) ? passwd_len : sizeof buf);
|
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
||||||
if (i % 3)
|
EVP_DigestFinal_ex(&md2, buf, NULL);
|
||||||
EVP_DigestUpdate(&md2, salt_out, salt_len);
|
|
||||||
if (i % 7)
|
|
||||||
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
|
||||||
EVP_DigestUpdate(&md2, (i & 1) ? buf : (unsigned const char *) passwd,
|
|
||||||
(i & 1) ? sizeof buf : passwd_len);
|
|
||||||
EVP_DigestFinal_ex(&md2, buf, NULL);
|
|
||||||
}
|
|
||||||
EVP_MD_CTX_cleanup(&md2);
|
|
||||||
|
|
||||||
{
|
|
||||||
/* transform buf into output string */
|
|
||||||
|
|
||||||
unsigned char buf_perm[sizeof buf];
|
|
||||||
int dest, source;
|
|
||||||
char *output;
|
|
||||||
|
|
||||||
/* silly output permutation */
|
for (i = passwd_len; i > sizeof buf; i -= sizeof buf)
|
||||||
for (dest = 0, source = 0; dest < 14; dest++, source = (source + 6) % 17)
|
EVP_DigestUpdate(&md, buf, sizeof buf);
|
||||||
buf_perm[dest] = buf[source];
|
EVP_DigestUpdate(&md, buf, i);
|
||||||
buf_perm[14] = buf[5];
|
|
||||||
buf_perm[15] = buf[11];
|
|
||||||
#ifndef PEDANTIC /* Unfortunately, this generates a "no effect" warning */
|
|
||||||
assert(16 == sizeof buf_perm);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
output = salt_out + salt_len;
|
|
||||||
assert(output == out_buf + strlen(out_buf));
|
|
||||||
|
|
||||||
*output++ = '$';
|
|
||||||
|
|
||||||
for (i = 0; i < 15; i += 3)
|
n = passwd_len;
|
||||||
{
|
while (n) {
|
||||||
*output++ = cov_2char[buf_perm[i+2] & 0x3f];
|
EVP_DigestUpdate(&md, (n & 1) ? "\0" : passwd, 1);
|
||||||
*output++ = cov_2char[((buf_perm[i+1] & 0xf) << 2) |
|
n >>= 1;
|
||||||
(buf_perm[i+2] >> 6)];
|
}
|
||||||
*output++ = cov_2char[((buf_perm[i] & 3) << 4) |
|
EVP_DigestFinal_ex(&md, buf, NULL);
|
||||||
(buf_perm[i+1] >> 4)];
|
|
||||||
*output++ = cov_2char[buf_perm[i] >> 2];
|
|
||||||
}
|
|
||||||
assert(i == 15);
|
|
||||||
*output++ = cov_2char[buf_perm[i] & 0x3f];
|
|
||||||
*output++ = cov_2char[buf_perm[i] >> 6];
|
|
||||||
*output = 0;
|
|
||||||
assert(strlen(out_buf) < sizeof(out_buf));
|
|
||||||
}
|
|
||||||
EVP_MD_CTX_cleanup(&md);
|
|
||||||
|
|
||||||
return out_buf;
|
for (i = 0; i < 1000; i++) {
|
||||||
}
|
EVP_DigestInit_ex(&md2, EVP_md5(), NULL);
|
||||||
#endif
|
EVP_DigestUpdate(&md2, (i & 1) ? (unsigned const char *)passwd : buf,
|
||||||
|
(i & 1) ? passwd_len : sizeof buf);
|
||||||
|
if (i % 3)
|
||||||
|
EVP_DigestUpdate(&md2, salt_out, salt_len);
|
||||||
|
if (i % 7)
|
||||||
|
EVP_DigestUpdate(&md2, passwd, passwd_len);
|
||||||
|
EVP_DigestUpdate(&md2, (i & 1) ? buf : (unsigned const char *)passwd,
|
||||||
|
(i & 1) ? sizeof buf : passwd_len);
|
||||||
|
EVP_DigestFinal_ex(&md2, buf, NULL);
|
||||||
|
}
|
||||||
|
EVP_MD_CTX_cleanup(&md2);
|
||||||
|
|
||||||
|
{
|
||||||
|
/* transform buf into output string */
|
||||||
|
|
||||||
|
unsigned char buf_perm[sizeof buf];
|
||||||
|
int dest, source;
|
||||||
|
char *output;
|
||||||
|
|
||||||
|
/* silly output permutation */
|
||||||
|
for (dest = 0, source = 0; dest < 14;
|
||||||
|
dest++, source = (source + 6) % 17)
|
||||||
|
buf_perm[dest] = buf[source];
|
||||||
|
buf_perm[14] = buf[5];
|
||||||
|
buf_perm[15] = buf[11];
|
||||||
|
# ifndef PEDANTIC /* Unfortunately, this generates a "no
|
||||||
|
* effect" warning */
|
||||||
|
assert(16 == sizeof buf_perm);
|
||||||
|
# endif
|
||||||
|
|
||||||
|
output = salt_out + salt_len;
|
||||||
|
assert(output == out_buf + strlen(out_buf));
|
||||||
|
|
||||||
|
*output++ = '$';
|
||||||
|
|
||||||
|
for (i = 0; i < 15; i += 3) {
|
||||||
|
*output++ = cov_2char[buf_perm[i + 2] & 0x3f];
|
||||||
|
*output++ = cov_2char[((buf_perm[i + 1] & 0xf) << 2) |
|
||||||
|
(buf_perm[i + 2] >> 6)];
|
||||||
|
*output++ = cov_2char[((buf_perm[i] & 3) << 4) |
|
||||||
|
(buf_perm[i + 1] >> 4)];
|
||||||
|
*output++ = cov_2char[buf_perm[i] >> 2];
|
||||||
|
}
|
||||||
|
assert(i == 15);
|
||||||
|
*output++ = cov_2char[buf_perm[i] & 0x3f];
|
||||||
|
*output++ = cov_2char[buf_perm[i] >> 6];
|
||||||
|
*output = 0;
|
||||||
|
assert(strlen(out_buf) < sizeof(out_buf));
|
||||||
|
}
|
||||||
|
EVP_MD_CTX_cleanup(&md);
|
||||||
|
|
||||||
|
return out_buf;
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
|
||||||
static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
|
||||||
char *passwd, BIO *out, int quiet, int table, int reverse,
|
char *passwd, BIO *out, int quiet, int table,
|
||||||
size_t pw_maxlen, int usecrypt, int use1, int useapr1)
|
int reverse, size_t pw_maxlen, int usecrypt, int use1,
|
||||||
{
|
int useapr1)
|
||||||
char *hash = NULL;
|
{
|
||||||
|
char *hash = NULL;
|
||||||
|
|
||||||
assert(salt_p != NULL);
|
assert(salt_p != NULL);
|
||||||
assert(salt_malloc_p != NULL);
|
assert(salt_malloc_p != NULL);
|
||||||
|
|
||||||
/* first make sure we have a salt */
|
/* first make sure we have a salt */
|
||||||
if (!passed_salt)
|
if (!passed_salt) {
|
||||||
{
|
# ifndef OPENSSL_NO_DES
|
||||||
#ifndef OPENSSL_NO_DES
|
if (usecrypt) {
|
||||||
if (usecrypt)
|
if (*salt_malloc_p == NULL) {
|
||||||
{
|
*salt_p = *salt_malloc_p = OPENSSL_malloc(3);
|
||||||
if (*salt_malloc_p == NULL)
|
if (*salt_malloc_p == NULL)
|
||||||
{
|
goto err;
|
||||||
*salt_p = *salt_malloc_p = OPENSSL_malloc(3);
|
}
|
||||||
if (*salt_malloc_p == NULL)
|
if (RAND_pseudo_bytes((unsigned char *)*salt_p, 2) < 0)
|
||||||
goto err;
|
goto err;
|
||||||
}
|
(*salt_p)[0] = cov_2char[(*salt_p)[0] & 0x3f]; /* 6 bits */
|
||||||
if (RAND_pseudo_bytes((unsigned char *)*salt_p, 2) < 0)
|
(*salt_p)[1] = cov_2char[(*salt_p)[1] & 0x3f]; /* 6 bits */
|
||||||
goto err;
|
(*salt_p)[2] = 0;
|
||||||
(*salt_p)[0] = cov_2char[(*salt_p)[0] & 0x3f]; /* 6 bits */
|
# ifdef CHARSET_EBCDIC
|
||||||
(*salt_p)[1] = cov_2char[(*salt_p)[1] & 0x3f]; /* 6 bits */
|
ascii2ebcdic(*salt_p, *salt_p, 2); /* des_crypt will convert back
|
||||||
(*salt_p)[2] = 0;
|
* to ASCII */
|
||||||
#ifdef CHARSET_EBCDIC
|
# endif
|
||||||
ascii2ebcdic(*salt_p, *salt_p, 2); /* des_crypt will convert
|
}
|
||||||
* back to ASCII */
|
# endif /* !OPENSSL_NO_DES */
|
||||||
#endif
|
|
||||||
}
|
|
||||||
#endif /* !OPENSSL_NO_DES */
|
|
||||||
|
|
||||||
#ifndef NO_MD5CRYPT_1
|
# ifndef NO_MD5CRYPT_1
|
||||||
if (use1 || useapr1)
|
if (use1 || useapr1) {
|
||||||
{
|
int i;
|
||||||
int i;
|
|
||||||
|
|
||||||
if (*salt_malloc_p == NULL)
|
|
||||||
{
|
|
||||||
*salt_p = *salt_malloc_p = OPENSSL_malloc(9);
|
|
||||||
if (*salt_malloc_p == NULL)
|
|
||||||
goto err;
|
|
||||||
}
|
|
||||||
if (RAND_pseudo_bytes((unsigned char *)*salt_p, 8) < 0)
|
|
||||||
goto err;
|
|
||||||
|
|
||||||
for (i = 0; i < 8; i++)
|
|
||||||
(*salt_p)[i] = cov_2char[(*salt_p)[i] & 0x3f]; /* 6 bits */
|
|
||||||
(*salt_p)[8] = 0;
|
|
||||||
}
|
|
||||||
#endif /* !NO_MD5CRYPT_1 */
|
|
||||||
}
|
|
||||||
|
|
||||||
assert(*salt_p != NULL);
|
|
||||||
|
|
||||||
/* truncate password if necessary */
|
|
||||||
if ((strlen(passwd) > pw_maxlen))
|
|
||||||
{
|
|
||||||
if (!quiet)
|
|
||||||
/* XXX: really we should know how to print a size_t, not cast it */
|
|
||||||
BIO_printf(bio_err, "Warning: truncating password to %u characters\n", (unsigned)pw_maxlen);
|
|
||||||
passwd[pw_maxlen] = 0;
|
|
||||||
}
|
|
||||||
assert(strlen(passwd) <= pw_maxlen);
|
|
||||||
|
|
||||||
/* now compute password hash */
|
|
||||||
#ifndef OPENSSL_NO_DES
|
|
||||||
if (usecrypt)
|
|
||||||
hash = DES_crypt(passwd, *salt_p);
|
|
||||||
#endif
|
|
||||||
#ifndef NO_MD5CRYPT_1
|
|
||||||
if (use1 || useapr1)
|
|
||||||
hash = md5crypt(passwd, (use1 ? "1" : "apr1"), *salt_p);
|
|
||||||
#endif
|
|
||||||
assert(hash != NULL);
|
|
||||||
|
|
||||||
if (table && !reverse)
|
if (*salt_malloc_p == NULL) {
|
||||||
BIO_printf(out, "%s\t%s\n", passwd, hash);
|
*salt_p = *salt_malloc_p = OPENSSL_malloc(9);
|
||||||
else if (table && reverse)
|
if (*salt_malloc_p == NULL)
|
||||||
BIO_printf(out, "%s\t%s\n", hash, passwd);
|
goto err;
|
||||||
else
|
}
|
||||||
BIO_printf(out, "%s\n", hash);
|
if (RAND_pseudo_bytes((unsigned char *)*salt_p, 8) < 0)
|
||||||
return 1;
|
goto err;
|
||||||
|
|
||||||
err:
|
for (i = 0; i < 8; i++)
|
||||||
return 0;
|
(*salt_p)[i] = cov_2char[(*salt_p)[i] & 0x3f]; /* 6 bits */
|
||||||
}
|
(*salt_p)[8] = 0;
|
||||||
|
}
|
||||||
|
# endif /* !NO_MD5CRYPT_1 */
|
||||||
|
}
|
||||||
|
|
||||||
|
assert(*salt_p != NULL);
|
||||||
|
|
||||||
|
/* truncate password if necessary */
|
||||||
|
if ((strlen(passwd) > pw_maxlen)) {
|
||||||
|
if (!quiet)
|
||||||
|
/*
|
||||||
|
* XXX: really we should know how to print a size_t, not cast it
|
||||||
|
*/
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"Warning: truncating password to %u characters\n",
|
||||||
|
(unsigned)pw_maxlen);
|
||||||
|
passwd[pw_maxlen] = 0;
|
||||||
|
}
|
||||||
|
assert(strlen(passwd) <= pw_maxlen);
|
||||||
|
|
||||||
|
/* now compute password hash */
|
||||||
|
# ifndef OPENSSL_NO_DES
|
||||||
|
if (usecrypt)
|
||||||
|
hash = DES_crypt(passwd, *salt_p);
|
||||||
|
# endif
|
||||||
|
# ifndef NO_MD5CRYPT_1
|
||||||
|
if (use1 || useapr1)
|
||||||
|
hash = md5crypt(passwd, (use1 ? "1" : "apr1"), *salt_p);
|
||||||
|
# endif
|
||||||
|
assert(hash != NULL);
|
||||||
|
|
||||||
|
if (table && !reverse)
|
||||||
|
BIO_printf(out, "%s\t%s\n", passwd, hash);
|
||||||
|
else if (table && reverse)
|
||||||
|
BIO_printf(out, "%s\t%s\n", hash, passwd);
|
||||||
|
else
|
||||||
|
BIO_printf(out, "%s\n", hash);
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
err:
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
#else
|
#else
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
fputs("Program not available.\n", stderr)
|
fputs("Program not available.\n", stderr)
|
||||||
OPENSSL_EXIT(1);
|
OPENSSL_EXIT(1);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
1575
apps/pkcs12.c
1575
apps/pkcs12.c
File diff suppressed because it is too large
Load Diff
411
apps/pkcs7.c
411
apps/pkcs7.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -69,252 +69,235 @@
|
|||||||
#include <openssl/pem.h>
|
#include <openssl/pem.h>
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG pkcs7_main
|
#define PROG pkcs7_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (DER or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (DER or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -print_certs
|
* -print_certs
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
PKCS7 *p7=NULL;
|
PKCS7 *p7 = NULL;
|
||||||
int i,badops=0;
|
int i, badops = 0;
|
||||||
BIO *in=NULL,*out=NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int informat,outformat;
|
int informat, outformat;
|
||||||
char *infile,*outfile,*prog;
|
char *infile, *outfile, *prog;
|
||||||
int print_certs=0,text=0,noout=0,p7_print=0;
|
int print_certs = 0, text = 0, noout = 0;
|
||||||
int ret=1;
|
int ret = 1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine = NULL;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
infile=NULL;
|
infile = NULL;
|
||||||
outfile=NULL;
|
outfile = NULL;
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat=FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
prog=argv[0];
|
prog = argv[0];
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
while (argc >= 1)
|
while (argc >= 1) {
|
||||||
{
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
if (--argc < 1)
|
||||||
{
|
goto bad;
|
||||||
if (--argc < 1) goto bad;
|
informat = str2fmt(*(++argv));
|
||||||
informat=str2fmt(*(++argv));
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
}
|
if (--argc < 1)
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
goto bad;
|
||||||
{
|
outformat = str2fmt(*(++argv));
|
||||||
if (--argc < 1) goto bad;
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
outformat=str2fmt(*(++argv));
|
if (--argc < 1)
|
||||||
}
|
goto bad;
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
infile = *(++argv);
|
||||||
{
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
if (--argc < 1) goto bad;
|
if (--argc < 1)
|
||||||
infile= *(++argv);
|
goto bad;
|
||||||
}
|
outfile = *(++argv);
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
} else if (strcmp(*argv, "-noout") == 0)
|
||||||
{
|
noout = 1;
|
||||||
if (--argc < 1) goto bad;
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
outfile= *(++argv);
|
text = 1;
|
||||||
}
|
else if (strcmp(*argv, "-print_certs") == 0)
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
print_certs = 1;
|
||||||
noout=1;
|
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
|
||||||
text=1;
|
|
||||||
else if (strcmp(*argv,"-print") == 0)
|
|
||||||
p7_print=1;
|
|
||||||
else if (strcmp(*argv,"-print_certs") == 0)
|
|
||||||
print_certs=1;
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
{
|
if (--argc < 1)
|
||||||
if (--argc < 1) goto bad;
|
goto bad;
|
||||||
engine= *(++argv);
|
engine = *(++argv);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
else
|
else {
|
||||||
{
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
badops = 1;
|
||||||
badops=1;
|
break;
|
||||||
break;
|
}
|
||||||
}
|
argc--;
|
||||||
argc--;
|
argv++;
|
||||||
argv++;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
if (badops) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err,"where options are\n");
|
BIO_printf(bio_err, " -inform arg input format - DER or PEM\n");
|
||||||
BIO_printf(bio_err," -inform arg input format - DER or PEM\n");
|
BIO_printf(bio_err, " -outform arg output format - DER or PEM\n");
|
||||||
BIO_printf(bio_err," -outform arg output format - DER or PEM\n");
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -print_certs print any certs or crl in the input\n");
|
" -print_certs print any certs or crl in the input\n");
|
||||||
BIO_printf(bio_err," -text print full details of certificates\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err," -noout don't output encoded data\n");
|
" -text print full details of certificates\n");
|
||||||
|
BIO_printf(bio_err, " -noout don't output encoded data\n");
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err,
|
||||||
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
#endif
|
||||||
ret = 1;
|
ret = 1;
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
in=BIO_new(BIO_s_file());
|
in = BIO_new(BIO_s_file());
|
||||||
out=BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if ((in == NULL) || (out == NULL))
|
if ((in == NULL) || (out == NULL)) {
|
||||||
{
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (infile == NULL)
|
||||||
|
BIO_set_fp(in, stdin, BIO_NOCLOSE);
|
||||||
|
else {
|
||||||
|
if (BIO_read_filename(in, infile) <= 0)
|
||||||
|
if (in == NULL) {
|
||||||
|
perror(infile);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (infile == NULL)
|
if (informat == FORMAT_ASN1)
|
||||||
BIO_set_fp(in,stdin,BIO_NOCLOSE);
|
p7 = d2i_PKCS7_bio(in, NULL);
|
||||||
else
|
else if (informat == FORMAT_PEM)
|
||||||
{
|
p7 = PEM_read_bio_PKCS7(in, NULL, NULL, NULL);
|
||||||
if (BIO_read_filename(in,infile) <= 0)
|
else {
|
||||||
if (in == NULL)
|
BIO_printf(bio_err, "bad input format specified for pkcs7 object\n");
|
||||||
{
|
goto end;
|
||||||
perror(infile);
|
}
|
||||||
goto end;
|
if (p7 == NULL) {
|
||||||
}
|
BIO_printf(bio_err, "unable to load PKCS7 object\n");
|
||||||
}
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if (informat == FORMAT_ASN1)
|
if (outfile == NULL) {
|
||||||
p7=d2i_PKCS7_bio(in,NULL);
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
else if (informat == FORMAT_PEM)
|
|
||||||
p7=PEM_read_bio_PKCS7(in,NULL,NULL,NULL);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"bad input format specified for pkcs7 object\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if (p7 == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unable to load PKCS7 object\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outfile == NULL)
|
|
||||||
{
|
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
} else {
|
||||||
else
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
{
|
perror(outfile);
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
goto end;
|
||||||
{
|
}
|
||||||
perror(outfile);
|
}
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (p7_print)
|
if (print_certs) {
|
||||||
PKCS7_print_ctx(out, p7, 0, NULL);
|
STACK_OF(X509) *certs = NULL;
|
||||||
|
STACK_OF(X509_CRL) *crls = NULL;
|
||||||
|
|
||||||
if (print_certs)
|
i = OBJ_obj2nid(p7->type);
|
||||||
{
|
switch (i) {
|
||||||
STACK_OF(X509) *certs=NULL;
|
case NID_pkcs7_signed:
|
||||||
STACK_OF(X509_CRL) *crls=NULL;
|
certs = p7->d.sign->cert;
|
||||||
|
crls = p7->d.sign->crl;
|
||||||
|
break;
|
||||||
|
case NID_pkcs7_signedAndEnveloped:
|
||||||
|
certs = p7->d.signed_and_enveloped->cert;
|
||||||
|
crls = p7->d.signed_and_enveloped->crl;
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
i=OBJ_obj2nid(p7->type);
|
if (certs != NULL) {
|
||||||
switch (i)
|
X509 *x;
|
||||||
{
|
|
||||||
case NID_pkcs7_signed:
|
|
||||||
certs=p7->d.sign->cert;
|
|
||||||
crls=p7->d.sign->crl;
|
|
||||||
break;
|
|
||||||
case NID_pkcs7_signedAndEnveloped:
|
|
||||||
certs=p7->d.signed_and_enveloped->cert;
|
|
||||||
crls=p7->d.signed_and_enveloped->crl;
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (certs != NULL)
|
for (i = 0; i < sk_X509_num(certs); i++) {
|
||||||
{
|
x = sk_X509_value(certs, i);
|
||||||
X509 *x;
|
if (text)
|
||||||
|
X509_print(out, x);
|
||||||
|
else
|
||||||
|
dump_cert_text(out, x);
|
||||||
|
|
||||||
for (i=0; i<sk_X509_num(certs); i++)
|
if (!noout)
|
||||||
{
|
PEM_write_bio_X509(out, x);
|
||||||
x=sk_X509_value(certs,i);
|
BIO_puts(out, "\n");
|
||||||
if(text) X509_print(out, x);
|
}
|
||||||
else dump_cert_text(out, x);
|
}
|
||||||
|
if (crls != NULL) {
|
||||||
|
X509_CRL *crl;
|
||||||
|
|
||||||
if(!noout) PEM_write_bio_X509(out,x);
|
for (i = 0; i < sk_X509_CRL_num(crls); i++) {
|
||||||
BIO_puts(out,"\n");
|
crl = sk_X509_CRL_value(crls, i);
|
||||||
}
|
|
||||||
}
|
|
||||||
if (crls != NULL)
|
|
||||||
{
|
|
||||||
X509_CRL *crl;
|
|
||||||
|
|
||||||
for (i=0; i<sk_X509_CRL_num(crls); i++)
|
X509_CRL_print(out, crl);
|
||||||
{
|
|
||||||
crl=sk_X509_CRL_value(crls,i);
|
|
||||||
|
|
||||||
X509_CRL_print(out, crl);
|
if (!noout)
|
||||||
|
PEM_write_bio_X509_CRL(out, crl);
|
||||||
|
BIO_puts(out, "\n");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if(!noout)PEM_write_bio_X509_CRL(out,crl);
|
ret = 0;
|
||||||
BIO_puts(out,"\n");
|
goto end;
|
||||||
}
|
}
|
||||||
}
|
|
||||||
|
|
||||||
ret=0;
|
if (!noout) {
|
||||||
goto end;
|
if (outformat == FORMAT_ASN1)
|
||||||
}
|
i = i2d_PKCS7_bio(out, p7);
|
||||||
|
else if (outformat == FORMAT_PEM)
|
||||||
|
i = PEM_write_bio_PKCS7(out, p7);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if(!noout) {
|
if (!i) {
|
||||||
if (outformat == FORMAT_ASN1)
|
BIO_printf(bio_err, "unable to write pkcs7 object\n");
|
||||||
i=i2d_PKCS7_bio(out,p7);
|
ERR_print_errors(bio_err);
|
||||||
else if (outformat == FORMAT_PEM)
|
goto end;
|
||||||
i=PEM_write_bio_PKCS7(out,p7);
|
}
|
||||||
else {
|
}
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
ret = 0;
|
||||||
goto end;
|
end:
|
||||||
}
|
if (p7 != NULL)
|
||||||
|
PKCS7_free(p7);
|
||||||
if (!i)
|
if (in != NULL)
|
||||||
{
|
BIO_free(in);
|
||||||
BIO_printf(bio_err,"unable to write pkcs7 object\n");
|
if (out != NULL)
|
||||||
ERR_print_errors(bio_err);
|
BIO_free_all(out);
|
||||||
goto end;
|
apps_shutdown();
|
||||||
}
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
ret=0;
|
|
||||||
end:
|
|
||||||
if (p7 != NULL) PKCS7_free(p7);
|
|
||||||
if (in != NULL) BIO_free(in);
|
|
||||||
if (out != NULL) BIO_free_all(out);
|
|
||||||
apps_shutdown();
|
|
||||||
OPENSSL_EXIT(ret);
|
|
||||||
}
|
|
||||||
|
|||||||
656
apps/pkcs8.c
656
apps/pkcs8.c
@@ -1,6 +1,7 @@
|
|||||||
/* pkcs8.c */
|
/* pkcs8.c */
|
||||||
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
/*
|
||||||
* project 1999-2004.
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
|
||||||
|
* 1999-2004.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 1999 The OpenSSL Project. All rights reserved.
|
||||||
@@ -10,7 +11,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -68,372 +69,343 @@
|
|||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
char **args, *infile = NULL, *outfile = NULL;
|
char **args, *infile = NULL, *outfile = NULL;
|
||||||
char *passargin = NULL, *passargout = NULL;
|
char *passargin = NULL, *passargout = NULL;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
int topk8 = 0;
|
int topk8 = 0;
|
||||||
int pbe_nid = -1;
|
int pbe_nid = -1;
|
||||||
const EVP_CIPHER *cipher = NULL;
|
const EVP_CIPHER *cipher = NULL;
|
||||||
int iter = PKCS12_DEFAULT_ITER;
|
int iter = PKCS12_DEFAULT_ITER;
|
||||||
int informat, outformat;
|
int informat, outformat;
|
||||||
int p8_broken = PKCS8_OK;
|
int p8_broken = PKCS8_OK;
|
||||||
int nocrypt = 0;
|
int nocrypt = 0;
|
||||||
X509_SIG *p8 = NULL;
|
X509_SIG *p8;
|
||||||
PKCS8_PRIV_KEY_INFO *p8inf = NULL;
|
PKCS8_PRIV_KEY_INFO *p8inf;
|
||||||
EVP_PKEY *pkey=NULL;
|
EVP_PKEY *pkey = NULL;
|
||||||
char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
|
char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
|
||||||
int badarg = 0;
|
int badarg = 0;
|
||||||
int ret = 1;
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine = NULL;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (bio_err == NULL) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
if (bio_err == NULL)
|
||||||
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
|
|
||||||
informat=FORMAT_PEM;
|
informat = FORMAT_PEM;
|
||||||
outformat=FORMAT_PEM;
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
OpenSSL_add_all_algorithms();
|
OpenSSL_add_all_algorithms();
|
||||||
args = argv + 1;
|
args = argv + 1;
|
||||||
while (!badarg && *args && *args[0] == '-')
|
while (!badarg && *args && *args[0] == '-') {
|
||||||
{
|
if (!strcmp(*args, "-v2")) {
|
||||||
if (!strcmp(*args,"-v2"))
|
if (args[1]) {
|
||||||
{
|
args++;
|
||||||
if (args[1])
|
cipher = EVP_get_cipherbyname(*args);
|
||||||
{
|
if (!cipher) {
|
||||||
args++;
|
BIO_printf(bio_err, "Unknown cipher %s\n", *args);
|
||||||
cipher=EVP_get_cipherbyname(*args);
|
badarg = 1;
|
||||||
if (!cipher)
|
}
|
||||||
{
|
} else
|
||||||
BIO_printf(bio_err,
|
badarg = 1;
|
||||||
"Unknown cipher %s\n", *args);
|
} else if (!strcmp(*args, "-v1")) {
|
||||||
badarg = 1;
|
if (args[1]) {
|
||||||
}
|
args++;
|
||||||
}
|
pbe_nid = OBJ_txt2nid(*args);
|
||||||
else
|
if (pbe_nid == NID_undef) {
|
||||||
badarg = 1;
|
BIO_printf(bio_err, "Unknown PBE algorithm %s\n", *args);
|
||||||
}
|
badarg = 1;
|
||||||
else if (!strcmp(*args,"-v1"))
|
}
|
||||||
{
|
} else
|
||||||
if (args[1])
|
badarg = 1;
|
||||||
{
|
} else if (!strcmp(*args, "-inform")) {
|
||||||
args++;
|
if (args[1]) {
|
||||||
pbe_nid=OBJ_txt2nid(*args);
|
args++;
|
||||||
if (pbe_nid == NID_undef)
|
informat = str2fmt(*args);
|
||||||
{
|
} else
|
||||||
BIO_printf(bio_err,
|
badarg = 1;
|
||||||
"Unknown PBE algorithm %s\n", *args);
|
} else if (!strcmp(*args, "-outform")) {
|
||||||
badarg = 1;
|
if (args[1]) {
|
||||||
}
|
args++;
|
||||||
}
|
outformat = str2fmt(*args);
|
||||||
else
|
} else
|
||||||
badarg = 1;
|
badarg = 1;
|
||||||
}
|
} else if (!strcmp(*args, "-topk8"))
|
||||||
else if (!strcmp(*args,"-inform"))
|
topk8 = 1;
|
||||||
{
|
else if (!strcmp(*args, "-noiter"))
|
||||||
if (args[1])
|
iter = 1;
|
||||||
{
|
else if (!strcmp(*args, "-nocrypt"))
|
||||||
args++;
|
nocrypt = 1;
|
||||||
informat=str2fmt(*args);
|
else if (!strcmp(*args, "-nooct"))
|
||||||
}
|
p8_broken = PKCS8_NO_OCTET;
|
||||||
else badarg = 1;
|
else if (!strcmp(*args, "-nsdb"))
|
||||||
}
|
p8_broken = PKCS8_NS_DB;
|
||||||
else if (!strcmp(*args,"-outform"))
|
else if (!strcmp(*args, "-embed"))
|
||||||
{
|
p8_broken = PKCS8_EMBEDDED_PARAM;
|
||||||
if (args[1])
|
else if (!strcmp(*args, "-passin")) {
|
||||||
{
|
if (!args[1])
|
||||||
args++;
|
goto bad;
|
||||||
outformat=str2fmt(*args);
|
passargin = *(++args);
|
||||||
}
|
} else if (!strcmp(*args, "-passout")) {
|
||||||
else badarg = 1;
|
if (!args[1])
|
||||||
}
|
goto bad;
|
||||||
else if (!strcmp (*args, "-topk8"))
|
passargout = *(++args);
|
||||||
topk8 = 1;
|
}
|
||||||
else if (!strcmp (*args, "-noiter"))
|
|
||||||
iter = 1;
|
|
||||||
else if (!strcmp (*args, "-nocrypt"))
|
|
||||||
nocrypt = 1;
|
|
||||||
else if (!strcmp (*args, "-nooct"))
|
|
||||||
p8_broken = PKCS8_NO_OCTET;
|
|
||||||
else if (!strcmp (*args, "-nsdb"))
|
|
||||||
p8_broken = PKCS8_NS_DB;
|
|
||||||
else if (!strcmp (*args, "-embed"))
|
|
||||||
p8_broken = PKCS8_EMBEDDED_PARAM;
|
|
||||||
else if (!strcmp(*args,"-passin"))
|
|
||||||
{
|
|
||||||
if (!args[1]) goto bad;
|
|
||||||
passargin= *(++args);
|
|
||||||
}
|
|
||||||
else if (!strcmp(*args,"-passout"))
|
|
||||||
{
|
|
||||||
if (!args[1]) goto bad;
|
|
||||||
passargout= *(++args);
|
|
||||||
}
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
else if (strcmp(*args,"-engine") == 0)
|
else if (strcmp(*args, "-engine") == 0) {
|
||||||
{
|
if (!args[1])
|
||||||
if (!args[1]) goto bad;
|
goto bad;
|
||||||
engine= *(++args);
|
engine = *(++args);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
else if (!strcmp (*args, "-in"))
|
else if (!strcmp(*args, "-in")) {
|
||||||
{
|
if (args[1]) {
|
||||||
if (args[1])
|
args++;
|
||||||
{
|
infile = *args;
|
||||||
args++;
|
} else
|
||||||
infile = *args;
|
badarg = 1;
|
||||||
}
|
} else if (!strcmp(*args, "-out")) {
|
||||||
else badarg = 1;
|
if (args[1]) {
|
||||||
}
|
args++;
|
||||||
else if (!strcmp (*args, "-out"))
|
outfile = *args;
|
||||||
{
|
} else
|
||||||
if (args[1])
|
badarg = 1;
|
||||||
{
|
} else
|
||||||
args++;
|
badarg = 1;
|
||||||
outfile = *args;
|
args++;
|
||||||
}
|
}
|
||||||
else badarg = 1;
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
args++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badarg)
|
if (badarg) {
|
||||||
{
|
bad:
|
||||||
bad:
|
BIO_printf(bio_err, "Usage pkcs8 [options]\n");
|
||||||
BIO_printf(bio_err, "Usage pkcs8 [options]\n");
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err, "where options are\n");
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
BIO_printf(bio_err, "-in file input file\n");
|
BIO_printf(bio_err, "-inform X input format (DER or PEM)\n");
|
||||||
BIO_printf(bio_err, "-inform X input format (DER or PEM)\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
|
"-passin arg input file pass phrase source\n");
|
||||||
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
||||||
BIO_printf(bio_err, "-out file output file\n");
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
BIO_printf(bio_err, "-passout arg output file pass phrase source\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-topk8 output PKCS8 file\n");
|
"-passout arg output file pass phrase source\n");
|
||||||
BIO_printf(bio_err, "-nooct use (nonstandard) no octet format\n");
|
BIO_printf(bio_err, "-topk8 output PKCS8 file\n");
|
||||||
BIO_printf(bio_err, "-embed use (nonstandard) embedded DSA parameters format\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-nsdb use (nonstandard) DSA Netscape DB format\n");
|
"-nooct use (nonstandard) no octet format\n");
|
||||||
BIO_printf(bio_err, "-noiter use 1 as iteration count\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-nocrypt use or expect unencrypted private key\n");
|
"-embed use (nonstandard) embedded DSA parameters format\n");
|
||||||
BIO_printf(bio_err, "-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
|
"-nsdb use (nonstandard) DSA Netscape DB format\n");
|
||||||
|
BIO_printf(bio_err, "-noiter use 1 as iteration count\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-nocrypt use or expect unencrypted private key\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-v2 alg use PKCS#5 v2.0 and cipher \"alg\"\n");
|
||||||
|
BIO_printf(bio_err,
|
||||||
|
"-v1 obj use PKCS#5 v1.5 and cipher \"alg\"\n");
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err,
|
||||||
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
#endif
|
||||||
goto end;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
e = setup_engine(bio_err, engine, 0);
|
e = setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||||
{
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
return 1;
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if ((pbe_nid == -1) && !cipher)
|
if ((pbe_nid == -1) && !cipher)
|
||||||
pbe_nid = NID_pbeWithMD5AndDES_CBC;
|
pbe_nid = NID_pbeWithMD5AndDES_CBC;
|
||||||
|
|
||||||
if (infile)
|
if (infile) {
|
||||||
{
|
if (!(in = BIO_new_file(infile, "rb"))) {
|
||||||
if (!(in = BIO_new_file(infile, "rb")))
|
BIO_printf(bio_err, "Can't open input file %s\n", infile);
|
||||||
{
|
return (1);
|
||||||
BIO_printf(bio_err,
|
}
|
||||||
"Can't open input file %s\n", infile);
|
} else
|
||||||
goto end;
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
in = BIO_new_fp (stdin, BIO_NOCLOSE);
|
|
||||||
|
|
||||||
if (outfile)
|
if (outfile) {
|
||||||
{
|
if (!(out = BIO_new_file(outfile, "wb"))) {
|
||||||
if (!(out = BIO_new_file (outfile, "wb")))
|
BIO_printf(bio_err, "Can't open output file %s\n", outfile);
|
||||||
{
|
return (1);
|
||||||
BIO_printf(bio_err,
|
}
|
||||||
"Can't open output file %s\n", outfile);
|
} else {
|
||||||
goto end;
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
if (topk8)
|
if (topk8) {
|
||||||
{
|
BIO_free(in); /* Not needed in this section */
|
||||||
pkey = load_key(bio_err, infile, informat, 1,
|
pkey = load_key(bio_err, infile, informat, 1, passin, e, "key");
|
||||||
passin, e, "key");
|
if (!pkey) {
|
||||||
if (!pkey)
|
BIO_free_all(out);
|
||||||
goto end;
|
return 1;
|
||||||
if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken)))
|
}
|
||||||
{
|
if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken))) {
|
||||||
BIO_printf(bio_err, "Error converting key\n");
|
BIO_printf(bio_err, "Error converting key\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
EVP_PKEY_free(pkey);
|
||||||
}
|
BIO_free_all(out);
|
||||||
if (nocrypt)
|
return 1;
|
||||||
{
|
}
|
||||||
if (outformat == FORMAT_PEM)
|
if (nocrypt) {
|
||||||
PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf);
|
if (outformat == FORMAT_PEM)
|
||||||
else if (outformat == FORMAT_ASN1)
|
PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf);
|
||||||
i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8inf);
|
else if (outformat == FORMAT_ASN1)
|
||||||
else
|
i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8inf);
|
||||||
{
|
else {
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
goto end;
|
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
||||||
}
|
EVP_PKEY_free(pkey);
|
||||||
}
|
BIO_free_all(out);
|
||||||
else
|
return (1);
|
||||||
{
|
}
|
||||||
if (passout)
|
} else {
|
||||||
p8pass = passout;
|
if (passout)
|
||||||
else
|
p8pass = passout;
|
||||||
{
|
else {
|
||||||
p8pass = pass;
|
p8pass = pass;
|
||||||
if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
|
if (EVP_read_pw_string
|
||||||
goto end;
|
(pass, sizeof pass, "Enter Encryption Password:", 1)) {
|
||||||
}
|
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
||||||
app_RAND_load_file(NULL, bio_err, 0);
|
EVP_PKEY_free(pkey);
|
||||||
if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
BIO_free_all(out);
|
||||||
p8pass, strlen(p8pass),
|
return (1);
|
||||||
NULL, 0, iter, p8inf)))
|
}
|
||||||
{
|
}
|
||||||
BIO_printf(bio_err, "Error encrypting key\n");
|
app_RAND_load_file(NULL, bio_err, 0);
|
||||||
ERR_print_errors(bio_err);
|
if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
|
||||||
goto end;
|
p8pass, strlen(p8pass),
|
||||||
}
|
NULL, 0, iter, p8inf))) {
|
||||||
app_RAND_write_file(NULL, bio_err);
|
BIO_printf(bio_err, "Error encrypting key\n");
|
||||||
if (outformat == FORMAT_PEM)
|
ERR_print_errors(bio_err);
|
||||||
PEM_write_bio_PKCS8(out, p8);
|
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
||||||
else if (outformat == FORMAT_ASN1)
|
EVP_PKEY_free(pkey);
|
||||||
i2d_PKCS8_bio(out, p8);
|
BIO_free_all(out);
|
||||||
else
|
return (1);
|
||||||
{
|
}
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
app_RAND_write_file(NULL, bio_err);
|
||||||
goto end;
|
if (outformat == FORMAT_PEM)
|
||||||
}
|
PEM_write_bio_PKCS8(out, p8);
|
||||||
}
|
else if (outformat == FORMAT_ASN1)
|
||||||
|
i2d_PKCS8_bio(out, p8);
|
||||||
|
else {
|
||||||
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
|
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
||||||
|
EVP_PKEY_free(pkey);
|
||||||
|
BIO_free_all(out);
|
||||||
|
return (1);
|
||||||
|
}
|
||||||
|
X509_SIG_free(p8);
|
||||||
|
}
|
||||||
|
|
||||||
ret = 0;
|
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
||||||
goto end;
|
EVP_PKEY_free(pkey);
|
||||||
}
|
BIO_free_all(out);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
return (0);
|
||||||
|
}
|
||||||
|
|
||||||
if (nocrypt)
|
if (nocrypt) {
|
||||||
{
|
if (informat == FORMAT_PEM)
|
||||||
if (informat == FORMAT_PEM)
|
p8inf = PEM_read_bio_PKCS8_PRIV_KEY_INFO(in, NULL, NULL, NULL);
|
||||||
p8inf = PEM_read_bio_PKCS8_PRIV_KEY_INFO(in,NULL,NULL, NULL);
|
else if (informat == FORMAT_ASN1)
|
||||||
else if (informat == FORMAT_ASN1)
|
p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(in, NULL);
|
||||||
p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(in, NULL);
|
else {
|
||||||
else
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
{
|
return (1);
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
}
|
||||||
goto end;
|
} else {
|
||||||
}
|
if (informat == FORMAT_PEM)
|
||||||
}
|
p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL);
|
||||||
else
|
else if (informat == FORMAT_ASN1)
|
||||||
{
|
p8 = d2i_PKCS8_bio(in, NULL);
|
||||||
if (informat == FORMAT_PEM)
|
else {
|
||||||
p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL);
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
else if (informat == FORMAT_ASN1)
|
return (1);
|
||||||
p8 = d2i_PKCS8_bio(in, NULL);
|
}
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!p8)
|
if (!p8) {
|
||||||
{
|
BIO_printf(bio_err, "Error reading key\n");
|
||||||
BIO_printf (bio_err, "Error reading key\n");
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
return (1);
|
||||||
goto end;
|
}
|
||||||
}
|
if (passin)
|
||||||
if (passin)
|
p8pass = passin;
|
||||||
p8pass = passin;
|
else {
|
||||||
else
|
p8pass = pass;
|
||||||
{
|
EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
||||||
p8pass = pass;
|
}
|
||||||
EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
|
p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
|
||||||
}
|
X509_SIG_free(p8);
|
||||||
p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (!p8inf)
|
if (!p8inf) {
|
||||||
{
|
BIO_printf(bio_err, "Error decrypting key\n");
|
||||||
BIO_printf(bio_err, "Error decrypting key\n");
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
return (1);
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (!(pkey = EVP_PKCS82PKEY(p8inf)))
|
if (!(pkey = EVP_PKCS82PKEY(p8inf))) {
|
||||||
{
|
BIO_printf(bio_err, "Error converting key\n");
|
||||||
BIO_printf(bio_err, "Error converting key\n");
|
ERR_print_errors(bio_err);
|
||||||
ERR_print_errors(bio_err);
|
return (1);
|
||||||
goto end;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if (p8inf->broken)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Warning: broken key encoding: ");
|
|
||||||
switch (p8inf->broken)
|
|
||||||
{
|
|
||||||
case PKCS8_NO_OCTET:
|
|
||||||
BIO_printf(bio_err, "No Octet String in PrivateKey\n");
|
|
||||||
break;
|
|
||||||
|
|
||||||
case PKCS8_EMBEDDED_PARAM:
|
if (p8inf->broken) {
|
||||||
BIO_printf(bio_err, "DSA parameters included in PrivateKey\n");
|
BIO_printf(bio_err, "Warning: broken key encoding: ");
|
||||||
break;
|
switch (p8inf->broken) {
|
||||||
|
case PKCS8_NO_OCTET:
|
||||||
|
BIO_printf(bio_err, "No Octet String in PrivateKey\n");
|
||||||
|
break;
|
||||||
|
|
||||||
case PKCS8_NS_DB:
|
case PKCS8_EMBEDDED_PARAM:
|
||||||
BIO_printf(bio_err, "DSA public key include in PrivateKey\n");
|
BIO_printf(bio_err, "DSA parameters included in PrivateKey\n");
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case PKCS8_NEG_PRIVKEY:
|
case PKCS8_NS_DB:
|
||||||
BIO_printf(bio_err, "DSA private key value is negative\n");
|
BIO_printf(bio_err, "DSA public key include in PrivateKey\n");
|
||||||
break;
|
break;
|
||||||
|
|
||||||
default:
|
default:
|
||||||
BIO_printf(bio_err, "Unknown broken type\n");
|
BIO_printf(bio_err, "Unknown broken type\n");
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if (outformat == FORMAT_PEM)
|
|
||||||
PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
|
|
||||||
else if (outformat == FORMAT_ASN1)
|
|
||||||
i2d_PrivateKey_bio(out, pkey);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
ret = 0;
|
|
||||||
|
|
||||||
end:
|
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
||||||
X509_SIG_free(p8);
|
if (outformat == FORMAT_PEM)
|
||||||
PKCS8_PRIV_KEY_INFO_free(p8inf);
|
PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
|
||||||
EVP_PKEY_free(pkey);
|
else if (outformat == FORMAT_ASN1)
|
||||||
BIO_free_all(out);
|
i2d_PrivateKey_bio(out, pkey);
|
||||||
BIO_free(in);
|
else {
|
||||||
if (passin)
|
BIO_printf(bio_err, "Bad format specified for key\n");
|
||||||
OPENSSL_free(passin);
|
return (1);
|
||||||
if (passout)
|
}
|
||||||
OPENSSL_free(passout);
|
|
||||||
|
|
||||||
return ret;
|
end:
|
||||||
}
|
EVP_PKEY_free(pkey);
|
||||||
|
BIO_free_all(out);
|
||||||
|
BIO_free(in);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
if (passout)
|
||||||
|
OPENSSL_free(passout);
|
||||||
|
|
||||||
|
return (0);
|
||||||
|
}
|
||||||
|
|||||||
284
apps/pkey.c
284
apps/pkey.c
@@ -1,284 +0,0 @@
|
|||||||
/* apps/pkey.c */
|
|
||||||
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
|
||||||
* project 2006
|
|
||||||
*/
|
|
||||||
/* ====================================================================
|
|
||||||
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
*
|
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
*
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in
|
|
||||||
* the documentation and/or other materials provided with the
|
|
||||||
* distribution.
|
|
||||||
*
|
|
||||||
* 3. All advertising materials mentioning features or use of this
|
|
||||||
* software must display the following acknowledgment:
|
|
||||||
* "This product includes software developed by the OpenSSL Project
|
|
||||||
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
|
||||||
*
|
|
||||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
||||||
* endorse or promote products derived from this software without
|
|
||||||
* prior written permission. For written permission, please contact
|
|
||||||
* licensing@OpenSSL.org.
|
|
||||||
*
|
|
||||||
* 5. Products derived from this software may not be called "OpenSSL"
|
|
||||||
* nor may "OpenSSL" appear in their names without prior written
|
|
||||||
* permission of the OpenSSL Project.
|
|
||||||
*
|
|
||||||
* 6. Redistributions of any form whatsoever must retain the following
|
|
||||||
* acknowledgment:
|
|
||||||
* "This product includes software developed by the OpenSSL Project
|
|
||||||
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
||||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
||||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
||||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
||||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
||||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
||||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
||||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
||||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
||||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
* ====================================================================
|
|
||||||
*
|
|
||||||
* This product includes cryptographic software written by Eric Young
|
|
||||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
||||||
* Hudson (tjh@cryptsoft.com).
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <string.h>
|
|
||||||
#include "apps.h"
|
|
||||||
#include <openssl/pem.h>
|
|
||||||
#include <openssl/err.h>
|
|
||||||
#include <openssl/evp.h>
|
|
||||||
|
|
||||||
#define PROG pkey_main
|
|
||||||
|
|
||||||
int MAIN(int, char **);
|
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
|
||||||
{
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
char **args, *infile = NULL, *outfile = NULL;
|
|
||||||
char *passargin = NULL, *passargout = NULL;
|
|
||||||
BIO *in = NULL, *out = NULL;
|
|
||||||
const EVP_CIPHER *cipher = NULL;
|
|
||||||
int informat, outformat;
|
|
||||||
int pubin = 0, pubout = 0, pubtext = 0, text = 0, noout = 0;
|
|
||||||
EVP_PKEY *pkey=NULL;
|
|
||||||
char *passin = NULL, *passout = NULL;
|
|
||||||
int badarg = 0;
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
char *engine=NULL;
|
|
||||||
#endif
|
|
||||||
int ret = 1;
|
|
||||||
|
|
||||||
if (bio_err == NULL)
|
|
||||||
bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
informat=FORMAT_PEM;
|
|
||||||
outformat=FORMAT_PEM;
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
|
||||||
OpenSSL_add_all_algorithms();
|
|
||||||
args = argv + 1;
|
|
||||||
while (!badarg && *args && *args[0] == '-')
|
|
||||||
{
|
|
||||||
if (!strcmp(*args,"-inform"))
|
|
||||||
{
|
|
||||||
if (args[1])
|
|
||||||
{
|
|
||||||
args++;
|
|
||||||
informat=str2fmt(*args);
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
}
|
|
||||||
else if (!strcmp(*args,"-outform"))
|
|
||||||
{
|
|
||||||
if (args[1])
|
|
||||||
{
|
|
||||||
args++;
|
|
||||||
outformat=str2fmt(*args);
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
}
|
|
||||||
else if (!strcmp(*args,"-passin"))
|
|
||||||
{
|
|
||||||
if (!args[1]) goto bad;
|
|
||||||
passargin= *(++args);
|
|
||||||
}
|
|
||||||
else if (!strcmp(*args,"-passout"))
|
|
||||||
{
|
|
||||||
if (!args[1]) goto bad;
|
|
||||||
passargout= *(++args);
|
|
||||||
}
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
else if (strcmp(*args,"-engine") == 0)
|
|
||||||
{
|
|
||||||
if (!args[1]) goto bad;
|
|
||||||
engine= *(++args);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
else if (!strcmp (*args, "-in"))
|
|
||||||
{
|
|
||||||
if (args[1])
|
|
||||||
{
|
|
||||||
args++;
|
|
||||||
infile = *args;
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
}
|
|
||||||
else if (!strcmp (*args, "-out"))
|
|
||||||
{
|
|
||||||
if (args[1])
|
|
||||||
{
|
|
||||||
args++;
|
|
||||||
outfile = *args;
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
}
|
|
||||||
else if (strcmp(*args,"-pubin") == 0)
|
|
||||||
{
|
|
||||||
pubin=1;
|
|
||||||
pubout=1;
|
|
||||||
pubtext=1;
|
|
||||||
}
|
|
||||||
else if (strcmp(*args,"-pubout") == 0)
|
|
||||||
pubout=1;
|
|
||||||
else if (strcmp(*args,"-text_pub") == 0)
|
|
||||||
{
|
|
||||||
pubtext=1;
|
|
||||||
text=1;
|
|
||||||
}
|
|
||||||
else if (strcmp(*args,"-text") == 0)
|
|
||||||
text=1;
|
|
||||||
else if (strcmp(*args,"-noout") == 0)
|
|
||||||
noout=1;
|
|
||||||
else
|
|
||||||
{
|
|
||||||
cipher = EVP_get_cipherbyname(*args + 1);
|
|
||||||
if (!cipher)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Unknown cipher %s\n",
|
|
||||||
*args + 1);
|
|
||||||
badarg = 1;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
args++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badarg)
|
|
||||||
{
|
|
||||||
bad:
|
|
||||||
BIO_printf(bio_err, "Usage pkey [options]\n");
|
|
||||||
BIO_printf(bio_err, "where options are\n");
|
|
||||||
BIO_printf(bio_err, "-in file input file\n");
|
|
||||||
BIO_printf(bio_err, "-inform X input format (DER or PEM)\n");
|
|
||||||
BIO_printf(bio_err, "-passin arg input file pass phrase source\n");
|
|
||||||
BIO_printf(bio_err, "-outform X output format (DER or PEM)\n");
|
|
||||||
BIO_printf(bio_err, "-out file output file\n");
|
|
||||||
BIO_printf(bio_err, "-passout arg output file pass phrase source\n");
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
|
||||||
#endif
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
e = setup_engine(bio_err, engine, 0);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (outfile)
|
|
||||||
{
|
|
||||||
if (!(out = BIO_new_file (outfile, "wb")))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Can't open output file %s\n", outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
if (pubin)
|
|
||||||
pkey = load_pubkey(bio_err, infile, informat, 1,
|
|
||||||
passin, e, "Public Key");
|
|
||||||
else
|
|
||||||
pkey = load_key(bio_err, infile, informat, 1,
|
|
||||||
passin, e, "key");
|
|
||||||
if (!pkey)
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
if (!noout)
|
|
||||||
{
|
|
||||||
if (outformat == FORMAT_PEM)
|
|
||||||
{
|
|
||||||
if (pubout)
|
|
||||||
PEM_write_bio_PUBKEY(out,pkey);
|
|
||||||
else
|
|
||||||
PEM_write_bio_PrivateKey(out, pkey, cipher,
|
|
||||||
NULL, 0, NULL, passout);
|
|
||||||
}
|
|
||||||
else if (outformat == FORMAT_ASN1)
|
|
||||||
{
|
|
||||||
if (pubout)
|
|
||||||
i2d_PUBKEY_bio(out, pkey);
|
|
||||||
else
|
|
||||||
i2d_PrivateKey_bio(out, pkey);
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Bad format specified for key\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
if (text)
|
|
||||||
{
|
|
||||||
if (pubtext)
|
|
||||||
EVP_PKEY_print_public(out, pkey, 0, NULL);
|
|
||||||
else
|
|
||||||
EVP_PKEY_print_private(out, pkey, 0, NULL);
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = 0;
|
|
||||||
|
|
||||||
end:
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
BIO_free(in);
|
|
||||||
if (passin)
|
|
||||||
OPENSSL_free(passin);
|
|
||||||
if (passout)
|
|
||||||
OPENSSL_free(passout);
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
200
apps/pkeyparam.c
200
apps/pkeyparam.c
@@ -1,200 +0,0 @@
|
|||||||
/* apps/pkeyparam.c */
|
|
||||||
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
|
||||||
* project 2006
|
|
||||||
*/
|
|
||||||
/* ====================================================================
|
|
||||||
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
*
|
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
*
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in
|
|
||||||
* the documentation and/or other materials provided with the
|
|
||||||
* distribution.
|
|
||||||
*
|
|
||||||
* 3. All advertising materials mentioning features or use of this
|
|
||||||
* software must display the following acknowledgment:
|
|
||||||
* "This product includes software developed by the OpenSSL Project
|
|
||||||
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
|
||||||
*
|
|
||||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
||||||
* endorse or promote products derived from this software without
|
|
||||||
* prior written permission. For written permission, please contact
|
|
||||||
* licensing@OpenSSL.org.
|
|
||||||
*
|
|
||||||
* 5. Products derived from this software may not be called "OpenSSL"
|
|
||||||
* nor may "OpenSSL" appear in their names without prior written
|
|
||||||
* permission of the OpenSSL Project.
|
|
||||||
*
|
|
||||||
* 6. Redistributions of any form whatsoever must retain the following
|
|
||||||
* acknowledgment:
|
|
||||||
* "This product includes software developed by the OpenSSL Project
|
|
||||||
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
||||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
||||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
||||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
||||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
||||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
||||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
||||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
||||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
||||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
* ====================================================================
|
|
||||||
*
|
|
||||||
* This product includes cryptographic software written by Eric Young
|
|
||||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
||||||
* Hudson (tjh@cryptsoft.com).
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <string.h>
|
|
||||||
#include "apps.h"
|
|
||||||
#include <openssl/pem.h>
|
|
||||||
#include <openssl/err.h>
|
|
||||||
#include <openssl/evp.h>
|
|
||||||
|
|
||||||
#define PROG pkeyparam_main
|
|
||||||
|
|
||||||
int MAIN(int, char **);
|
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
|
||||||
{
|
|
||||||
char **args, *infile = NULL, *outfile = NULL;
|
|
||||||
BIO *in = NULL, *out = NULL;
|
|
||||||
int text = 0, noout = 0;
|
|
||||||
EVP_PKEY *pkey=NULL;
|
|
||||||
int badarg = 0;
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
char *engine=NULL;
|
|
||||||
#endif
|
|
||||||
int ret = 1;
|
|
||||||
|
|
||||||
if (bio_err == NULL)
|
|
||||||
bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
|
||||||
OpenSSL_add_all_algorithms();
|
|
||||||
args = argv + 1;
|
|
||||||
while (!badarg && *args && *args[0] == '-')
|
|
||||||
{
|
|
||||||
if (!strcmp (*args, "-in"))
|
|
||||||
{
|
|
||||||
if (args[1])
|
|
||||||
{
|
|
||||||
args++;
|
|
||||||
infile = *args;
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
}
|
|
||||||
else if (!strcmp (*args, "-out"))
|
|
||||||
{
|
|
||||||
if (args[1])
|
|
||||||
{
|
|
||||||
args++;
|
|
||||||
outfile = *args;
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
}
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
else if (strcmp(*args,"-engine") == 0)
|
|
||||||
{
|
|
||||||
if (!args[1]) goto bad;
|
|
||||||
engine= *(++args);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
|
|
||||||
else if (strcmp(*args,"-text") == 0)
|
|
||||||
text=1;
|
|
||||||
else if (strcmp(*args,"-noout") == 0)
|
|
||||||
noout=1;
|
|
||||||
args++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badarg)
|
|
||||||
{
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
bad:
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err, "Usage pkeyparam [options]\n");
|
|
||||||
BIO_printf(bio_err, "where options are\n");
|
|
||||||
BIO_printf(bio_err, "-in file input file\n");
|
|
||||||
BIO_printf(bio_err, "-out file output file\n");
|
|
||||||
BIO_printf(bio_err, "-text print parameters as text\n");
|
|
||||||
BIO_printf(bio_err, "-noout don't output encoded parameters\n");
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
|
||||||
#endif
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
setup_engine(bio_err, engine, 0);
|
|
||||||
#endif
|
|
||||||
|
|
||||||
if (infile)
|
|
||||||
{
|
|
||||||
if (!(in = BIO_new_file (infile, "r")))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Can't open input file %s\n", infile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
in = BIO_new_fp (stdin, BIO_NOCLOSE);
|
|
||||||
|
|
||||||
if (outfile)
|
|
||||||
{
|
|
||||||
if (!(out = BIO_new_file (outfile, "w")))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,
|
|
||||||
"Can't open output file %s\n", outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
out = BIO_new_fp (stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
pkey = PEM_read_bio_Parameters(in, NULL);
|
|
||||||
if (!pkey)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error reading parameters\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!noout)
|
|
||||||
PEM_write_bio_Parameters(out,pkey);
|
|
||||||
|
|
||||||
if (text)
|
|
||||||
EVP_PKEY_print_params(out, pkey, 0, NULL);
|
|
||||||
|
|
||||||
ret = 0;
|
|
||||||
|
|
||||||
end:
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
BIO_free_all(out);
|
|
||||||
BIO_free(in);
|
|
||||||
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
570
apps/pkeyutl.c
570
apps/pkeyutl.c
@@ -1,570 +0,0 @@
|
|||||||
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
|
||||||
* project 2006.
|
|
||||||
*/
|
|
||||||
/* ====================================================================
|
|
||||||
* Copyright (c) 2006 The OpenSSL Project. All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions
|
|
||||||
* are met:
|
|
||||||
*
|
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer.
|
|
||||||
*
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
|
||||||
* notice, this list of conditions and the following disclaimer in
|
|
||||||
* the documentation and/or other materials provided with the
|
|
||||||
* distribution.
|
|
||||||
*
|
|
||||||
* 3. All advertising materials mentioning features or use of this
|
|
||||||
* software must display the following acknowledgment:
|
|
||||||
* "This product includes software developed by the OpenSSL Project
|
|
||||||
* for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
|
|
||||||
*
|
|
||||||
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
|
|
||||||
* endorse or promote products derived from this software without
|
|
||||||
* prior written permission. For written permission, please contact
|
|
||||||
* licensing@OpenSSL.org.
|
|
||||||
*
|
|
||||||
* 5. Products derived from this software may not be called "OpenSSL"
|
|
||||||
* nor may "OpenSSL" appear in their names without prior written
|
|
||||||
* permission of the OpenSSL Project.
|
|
||||||
*
|
|
||||||
* 6. Redistributions of any form whatsoever must retain the following
|
|
||||||
* acknowledgment:
|
|
||||||
* "This product includes software developed by the OpenSSL Project
|
|
||||||
* for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
|
|
||||||
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
|
||||||
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
|
|
||||||
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
||||||
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
||||||
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
||||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
||||||
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
|
|
||||||
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
||||||
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
||||||
* OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
* ====================================================================
|
|
||||||
*
|
|
||||||
* This product includes cryptographic software written by Eric Young
|
|
||||||
* (eay@cryptsoft.com). This product includes software written by Tim
|
|
||||||
* Hudson (tjh@cryptsoft.com).
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
|
|
||||||
|
|
||||||
#include "apps.h"
|
|
||||||
#include <string.h>
|
|
||||||
#include <openssl/err.h>
|
|
||||||
#include <openssl/pem.h>
|
|
||||||
#include <openssl/evp.h>
|
|
||||||
|
|
||||||
#define KEY_PRIVKEY 1
|
|
||||||
#define KEY_PUBKEY 2
|
|
||||||
#define KEY_CERT 3
|
|
||||||
|
|
||||||
static void usage(void);
|
|
||||||
|
|
||||||
#undef PROG
|
|
||||||
|
|
||||||
#define PROG pkeyutl_main
|
|
||||||
|
|
||||||
static EVP_PKEY_CTX *init_ctx(int *pkeysize,
|
|
||||||
char *keyfile, int keyform, int key_type,
|
|
||||||
char *passargin, int pkey_op, ENGINE *e);
|
|
||||||
|
|
||||||
static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
|
|
||||||
const char *file);
|
|
||||||
|
|
||||||
static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
|
|
||||||
unsigned char *out, size_t *poutlen,
|
|
||||||
unsigned char *in, size_t inlen);
|
|
||||||
|
|
||||||
int MAIN(int argc, char **);
|
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
|
||||||
{
|
|
||||||
BIO *in = NULL, *out = NULL;
|
|
||||||
char *infile = NULL, *outfile = NULL, *sigfile = NULL;
|
|
||||||
ENGINE *e = NULL;
|
|
||||||
int pkey_op = EVP_PKEY_OP_SIGN, key_type = KEY_PRIVKEY;
|
|
||||||
int keyform = FORMAT_PEM, peerform = FORMAT_PEM;
|
|
||||||
char badarg = 0, rev = 0;
|
|
||||||
char hexdump = 0, asn1parse = 0;
|
|
||||||
EVP_PKEY_CTX *ctx = NULL;
|
|
||||||
char *passargin = NULL;
|
|
||||||
int keysize = -1;
|
|
||||||
|
|
||||||
unsigned char *buf_in = NULL, *buf_out = NULL, *sig = NULL;
|
|
||||||
size_t buf_outlen;
|
|
||||||
int buf_inlen = 0, siglen = -1;
|
|
||||||
|
|
||||||
int ret = 1, rv = -1;
|
|
||||||
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
|
|
||||||
if(!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
|
||||||
goto end;
|
|
||||||
ERR_load_crypto_strings();
|
|
||||||
OpenSSL_add_all_algorithms();
|
|
||||||
|
|
||||||
while(argc >= 1)
|
|
||||||
{
|
|
||||||
if (!strcmp(*argv,"-in"))
|
|
||||||
{
|
|
||||||
if (--argc < 1) badarg = 1;
|
|
||||||
else infile= *(++argv);
|
|
||||||
}
|
|
||||||
else if (!strcmp(*argv,"-out"))
|
|
||||||
{
|
|
||||||
if (--argc < 1) badarg = 1;
|
|
||||||
else outfile= *(++argv);
|
|
||||||
}
|
|
||||||
else if (!strcmp(*argv,"-sigfile"))
|
|
||||||
{
|
|
||||||
if (--argc < 1) badarg = 1;
|
|
||||||
else sigfile= *(++argv);
|
|
||||||
}
|
|
||||||
else if(!strcmp(*argv, "-inkey"))
|
|
||||||
{
|
|
||||||
if (--argc < 1)
|
|
||||||
badarg = 1;
|
|
||||||
else
|
|
||||||
{
|
|
||||||
ctx = init_ctx(&keysize,
|
|
||||||
*(++argv), keyform, key_type,
|
|
||||||
passargin, pkey_op, e);
|
|
||||||
if (!ctx)
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err,
|
|
||||||
"Error initializing context\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
badarg = 1;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else if (!strcmp(*argv,"-peerkey"))
|
|
||||||
{
|
|
||||||
if (--argc < 1)
|
|
||||||
badarg = 1;
|
|
||||||
else if (!setup_peer(bio_err, ctx, peerform, *(++argv)))
|
|
||||||
badarg = 1;
|
|
||||||
}
|
|
||||||
else if (!strcmp(*argv,"-passin"))
|
|
||||||
{
|
|
||||||
if (--argc < 1) badarg = 1;
|
|
||||||
else passargin= *(++argv);
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-peerform") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) badarg = 1;
|
|
||||||
else peerform=str2fmt(*(++argv));
|
|
||||||
}
|
|
||||||
else if (strcmp(*argv,"-keyform") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1) badarg = 1;
|
|
||||||
else keyform=str2fmt(*(++argv));
|
|
||||||
}
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
else if(!strcmp(*argv, "-engine"))
|
|
||||||
{
|
|
||||||
if (--argc < 1)
|
|
||||||
badarg = 1;
|
|
||||||
else
|
|
||||||
e = setup_engine(bio_err, *(++argv), 0);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
else if(!strcmp(*argv, "-pubin"))
|
|
||||||
key_type = KEY_PUBKEY;
|
|
||||||
else if(!strcmp(*argv, "-certin"))
|
|
||||||
key_type = KEY_CERT;
|
|
||||||
else if(!strcmp(*argv, "-asn1parse"))
|
|
||||||
asn1parse = 1;
|
|
||||||
else if(!strcmp(*argv, "-hexdump"))
|
|
||||||
hexdump = 1;
|
|
||||||
else if(!strcmp(*argv, "-sign"))
|
|
||||||
pkey_op = EVP_PKEY_OP_SIGN;
|
|
||||||
else if(!strcmp(*argv, "-verify"))
|
|
||||||
pkey_op = EVP_PKEY_OP_VERIFY;
|
|
||||||
else if(!strcmp(*argv, "-verifyrecover"))
|
|
||||||
pkey_op = EVP_PKEY_OP_VERIFYRECOVER;
|
|
||||||
else if(!strcmp(*argv, "-rev"))
|
|
||||||
rev = 1;
|
|
||||||
else if(!strcmp(*argv, "-encrypt"))
|
|
||||||
pkey_op = EVP_PKEY_OP_ENCRYPT;
|
|
||||||
else if(!strcmp(*argv, "-decrypt"))
|
|
||||||
pkey_op = EVP_PKEY_OP_DECRYPT;
|
|
||||||
else if(!strcmp(*argv, "-derive"))
|
|
||||||
pkey_op = EVP_PKEY_OP_DERIVE;
|
|
||||||
else if (strcmp(*argv,"-pkeyopt") == 0)
|
|
||||||
{
|
|
||||||
if (--argc < 1)
|
|
||||||
badarg = 1;
|
|
||||||
else if (!ctx)
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err,
|
|
||||||
"-pkeyopt command before -inkey\n");
|
|
||||||
badarg = 1;
|
|
||||||
}
|
|
||||||
else if (pkey_ctrl_string(ctx, *(++argv)) <= 0)
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err, "parameter setting error\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else badarg = 1;
|
|
||||||
if(badarg)
|
|
||||||
{
|
|
||||||
usage();
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!ctx)
|
|
||||||
{
|
|
||||||
usage();
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (sigfile && (pkey_op != EVP_PKEY_OP_VERIFY))
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err, "Signature file specified for non verify\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!sigfile && (pkey_op == EVP_PKEY_OP_VERIFY))
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err, "No signature file specified for verify\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
/* FIXME: seed PRNG only if needed */
|
|
||||||
app_RAND_load_file(NULL, bio_err, 0);
|
|
||||||
|
|
||||||
if (pkey_op != EVP_PKEY_OP_DERIVE)
|
|
||||||
{
|
|
||||||
if(infile)
|
|
||||||
{
|
|
||||||
if(!(in = BIO_new_file(infile, "rb")))
|
|
||||||
{
|
|
||||||
BIO_puts(bio_err,
|
|
||||||
"Error Opening Input File\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
|
||||||
}
|
|
||||||
|
|
||||||
if(outfile)
|
|
||||||
{
|
|
||||||
if(!(out = BIO_new_file(outfile, "wb")))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error Creating Output File\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
|
||||||
{
|
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
|
|
||||||
if (sigfile)
|
|
||||||
{
|
|
||||||
BIO *sigbio = BIO_new_file(sigfile, "rb");
|
|
||||||
if (!sigbio)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Can't open signature file %s\n",
|
|
||||||
sigfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
siglen = bio_to_mem(&sig, keysize * 10, sigbio);
|
|
||||||
BIO_free(sigbio);
|
|
||||||
if (siglen <= 0)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error reading signature data\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (in)
|
|
||||||
{
|
|
||||||
/* Read the input data */
|
|
||||||
buf_inlen = bio_to_mem(&buf_in, keysize * 10, in);
|
|
||||||
if(buf_inlen <= 0)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error reading input Data\n");
|
|
||||||
exit(1);
|
|
||||||
}
|
|
||||||
if(rev)
|
|
||||||
{
|
|
||||||
size_t i;
|
|
||||||
unsigned char ctmp;
|
|
||||||
size_t l = (size_t)buf_inlen;
|
|
||||||
for(i = 0; i < l/2; i++)
|
|
||||||
{
|
|
||||||
ctmp = buf_in[i];
|
|
||||||
buf_in[i] = buf_in[l - 1 - i];
|
|
||||||
buf_in[l - 1 - i] = ctmp;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if(pkey_op == EVP_PKEY_OP_VERIFY)
|
|
||||||
{
|
|
||||||
rv = EVP_PKEY_verify(ctx, sig, (size_t)siglen,
|
|
||||||
buf_in, (size_t)buf_inlen);
|
|
||||||
if (rv == 0)
|
|
||||||
BIO_puts(out, "Signature Verification Failure\n");
|
|
||||||
else if (rv == 1)
|
|
||||||
BIO_puts(out, "Signature Verified Successfully\n");
|
|
||||||
if (rv >= 0)
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
rv = do_keyop(ctx, pkey_op, NULL, (size_t *)&buf_outlen,
|
|
||||||
buf_in, (size_t)buf_inlen);
|
|
||||||
if (rv > 0)
|
|
||||||
{
|
|
||||||
buf_out = OPENSSL_malloc(buf_outlen);
|
|
||||||
if (!buf_out)
|
|
||||||
rv = -1;
|
|
||||||
else
|
|
||||||
rv = do_keyop(ctx, pkey_op,
|
|
||||||
buf_out, (size_t *)&buf_outlen,
|
|
||||||
buf_in, (size_t)buf_inlen);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if(rv <= 0)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Public Key operation error\n");
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
ret = 0;
|
|
||||||
if(asn1parse)
|
|
||||||
{
|
|
||||||
if(!ASN1_parse_dump(out, buf_out, buf_outlen, 1, -1))
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
}
|
|
||||||
else if(hexdump)
|
|
||||||
BIO_dump(out, (char *)buf_out, buf_outlen);
|
|
||||||
else
|
|
||||||
BIO_write(out, buf_out, buf_outlen);
|
|
||||||
|
|
||||||
end:
|
|
||||||
if (ctx)
|
|
||||||
EVP_PKEY_CTX_free(ctx);
|
|
||||||
BIO_free(in);
|
|
||||||
BIO_free_all(out);
|
|
||||||
if (buf_in)
|
|
||||||
OPENSSL_free(buf_in);
|
|
||||||
if (buf_out)
|
|
||||||
OPENSSL_free(buf_out);
|
|
||||||
if (sig)
|
|
||||||
OPENSSL_free(sig);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static void usage()
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Usage: pkeyutl [options]\n");
|
|
||||||
BIO_printf(bio_err, "-in file input file\n");
|
|
||||||
BIO_printf(bio_err, "-out file output file\n");
|
|
||||||
BIO_printf(bio_err, "-sigfile file signature file (verify operation only)\n");
|
|
||||||
BIO_printf(bio_err, "-inkey file input key\n");
|
|
||||||
BIO_printf(bio_err, "-keyform arg private key format - default PEM\n");
|
|
||||||
BIO_printf(bio_err, "-pubin input is a public key\n");
|
|
||||||
BIO_printf(bio_err, "-certin input is a certificate carrying a public key\n");
|
|
||||||
BIO_printf(bio_err, "-pkeyopt X:Y public key options\n");
|
|
||||||
BIO_printf(bio_err, "-sign sign with private key\n");
|
|
||||||
BIO_printf(bio_err, "-verify verify with public key\n");
|
|
||||||
BIO_printf(bio_err, "-verifyrecover verify with public key, recover original data\n");
|
|
||||||
BIO_printf(bio_err, "-encrypt encrypt with public key\n");
|
|
||||||
BIO_printf(bio_err, "-decrypt decrypt with private key\n");
|
|
||||||
BIO_printf(bio_err, "-derive derive shared secret\n");
|
|
||||||
BIO_printf(bio_err, "-hexdump hex dump output\n");
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err, "-passin arg pass phrase source\n");
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
static EVP_PKEY_CTX *init_ctx(int *pkeysize,
|
|
||||||
char *keyfile, int keyform, int key_type,
|
|
||||||
char *passargin, int pkey_op, ENGINE *e)
|
|
||||||
{
|
|
||||||
EVP_PKEY *pkey = NULL;
|
|
||||||
EVP_PKEY_CTX *ctx = NULL;
|
|
||||||
char *passin = NULL;
|
|
||||||
int rv = -1;
|
|
||||||
X509 *x;
|
|
||||||
if(((pkey_op == EVP_PKEY_OP_SIGN) || (pkey_op == EVP_PKEY_OP_DECRYPT)
|
|
||||||
|| (pkey_op == EVP_PKEY_OP_DERIVE))
|
|
||||||
&& (key_type != KEY_PRIVKEY))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "A private key is needed for this operation\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error getting password\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
switch(key_type)
|
|
||||||
{
|
|
||||||
case KEY_PRIVKEY:
|
|
||||||
pkey = load_key(bio_err, keyfile, keyform, 0,
|
|
||||||
passin, e, "Private Key");
|
|
||||||
break;
|
|
||||||
|
|
||||||
case KEY_PUBKEY:
|
|
||||||
pkey = load_pubkey(bio_err, keyfile, keyform, 0,
|
|
||||||
NULL, e, "Public Key");
|
|
||||||
break;
|
|
||||||
|
|
||||||
case KEY_CERT:
|
|
||||||
x = load_cert(bio_err, keyfile, keyform,
|
|
||||||
NULL, e, "Certificate");
|
|
||||||
if(x)
|
|
||||||
{
|
|
||||||
pkey = X509_get_pubkey(x);
|
|
||||||
X509_free(x);
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
*pkeysize = EVP_PKEY_size(pkey);
|
|
||||||
|
|
||||||
if (!pkey)
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
ctx = EVP_PKEY_CTX_new(pkey, e);
|
|
||||||
|
|
||||||
EVP_PKEY_free(pkey);
|
|
||||||
|
|
||||||
if (!ctx)
|
|
||||||
goto end;
|
|
||||||
|
|
||||||
switch(pkey_op)
|
|
||||||
{
|
|
||||||
case EVP_PKEY_OP_SIGN:
|
|
||||||
rv = EVP_PKEY_sign_init(ctx);
|
|
||||||
break;
|
|
||||||
|
|
||||||
case EVP_PKEY_OP_VERIFY:
|
|
||||||
rv = EVP_PKEY_verify_init(ctx);
|
|
||||||
break;
|
|
||||||
|
|
||||||
case EVP_PKEY_OP_VERIFYRECOVER:
|
|
||||||
rv = EVP_PKEY_verify_recover_init(ctx);
|
|
||||||
break;
|
|
||||||
|
|
||||||
case EVP_PKEY_OP_ENCRYPT:
|
|
||||||
rv = EVP_PKEY_encrypt_init(ctx);
|
|
||||||
break;
|
|
||||||
|
|
||||||
case EVP_PKEY_OP_DECRYPT:
|
|
||||||
rv = EVP_PKEY_decrypt_init(ctx);
|
|
||||||
break;
|
|
||||||
|
|
||||||
case EVP_PKEY_OP_DERIVE:
|
|
||||||
rv = EVP_PKEY_derive_init(ctx);
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (rv <= 0)
|
|
||||||
{
|
|
||||||
EVP_PKEY_CTX_free(ctx);
|
|
||||||
ctx = NULL;
|
|
||||||
}
|
|
||||||
|
|
||||||
end:
|
|
||||||
|
|
||||||
if (passin)
|
|
||||||
OPENSSL_free(passin);
|
|
||||||
|
|
||||||
return ctx;
|
|
||||||
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
static int setup_peer(BIO *err, EVP_PKEY_CTX *ctx, int peerform,
|
|
||||||
const char *file)
|
|
||||||
{
|
|
||||||
EVP_PKEY *peer = NULL;
|
|
||||||
int ret;
|
|
||||||
if (!ctx)
|
|
||||||
{
|
|
||||||
BIO_puts(err, "-peerkey command before -inkey\n");
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
peer = load_pubkey(bio_err, file, peerform, 0, NULL, NULL, "Peer Key");
|
|
||||||
|
|
||||||
if (!peer)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err, "Error reading peer key %s\n", file);
|
|
||||||
ERR_print_errors(err);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = EVP_PKEY_derive_set_peer(ctx, peer);
|
|
||||||
|
|
||||||
EVP_PKEY_free(peer);
|
|
||||||
if (ret <= 0)
|
|
||||||
ERR_print_errors(err);
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int do_keyop(EVP_PKEY_CTX *ctx, int pkey_op,
|
|
||||||
unsigned char *out, size_t *poutlen,
|
|
||||||
unsigned char *in, size_t inlen)
|
|
||||||
{
|
|
||||||
int rv = 0;
|
|
||||||
switch(pkey_op)
|
|
||||||
{
|
|
||||||
case EVP_PKEY_OP_VERIFYRECOVER:
|
|
||||||
rv = EVP_PKEY_verify_recover(ctx, out, poutlen, in, inlen);
|
|
||||||
break;
|
|
||||||
|
|
||||||
case EVP_PKEY_OP_SIGN:
|
|
||||||
rv = EVP_PKEY_sign(ctx, out, poutlen, in, inlen);
|
|
||||||
break;
|
|
||||||
|
|
||||||
case EVP_PKEY_OP_ENCRYPT:
|
|
||||||
rv = EVP_PKEY_encrypt(ctx, out, poutlen, in, inlen);
|
|
||||||
break;
|
|
||||||
|
|
||||||
case EVP_PKEY_OP_DECRYPT:
|
|
||||||
rv = EVP_PKEY_decrypt(ctx, out, poutlen, in, inlen);
|
|
||||||
break;
|
|
||||||
|
|
||||||
case EVP_PKEY_OP_DERIVE:
|
|
||||||
rv = EVP_PKEY_derive(ctx, out, poutlen);
|
|
||||||
break;
|
|
||||||
|
|
||||||
}
|
|
||||||
return rv;
|
|
||||||
}
|
|
||||||
123
apps/prime.c
123
apps/prime.c
@@ -6,7 +6,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -52,109 +52,74 @@
|
|||||||
#include "apps.h"
|
#include "apps.h"
|
||||||
#include <openssl/bn.h>
|
#include <openssl/bn.h>
|
||||||
|
|
||||||
|
|
||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG prime_main
|
#define PROG prime_main
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int hex=0;
|
int hex = 0;
|
||||||
int checks=20;
|
int checks = 20;
|
||||||
int generate=0;
|
BIGNUM *bn = NULL;
|
||||||
int bits=0;
|
|
||||||
int safe=0;
|
|
||||||
BIGNUM *bn=NULL;
|
|
||||||
BIO *bio_out;
|
BIO *bio_out;
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
--argc;
|
--argc;
|
||||||
++argv;
|
++argv;
|
||||||
while (argc >= 1 && **argv == '-')
|
while (argc >= 1 && **argv == '-') {
|
||||||
{
|
if (!strcmp(*argv, "-hex"))
|
||||||
if(!strcmp(*argv,"-hex"))
|
hex = 1;
|
||||||
hex=1;
|
else if (!strcmp(*argv, "-checks"))
|
||||||
else if(!strcmp(*argv,"-generate"))
|
if (--argc < 1)
|
||||||
generate=1;
|
goto bad;
|
||||||
else if(!strcmp(*argv,"-bits"))
|
else
|
||||||
if(--argc < 1)
|
checks = atoi(*++argv);
|
||||||
goto bad;
|
else {
|
||||||
else
|
BIO_printf(bio_err, "Unknown option '%s'\n", *argv);
|
||||||
bits=atoi(*++argv);
|
goto bad;
|
||||||
else if(!strcmp(*argv,"-safe"))
|
}
|
||||||
safe=1;
|
--argc;
|
||||||
else if(!strcmp(*argv,"-checks"))
|
++argv;
|
||||||
if(--argc < 1)
|
}
|
||||||
goto bad;
|
|
||||||
else
|
|
||||||
checks=atoi(*++argv);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"Unknown option '%s'\n",*argv);
|
|
||||||
goto bad;
|
|
||||||
}
|
|
||||||
--argc;
|
|
||||||
++argv;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (argv[0] == NULL && !generate)
|
if (argv[0] == NULL) {
|
||||||
{
|
BIO_printf(bio_err, "No prime specified\n");
|
||||||
BIO_printf(bio_err,"No prime specified\n");
|
goto bad;
|
||||||
goto bad;
|
}
|
||||||
}
|
|
||||||
|
|
||||||
if ((bio_out=BIO_new(BIO_s_file())) != NULL)
|
if ((bio_out = BIO_new(BIO_s_file())) != NULL) {
|
||||||
{
|
BIO_set_fp(bio_out, stdout, BIO_NOCLOSE);
|
||||||
BIO_set_fp(bio_out,stdout,BIO_NOCLOSE);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
bio_out = BIO_push(tmpbio, bio_out);
|
bio_out = BIO_push(tmpbio, bio_out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
if(generate)
|
if (hex)
|
||||||
{
|
BN_hex2bn(&bn, argv[0]);
|
||||||
char *s;
|
|
||||||
|
|
||||||
if(!bits)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"Specifiy the number of bits.\n");
|
|
||||||
return 1;
|
|
||||||
}
|
|
||||||
bn=BN_new();
|
|
||||||
BN_generate_prime_ex(bn,bits,safe,NULL,NULL,NULL);
|
|
||||||
s=hex ? BN_bn2hex(bn) : BN_bn2dec(bn);
|
|
||||||
BIO_printf(bio_out,"%s\n",s);
|
|
||||||
OPENSSL_free(s);
|
|
||||||
}
|
|
||||||
else
|
else
|
||||||
{
|
BN_dec2bn(&bn, argv[0]);
|
||||||
if(hex)
|
|
||||||
BN_hex2bn(&bn,argv[0]);
|
|
||||||
else
|
|
||||||
BN_dec2bn(&bn,argv[0]);
|
|
||||||
|
|
||||||
BN_print(bio_out,bn);
|
BN_print(bio_out, bn);
|
||||||
BIO_printf(bio_out," is %sprime\n",
|
BIO_printf(bio_out, " is %sprime\n",
|
||||||
BN_is_prime_ex(bn,checks,NULL,NULL) ? "" : "not ");
|
BN_is_prime_ex(bn, checks, NULL, NULL) ? "" : "not ");
|
||||||
}
|
|
||||||
|
|
||||||
BN_free(bn);
|
BN_free(bn);
|
||||||
BIO_free_all(bio_out);
|
BIO_free_all(bio_out);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
bad:
|
bad:
|
||||||
BIO_printf(bio_err,"options are\n");
|
BIO_printf(bio_err, "options are\n");
|
||||||
BIO_printf(bio_err,"%-14s hex\n","-hex");
|
BIO_printf(bio_err, "%-14s hex\n", "-hex");
|
||||||
BIO_printf(bio_err,"%-14s number of checks\n","-checks <n>");
|
BIO_printf(bio_err, "%-14s number of checks\n", "-checks <n>");
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,16 +1,18 @@
|
|||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAMo7DFNMqywUA1O/
|
Proc-Type: 4,ENCRYPTED
|
||||||
qvWqCOm6rGrUAcR+dKsSXw6y2qiKO7APDDyotc0b4Mxwqjga98npex2RBIwUoCGJ
|
DEK-Info: DES-EDE3-CBC,BA26229A1653B7FF
|
||||||
iEmMXo/a8RbXVUZ+ZwcAX7PC+XeXVC5qoajaBBkd2MvYmib/2PqnNrgvhHsUL5dO
|
|
||||||
xhC7cRqxLM/g45k3Yyw+nGa+WkTdAgMBAAECgYBMBT5w4dVG0I8foGFnz+9hzWab
|
6nhWG8PKhTPO/s3ZvjUa6226NlKdvPDZFsNXOOoSUs9ejxpb/aj5huhs6qRYzsz9
|
||||||
Ee9IKjE5TcKmB93ilXQyjrWO5+zPmbc7ou6aAKk9IaPCTY1kCyzW7pho7Xdt+RFq
|
Year47uaAZYhGD0vAagnNiBnYmjWEpN9G/wQxG7pgZThK1ZxDi63qn8aQ8UjuGHo
|
||||||
TgVXGZZfqtixO7f2/5oqZAkd00eOn9ZrhBpVMu4yXbbDvhDyFe4/oy0HGDjRUhxa
|
F6RpnnBQIAnWTWqr/Qsybtc5EoNkrj/Cpx0OfbSr6gZsFBCxwX1R1hT3/mhJ45f3
|
||||||
Lf6ZlBuTherxm4eFkQJBAPBQwRs9UtqaMAQlagA9pV5UsQjV1WT4IxDURMPfXgCd
|
XMofY32Vdfx9/vtw1O7HmlHXQnXaqnbd9/nn1EpvFJG9+UjPoW7gV4jCOLuR4deE
|
||||||
ETNkB6pP0SmxQm5xhv9N2HY1UtoWpug9s0OU5IJB15sCQQDXbfbjiujNbuOxCFNw
|
jS8hm+cpkwXmFtk3VGjT9tQXPpMv3JpYfBqgGQoMAJ5Toq0DWcHi6Wg08PsD8lgy
|
||||||
68JZaCFVdNovyOWORkpenQLNEjVkmTCS9OayK09ADEYtsdpUGKeF+2EYBNkFr5px
|
vmTioPsRg+JGkJkJ8GnusgLpQdlQJbjzd7wGE6ElUFLfOxLo8bLlRHoriHNdWYhh
|
||||||
CajnAkBMYI4PNz1HBuwt1SpMa0tMoMQnV7bbwVV7usskKbC5pzHZUHhzM6z5gEHp
|
JjY0LyeTkovcmWxVjImc6ZyBz5Ly4t0BYf1gq3OkjsV91Q1taBxnhiavfizqMCAf
|
||||||
0iEisT4Ty7zKXZqsgzefSgoaMAzzAkEAoCIaUhtwXzwdPfvNYnOs3J6doJMimECB
|
PPB3sLQnlXG77TOXkNxpqbZfEYrVZW2Nsqqdn8s07Uj4IMONZyq2odYKWFPMJBiM
|
||||||
+lbfcyLM8TimvadtRt+KGEg/OYGmLNM2UiqdY+duzdbUpvhYGcwvYwJAQvaoi9z2
|
POYwXjMAOcmFMTHYsVlhcUJuV6LOuipw/FEbTtPH/MYMxLe4zx65dYo1rb4iLKLS
|
||||||
CkiwSs/PFrLaNlfLJmXRsUBzmiWYoh6+IQJJorEXz7ewI72ee9RBO4s746cgUFwH
|
gMtB0o/Wl4Xno3ZXh1ucicYnV2J7NpVcjVq+3SFiCRu2SrSkZHZ23EPS13Ec6fcz
|
||||||
Ri+qO+HhZFUBqQ==
|
8X/YGA2vTJ8MAOozAzQUwHQYvLk7bIoQVekqDq4p0AZQbhdspHpArCk0Ifqqzg/v
|
||||||
-----END PRIVATE KEY-----
|
Uyky/zZiQYanzDenTSRVI/8wac3olxpU8QvbySxYqmbkgq6bTpXJfYFQfnAttEsC
|
||||||
|
dA4S5UFgyOPZluxCAM4yaJF3Ft6neutNwftuJQMbgCUi9vYg2tGdSw==
|
||||||
|
-----END RSA PRIVATE KEY-----
|
||||||
|
|||||||
347
apps/progs.h
347
apps/progs.h
@@ -1,366 +1,343 @@
|
|||||||
/* apps/progs.h */
|
/* apps/progs.h */
|
||||||
/* automatically generated by progs.pl for openssl.c */
|
/* automatically generated by progs.pl for openssl.c */
|
||||||
|
|
||||||
extern int verify_main(int argc,char *argv[]);
|
extern int verify_main(int argc, char *argv[]);
|
||||||
extern int asn1parse_main(int argc,char *argv[]);
|
extern int asn1parse_main(int argc, char *argv[]);
|
||||||
extern int req_main(int argc,char *argv[]);
|
extern int req_main(int argc, char *argv[]);
|
||||||
extern int dgst_main(int argc,char *argv[]);
|
extern int dgst_main(int argc, char *argv[]);
|
||||||
extern int dh_main(int argc,char *argv[]);
|
extern int dh_main(int argc, char *argv[]);
|
||||||
extern int dhparam_main(int argc,char *argv[]);
|
extern int dhparam_main(int argc, char *argv[]);
|
||||||
extern int enc_main(int argc,char *argv[]);
|
extern int enc_main(int argc, char *argv[]);
|
||||||
extern int passwd_main(int argc,char *argv[]);
|
extern int passwd_main(int argc, char *argv[]);
|
||||||
extern int gendh_main(int argc,char *argv[]);
|
extern int gendh_main(int argc, char *argv[]);
|
||||||
extern int errstr_main(int argc,char *argv[]);
|
extern int errstr_main(int argc, char *argv[]);
|
||||||
extern int ca_main(int argc,char *argv[]);
|
extern int ca_main(int argc, char *argv[]);
|
||||||
extern int crl_main(int argc,char *argv[]);
|
extern int crl_main(int argc, char *argv[]);
|
||||||
extern int rsa_main(int argc,char *argv[]);
|
extern int rsa_main(int argc, char *argv[]);
|
||||||
extern int rsautl_main(int argc,char *argv[]);
|
extern int rsautl_main(int argc, char *argv[]);
|
||||||
extern int dsa_main(int argc,char *argv[]);
|
extern int dsa_main(int argc, char *argv[]);
|
||||||
extern int dsaparam_main(int argc,char *argv[]);
|
extern int dsaparam_main(int argc, char *argv[]);
|
||||||
extern int ec_main(int argc,char *argv[]);
|
extern int ec_main(int argc, char *argv[]);
|
||||||
extern int ecparam_main(int argc,char *argv[]);
|
extern int ecparam_main(int argc, char *argv[]);
|
||||||
extern int x509_main(int argc,char *argv[]);
|
extern int x509_main(int argc, char *argv[]);
|
||||||
extern int genrsa_main(int argc,char *argv[]);
|
extern int genrsa_main(int argc, char *argv[]);
|
||||||
extern int gendsa_main(int argc,char *argv[]);
|
extern int gendsa_main(int argc, char *argv[]);
|
||||||
extern int genpkey_main(int argc,char *argv[]);
|
extern int s_server_main(int argc, char *argv[]);
|
||||||
extern int s_server_main(int argc,char *argv[]);
|
extern int s_client_main(int argc, char *argv[]);
|
||||||
extern int s_client_main(int argc,char *argv[]);
|
extern int speed_main(int argc, char *argv[]);
|
||||||
extern int speed_main(int argc,char *argv[]);
|
extern int s_time_main(int argc, char *argv[]);
|
||||||
extern int s_time_main(int argc,char *argv[]);
|
extern int version_main(int argc, char *argv[]);
|
||||||
extern int version_main(int argc,char *argv[]);
|
extern int pkcs7_main(int argc, char *argv[]);
|
||||||
extern int pkcs7_main(int argc,char *argv[]);
|
extern int cms_main(int argc, char *argv[]);
|
||||||
extern int cms_main(int argc,char *argv[]);
|
extern int crl2pkcs7_main(int argc, char *argv[]);
|
||||||
extern int crl2pkcs7_main(int argc,char *argv[]);
|
extern int sess_id_main(int argc, char *argv[]);
|
||||||
extern int sess_id_main(int argc,char *argv[]);
|
extern int ciphers_main(int argc, char *argv[]);
|
||||||
extern int ciphers_main(int argc,char *argv[]);
|
extern int nseq_main(int argc, char *argv[]);
|
||||||
extern int nseq_main(int argc,char *argv[]);
|
extern int pkcs12_main(int argc, char *argv[]);
|
||||||
extern int pkcs12_main(int argc,char *argv[]);
|
extern int pkcs8_main(int argc, char *argv[]);
|
||||||
extern int pkcs8_main(int argc,char *argv[]);
|
extern int spkac_main(int argc, char *argv[]);
|
||||||
extern int pkey_main(int argc,char *argv[]);
|
extern int smime_main(int argc, char *argv[]);
|
||||||
extern int pkeyparam_main(int argc,char *argv[]);
|
extern int rand_main(int argc, char *argv[]);
|
||||||
extern int pkeyutl_main(int argc,char *argv[]);
|
extern int engine_main(int argc, char *argv[]);
|
||||||
extern int spkac_main(int argc,char *argv[]);
|
extern int ocsp_main(int argc, char *argv[]);
|
||||||
extern int smime_main(int argc,char *argv[]);
|
extern int prime_main(int argc, char *argv[]);
|
||||||
extern int rand_main(int argc,char *argv[]);
|
|
||||||
extern int engine_main(int argc,char *argv[]);
|
|
||||||
extern int ocsp_main(int argc,char *argv[]);
|
|
||||||
extern int srp_main(int argc,char *argv[]);
|
|
||||||
extern int prime_main(int argc,char *argv[]);
|
|
||||||
extern int ts_main(int argc,char *argv[]);
|
|
||||||
|
|
||||||
#define FUNC_TYPE_GENERAL 1
|
#define FUNC_TYPE_GENERAL 1
|
||||||
#define FUNC_TYPE_MD 2
|
#define FUNC_TYPE_MD 2
|
||||||
#define FUNC_TYPE_CIPHER 3
|
#define FUNC_TYPE_CIPHER 3
|
||||||
#define FUNC_TYPE_PKEY 4
|
|
||||||
#define FUNC_TYPE_MD_ALG 5
|
|
||||||
#define FUNC_TYPE_CIPHER_ALG 6
|
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int type;
|
int type;
|
||||||
const char *name;
|
const char *name;
|
||||||
int (*func)(int argc,char *argv[]);
|
int (*func) (int argc, char *argv[]);
|
||||||
} FUNCTION;
|
} FUNCTION;
|
||||||
DECLARE_LHASH_OF(FUNCTION);
|
|
||||||
|
|
||||||
FUNCTION functions[] = {
|
FUNCTION functions[] = {
|
||||||
{FUNC_TYPE_GENERAL,"verify",verify_main},
|
{FUNC_TYPE_GENERAL, "verify", verify_main},
|
||||||
{FUNC_TYPE_GENERAL,"asn1parse",asn1parse_main},
|
{FUNC_TYPE_GENERAL, "asn1parse", asn1parse_main},
|
||||||
{FUNC_TYPE_GENERAL,"req",req_main},
|
{FUNC_TYPE_GENERAL, "req", req_main},
|
||||||
{FUNC_TYPE_GENERAL,"dgst",dgst_main},
|
{FUNC_TYPE_GENERAL, "dgst", dgst_main},
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
{FUNC_TYPE_GENERAL,"dh",dh_main},
|
{FUNC_TYPE_GENERAL, "dh", dh_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
{FUNC_TYPE_GENERAL,"dhparam",dhparam_main},
|
{FUNC_TYPE_GENERAL, "dhparam", dhparam_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"enc",enc_main},
|
{FUNC_TYPE_GENERAL, "enc", enc_main},
|
||||||
{FUNC_TYPE_GENERAL,"passwd",passwd_main},
|
{FUNC_TYPE_GENERAL, "passwd", passwd_main},
|
||||||
#ifndef OPENSSL_NO_DH
|
#ifndef OPENSSL_NO_DH
|
||||||
{FUNC_TYPE_GENERAL,"gendh",gendh_main},
|
{FUNC_TYPE_GENERAL, "gendh", gendh_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"errstr",errstr_main},
|
{FUNC_TYPE_GENERAL, "errstr", errstr_main},
|
||||||
{FUNC_TYPE_GENERAL,"ca",ca_main},
|
{FUNC_TYPE_GENERAL, "ca", ca_main},
|
||||||
{FUNC_TYPE_GENERAL,"crl",crl_main},
|
{FUNC_TYPE_GENERAL, "crl", crl_main},
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
{FUNC_TYPE_GENERAL,"rsa",rsa_main},
|
{FUNC_TYPE_GENERAL, "rsa", rsa_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
{FUNC_TYPE_GENERAL,"rsautl",rsautl_main},
|
{FUNC_TYPE_GENERAL, "rsautl", rsautl_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
{FUNC_TYPE_GENERAL,"dsa",dsa_main},
|
{FUNC_TYPE_GENERAL, "dsa", dsa_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
{FUNC_TYPE_GENERAL,"dsaparam",dsaparam_main},
|
{FUNC_TYPE_GENERAL, "dsaparam", dsaparam_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_EC
|
#ifndef OPENSSL_NO_EC
|
||||||
{FUNC_TYPE_GENERAL,"ec",ec_main},
|
{FUNC_TYPE_GENERAL, "ec", ec_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_EC
|
#ifndef OPENSSL_NO_EC
|
||||||
{FUNC_TYPE_GENERAL,"ecparam",ecparam_main},
|
{FUNC_TYPE_GENERAL, "ecparam", ecparam_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"x509",x509_main},
|
{FUNC_TYPE_GENERAL, "x509", x509_main},
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
{FUNC_TYPE_GENERAL,"genrsa",genrsa_main},
|
{FUNC_TYPE_GENERAL, "genrsa", genrsa_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DSA
|
#ifndef OPENSSL_NO_DSA
|
||||||
{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
|
{FUNC_TYPE_GENERAL, "gendsa", gendsa_main},
|
||||||
#endif
|
|
||||||
{FUNC_TYPE_GENERAL,"genpkey",genpkey_main},
|
|
||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
|
||||||
{FUNC_TYPE_GENERAL,"s_server",s_server_main},
|
|
||||||
#endif
|
#endif
|
||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
||||||
{FUNC_TYPE_GENERAL,"s_client",s_client_main},
|
{FUNC_TYPE_GENERAL, "s_server", s_server_main},
|
||||||
|
#endif
|
||||||
|
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
||||||
|
{FUNC_TYPE_GENERAL, "s_client", s_client_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SPEED
|
#ifndef OPENSSL_NO_SPEED
|
||||||
{FUNC_TYPE_GENERAL,"speed",speed_main},
|
{FUNC_TYPE_GENERAL, "speed", speed_main},
|
||||||
#endif
|
#endif
|
||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
||||||
{FUNC_TYPE_GENERAL,"s_time",s_time_main},
|
{FUNC_TYPE_GENERAL, "s_time", s_time_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"version",version_main},
|
{FUNC_TYPE_GENERAL, "version", version_main},
|
||||||
{FUNC_TYPE_GENERAL,"pkcs7",pkcs7_main},
|
{FUNC_TYPE_GENERAL, "pkcs7", pkcs7_main},
|
||||||
#ifndef OPENSSL_NO_CMS
|
#ifndef OPENSSL_NO_CMS
|
||||||
{FUNC_TYPE_GENERAL,"cms",cms_main},
|
{FUNC_TYPE_GENERAL, "cms", cms_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"crl2pkcs7",crl2pkcs7_main},
|
{FUNC_TYPE_GENERAL, "crl2pkcs7", crl2pkcs7_main},
|
||||||
{FUNC_TYPE_GENERAL,"sess_id",sess_id_main},
|
{FUNC_TYPE_GENERAL, "sess_id", sess_id_main},
|
||||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
|
||||||
{FUNC_TYPE_GENERAL,"ciphers",ciphers_main},
|
{FUNC_TYPE_GENERAL, "ciphers", ciphers_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"nseq",nseq_main},
|
{FUNC_TYPE_GENERAL, "nseq", nseq_main},
|
||||||
#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)
|
#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)
|
||||||
{FUNC_TYPE_GENERAL,"pkcs12",pkcs12_main},
|
{FUNC_TYPE_GENERAL, "pkcs12", pkcs12_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_GENERAL,"pkcs8",pkcs8_main},
|
{FUNC_TYPE_GENERAL, "pkcs8", pkcs8_main},
|
||||||
{FUNC_TYPE_GENERAL,"pkey",pkey_main},
|
{FUNC_TYPE_GENERAL, "spkac", spkac_main},
|
||||||
{FUNC_TYPE_GENERAL,"pkeyparam",pkeyparam_main},
|
{FUNC_TYPE_GENERAL, "smime", smime_main},
|
||||||
{FUNC_TYPE_GENERAL,"pkeyutl",pkeyutl_main},
|
{FUNC_TYPE_GENERAL, "rand", rand_main},
|
||||||
{FUNC_TYPE_GENERAL,"spkac",spkac_main},
|
|
||||||
{FUNC_TYPE_GENERAL,"smime",smime_main},
|
|
||||||
{FUNC_TYPE_GENERAL,"rand",rand_main},
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
{FUNC_TYPE_GENERAL,"engine",engine_main},
|
{FUNC_TYPE_GENERAL, "engine", engine_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_OCSP
|
{FUNC_TYPE_GENERAL, "ocsp", ocsp_main},
|
||||||
{FUNC_TYPE_GENERAL,"ocsp",ocsp_main},
|
{FUNC_TYPE_GENERAL, "prime", prime_main},
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_SRP
|
|
||||||
{FUNC_TYPE_GENERAL,"srp",srp_main},
|
|
||||||
#endif
|
|
||||||
{FUNC_TYPE_GENERAL,"prime",prime_main},
|
|
||||||
{FUNC_TYPE_GENERAL,"ts",ts_main},
|
|
||||||
#ifndef OPENSSL_NO_MD2
|
#ifndef OPENSSL_NO_MD2
|
||||||
{FUNC_TYPE_MD,"md2",dgst_main},
|
{FUNC_TYPE_MD, "md2", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_MD4
|
#ifndef OPENSSL_NO_MD4
|
||||||
{FUNC_TYPE_MD,"md4",dgst_main},
|
{FUNC_TYPE_MD, "md4", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_MD5
|
#ifndef OPENSSL_NO_MD5
|
||||||
{FUNC_TYPE_MD,"md5",dgst_main},
|
{FUNC_TYPE_MD, "md5", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SHA
|
#ifndef OPENSSL_NO_SHA
|
||||||
{FUNC_TYPE_MD,"sha",dgst_main},
|
{FUNC_TYPE_MD, "sha", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SHA1
|
#ifndef OPENSSL_NO_SHA1
|
||||||
{FUNC_TYPE_MD,"sha1",dgst_main},
|
{FUNC_TYPE_MD, "sha1", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_MDC2
|
#ifndef OPENSSL_NO_MDC2
|
||||||
{FUNC_TYPE_MD,"mdc2",dgst_main},
|
{FUNC_TYPE_MD, "mdc2", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RMD160
|
#ifndef OPENSSL_NO_RMD160
|
||||||
{FUNC_TYPE_MD,"rmd160",dgst_main},
|
{FUNC_TYPE_MD, "rmd160", dgst_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-128-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-128-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-128-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-128-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-192-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-192-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-192-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-192-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-256-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-256-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_AES
|
#ifndef OPENSSL_NO_AES
|
||||||
{FUNC_TYPE_CIPHER,"aes-256-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "aes-256-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
{FUNC_TYPE_CIPHER,"camellia-128-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "camellia-128-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
{FUNC_TYPE_CIPHER,"camellia-128-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "camellia-128-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
{FUNC_TYPE_CIPHER,"camellia-192-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "camellia-192-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
{FUNC_TYPE_CIPHER,"camellia-192-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "camellia-192-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
{FUNC_TYPE_CIPHER,"camellia-256-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "camellia-256-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
#ifndef OPENSSL_NO_CAMELLIA
|
||||||
{FUNC_TYPE_CIPHER,"camellia-256-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "camellia-256-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
{FUNC_TYPE_CIPHER,"base64",enc_main},
|
{FUNC_TYPE_CIPHER, "base64", enc_main},
|
||||||
#ifdef ZLIB
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"zlib",enc_main},
|
{FUNC_TYPE_CIPHER, "des", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des",enc_main},
|
{FUNC_TYPE_CIPHER, "des3", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des3",enc_main},
|
{FUNC_TYPE_CIPHER, "desx", enc_main},
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_DES
|
|
||||||
{FUNC_TYPE_CIPHER,"desx",enc_main},
|
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_IDEA
|
#ifndef OPENSSL_NO_IDEA
|
||||||
{FUNC_TYPE_CIPHER,"idea",enc_main},
|
{FUNC_TYPE_CIPHER, "idea", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SEED
|
#ifndef OPENSSL_NO_SEED
|
||||||
{FUNC_TYPE_CIPHER,"seed",enc_main},
|
{FUNC_TYPE_CIPHER, "seed", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC4
|
#ifndef OPENSSL_NO_RC4
|
||||||
{FUNC_TYPE_CIPHER,"rc4",enc_main},
|
{FUNC_TYPE_CIPHER, "rc4", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC4
|
#ifndef OPENSSL_NO_RC4
|
||||||
{FUNC_TYPE_CIPHER,"rc4-40",enc_main},
|
{FUNC_TYPE_CIPHER, "rc4-40", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_BF
|
#ifndef OPENSSL_NO_BF
|
||||||
{FUNC_TYPE_CIPHER,"bf",enc_main},
|
{FUNC_TYPE_CIPHER, "bf", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast",enc_main},
|
{FUNC_TYPE_CIPHER, "cast", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC5
|
#ifndef OPENSSL_NO_RC5
|
||||||
{FUNC_TYPE_CIPHER,"rc5",enc_main},
|
{FUNC_TYPE_CIPHER, "rc5", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede3",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede3", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "des-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede3-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede3-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede3-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede3-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_DES
|
#ifndef OPENSSL_NO_DES
|
||||||
{FUNC_TYPE_CIPHER,"des-ede3-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "des-ede3-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_IDEA
|
#ifndef OPENSSL_NO_IDEA
|
||||||
{FUNC_TYPE_CIPHER,"idea-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "idea-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_IDEA
|
#ifndef OPENSSL_NO_IDEA
|
||||||
{FUNC_TYPE_CIPHER,"idea-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "idea-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_IDEA
|
#ifndef OPENSSL_NO_IDEA
|
||||||
{FUNC_TYPE_CIPHER,"idea-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "idea-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_IDEA
|
#ifndef OPENSSL_NO_IDEA
|
||||||
{FUNC_TYPE_CIPHER,"idea-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "idea-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SEED
|
#ifndef OPENSSL_NO_SEED
|
||||||
{FUNC_TYPE_CIPHER,"seed-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "seed-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SEED
|
#ifndef OPENSSL_NO_SEED
|
||||||
{FUNC_TYPE_CIPHER,"seed-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "seed-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SEED
|
#ifndef OPENSSL_NO_SEED
|
||||||
{FUNC_TYPE_CIPHER,"seed-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "seed-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_SEED
|
#ifndef OPENSSL_NO_SEED
|
||||||
{FUNC_TYPE_CIPHER,"seed-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "seed-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-64-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-64-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC2
|
#ifndef OPENSSL_NO_RC2
|
||||||
{FUNC_TYPE_CIPHER,"rc2-40-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "rc2-40-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_BF
|
#ifndef OPENSSL_NO_BF
|
||||||
{FUNC_TYPE_CIPHER,"bf-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "bf-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_BF
|
#ifndef OPENSSL_NO_BF
|
||||||
{FUNC_TYPE_CIPHER,"bf-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "bf-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_BF
|
#ifndef OPENSSL_NO_BF
|
||||||
{FUNC_TYPE_CIPHER,"bf-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "bf-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_BF
|
#ifndef OPENSSL_NO_BF
|
||||||
{FUNC_TYPE_CIPHER,"bf-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "bf-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast5-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "cast5-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast5-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "cast5-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast5-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "cast5-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast5-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "cast5-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_CAST
|
#ifndef OPENSSL_NO_CAST
|
||||||
{FUNC_TYPE_CIPHER,"cast-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "cast-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC5
|
#ifndef OPENSSL_NO_RC5
|
||||||
{FUNC_TYPE_CIPHER,"rc5-cbc",enc_main},
|
{FUNC_TYPE_CIPHER, "rc5-cbc", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC5
|
#ifndef OPENSSL_NO_RC5
|
||||||
{FUNC_TYPE_CIPHER,"rc5-ecb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc5-ecb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC5
|
#ifndef OPENSSL_NO_RC5
|
||||||
{FUNC_TYPE_CIPHER,"rc5-cfb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc5-cfb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
#ifndef OPENSSL_NO_RC5
|
#ifndef OPENSSL_NO_RC5
|
||||||
{FUNC_TYPE_CIPHER,"rc5-ofb",enc_main},
|
{FUNC_TYPE_CIPHER, "rc5-ofb", enc_main},
|
||||||
#endif
|
#endif
|
||||||
{0,NULL,NULL}
|
{0, NULL, NULL}
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -13,16 +13,12 @@ print <<'EOF';
|
|||||||
#define FUNC_TYPE_GENERAL 1
|
#define FUNC_TYPE_GENERAL 1
|
||||||
#define FUNC_TYPE_MD 2
|
#define FUNC_TYPE_MD 2
|
||||||
#define FUNC_TYPE_CIPHER 3
|
#define FUNC_TYPE_CIPHER 3
|
||||||
#define FUNC_TYPE_PKEY 4
|
|
||||||
#define FUNC_TYPE_MD_ALG 5
|
|
||||||
#define FUNC_TYPE_CIPHER_ALG 6
|
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
int type;
|
int type;
|
||||||
const char *name;
|
const char *name;
|
||||||
int (*func)(int argc,char *argv[]);
|
int (*func)(int argc,char *argv[]);
|
||||||
} FUNCTION;
|
} FUNCTION;
|
||||||
DECLARE_LHASH_OF(FUNCTION);
|
|
||||||
|
|
||||||
FUNCTION functions[] = {
|
FUNCTION functions[] = {
|
||||||
EOF
|
EOF
|
||||||
@@ -49,8 +45,6 @@ foreach (@ARGV)
|
|||||||
{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
|
{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
|
||||||
elsif ( ($_ =~ /^cms$/))
|
elsif ( ($_ =~ /^cms$/))
|
||||||
{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
|
{ print "#ifndef OPENSSL_NO_CMS\n${str}#endif\n"; }
|
||||||
elsif ( ($_ =~ /^ocsp$/))
|
|
||||||
{ print "#ifndef OPENSSL_NO_OCSP\n${str}#endif\n"; }
|
|
||||||
else
|
else
|
||||||
{ print $str; }
|
{ print $str; }
|
||||||
}
|
}
|
||||||
@@ -68,7 +62,7 @@ foreach (
|
|||||||
"camellia-128-cbc", "camellia-128-ecb",
|
"camellia-128-cbc", "camellia-128-ecb",
|
||||||
"camellia-192-cbc", "camellia-192-ecb",
|
"camellia-192-cbc", "camellia-192-ecb",
|
||||||
"camellia-256-cbc", "camellia-256-ecb",
|
"camellia-256-cbc", "camellia-256-ecb",
|
||||||
"base64", "zlib",
|
"base64",
|
||||||
"des", "des3", "desx", "idea", "seed", "rc4", "rc4-40",
|
"des", "des3", "desx", "idea", "seed", "rc4", "rc4-40",
|
||||||
"rc2", "bf", "cast", "rc5",
|
"rc2", "bf", "cast", "rc5",
|
||||||
"des-ecb", "des-ede", "des-ede3",
|
"des-ecb", "des-ede", "des-ede3",
|
||||||
@@ -95,7 +89,6 @@ foreach (
|
|||||||
elsif ($_ =~ /bf/) { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
|
elsif ($_ =~ /bf/) { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
|
elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /rc5/) { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
|
elsif ($_ =~ /rc5/) { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
|
||||||
elsif ($_ =~ /zlib/) { $t="#ifdef ZLIB\n${t}#endif\n"; }
|
|
||||||
print $t;
|
print $t;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
280
apps/rand.c
280
apps/rand.c
@@ -7,7 +7,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -66,7 +66,8 @@
|
|||||||
#undef PROG
|
#undef PROG
|
||||||
#define PROG rand_main
|
#define PROG rand_main
|
||||||
|
|
||||||
/* -out file - write to file
|
/*-
|
||||||
|
* -out file - write to file
|
||||||
* -rand file:file - PRNG seed files
|
* -rand file:file - PRNG seed files
|
||||||
* -base64 - base64 encode output
|
* -base64 - base64 encode output
|
||||||
* -hex - hex encode output
|
* -hex - hex encode output
|
||||||
@@ -76,170 +77,153 @@
|
|||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
int i, r, ret = 1;
|
int i, r, ret = 1;
|
||||||
int badopt;
|
int badopt;
|
||||||
char *outfile = NULL;
|
char *outfile = NULL;
|
||||||
char *inrand = NULL;
|
char *inrand = NULL;
|
||||||
int base64 = 0;
|
int base64 = 0;
|
||||||
int hex = 0;
|
int hex = 0;
|
||||||
BIO *out = NULL;
|
BIO *out = NULL;
|
||||||
int num = -1;
|
int num = -1;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine = NULL;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
apps_startup();
|
apps_startup();
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (bio_err == NULL)
|
||||||
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
badopt = 0;
|
badopt = 0;
|
||||||
i = 0;
|
i = 0;
|
||||||
while (!badopt && argv[++i] != NULL)
|
while (!badopt && argv[++i] != NULL) {
|
||||||
{
|
if (strcmp(argv[i], "-out") == 0) {
|
||||||
if (strcmp(argv[i], "-out") == 0)
|
if ((argv[i + 1] != NULL) && (outfile == NULL))
|
||||||
{
|
outfile = argv[++i];
|
||||||
if ((argv[i+1] != NULL) && (outfile == NULL))
|
else
|
||||||
outfile = argv[++i];
|
badopt = 1;
|
||||||
else
|
}
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
else if (strcmp(argv[i], "-engine") == 0)
|
else if (strcmp(argv[i], "-engine") == 0) {
|
||||||
{
|
if ((argv[i + 1] != NULL) && (engine == NULL))
|
||||||
if ((argv[i+1] != NULL) && (engine == NULL))
|
engine = argv[++i];
|
||||||
engine = argv[++i];
|
else
|
||||||
else
|
badopt = 1;
|
||||||
badopt = 1;
|
}
|
||||||
}
|
|
||||||
#endif
|
#endif
|
||||||
else if (strcmp(argv[i], "-rand") == 0)
|
else if (strcmp(argv[i], "-rand") == 0) {
|
||||||
{
|
if ((argv[i + 1] != NULL) && (inrand == NULL))
|
||||||
if ((argv[i+1] != NULL) && (inrand == NULL))
|
inrand = argv[++i];
|
||||||
inrand = argv[++i];
|
else
|
||||||
else
|
badopt = 1;
|
||||||
badopt = 1;
|
} else if (strcmp(argv[i], "-base64") == 0) {
|
||||||
}
|
if (!base64)
|
||||||
else if (strcmp(argv[i], "-base64") == 0)
|
base64 = 1;
|
||||||
{
|
else
|
||||||
if (!base64)
|
badopt = 1;
|
||||||
base64 = 1;
|
} else if (strcmp(argv[i], "-hex") == 0) {
|
||||||
else
|
if (!hex)
|
||||||
badopt = 1;
|
hex = 1;
|
||||||
}
|
else
|
||||||
else if (strcmp(argv[i], "-hex") == 0)
|
badopt = 1;
|
||||||
{
|
} else if (isdigit((unsigned char)argv[i][0])) {
|
||||||
if (!hex)
|
if (num < 0) {
|
||||||
hex = 1;
|
r = sscanf(argv[i], "%d", &num);
|
||||||
else
|
if (r == 0 || num < 0)
|
||||||
badopt = 1;
|
badopt = 1;
|
||||||
}
|
} else
|
||||||
else if (isdigit((unsigned char)argv[i][0]))
|
badopt = 1;
|
||||||
{
|
} else
|
||||||
if (num < 0)
|
badopt = 1;
|
||||||
{
|
}
|
||||||
r = sscanf(argv[i], "%d", &num);
|
|
||||||
if (r == 0 || num < 0)
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
else
|
|
||||||
badopt = 1;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (hex && base64)
|
if (hex && base64)
|
||||||
badopt = 1;
|
badopt = 1;
|
||||||
|
|
||||||
if (num < 0)
|
if (num < 0)
|
||||||
badopt = 1;
|
badopt = 1;
|
||||||
|
|
||||||
if (badopt)
|
if (badopt) {
|
||||||
{
|
BIO_printf(bio_err, "Usage: rand [options] num\n");
|
||||||
BIO_printf(bio_err, "Usage: rand [options] num\n");
|
BIO_printf(bio_err, "where options are\n");
|
||||||
BIO_printf(bio_err, "where options are\n");
|
BIO_printf(bio_err, "-out file - write to file\n");
|
||||||
BIO_printf(bio_err, "-out file - write to file\n");
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
BIO_printf(bio_err, "-engine e - use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err,
|
||||||
|
"-engine e - use engine e, possibly a hardware device.\n");
|
||||||
#endif
|
#endif
|
||||||
BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n",
|
||||||
BIO_printf(bio_err, "-base64 - base64 encode output\n");
|
LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
|
||||||
BIO_printf(bio_err, "-hex - hex encode output\n");
|
BIO_printf(bio_err, "-base64 - base64 encode output\n");
|
||||||
goto err;
|
BIO_printf(bio_err, "-hex - hex encode output\n");
|
||||||
}
|
goto err;
|
||||||
|
}
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
#ifndef OPENSSL_NO_ENGINE
|
||||||
setup_engine(bio_err, engine, 0);
|
setup_engine(bio_err, engine, 0);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
app_RAND_load_file(NULL, bio_err, (inrand != NULL));
|
||||||
if (inrand != NULL)
|
if (inrand != NULL)
|
||||||
BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
|
BIO_printf(bio_err, "%ld semi-random bytes loaded\n",
|
||||||
app_RAND_load_files(inrand));
|
app_RAND_load_files(inrand));
|
||||||
|
|
||||||
out = BIO_new(BIO_s_file());
|
out = BIO_new(BIO_s_file());
|
||||||
if (out == NULL)
|
if (out == NULL)
|
||||||
goto err;
|
goto err;
|
||||||
if (outfile != NULL)
|
if (outfile != NULL)
|
||||||
r = BIO_write_filename(out, outfile);
|
r = BIO_write_filename(out, outfile);
|
||||||
else
|
else {
|
||||||
{
|
r = BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
r = BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
|
|
||||||
#ifdef OPENSSL_SYS_VMS
|
#ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
if (r <= 0)
|
if (r <= 0)
|
||||||
goto err;
|
goto err;
|
||||||
|
|
||||||
if (base64)
|
if (base64) {
|
||||||
{
|
BIO *b64 = BIO_new(BIO_f_base64());
|
||||||
BIO *b64 = BIO_new(BIO_f_base64());
|
if (b64 == NULL)
|
||||||
if (b64 == NULL)
|
goto err;
|
||||||
goto err;
|
out = BIO_push(b64, out);
|
||||||
out = BIO_push(b64, out);
|
}
|
||||||
}
|
|
||||||
|
|
||||||
while (num > 0)
|
|
||||||
{
|
|
||||||
unsigned char buf[4096];
|
|
||||||
int chunk;
|
|
||||||
|
|
||||||
chunk = num;
|
while (num > 0) {
|
||||||
if (chunk > (int)sizeof(buf))
|
unsigned char buf[4096];
|
||||||
chunk = sizeof buf;
|
int chunk;
|
||||||
r = RAND_bytes(buf, chunk);
|
|
||||||
if (r <= 0)
|
|
||||||
goto err;
|
|
||||||
if (!hex)
|
|
||||||
BIO_write(out, buf, chunk);
|
|
||||||
else
|
|
||||||
{
|
|
||||||
for (i = 0; i < chunk; i++)
|
|
||||||
BIO_printf(out, "%02x", buf[i]);
|
|
||||||
}
|
|
||||||
num -= chunk;
|
|
||||||
}
|
|
||||||
if (hex)
|
|
||||||
BIO_puts(out, "\n");
|
|
||||||
(void)BIO_flush(out);
|
|
||||||
|
|
||||||
app_RAND_write_file(NULL, bio_err);
|
chunk = num;
|
||||||
ret = 0;
|
if (chunk > (int)sizeof(buf))
|
||||||
|
chunk = sizeof buf;
|
||||||
err:
|
r = RAND_bytes(buf, chunk);
|
||||||
ERR_print_errors(bio_err);
|
if (r <= 0)
|
||||||
if (out)
|
goto err;
|
||||||
BIO_free_all(out);
|
if (!hex)
|
||||||
apps_shutdown();
|
BIO_write(out, buf, chunk);
|
||||||
OPENSSL_EXIT(ret);
|
else {
|
||||||
}
|
for (i = 0; i < chunk; i++)
|
||||||
|
BIO_printf(out, "%02x", buf[i]);
|
||||||
|
}
|
||||||
|
num -= chunk;
|
||||||
|
}
|
||||||
|
if (hex)
|
||||||
|
BIO_puts(out, "\n");
|
||||||
|
(void)BIO_flush(out);
|
||||||
|
|
||||||
|
app_RAND_write_file(NULL, bio_err);
|
||||||
|
ret = 0;
|
||||||
|
|
||||||
|
err:
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
if (out)
|
||||||
|
BIO_free_all(out);
|
||||||
|
apps_shutdown();
|
||||||
|
OPENSSL_EXIT(ret);
|
||||||
|
}
|
||||||
|
|||||||
3121
apps/req.c
3121
apps/req.c
File diff suppressed because it is too large
Load Diff
663
apps/rsa.c
663
apps/rsa.c
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -58,393 +58,342 @@
|
|||||||
|
|
||||||
#include <openssl/opensslconf.h>
|
#include <openssl/opensslconf.h>
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
#include <stdio.h>
|
# include <stdio.h>
|
||||||
#include <stdlib.h>
|
# include <stdlib.h>
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <time.h>
|
# include <time.h>
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <openssl/bio.h>
|
# include <openssl/bio.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/rsa.h>
|
# include <openssl/rsa.h>
|
||||||
#include <openssl/evp.h>
|
# include <openssl/evp.h>
|
||||||
#include <openssl/x509.h>
|
# include <openssl/x509.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
#include <openssl/bn.h>
|
# include <openssl/bn.h>
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
#define PROG rsa_main
|
# define PROG rsa_main
|
||||||
|
|
||||||
/* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
/*-
|
||||||
|
* -inform arg - input format - default PEM (one of DER, NET or PEM)
|
||||||
* -outform arg - output format - default PEM
|
* -outform arg - output format - default PEM
|
||||||
* -in arg - input file - default stdin
|
* -in arg - input file - default stdin
|
||||||
* -out arg - output file - default stdout
|
* -out arg - output file - default stdout
|
||||||
* -des - encrypt output if PEM format with DES in cbc mode
|
* -des - encrypt output if PEM format with DES in cbc mode
|
||||||
* -des3 - encrypt output if PEM format
|
* -des3 - encrypt output if PEM format
|
||||||
* -idea - encrypt output if PEM format
|
* -idea - encrypt output if PEM format
|
||||||
* -seed - encrypt output if PEM format
|
* -seed - encrypt output if PEM format
|
||||||
* -aes128 - encrypt output if PEM format
|
* -aes128 - encrypt output if PEM format
|
||||||
* -aes192 - encrypt output if PEM format
|
* -aes192 - encrypt output if PEM format
|
||||||
* -aes256 - encrypt output if PEM format
|
* -aes256 - encrypt output if PEM format
|
||||||
* -camellia128 - encrypt output if PEM format
|
* -camellia128 - encrypt output if PEM format
|
||||||
* -camellia192 - encrypt output if PEM format
|
* -camellia192 - encrypt output if PEM format
|
||||||
* -camellia256 - encrypt output if PEM format
|
* -camellia256 - encrypt output if PEM format
|
||||||
* -text - print a text version
|
* -text - print a text version
|
||||||
* -modulus - print the RSA key modulus
|
* -modulus - print the RSA key modulus
|
||||||
* -check - verify key consistency
|
* -check - verify key consistency
|
||||||
* -pubin - Expect a public key in input file.
|
* -pubin - Expect a public key in input file.
|
||||||
* -pubout - Output a public key.
|
* -pubout - Output a public key.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
int MAIN(int, char **);
|
int MAIN(int, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
int ret=1;
|
int ret = 1;
|
||||||
RSA *rsa=NULL;
|
RSA *rsa = NULL;
|
||||||
int i,badops=0, sgckey=0;
|
int i, badops = 0, sgckey = 0;
|
||||||
const EVP_CIPHER *enc=NULL;
|
const EVP_CIPHER *enc = NULL;
|
||||||
BIO *out=NULL;
|
BIO *out = NULL;
|
||||||
int informat,outformat,text=0,check=0,noout=0;
|
int informat, outformat, text = 0, check = 0, noout = 0;
|
||||||
int pubin = 0, pubout = 0;
|
int pubin = 0, pubout = 0;
|
||||||
char *infile,*outfile,*prog;
|
char *infile, *outfile, *prog;
|
||||||
char *passargin = NULL, *passargout = NULL;
|
char *passargin = NULL, *passargout = NULL;
|
||||||
char *passin = NULL, *passout = NULL;
|
char *passin = NULL, *passout = NULL;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine=NULL;
|
char *engine = NULL;
|
||||||
#endif
|
# endif
|
||||||
int modulus=0;
|
int modulus = 0;
|
||||||
|
|
||||||
int pvk_encr = 2;
|
apps_startup();
|
||||||
|
|
||||||
apps_startup();
|
if (bio_err == NULL)
|
||||||
|
if ((bio_err = BIO_new(BIO_s_file())) != NULL)
|
||||||
|
BIO_set_fp(bio_err, stderr, BIO_NOCLOSE | BIO_FP_TEXT);
|
||||||
|
|
||||||
if (bio_err == NULL)
|
if (!load_config(bio_err, NULL))
|
||||||
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
|
goto end;
|
||||||
BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
|
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
infile = NULL;
|
||||||
goto end;
|
outfile = NULL;
|
||||||
|
informat = FORMAT_PEM;
|
||||||
|
outformat = FORMAT_PEM;
|
||||||
|
|
||||||
infile=NULL;
|
prog = argv[0];
|
||||||
outfile=NULL;
|
argc--;
|
||||||
informat=FORMAT_PEM;
|
argv++;
|
||||||
outformat=FORMAT_PEM;
|
while (argc >= 1) {
|
||||||
|
if (strcmp(*argv, "-inform") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
informat = str2fmt(*(++argv));
|
||||||
|
} else if (strcmp(*argv, "-outform") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
outformat = str2fmt(*(++argv));
|
||||||
|
} else if (strcmp(*argv, "-in") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
infile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-out") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
outfile = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-passin") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
passargin = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-passout") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
passargout = *(++argv);
|
||||||
|
}
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
else if (strcmp(*argv, "-engine") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
goto bad;
|
||||||
|
engine = *(++argv);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
else if (strcmp(*argv, "-sgckey") == 0)
|
||||||
|
sgckey = 1;
|
||||||
|
else if (strcmp(*argv, "-pubin") == 0)
|
||||||
|
pubin = 1;
|
||||||
|
else if (strcmp(*argv, "-pubout") == 0)
|
||||||
|
pubout = 1;
|
||||||
|
else if (strcmp(*argv, "-noout") == 0)
|
||||||
|
noout = 1;
|
||||||
|
else if (strcmp(*argv, "-text") == 0)
|
||||||
|
text = 1;
|
||||||
|
else if (strcmp(*argv, "-modulus") == 0)
|
||||||
|
modulus = 1;
|
||||||
|
else if (strcmp(*argv, "-check") == 0)
|
||||||
|
check = 1;
|
||||||
|
else if ((enc = EVP_get_cipherbyname(&(argv[0][1]))) == NULL) {
|
||||||
|
BIO_printf(bio_err, "unknown option %s\n", *argv);
|
||||||
|
badops = 1;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
prog=argv[0];
|
if (badops) {
|
||||||
argc--;
|
bad:
|
||||||
argv++;
|
BIO_printf(bio_err, "%s [options] <infile >outfile\n", prog);
|
||||||
while (argc >= 1)
|
BIO_printf(bio_err, "where options are\n");
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
if (strcmp(*argv,"-inform") == 0)
|
" -inform arg input format - one of DER NET PEM\n");
|
||||||
{
|
BIO_printf(bio_err,
|
||||||
if (--argc < 1) goto bad;
|
" -outform arg output format - one of DER NET PEM\n");
|
||||||
informat=str2fmt(*(++argv));
|
BIO_printf(bio_err, " -in arg input file\n");
|
||||||
}
|
BIO_printf(bio_err, " -sgckey Use IIS SGC key format\n");
|
||||||
else if (strcmp(*argv,"-outform") == 0)
|
BIO_printf(bio_err,
|
||||||
{
|
" -passin arg input file pass phrase source\n");
|
||||||
if (--argc < 1) goto bad;
|
BIO_printf(bio_err, " -out arg output file\n");
|
||||||
outformat=str2fmt(*(++argv));
|
BIO_printf(bio_err,
|
||||||
}
|
" -passout arg output file pass phrase source\n");
|
||||||
else if (strcmp(*argv,"-in") == 0)
|
BIO_printf(bio_err,
|
||||||
{
|
" -des encrypt PEM output with cbc des\n");
|
||||||
if (--argc < 1) goto bad;
|
BIO_printf(bio_err,
|
||||||
infile= *(++argv);
|
" -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
||||||
}
|
# ifndef OPENSSL_NO_IDEA
|
||||||
else if (strcmp(*argv,"-out") == 0)
|
BIO_printf(bio_err,
|
||||||
{
|
" -idea encrypt PEM output with cbc idea\n");
|
||||||
if (--argc < 1) goto bad;
|
# endif
|
||||||
outfile= *(++argv);
|
# ifndef OPENSSL_NO_SEED
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
else if (strcmp(*argv,"-passin") == 0)
|
" -seed encrypt PEM output with cbc seed\n");
|
||||||
{
|
# endif
|
||||||
if (--argc < 1) goto bad;
|
# ifndef OPENSSL_NO_AES
|
||||||
passargin= *(++argv);
|
BIO_printf(bio_err, " -aes128, -aes192, -aes256\n");
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
else if (strcmp(*argv,"-passout") == 0)
|
" encrypt PEM output with cbc aes\n");
|
||||||
{
|
# endif
|
||||||
if (--argc < 1) goto bad;
|
# ifndef OPENSSL_NO_CAMELLIA
|
||||||
passargout= *(++argv);
|
BIO_printf(bio_err, " -camellia128, -camellia192, -camellia256\n");
|
||||||
}
|
BIO_printf(bio_err,
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
" encrypt PEM output with cbc camellia\n");
|
||||||
else if (strcmp(*argv,"-engine") == 0)
|
# endif
|
||||||
{
|
BIO_printf(bio_err, " -text print the key in text\n");
|
||||||
if (--argc < 1) goto bad;
|
BIO_printf(bio_err, " -noout don't print key out\n");
|
||||||
engine= *(++argv);
|
BIO_printf(bio_err, " -modulus print the RSA key modulus\n");
|
||||||
}
|
BIO_printf(bio_err, " -check verify key consistency\n");
|
||||||
#endif
|
BIO_printf(bio_err,
|
||||||
else if (strcmp(*argv,"-sgckey") == 0)
|
" -pubin expect a public key in input file\n");
|
||||||
sgckey=1;
|
BIO_printf(bio_err, " -pubout output a public key\n");
|
||||||
else if (strcmp(*argv,"-pubin") == 0)
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
pubin=1;
|
BIO_printf(bio_err,
|
||||||
else if (strcmp(*argv,"-pubout") == 0)
|
" -engine e use engine e, possibly a hardware device.\n");
|
||||||
pubout=1;
|
# endif
|
||||||
else if (strcmp(*argv,"-RSAPublicKey_in") == 0)
|
goto end;
|
||||||
pubin = 2;
|
}
|
||||||
else if (strcmp(*argv,"-RSAPublicKey_out") == 0)
|
|
||||||
pubout = 2;
|
|
||||||
else if (strcmp(*argv,"-pvk-strong") == 0)
|
|
||||||
pvk_encr=2;
|
|
||||||
else if (strcmp(*argv,"-pvk-weak") == 0)
|
|
||||||
pvk_encr=1;
|
|
||||||
else if (strcmp(*argv,"-pvk-none") == 0)
|
|
||||||
pvk_encr=0;
|
|
||||||
else if (strcmp(*argv,"-noout") == 0)
|
|
||||||
noout=1;
|
|
||||||
else if (strcmp(*argv,"-text") == 0)
|
|
||||||
text=1;
|
|
||||||
else if (strcmp(*argv,"-modulus") == 0)
|
|
||||||
modulus=1;
|
|
||||||
else if (strcmp(*argv,"-check") == 0)
|
|
||||||
check=1;
|
|
||||||
else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
|
|
||||||
{
|
|
||||||
BIO_printf(bio_err,"unknown option %s\n",*argv);
|
|
||||||
badops=1;
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (badops)
|
ERR_load_crypto_strings();
|
||||||
{
|
|
||||||
bad:
|
|
||||||
BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
|
|
||||||
BIO_printf(bio_err,"where options are\n");
|
|
||||||
BIO_printf(bio_err," -inform arg input format - one of DER NET PEM\n");
|
|
||||||
BIO_printf(bio_err," -outform arg output format - one of DER NET PEM\n");
|
|
||||||
BIO_printf(bio_err," -in arg input file\n");
|
|
||||||
BIO_printf(bio_err," -sgckey Use IIS SGC key format\n");
|
|
||||||
BIO_printf(bio_err," -passin arg input file pass phrase source\n");
|
|
||||||
BIO_printf(bio_err," -out arg output file\n");
|
|
||||||
BIO_printf(bio_err," -passout arg output file pass phrase source\n");
|
|
||||||
BIO_printf(bio_err," -des encrypt PEM output with cbc des\n");
|
|
||||||
BIO_printf(bio_err," -des3 encrypt PEM output with ede cbc des using 168 bit key\n");
|
|
||||||
#ifndef OPENSSL_NO_IDEA
|
|
||||||
BIO_printf(bio_err," -idea encrypt PEM output with cbc idea\n");
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_SEED
|
|
||||||
BIO_printf(bio_err," -seed encrypt PEM output with cbc seed\n");
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_AES
|
|
||||||
BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
|
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc aes\n");
|
|
||||||
#endif
|
|
||||||
#ifndef OPENSSL_NO_CAMELLIA
|
|
||||||
BIO_printf(bio_err," -camellia128, -camellia192, -camellia256\n");
|
|
||||||
BIO_printf(bio_err," encrypt PEM output with cbc camellia\n");
|
|
||||||
#endif
|
|
||||||
BIO_printf(bio_err," -text print the key in text\n");
|
|
||||||
BIO_printf(bio_err," -noout don't print key out\n");
|
|
||||||
BIO_printf(bio_err," -modulus print the RSA key modulus\n");
|
|
||||||
BIO_printf(bio_err," -check verify key consistency\n");
|
|
||||||
BIO_printf(bio_err," -pubin expect a public key in input file\n");
|
|
||||||
BIO_printf(bio_err," -pubout output a public key\n");
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
BIO_printf(bio_err," -engine e use engine e, possibly a hardware device.\n");
|
|
||||||
#endif
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
ERR_load_crypto_strings();
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
e = setup_engine(bio_err, engine, 0);
|
||||||
|
# endif
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
if (!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
||||||
e = setup_engine(bio_err, engine, 0);
|
BIO_printf(bio_err, "Error getting passwords\n");
|
||||||
#endif
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
|
if (check && pubin) {
|
||||||
BIO_printf(bio_err, "Error getting passwords\n");
|
BIO_printf(bio_err, "Only private keys can be checked\n");
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if(check && pubin) {
|
out = BIO_new(BIO_s_file());
|
||||||
BIO_printf(bio_err, "Only private keys can be checked\n");
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
out=BIO_new(BIO_s_file());
|
{
|
||||||
|
EVP_PKEY *pkey;
|
||||||
|
|
||||||
{
|
if (pubin)
|
||||||
EVP_PKEY *pkey;
|
pkey = load_pubkey(bio_err, infile,
|
||||||
|
(informat == FORMAT_NETSCAPE && sgckey ?
|
||||||
|
FORMAT_IISSGC : informat), 1,
|
||||||
|
passin, e, "Public Key");
|
||||||
|
else
|
||||||
|
pkey = load_key(bio_err, infile,
|
||||||
|
(informat == FORMAT_NETSCAPE && sgckey ?
|
||||||
|
FORMAT_IISSGC : informat), 1,
|
||||||
|
passin, e, "Private Key");
|
||||||
|
|
||||||
if (pubin)
|
if (pkey != NULL)
|
||||||
{
|
rsa = pkey == NULL ? NULL : EVP_PKEY_get1_RSA(pkey);
|
||||||
int tmpformat=-1;
|
EVP_PKEY_free(pkey);
|
||||||
if (pubin == 2)
|
}
|
||||||
{
|
|
||||||
if (informat == FORMAT_PEM)
|
|
||||||
tmpformat = FORMAT_PEMRSA;
|
|
||||||
else if (informat == FORMAT_ASN1)
|
|
||||||
tmpformat = FORMAT_ASN1RSA;
|
|
||||||
}
|
|
||||||
else if (informat == FORMAT_NETSCAPE && sgckey)
|
|
||||||
tmpformat = FORMAT_IISSGC;
|
|
||||||
else
|
|
||||||
tmpformat = informat;
|
|
||||||
|
|
||||||
pkey = load_pubkey(bio_err, infile, tmpformat, 1,
|
|
||||||
passin, e, "Public Key");
|
|
||||||
}
|
|
||||||
else
|
|
||||||
pkey = load_key(bio_err, infile,
|
|
||||||
(informat == FORMAT_NETSCAPE && sgckey ?
|
|
||||||
FORMAT_IISSGC : informat), 1,
|
|
||||||
passin, e, "Private Key");
|
|
||||||
|
|
||||||
if (pkey != NULL)
|
if (rsa == NULL) {
|
||||||
rsa = EVP_PKEY_get1_RSA(pkey);
|
ERR_print_errors(bio_err);
|
||||||
EVP_PKEY_free(pkey);
|
goto end;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (rsa == NULL)
|
if (outfile == NULL) {
|
||||||
{
|
BIO_set_fp(out, stdout, BIO_NOCLOSE);
|
||||||
ERR_print_errors(bio_err);
|
# ifdef OPENSSL_SYS_VMS
|
||||||
goto end;
|
{
|
||||||
}
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
|
out = BIO_push(tmpbio, out);
|
||||||
|
}
|
||||||
|
# endif
|
||||||
|
} else {
|
||||||
|
if (BIO_write_filename(out, outfile) <= 0) {
|
||||||
|
perror(outfile);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if (outfile == NULL)
|
if (text)
|
||||||
{
|
if (!RSA_print(out, rsa, 0)) {
|
||||||
BIO_set_fp(out,stdout,BIO_NOCLOSE);
|
perror(outfile);
|
||||||
#ifdef OPENSSL_SYS_VMS
|
ERR_print_errors(bio_err);
|
||||||
{
|
goto end;
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
}
|
||||||
out = BIO_push(tmpbio, out);
|
|
||||||
}
|
|
||||||
#endif
|
|
||||||
}
|
|
||||||
else
|
|
||||||
{
|
|
||||||
if (BIO_write_filename(out,outfile) <= 0)
|
|
||||||
{
|
|
||||||
perror(outfile);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (text)
|
if (modulus) {
|
||||||
if (!RSA_print(out,rsa,0))
|
BIO_printf(out, "Modulus=");
|
||||||
{
|
BN_print(out, rsa->n);
|
||||||
perror(outfile);
|
BIO_printf(out, "\n");
|
||||||
ERR_print_errors(bio_err);
|
}
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (modulus)
|
if (check) {
|
||||||
{
|
int r = RSA_check_key(rsa);
|
||||||
BIO_printf(out,"Modulus=");
|
|
||||||
BN_print(out,rsa->n);
|
|
||||||
BIO_printf(out,"\n");
|
|
||||||
}
|
|
||||||
|
|
||||||
if (check)
|
if (r == 1)
|
||||||
{
|
BIO_printf(out, "RSA key ok\n");
|
||||||
int r = RSA_check_key(rsa);
|
else if (r == 0) {
|
||||||
|
unsigned long err;
|
||||||
|
|
||||||
if (r == 1)
|
while ((err = ERR_peek_error()) != 0 &&
|
||||||
BIO_printf(out,"RSA key ok\n");
|
ERR_GET_LIB(err) == ERR_LIB_RSA &&
|
||||||
else if (r == 0)
|
ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY &&
|
||||||
{
|
ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE) {
|
||||||
unsigned long err;
|
BIO_printf(out, "RSA key error: %s\n",
|
||||||
|
ERR_reason_error_string(err));
|
||||||
|
ERR_get_error(); /* remove e from error stack */
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
while ((err = ERR_peek_error()) != 0 &&
|
if (r == -1 || ERR_peek_error() != 0) { /* should happen only if r ==
|
||||||
ERR_GET_LIB(err) == ERR_LIB_RSA &&
|
* -1 */
|
||||||
ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY &&
|
ERR_print_errors(bio_err);
|
||||||
ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE)
|
goto end;
|
||||||
{
|
}
|
||||||
BIO_printf(out, "RSA key error: %s\n", ERR_reason_error_string(err));
|
}
|
||||||
ERR_get_error(); /* remove e from error stack */
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (r == -1 || ERR_peek_error() != 0) /* should happen only if r == -1 */
|
|
||||||
{
|
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if (noout)
|
|
||||||
{
|
|
||||||
ret = 0;
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
BIO_printf(bio_err,"writing RSA key\n");
|
|
||||||
if (outformat == FORMAT_ASN1) {
|
|
||||||
if(pubout || pubin)
|
|
||||||
{
|
|
||||||
if (pubout == 2)
|
|
||||||
i=i2d_RSAPublicKey_bio(out,rsa);
|
|
||||||
else
|
|
||||||
i=i2d_RSA_PUBKEY_bio(out,rsa);
|
|
||||||
}
|
|
||||||
else i=i2d_RSAPrivateKey_bio(out,rsa);
|
|
||||||
}
|
|
||||||
#ifndef OPENSSL_NO_RC4
|
|
||||||
else if (outformat == FORMAT_NETSCAPE)
|
|
||||||
{
|
|
||||||
unsigned char *p,*pp;
|
|
||||||
int size;
|
|
||||||
|
|
||||||
i=1;
|
if (noout) {
|
||||||
size=i2d_RSA_NET(rsa,NULL,NULL, sgckey);
|
ret = 0;
|
||||||
if ((p=(unsigned char *)OPENSSL_malloc(size)) == NULL)
|
goto end;
|
||||||
{
|
}
|
||||||
BIO_printf(bio_err,"Memory allocation failure\n");
|
BIO_printf(bio_err, "writing RSA key\n");
|
||||||
goto end;
|
if (outformat == FORMAT_ASN1) {
|
||||||
}
|
if (pubout || pubin)
|
||||||
pp=p;
|
i = i2d_RSA_PUBKEY_bio(out, rsa);
|
||||||
i2d_RSA_NET(rsa,&p,NULL, sgckey);
|
else
|
||||||
BIO_write(out,(char *)pp,size);
|
i = i2d_RSAPrivateKey_bio(out, rsa);
|
||||||
OPENSSL_free(pp);
|
}
|
||||||
}
|
# ifndef OPENSSL_NO_RC4
|
||||||
#endif
|
else if (outformat == FORMAT_NETSCAPE) {
|
||||||
else if (outformat == FORMAT_PEM) {
|
unsigned char *p, *pp;
|
||||||
if(pubout || pubin)
|
int size;
|
||||||
{
|
|
||||||
if (pubout == 2)
|
i = 1;
|
||||||
i=PEM_write_bio_RSAPublicKey(out,rsa);
|
size = i2d_RSA_NET(rsa, NULL, NULL, sgckey);
|
||||||
else
|
if ((p = (unsigned char *)OPENSSL_malloc(size)) == NULL) {
|
||||||
i=PEM_write_bio_RSA_PUBKEY(out,rsa);
|
BIO_printf(bio_err, "Memory allocation failure\n");
|
||||||
}
|
goto end;
|
||||||
else i=PEM_write_bio_RSAPrivateKey(out,rsa,
|
}
|
||||||
enc,NULL,0,NULL,passout);
|
pp = p;
|
||||||
#if !defined(OPENSSL_NO_DSA) && !defined(OPENSSL_NO_RC4)
|
i2d_RSA_NET(rsa, &p, NULL, sgckey);
|
||||||
} else if (outformat == FORMAT_MSBLOB || outformat == FORMAT_PVK) {
|
BIO_write(out, (char *)pp, size);
|
||||||
EVP_PKEY *pk;
|
OPENSSL_free(pp);
|
||||||
pk = EVP_PKEY_new();
|
}
|
||||||
EVP_PKEY_set1_RSA(pk, rsa);
|
# endif
|
||||||
if (outformat == FORMAT_PVK)
|
else if (outformat == FORMAT_PEM) {
|
||||||
i = i2b_PVK_bio(out, pk, pvk_encr, 0, passout);
|
if (pubout || pubin)
|
||||||
else if (pubin || pubout)
|
i = PEM_write_bio_RSA_PUBKEY(out, rsa);
|
||||||
i = i2b_PublicKey_bio(out, pk);
|
else
|
||||||
else
|
i = PEM_write_bio_RSAPrivateKey(out, rsa,
|
||||||
i = i2b_PrivateKey_bio(out, pk);
|
enc, NULL, 0, NULL, passout);
|
||||||
EVP_PKEY_free(pk);
|
} else {
|
||||||
#endif
|
BIO_printf(bio_err, "bad output format specified for outfile\n");
|
||||||
} else {
|
goto end;
|
||||||
BIO_printf(bio_err,"bad output format specified for outfile\n");
|
}
|
||||||
goto end;
|
if (!i) {
|
||||||
}
|
BIO_printf(bio_err, "unable to write key\n");
|
||||||
if (i <= 0)
|
ERR_print_errors(bio_err);
|
||||||
{
|
} else
|
||||||
BIO_printf(bio_err,"unable to write key\n");
|
ret = 0;
|
||||||
ERR_print_errors(bio_err);
|
end:
|
||||||
}
|
if (out != NULL)
|
||||||
else
|
BIO_free_all(out);
|
||||||
ret=0;
|
if (rsa != NULL)
|
||||||
end:
|
RSA_free(rsa);
|
||||||
if(out != NULL) BIO_free_all(out);
|
if (passin)
|
||||||
if(rsa != NULL) RSA_free(rsa);
|
OPENSSL_free(passin);
|
||||||
if(passin) OPENSSL_free(passin);
|
if (passout)
|
||||||
if(passout) OPENSSL_free(passout);
|
OPENSSL_free(passout);
|
||||||
apps_shutdown();
|
apps_shutdown();
|
||||||
OPENSSL_EXIT(ret);
|
OPENSSL_EXIT(ret);
|
||||||
}
|
}
|
||||||
#else /* !OPENSSL_NO_RSA */
|
#else /* !OPENSSL_NO_RSA */
|
||||||
|
|
||||||
# if PEDANTIC
|
# if PEDANTIC
|
||||||
static void *dummy=&dummy;
|
static void *dummy = &dummy;
|
||||||
# endif
|
# endif
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
511
apps/rsautl.c
511
apps/rsautl.c
@@ -1,6 +1,7 @@
|
|||||||
/* rsautl.c */
|
/* rsautl.c */
|
||||||
/* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL
|
/*
|
||||||
* project 2000.
|
* Written by Dr Stephen N Henson (steve@openssl.org) for the OpenSSL project
|
||||||
|
* 2000.
|
||||||
*/
|
*/
|
||||||
/* ====================================================================
|
/* ====================================================================
|
||||||
* Copyright (c) 2000 The OpenSSL Project. All rights reserved.
|
* Copyright (c) 2000 The OpenSSL Project. All rights reserved.
|
||||||
@@ -10,7 +11,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -59,293 +60,305 @@
|
|||||||
#include <openssl/opensslconf.h>
|
#include <openssl/opensslconf.h>
|
||||||
#ifndef OPENSSL_NO_RSA
|
#ifndef OPENSSL_NO_RSA
|
||||||
|
|
||||||
#include "apps.h"
|
# include "apps.h"
|
||||||
#include <string.h>
|
# include <string.h>
|
||||||
#include <openssl/err.h>
|
# include <openssl/err.h>
|
||||||
#include <openssl/pem.h>
|
# include <openssl/pem.h>
|
||||||
#include <openssl/rsa.h>
|
# include <openssl/rsa.h>
|
||||||
|
|
||||||
#define RSA_SIGN 1
|
# define RSA_SIGN 1
|
||||||
#define RSA_VERIFY 2
|
# define RSA_VERIFY 2
|
||||||
#define RSA_ENCRYPT 3
|
# define RSA_ENCRYPT 3
|
||||||
#define RSA_DECRYPT 4
|
# define RSA_DECRYPT 4
|
||||||
|
|
||||||
#define KEY_PRIVKEY 1
|
# define KEY_PRIVKEY 1
|
||||||
#define KEY_PUBKEY 2
|
# define KEY_PUBKEY 2
|
||||||
#define KEY_CERT 3
|
# define KEY_CERT 3
|
||||||
|
|
||||||
static void usage(void);
|
static void usage(void);
|
||||||
|
|
||||||
#undef PROG
|
# undef PROG
|
||||||
|
|
||||||
#define PROG rsautl_main
|
# define PROG rsautl_main
|
||||||
|
|
||||||
int MAIN(int argc, char **);
|
int MAIN(int argc, char **);
|
||||||
|
|
||||||
int MAIN(int argc, char **argv)
|
int MAIN(int argc, char **argv)
|
||||||
{
|
{
|
||||||
ENGINE *e = NULL;
|
ENGINE *e = NULL;
|
||||||
BIO *in = NULL, *out = NULL;
|
BIO *in = NULL, *out = NULL;
|
||||||
char *infile = NULL, *outfile = NULL;
|
char *infile = NULL, *outfile = NULL;
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
char *engine = NULL;
|
char *engine = NULL;
|
||||||
#endif
|
# endif
|
||||||
char *keyfile = NULL;
|
char *keyfile = NULL;
|
||||||
char rsa_mode = RSA_VERIFY, key_type = KEY_PRIVKEY;
|
char rsa_mode = RSA_VERIFY, key_type = KEY_PRIVKEY;
|
||||||
int keyform = FORMAT_PEM;
|
int keyform = FORMAT_PEM;
|
||||||
char need_priv = 0, badarg = 0, rev = 0;
|
char need_priv = 0, badarg = 0, rev = 0;
|
||||||
char hexdump = 0, asn1parse = 0;
|
char hexdump = 0, asn1parse = 0;
|
||||||
X509 *x;
|
X509 *x;
|
||||||
EVP_PKEY *pkey = NULL;
|
EVP_PKEY *pkey = NULL;
|
||||||
RSA *rsa = NULL;
|
RSA *rsa = NULL;
|
||||||
unsigned char *rsa_in = NULL, *rsa_out = NULL, pad;
|
unsigned char *rsa_in = NULL, *rsa_out = NULL, pad;
|
||||||
char *passargin = NULL, *passin = NULL;
|
char *passargin = NULL, *passin = NULL;
|
||||||
int rsa_inlen, rsa_outlen = 0;
|
int rsa_inlen, rsa_outlen = 0;
|
||||||
int keysize;
|
int keysize;
|
||||||
|
|
||||||
int ret = 1;
|
int ret = 1;
|
||||||
|
|
||||||
argc--;
|
argc--;
|
||||||
argv++;
|
argv++;
|
||||||
|
|
||||||
if(!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
if (!bio_err)
|
||||||
|
bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
|
||||||
|
|
||||||
if (!load_config(bio_err, NULL))
|
if (!load_config(bio_err, NULL))
|
||||||
goto end;
|
goto end;
|
||||||
ERR_load_crypto_strings();
|
ERR_load_crypto_strings();
|
||||||
OpenSSL_add_all_algorithms();
|
OpenSSL_add_all_algorithms();
|
||||||
pad = RSA_PKCS1_PADDING;
|
pad = RSA_PKCS1_PADDING;
|
||||||
|
|
||||||
while(argc >= 1)
|
|
||||||
{
|
|
||||||
if (!strcmp(*argv,"-in")) {
|
|
||||||
if (--argc < 1)
|
|
||||||
badarg = 1;
|
|
||||||
else
|
|
||||||
infile= *(++argv);
|
|
||||||
} else if (!strcmp(*argv,"-out")) {
|
|
||||||
if (--argc < 1)
|
|
||||||
badarg = 1;
|
|
||||||
else
|
|
||||||
outfile= *(++argv);
|
|
||||||
} else if(!strcmp(*argv, "-inkey")) {
|
|
||||||
if (--argc < 1)
|
|
||||||
badarg = 1;
|
|
||||||
else
|
|
||||||
keyfile = *(++argv);
|
|
||||||
} else if (!strcmp(*argv,"-passin")) {
|
|
||||||
if (--argc < 1)
|
|
||||||
badarg = 1;
|
|
||||||
else
|
|
||||||
passargin= *(++argv);
|
|
||||||
} else if (strcmp(*argv,"-keyform") == 0) {
|
|
||||||
if (--argc < 1)
|
|
||||||
badarg = 1;
|
|
||||||
else
|
|
||||||
keyform=str2fmt(*(++argv));
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
|
||||||
} else if(!strcmp(*argv, "-engine")) {
|
|
||||||
if (--argc < 1)
|
|
||||||
badarg = 1;
|
|
||||||
else
|
|
||||||
engine = *(++argv);
|
|
||||||
#endif
|
|
||||||
} else if(!strcmp(*argv, "-pubin")) {
|
|
||||||
key_type = KEY_PUBKEY;
|
|
||||||
} else if(!strcmp(*argv, "-certin")) {
|
|
||||||
key_type = KEY_CERT;
|
|
||||||
}
|
|
||||||
else if(!strcmp(*argv, "-asn1parse")) asn1parse = 1;
|
|
||||||
else if(!strcmp(*argv, "-hexdump")) hexdump = 1;
|
|
||||||
else if(!strcmp(*argv, "-raw")) pad = RSA_NO_PADDING;
|
|
||||||
else if(!strcmp(*argv, "-oaep")) pad = RSA_PKCS1_OAEP_PADDING;
|
|
||||||
else if(!strcmp(*argv, "-ssl")) pad = RSA_SSLV23_PADDING;
|
|
||||||
else if(!strcmp(*argv, "-pkcs")) pad = RSA_PKCS1_PADDING;
|
|
||||||
else if(!strcmp(*argv, "-x931")) pad = RSA_X931_PADDING;
|
|
||||||
else if(!strcmp(*argv, "-sign")) {
|
|
||||||
rsa_mode = RSA_SIGN;
|
|
||||||
need_priv = 1;
|
|
||||||
} else if(!strcmp(*argv, "-verify")) rsa_mode = RSA_VERIFY;
|
|
||||||
else if(!strcmp(*argv, "-rev")) rev = 1;
|
|
||||||
else if(!strcmp(*argv, "-encrypt")) rsa_mode = RSA_ENCRYPT;
|
|
||||||
else if(!strcmp(*argv, "-decrypt")) {
|
|
||||||
rsa_mode = RSA_DECRYPT;
|
|
||||||
need_priv = 1;
|
|
||||||
} else badarg = 1;
|
|
||||||
if(badarg) {
|
|
||||||
usage();
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
argc--;
|
|
||||||
argv++;
|
|
||||||
}
|
|
||||||
|
|
||||||
if(need_priv && (key_type != KEY_PRIVKEY)) {
|
while (argc >= 1) {
|
||||||
BIO_printf(bio_err, "A private key is needed for this operation\n");
|
if (!strcmp(*argv, "-in")) {
|
||||||
goto end;
|
if (--argc < 1)
|
||||||
}
|
badarg = 1;
|
||||||
|
else
|
||||||
|
infile = *(++argv);
|
||||||
|
} else if (!strcmp(*argv, "-out")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
outfile = *(++argv);
|
||||||
|
} else if (!strcmp(*argv, "-inkey")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
keyfile = *(++argv);
|
||||||
|
} else if (!strcmp(*argv, "-passin")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
passargin = *(++argv);
|
||||||
|
} else if (strcmp(*argv, "-keyform") == 0) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
keyform = str2fmt(*(++argv));
|
||||||
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
|
} else if (!strcmp(*argv, "-engine")) {
|
||||||
|
if (--argc < 1)
|
||||||
|
badarg = 1;
|
||||||
|
else
|
||||||
|
engine = *(++argv);
|
||||||
|
# endif
|
||||||
|
} else if (!strcmp(*argv, "-pubin")) {
|
||||||
|
key_type = KEY_PUBKEY;
|
||||||
|
} else if (!strcmp(*argv, "-certin")) {
|
||||||
|
key_type = KEY_CERT;
|
||||||
|
} else if (!strcmp(*argv, "-asn1parse"))
|
||||||
|
asn1parse = 1;
|
||||||
|
else if (!strcmp(*argv, "-hexdump"))
|
||||||
|
hexdump = 1;
|
||||||
|
else if (!strcmp(*argv, "-raw"))
|
||||||
|
pad = RSA_NO_PADDING;
|
||||||
|
else if (!strcmp(*argv, "-oaep"))
|
||||||
|
pad = RSA_PKCS1_OAEP_PADDING;
|
||||||
|
else if (!strcmp(*argv, "-ssl"))
|
||||||
|
pad = RSA_SSLV23_PADDING;
|
||||||
|
else if (!strcmp(*argv, "-pkcs"))
|
||||||
|
pad = RSA_PKCS1_PADDING;
|
||||||
|
else if (!strcmp(*argv, "-x931"))
|
||||||
|
pad = RSA_X931_PADDING;
|
||||||
|
else if (!strcmp(*argv, "-sign")) {
|
||||||
|
rsa_mode = RSA_SIGN;
|
||||||
|
need_priv = 1;
|
||||||
|
} else if (!strcmp(*argv, "-verify"))
|
||||||
|
rsa_mode = RSA_VERIFY;
|
||||||
|
else if (!strcmp(*argv, "-rev"))
|
||||||
|
rev = 1;
|
||||||
|
else if (!strcmp(*argv, "-encrypt"))
|
||||||
|
rsa_mode = RSA_ENCRYPT;
|
||||||
|
else if (!strcmp(*argv, "-decrypt")) {
|
||||||
|
rsa_mode = RSA_DECRYPT;
|
||||||
|
need_priv = 1;
|
||||||
|
} else
|
||||||
|
badarg = 1;
|
||||||
|
if (badarg) {
|
||||||
|
usage();
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
argc--;
|
||||||
|
argv++;
|
||||||
|
}
|
||||||
|
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
if (need_priv && (key_type != KEY_PRIVKEY)) {
|
||||||
e = setup_engine(bio_err, engine, 0);
|
BIO_printf(bio_err, "A private key is needed for this operation\n");
|
||||||
#endif
|
goto end;
|
||||||
if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
|
}
|
||||||
BIO_printf(bio_err, "Error getting password\n");
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
goto end;
|
e = setup_engine(bio_err, engine, 0);
|
||||||
}
|
# endif
|
||||||
|
if (!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
|
||||||
|
BIO_printf(bio_err, "Error getting password\n");
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
/* FIXME: seed PRNG only if needed */
|
/* FIXME: seed PRNG only if needed */
|
||||||
app_RAND_load_file(NULL, bio_err, 0);
|
app_RAND_load_file(NULL, bio_err, 0);
|
||||||
|
|
||||||
switch(key_type) {
|
|
||||||
case KEY_PRIVKEY:
|
|
||||||
pkey = load_key(bio_err, keyfile, keyform, 0,
|
|
||||||
passin, e, "Private Key");
|
|
||||||
break;
|
|
||||||
|
|
||||||
case KEY_PUBKEY:
|
switch (key_type) {
|
||||||
pkey = load_pubkey(bio_err, keyfile, keyform, 0,
|
case KEY_PRIVKEY:
|
||||||
NULL, e, "Public Key");
|
pkey = load_key(bio_err, keyfile, keyform, 0,
|
||||||
break;
|
passin, e, "Private Key");
|
||||||
|
break;
|
||||||
|
|
||||||
case KEY_CERT:
|
case KEY_PUBKEY:
|
||||||
x = load_cert(bio_err, keyfile, keyform,
|
pkey = load_pubkey(bio_err, keyfile, keyform, 0,
|
||||||
NULL, e, "Certificate");
|
NULL, e, "Public Key");
|
||||||
if(x) {
|
break;
|
||||||
pkey = X509_get_pubkey(x);
|
|
||||||
X509_free(x);
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
|
|
||||||
if(!pkey) {
|
case KEY_CERT:
|
||||||
return 1;
|
x = load_cert(bio_err, keyfile, keyform, NULL, e, "Certificate");
|
||||||
}
|
if (x) {
|
||||||
|
pkey = X509_get_pubkey(x);
|
||||||
|
X509_free(x);
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
rsa = EVP_PKEY_get1_RSA(pkey);
|
if (!pkey) {
|
||||||
EVP_PKEY_free(pkey);
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
if(!rsa) {
|
rsa = EVP_PKEY_get1_RSA(pkey);
|
||||||
BIO_printf(bio_err, "Error getting RSA key\n");
|
EVP_PKEY_free(pkey);
|
||||||
ERR_print_errors(bio_err);
|
|
||||||
goto end;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
if (!rsa) {
|
||||||
|
BIO_printf(bio_err, "Error getting RSA key\n");
|
||||||
|
ERR_print_errors(bio_err);
|
||||||
|
goto end;
|
||||||
|
}
|
||||||
|
|
||||||
if(infile) {
|
if (infile) {
|
||||||
if(!(in = BIO_new_file(infile, "rb"))) {
|
if (!(in = BIO_new_file(infile, "rb"))) {
|
||||||
BIO_printf(bio_err, "Error Reading Input File\n");
|
BIO_printf(bio_err, "Error Reading Input File\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
} else in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
} else
|
||||||
|
in = BIO_new_fp(stdin, BIO_NOCLOSE);
|
||||||
|
|
||||||
if(outfile) {
|
if (outfile) {
|
||||||
if(!(out = BIO_new_file(outfile, "wb"))) {
|
if (!(out = BIO_new_file(outfile, "wb"))) {
|
||||||
BIO_printf(bio_err, "Error Reading Output File\n");
|
BIO_printf(bio_err, "Error Reading Output File\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
out = BIO_new_fp(stdout, BIO_NOCLOSE);
|
||||||
#ifdef OPENSSL_SYS_VMS
|
# ifdef OPENSSL_SYS_VMS
|
||||||
{
|
{
|
||||||
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
BIO *tmpbio = BIO_new(BIO_f_linebuffer());
|
||||||
out = BIO_push(tmpbio, out);
|
out = BIO_push(tmpbio, out);
|
||||||
}
|
}
|
||||||
#endif
|
# endif
|
||||||
}
|
}
|
||||||
|
|
||||||
keysize = RSA_size(rsa);
|
keysize = RSA_size(rsa);
|
||||||
|
|
||||||
rsa_in = OPENSSL_malloc(keysize * 2);
|
rsa_in = OPENSSL_malloc(keysize * 2);
|
||||||
rsa_out = OPENSSL_malloc(keysize);
|
rsa_out = OPENSSL_malloc(keysize);
|
||||||
|
|
||||||
/* Read the input data */
|
/* Read the input data */
|
||||||
rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
|
rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
|
||||||
if(rsa_inlen <= 0) {
|
if (rsa_inlen <= 0) {
|
||||||
BIO_printf(bio_err, "Error reading input Data\n");
|
BIO_printf(bio_err, "Error reading input Data\n");
|
||||||
exit(1);
|
exit(1);
|
||||||
}
|
}
|
||||||
if(rev) {
|
if (rev) {
|
||||||
int i;
|
int i;
|
||||||
unsigned char ctmp;
|
unsigned char ctmp;
|
||||||
for(i = 0; i < rsa_inlen/2; i++) {
|
for (i = 0; i < rsa_inlen / 2; i++) {
|
||||||
ctmp = rsa_in[i];
|
ctmp = rsa_in[i];
|
||||||
rsa_in[i] = rsa_in[rsa_inlen - 1 - i];
|
rsa_in[i] = rsa_in[rsa_inlen - 1 - i];
|
||||||
rsa_in[rsa_inlen - 1 - i] = ctmp;
|
rsa_in[rsa_inlen - 1 - i] = ctmp;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
switch(rsa_mode) {
|
switch (rsa_mode) {
|
||||||
|
|
||||||
case RSA_VERIFY:
|
case RSA_VERIFY:
|
||||||
rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case RSA_SIGN:
|
case RSA_SIGN:
|
||||||
rsa_outlen = RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
rsa_outlen =
|
||||||
break;
|
RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
||||||
|
break;
|
||||||
|
|
||||||
case RSA_ENCRYPT:
|
case RSA_ENCRYPT:
|
||||||
rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
||||||
break;
|
break;
|
||||||
|
|
||||||
case RSA_DECRYPT:
|
case RSA_DECRYPT:
|
||||||
rsa_outlen = RSA_private_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
rsa_outlen =
|
||||||
break;
|
RSA_private_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
|
||||||
|
break;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if(rsa_outlen <= 0) {
|
if (rsa_outlen <= 0) {
|
||||||
BIO_printf(bio_err, "RSA operation error\n");
|
BIO_printf(bio_err, "RSA operation error\n");
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
goto end;
|
goto end;
|
||||||
}
|
}
|
||||||
ret = 0;
|
ret = 0;
|
||||||
if(asn1parse) {
|
if (asn1parse) {
|
||||||
if(!ASN1_parse_dump(out, rsa_out, rsa_outlen, 1, -1)) {
|
if (!ASN1_parse_dump(out, rsa_out, rsa_outlen, 1, -1)) {
|
||||||
ERR_print_errors(bio_err);
|
ERR_print_errors(bio_err);
|
||||||
}
|
}
|
||||||
} else if(hexdump) BIO_dump(out, (char *)rsa_out, rsa_outlen);
|
} else if (hexdump)
|
||||||
else BIO_write(out, rsa_out, rsa_outlen);
|
BIO_dump(out, (char *)rsa_out, rsa_outlen);
|
||||||
end:
|
else
|
||||||
RSA_free(rsa);
|
BIO_write(out, rsa_out, rsa_outlen);
|
||||||
BIO_free(in);
|
end:
|
||||||
BIO_free_all(out);
|
RSA_free(rsa);
|
||||||
if(rsa_in) OPENSSL_free(rsa_in);
|
BIO_free(in);
|
||||||
if(rsa_out) OPENSSL_free(rsa_out);
|
BIO_free_all(out);
|
||||||
if(passin) OPENSSL_free(passin);
|
if (rsa_in)
|
||||||
return ret;
|
OPENSSL_free(rsa_in);
|
||||||
|
if (rsa_out)
|
||||||
|
OPENSSL_free(rsa_out);
|
||||||
|
if (passin)
|
||||||
|
OPENSSL_free(passin);
|
||||||
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void usage()
|
static void usage()
|
||||||
{
|
{
|
||||||
BIO_printf(bio_err, "Usage: rsautl [options]\n");
|
BIO_printf(bio_err, "Usage: rsautl [options]\n");
|
||||||
BIO_printf(bio_err, "-in file input file\n");
|
BIO_printf(bio_err, "-in file input file\n");
|
||||||
BIO_printf(bio_err, "-out file output file\n");
|
BIO_printf(bio_err, "-out file output file\n");
|
||||||
BIO_printf(bio_err, "-inkey file input key\n");
|
BIO_printf(bio_err, "-inkey file input key\n");
|
||||||
BIO_printf(bio_err, "-keyform arg private key format - default PEM\n");
|
BIO_printf(bio_err, "-keyform arg private key format - default PEM\n");
|
||||||
BIO_printf(bio_err, "-pubin input is an RSA public\n");
|
BIO_printf(bio_err, "-pubin input is an RSA public\n");
|
||||||
BIO_printf(bio_err, "-certin input is a certificate carrying an RSA public key\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-ssl use SSL v2 padding\n");
|
"-certin input is a certificate carrying an RSA public key\n");
|
||||||
BIO_printf(bio_err, "-raw use no padding\n");
|
BIO_printf(bio_err, "-ssl use SSL v2 padding\n");
|
||||||
BIO_printf(bio_err, "-pkcs use PKCS#1 v1.5 padding (default)\n");
|
BIO_printf(bio_err, "-raw use no padding\n");
|
||||||
BIO_printf(bio_err, "-oaep use PKCS#1 OAEP\n");
|
BIO_printf(bio_err,
|
||||||
BIO_printf(bio_err, "-sign sign with private key\n");
|
"-pkcs use PKCS#1 v1.5 padding (default)\n");
|
||||||
BIO_printf(bio_err, "-verify verify with public key\n");
|
BIO_printf(bio_err, "-oaep use PKCS#1 OAEP\n");
|
||||||
BIO_printf(bio_err, "-encrypt encrypt with public key\n");
|
BIO_printf(bio_err, "-sign sign with private key\n");
|
||||||
BIO_printf(bio_err, "-decrypt decrypt with private key\n");
|
BIO_printf(bio_err, "-verify verify with public key\n");
|
||||||
BIO_printf(bio_err, "-hexdump hex dump output\n");
|
BIO_printf(bio_err, "-encrypt encrypt with public key\n");
|
||||||
#ifndef OPENSSL_NO_ENGINE
|
BIO_printf(bio_err, "-decrypt decrypt with private key\n");
|
||||||
BIO_printf(bio_err, "-engine e use engine e, possibly a hardware device.\n");
|
BIO_printf(bio_err, "-hexdump hex dump output\n");
|
||||||
BIO_printf (bio_err, "-passin arg pass phrase source\n");
|
# ifndef OPENSSL_NO_ENGINE
|
||||||
#endif
|
BIO_printf(bio_err,
|
||||||
|
"-engine e use engine e, possibly a hardware device.\n");
|
||||||
|
BIO_printf(bio_err, "-passin arg pass phrase source\n");
|
||||||
|
# endif
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#else /* !OPENSSL_NO_RSA */
|
|
||||||
|
|
||||||
# if PEDANTIC
|
|
||||||
static void *dummy=&dummy;
|
|
||||||
# endif
|
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -5,21 +5,21 @@
|
|||||||
* This package is an SSL implementation written
|
* This package is an SSL implementation written
|
||||||
* by Eric Young (eay@cryptsoft.com).
|
* by Eric Young (eay@cryptsoft.com).
|
||||||
* The implementation was written so as to conform with Netscapes SSL.
|
* The implementation was written so as to conform with Netscapes SSL.
|
||||||
*
|
*
|
||||||
* This library is free for commercial and non-commercial use as long as
|
* This library is free for commercial and non-commercial use as long as
|
||||||
* the following conditions are aheared to. The following conditions
|
* the following conditions are aheared to. The following conditions
|
||||||
* apply to all code found in this distribution, be it the RC4, RSA,
|
* apply to all code found in this distribution, be it the RC4, RSA,
|
||||||
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
* lhash, DES, etc., code; not just the SSL code. The SSL documentation
|
||||||
* included with this distribution is covered by the same copyright terms
|
* included with this distribution is covered by the same copyright terms
|
||||||
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
* except that the holder is Tim Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
* Copyright remains Eric Young's, and as such any Copyright notices in
|
* Copyright remains Eric Young's, and as such any Copyright notices in
|
||||||
* the code are not to be removed.
|
* the code are not to be removed.
|
||||||
* If this package is used in a product, Eric Young should be given attribution
|
* If this package is used in a product, Eric Young should be given attribution
|
||||||
* as the author of the parts of the library used.
|
* as the author of the parts of the library used.
|
||||||
* This can be in the form of a textual message at program startup or
|
* This can be in the form of a textual message at program startup or
|
||||||
* in documentation (online or textual) provided with the package.
|
* in documentation (online or textual) provided with the package.
|
||||||
*
|
*
|
||||||
* Redistribution and use in source and binary forms, with or without
|
* Redistribution and use in source and binary forms, with or without
|
||||||
* modification, are permitted provided that the following conditions
|
* modification, are permitted provided that the following conditions
|
||||||
* are met:
|
* are met:
|
||||||
@@ -34,10 +34,10 @@
|
|||||||
* Eric Young (eay@cryptsoft.com)"
|
* Eric Young (eay@cryptsoft.com)"
|
||||||
* The word 'cryptographic' can be left out if the rouines from the library
|
* The word 'cryptographic' can be left out if the rouines from the library
|
||||||
* being used are not cryptographic related :-).
|
* being used are not cryptographic related :-).
|
||||||
* 4. If you include any Windows specific code (or a derivative thereof) from
|
* 4. If you include any Windows specific code (or a derivative thereof) from
|
||||||
* the apps directory (application code) you must include an acknowledgement:
|
* the apps directory (application code) you must include an acknowledgement:
|
||||||
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
* "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
|
||||||
*
|
*
|
||||||
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
|
||||||
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
@@ -49,7 +49,7 @@
|
|||||||
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||||||
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||||||
* SUCH DAMAGE.
|
* SUCH DAMAGE.
|
||||||
*
|
*
|
||||||
* The licence and distribution terms for any publically available version or
|
* The licence and distribution terms for any publically available version or
|
||||||
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
* derivative of this code cannot be changed. i.e. this code cannot simply be
|
||||||
* copied and put under another distribution licence
|
* copied and put under another distribution licence
|
||||||
@@ -63,7 +63,7 @@
|
|||||||
* are met:
|
* are met:
|
||||||
*
|
*
|
||||||
* 1. Redistributions of source code must retain the above copyright
|
* 1. Redistributions of source code must retain the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer.
|
* notice, this list of conditions and the following disclaimer.
|
||||||
*
|
*
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright
|
* 2. Redistributions in binary form must reproduce the above copyright
|
||||||
* notice, this list of conditions and the following disclaimer in
|
* notice, this list of conditions and the following disclaimer in
|
||||||
@@ -108,47 +108,52 @@
|
|||||||
* Hudson (tjh@cryptsoft.com).
|
* Hudson (tjh@cryptsoft.com).
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
#if !defined(OPENSSL_SYS_NETWARE) /* conflicts with winsock2 stuff on netware */
|
/* conflicts with winsock2 stuff on netware */
|
||||||
#include <sys/types.h>
|
#if !defined(OPENSSL_SYS_NETWARE)
|
||||||
|
# include <sys/types.h>
|
||||||
#endif
|
#endif
|
||||||
#include <openssl/opensslconf.h>
|
#include <openssl/opensslconf.h>
|
||||||
|
|
||||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
|
||||||
#include <conio.h>
|
# include <conio.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(OPENSSL_SYS_MSDOS) && !defined(_WIN32)
|
#ifdef OPENSSL_SYS_MSDOS
|
||||||
#define _kbhit kbhit
|
# define _kbhit kbhit
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#if defined(OPENSSL_SYS_VMS) && !defined(FD_SET)
|
#if defined(OPENSSL_SYS_VMS) && !defined(FD_SET)
|
||||||
/* VAX C does not defined fd_set and friends, but it's actually quite simple */
|
/*
|
||||||
/* These definitions are borrowed from SOCKETSHR. /Richard Levitte */
|
* VAX C does not defined fd_set and friends, but it's actually quite simple
|
||||||
#define MAX_NOFILE 32
|
*/
|
||||||
#define NBBY 8 /* number of bits in a byte */
|
/* These definitions are borrowed from SOCKETSHR. /Richard Levitte */
|
||||||
|
# define MAX_NOFILE 32
|
||||||
|
# define NBBY 8 /* number of bits in a byte */
|
||||||
|
|
||||||
#ifndef FD_SETSIZE
|
# ifndef FD_SETSIZE
|
||||||
#define FD_SETSIZE MAX_NOFILE
|
# define FD_SETSIZE MAX_NOFILE
|
||||||
#endif /* FD_SETSIZE */
|
# endif /* FD_SETSIZE */
|
||||||
|
|
||||||
/* How many things we'll allow select to use. 0 if unlimited */
|
/* How many things we'll allow select to use. 0 if unlimited */
|
||||||
#define MAXSELFD MAX_NOFILE
|
# define MAXSELFD MAX_NOFILE
|
||||||
typedef int fd_mask; /* int here! VMS prototypes int, not long */
|
typedef int fd_mask; /* int here! VMS prototypes int, not long */
|
||||||
#define NFDBITS (sizeof(fd_mask) * NBBY) /* bits per mask (power of 2!)*/
|
# define NFDBITS (sizeof(fd_mask) * NBBY)/* bits per mask (power of 2!) */
|
||||||
#define NFDSHIFT 5 /* Shift based on above */
|
# define NFDSHIFT 5 /* Shift based on above */
|
||||||
|
|
||||||
typedef fd_mask fd_set;
|
typedef fd_mask fd_set;
|
||||||
#define FD_SET(n, p) (*(p) |= (1 << ((n) % NFDBITS)))
|
# define FD_SET(n, p) (*(p) |= (1 << ((n) % NFDBITS)))
|
||||||
#define FD_CLR(n, p) (*(p) &= ~(1 << ((n) % NFDBITS)))
|
# define FD_CLR(n, p) (*(p) &= ~(1 << ((n) % NFDBITS)))
|
||||||
#define FD_ISSET(n, p) (*(p) & (1 << ((n) % NFDBITS)))
|
# define FD_ISSET(n, p) (*(p) & (1 << ((n) % NFDBITS)))
|
||||||
#define FD_ZERO(p) memset((char *)(p), 0, sizeof(*(p)))
|
# define FD_ZERO(p) memset((char *)(p), 0, sizeof(*(p)))
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define PORT 4433
|
#define PORT 4433
|
||||||
#define PORT_STR "4433"
|
#define PORT_STR "4433"
|
||||||
#define PROTOCOL "tcp"
|
#define PROTOCOL "tcp"
|
||||||
|
|
||||||
int do_server(int port, int type, int *ret, int (*cb) (char *hostname, int s, unsigned char *context), unsigned char *context);
|
int do_server(int port, int type, int *ret,
|
||||||
|
int (*cb) (char *hostname, int s, unsigned char *context),
|
||||||
|
unsigned char *context);
|
||||||
#ifdef HEADER_X509_H
|
#ifdef HEADER_X509_H
|
||||||
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
|
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
|
||||||
#endif
|
#endif
|
||||||
@@ -159,18 +164,21 @@ int set_cert_key_stuff(SSL_CTX *ctx, X509 *cert, EVP_PKEY *key);
|
|||||||
int init_client(int *sock, char *server, int port, int type);
|
int init_client(int *sock, char *server, int port, int type);
|
||||||
int should_retry(int i);
|
int should_retry(int i);
|
||||||
int extract_port(char *str, short *port_ptr);
|
int extract_port(char *str, short *port_ptr);
|
||||||
int extract_host_port(char *str,char **host_ptr,unsigned char *ip,short *p);
|
int extract_host_port(char *str, char **host_ptr, unsigned char *ip,
|
||||||
|
short *p);
|
||||||
|
|
||||||
long MS_CALLBACK bio_dump_callback(BIO *bio, int cmd, const char *argp,
|
long MS_CALLBACK bio_dump_callback(BIO *bio, int cmd, const char *argp,
|
||||||
int argi, long argl, long ret);
|
int argi, long argl, long ret);
|
||||||
|
|
||||||
#ifdef HEADER_SSL_H
|
#ifdef HEADER_SSL_H
|
||||||
void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret);
|
void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret);
|
||||||
void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);
|
void MS_CALLBACK msg_cb(int write_p, int version, int content_type,
|
||||||
|
const void *buf, size_t len, SSL *ssl, void *arg);
|
||||||
void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
|
void MS_CALLBACK tlsext_cb(SSL *s, int client_server, int type,
|
||||||
unsigned char *data, int len,
|
unsigned char *data, int len, void *arg);
|
||||||
void *arg);
|
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int *cookie_len);
|
int MS_CALLBACK generate_cookie_callback(SSL *ssl, unsigned char *cookie,
|
||||||
int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie, unsigned int cookie_len);
|
unsigned int *cookie_len);
|
||||||
|
int MS_CALLBACK verify_cookie_callback(SSL *ssl, unsigned char *cookie,
|
||||||
|
unsigned int cookie_len);
|
||||||
|
|||||||
1228
apps/s_cb.c
1228
apps/s_cb.c
File diff suppressed because it is too large
Load Diff
2985
apps/s_client.c
2985
apps/s_client.c
File diff suppressed because it is too large
Load Diff
4399
apps/s_server.c
4399
apps/s_server.c
File diff suppressed because it is too large
Load Diff
958
apps/s_socket.c
958
apps/s_socket.c
File diff suppressed because it is too large
Load Diff
850
apps/s_time.c
850
apps/s_time.c
File diff suppressed because it is too large
Load Diff
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user