Compare commits
	
		
			701 Commits
		
	
	
		
			OpenSSL-fi
			...
			OpenSSL_0_
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					05ebb1e7cf | ||
| 
						 | 
					bb41724483 | ||
| 
						 | 
					d12eb7b024 | ||
| 
						 | 
					693dc88fc6 | ||
| 
						 | 
					c3fa44cb17 | ||
| 
						 | 
					fc288e5740 | ||
| 
						 | 
					e6db99a4ab | ||
| 
						 | 
					99078a3e6f | ||
| 
						 | 
					8792704cf2 | ||
| 
						 | 
					5787727f5d | ||
| 
						 | 
					b5b19ae0bd | ||
| 
						 | 
					1802b96a42 | ||
| 
						 | 
					165d5907c8 | ||
| 
						 | 
					61bed53665 | ||
| 
						 | 
					124da0e580 | ||
| 
						 | 
					abcce97a97 | ||
| 
						 | 
					0ff3250f05 | ||
| 
						 | 
					f0a3f16691 | ||
| 
						 | 
					c34a865f98 | ||
| 
						 | 
					4f27f6be73 | ||
| 
						 | 
					4d088fcede | ||
| 
						 | 
					5fe5996867 | ||
| 
						 | 
					8f56fcdfb0 | ||
| 
						 | 
					4d4d588fa1 | ||
| 
						 | 
					156e746981 | ||
| 
						 | 
					79587521ae | ||
| 
						 | 
					aa131804c5 | ||
| 
						 | 
					9a55e8263c | ||
| 
						 | 
					dfa098012f | ||
| 
						 | 
					b3994e15d6 | ||
| 
						 | 
					3406fae673 | ||
| 
						 | 
					e0299ff63b | ||
| 
						 | 
					d2cbe66ee1 | ||
| 
						 | 
					7d0e1c1188 | ||
| 
						 | 
					0ac51fcf0b | ||
| 
						 | 
					01a9310b75 | ||
| 
						 | 
					e17af60f15 | ||
| 
						 | 
					b2d4cea305 | ||
| 
						 | 
					9b25ef8b2e | ||
| 
						 | 
					e2c07bce12 | ||
| 
						 | 
					c678763f7d | ||
| 
						 | 
					5a52e7ecad | ||
| 
						 | 
					d466e8eb5a | ||
| 
						 | 
					2edfbc53d8 | ||
| 
						 | 
					ef42bf2a7e | ||
| 
						 | 
					c6c12d6301 | ||
| 
						 | 
					180a8f8e2c | ||
| 
						 | 
					06d4c6b176 | ||
| 
						 | 
					132702460b | ||
| 
						 | 
					32a76f2c75 | ||
| 
						 | 
					578c1cdefa | ||
| 
						 | 
					c3347d0561 | ||
| 
						 | 
					1f5a2a4dde | ||
| 
						 | 
					2994181b1b | ||
| 
						 | 
					d993f3af33 | ||
| 
						 | 
					1ffa78ec6c | ||
| 
						 | 
					64e3974013 | ||
| 
						 | 
					c6f0c60427 | ||
| 
						 | 
					d23a74f71c | ||
| 
						 | 
					12c853701e | ||
| 
						 | 
					d5353b5ffb | ||
| 
						 | 
					549ce02729 | ||
| 
						 | 
					ea2a6251b9 | ||
| 
						 | 
					89cac82066 | ||
| 
						 | 
					fa7688a5b1 | ||
| 
						 | 
					094ed2dd19 | ||
| 
						 | 
					d0f07ceeee | ||
| 
						 | 
					68927d3670 | ||
| 
						 | 
					ba6c905c93 | ||
| 
						 | 
					fa54157a11 | ||
| 
						 | 
					ea4df8ad62 | ||
| 
						 | 
					dbf50f36c4 | ||
| 
						 | 
					d49ceb3328 | ||
| 
						 | 
					d66c022a1f | ||
| 
						 | 
					04c8e99b39 | ||
| 
						 | 
					09402efb93 | ||
| 
						 | 
					2619064e09 | ||
| 
						 | 
					3cda197ee3 | ||
| 
						 | 
					c019099cb6 | ||
| 
						 | 
					043e8ec568 | ||
| 
						 | 
					e57a8c732b | ||
| 
						 | 
					da0bab4c0c | ||
| 
						 | 
					9b652e84a8 | ||
| 
						 | 
					b91c29147b | ||
| 
						 | 
					1af4d83565 | ||
| 
						 | 
					c1febe86d1 | ||
| 
						 | 
					6c53759a50 | ||
| 
						 | 
					8c20ab7994 | ||
| 
						 | 
					a9950dfb67 | ||
| 
						 | 
					a385a1aef0 | ||
| 
						 | 
					1126740ddd | ||
| 
						 | 
					fa9647d62f | ||
| 
						 | 
					5981eee041 | ||
| 
						 | 
					be730546c8 | ||
| 
						 | 
					daab6e86f4 | ||
| 
						 | 
					5317543ada | ||
| 
						 | 
					38d3544867 | ||
| 
						 | 
					9811a7406c | ||
| 
						 | 
					2d4ce88b11 | ||
| 
						 | 
					2cbe7e26c0 | ||
| 
						 | 
					a6c4ee6d79 | ||
| 
						 | 
					3f8c72ce77 | ||
| 
						 | 
					35fbadb322 | ||
| 
						 | 
					42e453201d | ||
| 
						 | 
					ea9e248cde | ||
| 
						 | 
					3d24c18200 | ||
| 
						 | 
					64f1ae3868 | ||
| 
						 | 
					9cf94f9ed3 | ||
| 
						 | 
					c15bf8f609 | ||
| 
						 | 
					6b42cad215 | ||
| 
						 | 
					4a34577ec8 | ||
| 
						 | 
					6e7af77268 | ||
| 
						 | 
					5c5a2cd273 | ||
| 
						 | 
					1c4dc1517d | ||
| 
						 | 
					07a0226c28 | ||
| 
						 | 
					2ced9dc822 | ||
| 
						 | 
					9a12193611 | ||
| 
						 | 
					ea599390c6 | ||
| 
						 | 
					0a0102b0fd | ||
| 
						 | 
					1532a839fc | ||
| 
						 | 
					d77ee3b75c | ||
| 
						 | 
					c387a61fdd | ||
| 
						 | 
					5d2175eddb | ||
| 
						 | 
					7680669c33 | ||
| 
						 | 
					a6ec2d58ba | ||
| 
						 | 
					82c77c1b32 | ||
| 
						 | 
					ea72ff2df7 | ||
| 
						 | 
					4e5b835c6a | ||
| 
						 | 
					1171f28f97 | ||
| 
						 | 
					5c04e56285 | ||
| 
						 | 
					9bac8d91d9 | ||
| 
						 | 
					875e8fca2d | ||
| 
						 | 
					39ee29b02c | ||
| 
						 | 
					847b76dd0e | ||
| 
						 | 
					c901a0538b | ||
| 
						 | 
					a5ee2b5232 | ||
| 
						 | 
					f520a2a8c2 | ||
| 
						 | 
					78e7617324 | ||
| 
						 | 
					56d490cd40 | ||
| 
						 | 
					9bd313b83d | ||
| 
						 | 
					50e4d01fa0 | ||
| 
						 | 
					4a579233b4 | ||
| 
						 | 
					ca3bba36c4 | ||
| 
						 | 
					a37d05fa56 | ||
| 
						 | 
					b111c5b8ce | ||
| 
						 | 
					7228bfb439 | ||
| 
						 | 
					687f9d2b94 | ||
| 
						 | 
					6bcba344b5 | ||
| 
						 | 
					6cebd2dd00 | ||
| 
						 | 
					b82a94ee26 | ||
| 
						 | 
					ba5541e1ad | ||
| 
						 | 
					84b45fda86 | ||
| 
						 | 
					7aacd4c458 | ||
| 
						 | 
					e18ed57afd | ||
| 
						 | 
					ff9722c7f1 | ||
| 
						 | 
					08f38d887e | ||
| 
						 | 
					5798378a22 | ||
| 
						 | 
					e1fefe8124 | ||
| 
						 | 
					b8b09625dc | ||
| 
						 | 
					54d78c4778 | ||
| 
						 | 
					354d263e44 | ||
| 
						 | 
					f85b14c4ba | ||
| 
						 | 
					ec20856622 | ||
| 
						 | 
					e463138be9 | ||
| 
						 | 
					ce1e801013 | ||
| 
						 | 
					03a6dcdf31 | ||
| 
						 | 
					bfb863b8b5 | ||
| 
						 | 
					f261295d9c | ||
| 
						 | 
					f4702b467e | ||
| 
						 | 
					2aa5dac48f | ||
| 
						 | 
					fae0ff419a | ||
| 
						 | 
					74e6916996 | ||
| 
						 | 
					99738e6393 | ||
| 
						 | 
					0df2a19b10 | ||
| 
						 | 
					1c8f840653 | ||
| 
						 | 
					e2d39e421d | ||
| 
						 | 
					2ff622cf9d | ||
| 
						 | 
					b92fb90de5 | ||
| 
						 | 
					8481a0905b | ||
| 
						 | 
					44bbfcddaf | ||
| 
						 | 
					6b7b277900 | ||
| 
						 | 
					5e99ec6c7c | ||
| 
						 | 
					52f3038667 | ||
| 
						 | 
					1827be43ab | ||
| 
						 | 
					8935c03618 | ||
| 
						 | 
					76dca45720 | ||
| 
						 | 
					a5f158fa0b | ||
| 
						 | 
					1a11273bc3 | ||
| 
						 | 
					babc4d0e7a | ||
| 
						 | 
					c9c111468c | ||
| 
						 | 
					73feb5418d | ||
| 
						 | 
					b3467218f8 | ||
| 
						 | 
					f760c5d80b | ||
| 
						 | 
					4fd350e8f5 | ||
| 
						 | 
					bc52146aee | ||
| 
						 | 
					348c9e5985 | ||
| 
						 | 
					06e6478d6f | ||
| 
						 | 
					19fa8cfe5a | ||
| 
						 | 
					5f18fe493e | ||
| 
						 | 
					d16e3759a8 | ||
| 
						 | 
					31961f7308 | ||
| 
						 | 
					2e1b411f23 | ||
| 
						 | 
					4d77825557 | ||
| 
						 | 
					439c7ba540 | ||
| 
						 | 
					edbbf22a0e | ||
| 
						 | 
					1cb8923507 | ||
| 
						 | 
					83f1147664 | ||
| 
						 | 
					4d4744ef48 | ||
| 
						 | 
					0242564c17 | ||
| 
						 | 
					e8d2e6cac2 | ||
| 
						 | 
					651fa63e2b | ||
| 
						 | 
					6a40c26308 | ||
| 
						 | 
					b7342e116b | ||
| 
						 | 
					9d7bb313e3 | ||
| 
						 | 
					00b6ab09fc | ||
| 
						 | 
					c99b94be3e | ||
| 
						 | 
					b9bb1c5f77 | ||
| 
						 | 
					87af0e5e19 | ||
| 
						 | 
					76b5524d3d | ||
| 
						 | 
					0b421d35fb | ||
| 
						 | 
					b2f570ecbb | ||
| 
						 | 
					988988807f | ||
| 
						 | 
					b1b62e7976 | ||
| 
						 | 
					069eb94607 | ||
| 
						 | 
					5dfaf1c437 | ||
| 
						 | 
					c6c5cf1754 | ||
| 
						 | 
					3d7b414c55 | ||
| 
						 | 
					863b1279f7 | ||
| 
						 | 
					24ceef033a | ||
| 
						 | 
					fe165e465b | ||
| 
						 | 
					3ece3605ac | ||
| 
						 | 
					b35ef576f4 | ||
| 
						 | 
					865ce8abcb | ||
| 
						 | 
					a69b3e94f3 | ||
| 
						 | 
					7f0f3f17b3 | ||
| 
						 | 
					0bc2e28295 | ||
| 
						 | 
					4b16376d51 | ||
| 
						 | 
					fe094cdfe3 | ||
| 
						 | 
					276753772e | ||
| 
						 | 
					16712ec35e | ||
| 
						 | 
					4e6c537141 | ||
| 
						 | 
					1b0613e313 | ||
| 
						 | 
					75140e8bc9 | ||
| 
						 | 
					f717e5460f | ||
| 
						 | 
					65129e1d57 | ||
| 
						 | 
					2a6db68797 | ||
| 
						 | 
					2b98d1ccb7 | ||
| 
						 | 
					ce8ac3dc00 | ||
| 
						 | 
					c156d5c9bd | ||
| 
						 | 
					54b293ec3c | ||
| 
						 | 
					5a8e7c5bec | ||
| 
						 | 
					75df0bb231 | ||
| 
						 | 
					22b540f5c2 | ||
| 
						 | 
					479275ef18 | ||
| 
						 | 
					6f3fa4b71d | ||
| 
						 | 
					2f4dca7052 | ||
| 
						 | 
					7b78aa0e8d | ||
| 
						 | 
					c37e7bf580 | ||
| 
						 | 
					926606deab | ||
| 
						 | 
					f98c9972a7 | ||
| 
						 | 
					df7cae352d | ||
| 
						 | 
					eda75c31e3 | ||
| 
						 | 
					2e689f6040 | ||
| 
						 | 
					ea494f7b88 | ||
| 
						 | 
					8250f6f1fc | ||
| 
						 | 
					eb0c85dec3 | ||
| 
						 | 
					9332b8c1c4 | ||
| 
						 | 
					7be09992c6 | ||
| 
						 | 
					ceea4c85b4 | ||
| 
						 | 
					d1ec197e49 | ||
| 
						 | 
					f4d9cdc531 | ||
| 
						 | 
					e3f47ba87f | ||
| 
						 | 
					ab665f4a7e | ||
| 
						 | 
					35ff595e19 | ||
| 
						 | 
					be2c37ef73 | ||
| 
						 | 
					888b8f32d7 | ||
| 
						 | 
					962c53c0cd | ||
| 
						 | 
					ce6f656e1b | ||
| 
						 | 
					9cb12c9d76 | ||
| 
						 | 
					f089efdfab | ||
| 
						 | 
					a236373435 | ||
| 
						 | 
					7d555c8615 | ||
| 
						 | 
					d63b1678b5 | ||
| 
						 | 
					beaa89def7 | ||
| 
						 | 
					b4bf34ce39 | ||
| 
						 | 
					f99ac98efb | ||
| 
						 | 
					c615cdd7cb | ||
| 
						 | 
					e7d339b678 | ||
| 
						 | 
					3f64d0bf3b | ||
| 
						 | 
					fab972b914 | ||
| 
						 | 
					a10b85d9e6 | ||
| 
						 | 
					44cc9715ec | ||
| 
						 | 
					a807f6460e | ||
| 
						 | 
					19c3f1c40d | ||
| 
						 | 
					b30504c61c | ||
| 
						 | 
					cbb5f1f025 | ||
| 
						 | 
					b8556ab14b | ||
| 
						 | 
					48c269ad7f | ||
| 
						 | 
					d6945e10b5 | ||
| 
						 | 
					70bed0ca2d | ||
| 
						 | 
					e20788700c | ||
| 
						 | 
					b60806a097 | ||
| 
						 | 
					0b9925be4f | ||
| 
						 | 
					3e9ae0c462 | ||
| 
						 | 
					96ec4ce0d2 | ||
| 
						 | 
					38b3e9edde | ||
| 
						 | 
					9ccadf1c6f | ||
| 
						 | 
					1e55e768c3 | ||
| 
						 | 
					b914a547e1 | ||
| 
						 | 
					03b148f4a9 | ||
| 
						 | 
					2dbdcd9734 | ||
| 
						 | 
					1147fa5a5f | ||
| 
						 | 
					a9eba3f3f5 | ||
| 
						 | 
					aa8a33c230 | ||
| 
						 | 
					46ff8e0d0a | ||
| 
						 | 
					3f9077278a | ||
| 
						 | 
					accb6063f3 | ||
| 
						 | 
					744301ccd8 | ||
| 
						 | 
					a295ca8cf9 | ||
| 
						 | 
					293c4d747c | ||
| 
						 | 
					09389cbef5 | ||
| 
						 | 
					594a3e5bd5 | ||
| 
						 | 
					ae9010abd5 | ||
| 
						 | 
					ae3a6640b7 | ||
| 
						 | 
					029dfa64d4 | ||
| 
						 | 
					f8845509b6 | ||
| 
						 | 
					3f98e1dd11 | ||
| 
						 | 
					e53afa9e9b | ||
| 
						 | 
					e41c5bd730 | ||
| 
						 | 
					10981a5c84 | ||
| 
						 | 
					9cf8888149 | ||
| 
						 | 
					491d390ec9 | ||
| 
						 | 
					87301baec9 | ||
| 
						 | 
					0cf4df488b | ||
| 
						 | 
					fde9626cff | ||
| 
						 | 
					fb9520c12d | ||
| 
						 | 
					62b0502750 | ||
| 
						 | 
					c77c4c9f1c | ||
| 
						 | 
					c5220abc6a | ||
| 
						 | 
					b90f36d240 | ||
| 
						 | 
					2712fe80be | ||
| 
						 | 
					13aab9cca4 | ||
| 
						 | 
					33c0e6f547 | ||
| 
						 | 
					d84f543ea6 | ||
| 
						 | 
					a7113d645f | ||
| 
						 | 
					3f345dc653 | ||
| 
						 | 
					0dd892848e | ||
| 
						 | 
					f4681b0864 | ||
| 
						 | 
					a04baf9b5c | ||
| 
						 | 
					029fb8aa26 | ||
| 
						 | 
					2cb95a153e | ||
| 
						 | 
					20d57547e6 | ||
| 
						 | 
					ea5b10a177 | ||
| 
						 | 
					dca598b911 | ||
| 
						 | 
					187ebb98ad | ||
| 
						 | 
					84712f4f9d | ||
| 
						 | 
					44366c3713 | ||
| 
						 | 
					feef7d2dc6 | ||
| 
						 | 
					7ac19add8f | ||
| 
						 | 
					e1c82386d1 | ||
| 
						 | 
					d9164abe69 | ||
| 
						 | 
					9347774449 | ||
| 
						 | 
					51db1db082 | ||
| 
						 | 
					3d11230259 | ||
| 
						 | 
					653cc07b51 | ||
| 
						 | 
					7a5b2bea86 | ||
| 
						 | 
					3eba9b0ebc | ||
| 
						 | 
					544346a6c8 | ||
| 
						 | 
					5f18f1b4c5 | ||
| 
						 | 
					1b061845d7 | ||
| 
						 | 
					3ad82e4707 | ||
| 
						 | 
					71cbb0f128 | ||
| 
						 | 
					b82030e90a | ||
| 
						 | 
					ce59bb8bd0 | ||
| 
						 | 
					deecc4bede | ||
| 
						 | 
					86cd2530db | ||
| 
						 | 
					3d85776a09 | ||
| 
						 | 
					ec578380c9 | ||
| 
						 | 
					8dccbdfc5b | ||
| 
						 | 
					904de6e4f5 | ||
| 
						 | 
					65ce21da9a | ||
| 
						 | 
					7ea0acc3ef | ||
| 
						 | 
					dd186f600d | ||
| 
						 | 
					01fc70323f | ||
| 
						 | 
					03a70bad4f | ||
| 
						 | 
					7146221bbe | ||
| 
						 | 
					80a8d1406b | ||
| 
						 | 
					1a76a85c93 | ||
| 
						 | 
					cf1b34ad34 | ||
| 
						 | 
					44d4b684f9 | ||
| 
						 | 
					746142d672 | ||
| 
						 | 
					475e21bc7b | ||
| 
						 | 
					5204726bfe | ||
| 
						 | 
					27f3a1bd9c | ||
| 
						 | 
					b1a810571c | ||
| 
						 | 
					c6719ffb77 | ||
| 
						 | 
					16fdf5b904 | ||
| 
						 | 
					d2cfefc892 | ||
| 
						 | 
					71ff177754 | ||
| 
						 | 
					5b6051067a | ||
| 
						 | 
					c0bee3c8d6 | ||
| 
						 | 
					79e29dca65 | ||
| 
						 | 
					04bdca29d7 | ||
| 
						 | 
					7ca6deef3f | ||
| 
						 | 
					026dad0f3b | ||
| 
						 | 
					6b99c692d0 | ||
| 
						 | 
					04d9784d17 | ||
| 
						 | 
					bcfca923d4 | ||
| 
						 | 
					0410b6c50b | ||
| 
						 | 
					483c4e0682 | ||
| 
						 | 
					de61328615 | ||
| 
						 | 
					731e14031c | ||
| 
						 | 
					93074b2509 | ||
| 
						 | 
					1498ad74bb | ||
| 
						 | 
					e319a89f84 | ||
| 
						 | 
					9fa5786340 | ||
| 
						 | 
					1b822decb8 | ||
| 
						 | 
					dab4c2824f | ||
| 
						 | 
					19352b794d | ||
| 
						 | 
					8746ee311e | ||
| 
						 | 
					e90323844f | ||
| 
						 | 
					630c1aedd2 | ||
| 
						 | 
					a650df440b | ||
| 
						 | 
					afd7b5affe | ||
| 
						 | 
					38c3436577 | ||
| 
						 | 
					7e9547e126 | ||
| 
						 | 
					83583e9479 | ||
| 
						 | 
					41d208db79 | ||
| 
						 | 
					9a1c40049e | ||
| 
						 | 
					39bed15e53 | ||
| 
						 | 
					4b04466f14 | ||
| 
						 | 
					2474b596ad | ||
| 
						 | 
					a890c4e9bb | ||
| 
						 | 
					c62ddfbb6e | ||
| 
						 | 
					8b9351cf61 | ||
| 
						 | 
					b23f1df65f | ||
| 
						 | 
					f05735c8c9 | ||
| 
						 | 
					42f310f596 | ||
| 
						 | 
					77c6edc1d1 | ||
| 
						 | 
					99bd4baa54 | ||
| 
						 | 
					c8913d8e8a | ||
| 
						 | 
					3c836ff0f8 | ||
| 
						 | 
					a956392145 | ||
| 
						 | 
					4760dc31c9 | ||
| 
						 | 
					5fde80cd56 | ||
| 
						 | 
					ecacb136c5 | ||
| 
						 | 
					db17ecdae3 | ||
| 
						 | 
					ee718b2c22 | ||
| 
						 | 
					514481f686 | ||
| 
						 | 
					b089e64654 | ||
| 
						 | 
					3c1f0ccbf4 | ||
| 
						 | 
					c5e00a3ee2 | ||
| 
						 | 
					26c329cd84 | ||
| 
						 | 
					d349c5f8fd | ||
| 
						 | 
					3a11466381 | ||
| 
						 | 
					5c4c4c2b90 | ||
| 
						 | 
					ec11fa2159 | ||
| 
						 | 
					c4365acc48 | ||
| 
						 | 
					c29dbb9562 | ||
| 
						 | 
					cb1c1555fa | ||
| 
						 | 
					fa528639e3 | ||
| 
						 | 
					092ab05aef | ||
| 
						 | 
					4f647957c5 | ||
| 
						 | 
					4424a12c43 | ||
| 
						 | 
					592f5c5797 | ||
| 
						 | 
					14ba311676 | ||
| 
						 | 
					b9a96c0134 | ||
| 
						 | 
					75c3c831db | ||
| 
						 | 
					385af2e9ec | ||
| 
						 | 
					3c43aa1b82 | ||
| 
						 | 
					dea0f7dd0d | ||
| 
						 | 
					9a22ce66c9 | ||
| 
						 | 
					72cd659df6 | ||
| 
						 | 
					58eef36b4d | ||
| 
						 | 
					79311176b2 | ||
| 
						 | 
					88f59f6152 | ||
| 
						 | 
					e32578847c | ||
| 
						 | 
					323fd27435 | ||
| 
						 | 
					fcc88e4915 | ||
| 
						 | 
					86cb01870c | ||
| 
						 | 
					19086ef67b | ||
| 
						 | 
					ce3fc3956d | ||
| 
						 | 
					787f25ab42 | ||
| 
						 | 
					85794e5556 | ||
| 
						 | 
					7f950bd8a2 | ||
| 
						 | 
					bf7b0d2d2b | ||
| 
						 | 
					83c4e75be9 | ||
| 
						 | 
					e5f3be2bbb | ||
| 
						 | 
					fbca4281c8 | ||
| 
						 | 
					a858b8036c | ||
| 
						 | 
					d2be2fb241 | ||
| 
						 | 
					4855eb75a7 | ||
| 
						 | 
					b1f88ec4e2 | ||
| 
						 | 
					44924fb2b4 | ||
| 
						 | 
					0e810cf6b0 | ||
| 
						 | 
					1777e3fd5e | ||
| 
						 | 
					509ca689b0 | ||
| 
						 | 
					3a1dbce19d | ||
| 
						 | 
					10f2bf6d81 | ||
| 
						 | 
					1714c07164 | ||
| 
						 | 
					4cc3d1728f | ||
| 
						 | 
					3ae82255a9 | ||
| 
						 | 
					9bcab53f49 | ||
| 
						 | 
					ae17135ab5 | ||
| 
						 | 
					1f6b757ae9 | ||
| 
						 | 
					a496f45f22 | ||
| 
						 | 
					3485cdb98e | ||
| 
						 | 
					3e3f04d4b7 | ||
| 
						 | 
					879d230da3 | ||
| 
						 | 
					2006dd12d6 | ||
| 
						 | 
					744b9066e2 | ||
| 
						 | 
					1e01dbfbb2 | ||
| 
						 | 
					6ebcd441d6 | ||
| 
						 | 
					ea09a504ef | ||
| 
						 | 
					2e3b3c7be5 | ||
| 
						 | 
					93389c86ca | ||
| 
						 | 
					8d82218269 | ||
| 
						 | 
					a8e738f9ad | ||
| 
						 | 
					bdcb9321ca | ||
| 
						 | 
					d239b734e1 | ||
| 
						 | 
					d91722f8e0 | ||
| 
						 | 
					b6282a2004 | ||
| 
						 | 
					f14aa30118 | ||
| 
						 | 
					a4c1a7e317 | ||
| 
						 | 
					b222cf0624 | ||
| 
						 | 
					68b08abb14 | ||
| 
						 | 
					cee3fffab5 | ||
| 
						 | 
					d1d8608464 | ||
| 
						 | 
					19d2a20a7f | ||
| 
						 | 
					0bf5d40787 | ||
| 
						 | 
					757d479536 | ||
| 
						 | 
					74c9ace6f0 | ||
| 
						 | 
					cfb8afc558 | ||
| 
						 | 
					e8acf5c6f8 | ||
| 
						 | 
					d5864a1dcb | ||
| 
						 | 
					9f56705f96 | ||
| 
						 | 
					7b5b22af5a | ||
| 
						 | 
					00ecca84a8 | ||
| 
						 | 
					38c3b405c8 | ||
| 
						 | 
					e486ec5e0e | ||
| 
						 | 
					9f06ce19dd | ||
| 
						 | 
					ba61b14f1d | ||
| 
						 | 
					5114966e00 | ||
| 
						 | 
					eed7dd8d75 | ||
| 
						 | 
					70bddeda24 | ||
| 
						 | 
					f66efab8f7 | ||
| 
						 | 
					0caa1c11f8 | ||
| 
						 | 
					c68f050647 | ||
| 
						 | 
					d58eb72f25 | ||
| 
						 | 
					11bfaf6cff | ||
| 
						 | 
					68a54ab591 | ||
| 
						 | 
					9693045170 | ||
| 
						 | 
					311e4e9253 | ||
| 
						 | 
					1874366208 | ||
| 
						 | 
					18c497dffb | ||
| 
						 | 
					15922ccdf6 | ||
| 
						 | 
					5098bc92f8 | ||
| 
						 | 
					a411eaa858 | ||
| 
						 | 
					42b848bcf1 | ||
| 
						 | 
					b670b1e3da | ||
| 
						 | 
					a1c769a5f6 | ||
| 
						 | 
					2c89d56a1d | ||
| 
						 | 
					142e22641e | ||
| 
						 | 
					b9cc6148f4 | ||
| 
						 | 
					c6a15854ee | ||
| 
						 | 
					ba41d8a556 | ||
| 
						 | 
					f46a878e3f | ||
| 
						 | 
					fac683684b | ||
| 
						 | 
					f51fee66ad | ||
| 
						 | 
					5fb0aa6487 | ||
| 
						 | 
					9c3cbe5d7f | ||
| 
						 | 
					3e0d891828 | ||
| 
						 | 
					1c85e93c7c | ||
| 
						 | 
					95d334f2db | ||
| 
						 | 
					98486a9310 | ||
| 
						 | 
					4910cbf6db | ||
| 
						 | 
					75090e0365 | ||
| 
						 | 
					6676457bba | ||
| 
						 | 
					ad45ed9f5c | ||
| 
						 | 
					32828e6ffd | ||
| 
						 | 
					a39ded513a | ||
| 
						 | 
					0069dbc4a5 | ||
| 
						 | 
					ac90362581 | ||
| 
						 | 
					6d82a20624 | ||
| 
						 | 
					6c66fcba5f | ||
| 
						 | 
					faa624f9f9 | ||
| 
						 | 
					15ed15d3e4 | ||
| 
						 | 
					54f7c8571f | ||
| 
						 | 
					b6fefec364 | ||
| 
						 | 
					2bf1c86d05 | ||
| 
						 | 
					2147cd3540 | ||
| 
						 | 
					6a0fb6083c | ||
| 
						 | 
					0dbfc1da4a | ||
| 
						 | 
					f945040633 | ||
| 
						 | 
					8b8e03dc66 | ||
| 
						 | 
					56ec43a0dd | ||
| 
						 | 
					74ac7455c5 | ||
| 
						 | 
					166850e315 | ||
| 
						 | 
					e15abbc69f | ||
| 
						 | 
					c6b523d3dd | ||
| 
						 | 
					1e376e41a2 | ||
| 
						 | 
					dc931b1fca | ||
| 
						 | 
					7fcb1de839 | ||
| 
						 | 
					49b02a2d77 | ||
| 
						 | 
					418a0d151e | ||
| 
						 | 
					7b0cb7f08d | ||
| 
						 | 
					1c08c320c5 | ||
| 
						 | 
					452b34a770 | ||
| 
						 | 
					6bdb723259 | ||
| 
						 | 
					31a74acfd3 | ||
| 
						 | 
					d82242169b | ||
| 
						 | 
					a0707e6170 | ||
| 
						 | 
					07fc72fea1 | ||
| 
						 | 
					813c7c415b | ||
| 
						 | 
					38b3a46ffa | ||
| 
						 | 
					60b3b2c9d0 | ||
| 
						 | 
					c7410f2693 | ||
| 
						 | 
					43a5e1409e | ||
| 
						 | 
					cd4fad5488 | ||
| 
						 | 
					28b1bceb2f | ||
| 
						 | 
					d4d76b9e83 | ||
| 
						 | 
					e1fee47759 | ||
| 
						 | 
					88e9984da5 | ||
| 
						 | 
					dac1169e82 | ||
| 
						 | 
					53ab745f7a | ||
| 
						 | 
					2bbe747045 | ||
| 
						 | 
					55cd47ffb4 | ||
| 
						 | 
					2e1d669cba | ||
| 
						 | 
					819d5cef08 | ||
| 
						 | 
					e9cba65a99 | ||
| 
						 | 
					3b1f393ae7 | ||
| 
						 | 
					61433519af | ||
| 
						 | 
					c032563a0a | ||
| 
						 | 
					943f8a46a4 | ||
| 
						 | 
					7a60df7dd3 | ||
| 
						 | 
					de0b3ab7fb | ||
| 
						 | 
					2b8d087ba1 | ||
| 
						 | 
					eec6e53851 | ||
| 
						 | 
					9cd9ae3e3e | ||
| 
						 | 
					c4fd88f519 | ||
| 
						 | 
					0a0a261d64 | ||
| 
						 | 
					6610d4f3b9 | ||
| 
						 | 
					70f74dd946 | ||
| 
						 | 
					92fdeb37a0 | ||
| 
						 | 
					ffac355834 | ||
| 
						 | 
					2e72fde15f | ||
| 
						 | 
					aa9be09088 | ||
| 
						 | 
					8bcceacf34 | ||
| 
						 | 
					a5a4b34a5a | ||
| 
						 | 
					f99267cffc | ||
| 
						 | 
					5860ecb8ec | ||
| 
						 | 
					799751bcff | ||
| 
						 | 
					beaea31a96 | ||
| 
						 | 
					a9c3dc60b9 | ||
| 
						 | 
					2fb0c899c6 | ||
| 
						 | 
					73bc0cfd93 | ||
| 
						 | 
					cbfa030de7 | ||
| 
						 | 
					bb617a9646 | ||
| 
						 | 
					7947f98b9b | ||
| 
						 | 
					fc4868cb47 | ||
| 
						 | 
					555a8493cd | ||
| 
						 | 
					2452e013aa | ||
| 
						 | 
					a29b1a3f0f | ||
| 
						 | 
					79370621ea | ||
| 
						 | 
					4c4f1ee4de | ||
| 
						 | 
					fe772376ec | ||
| 
						 | 
					99cf5acd5c | ||
| 
						 | 
					d2c38b1c73 | ||
| 
						 | 
					673d7ac121 | ||
| 
						 | 
					666d437538 | ||
| 
						 | 
					ddf72ed59f | ||
| 
						 | 
					6502735b9c | ||
| 
						 | 
					31a266cb93 | ||
| 
						 | 
					b703bce788 | ||
| 
						 | 
					0188a53d19 | ||
| 
						 | 
					e7ce15846d | ||
| 
						 | 
					1433ae4790 | ||
| 
						 | 
					a506153219 | ||
| 
						 | 
					bee4756251 | ||
| 
						 | 
					b3f4fb1f72 | ||
| 
						 | 
					38654b070d | ||
| 
						 | 
					82c31e1496 | ||
| 
						 | 
					4c3853abea | ||
| 
						 | 
					5b88fe121d | ||
| 
						 | 
					a46db6ecce | ||
| 
						 | 
					f4d52a896e | ||
| 
						 | 
					57b6a64eed | ||
| 
						 | 
					c0a86cd5dd | ||
| 
						 | 
					43cbb1e3dd | ||
| 
						 | 
					2cb3c3b2bf | ||
| 
						 | 
					24802a6d91 | ||
| 
						 | 
					c125ea2767 | ||
| 
						 | 
					df4fd356df | ||
| 
						 | 
					1f1f23a882 | ||
| 
						 | 
					ee4462d2b1 | ||
| 
						 | 
					41faea737a | ||
| 
						 | 
					7c69ce8bc0 | ||
| 
						 | 
					eb3633164e | ||
| 
						 | 
					a08d14fef4 | ||
| 
						 | 
					b73ff18078 | ||
| 
						 | 
					9beaae61ec | 
@@ -1,5 +1,4 @@
 | 
			
		||||
openssl.pc
 | 
			
		||||
Makefile
 | 
			
		||||
Makefile.ssl
 | 
			
		||||
MINFO
 | 
			
		||||
makefile.one
 | 
			
		||||
tmp
 | 
			
		||||
@@ -13,9 +12,4 @@ cctest
 | 
			
		||||
cctest.c
 | 
			
		||||
cctest.a
 | 
			
		||||
libcrypto.so.*
 | 
			
		||||
libfips.so.*
 | 
			
		||||
libssl.so.*
 | 
			
		||||
libcrypto.sha1
 | 
			
		||||
libcrypto.a.sha1
 | 
			
		||||
*.flc
 | 
			
		||||
semantic.cache
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										206
									
								
								FAQ
									
									
									
									
									
								
							
							
						
						
									
										206
									
								
								FAQ
									
									
									
									
									
								
							@@ -9,7 +9,6 @@ OpenSSL  -  Frequently Asked Questions
 | 
			
		||||
* Where can I get a compiled version of OpenSSL?
 | 
			
		||||
* Why aren't tools like 'autoconf' and 'libtool' used?
 | 
			
		||||
* What is an 'engine' version?
 | 
			
		||||
* How do I check the authenticity of the OpenSSL distribution?
 | 
			
		||||
 | 
			
		||||
[LEGAL] Legal questions
 | 
			
		||||
 | 
			
		||||
@@ -30,29 +29,23 @@ OpenSSL  -  Frequently Asked Questions
 | 
			
		||||
* Why can't I use OpenSSL certificates with SSL client authentication?
 | 
			
		||||
* Why does my browser give a warning about a mismatched hostname?
 | 
			
		||||
* How do I install a CA certificate into a browser?
 | 
			
		||||
* Why is OpenSSL x509 DN output not conformant to RFC2253?
 | 
			
		||||
 | 
			
		||||
[BUILD] Questions about building and testing OpenSSL
 | 
			
		||||
 | 
			
		||||
* Why does the linker complain about undefined symbols?
 | 
			
		||||
* Why does the OpenSSL test fail with "bc: command not found"?
 | 
			
		||||
* Why does the OpenSSL test fail with "bc: 1 no implemented"?
 | 
			
		||||
* Why does the OpenSSL test fail with "bc: stack empty"?
 | 
			
		||||
* Why does the OpenSSL compilation fail on Alpha Tru64 Unix?
 | 
			
		||||
* Why does the OpenSSL compilation fail with "ar: command not found"?
 | 
			
		||||
* Why does the OpenSSL compilation fail on Win32 with VC++?
 | 
			
		||||
* What is special about OpenSSL on Redhat?
 | 
			
		||||
* Why does the OpenSSL compilation fail on MacOS X?
 | 
			
		||||
* Why does the OpenSSL test suite fail on MacOS X?
 | 
			
		||||
* Why does the OpenSSL test suite fail in BN_sqr test [on a 64-bit platform]?
 | 
			
		||||
* Why does OpenBSD-i386 build fail on des-586.s with "Unimplemented segment type"?
 | 
			
		||||
 | 
			
		||||
[PROG] Questions about programming with OpenSSL
 | 
			
		||||
 | 
			
		||||
* Is OpenSSL thread-safe?
 | 
			
		||||
* I've compiled a program under Windows and it crashes: why?
 | 
			
		||||
* How do I read or write a DER encoded buffer using the ASN1 functions?
 | 
			
		||||
* OpenSSL uses DER but I need BER format: does OpenSSL support BER?
 | 
			
		||||
* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
 | 
			
		||||
* I've called <some function> and it fails, why?
 | 
			
		||||
* I just get a load of numbers for the error output, what do they mean?
 | 
			
		||||
@@ -60,8 +53,6 @@ OpenSSL  -  Frequently Asked Questions
 | 
			
		||||
* Why can't the OpenSSH configure script detect OpenSSL?
 | 
			
		||||
* Can I use OpenSSL's SSL library with non-blocking I/O?
 | 
			
		||||
* Why doesn't my server application receive a client certificate?
 | 
			
		||||
* Why does compilation fail due to an undefined symbol NID_uniqueIdentifier?
 | 
			
		||||
* I think I've detected a memory leak, is this a bug?
 | 
			
		||||
 | 
			
		||||
===============================================================================
 | 
			
		||||
 | 
			
		||||
@@ -70,7 +61,7 @@ OpenSSL  -  Frequently Asked Questions
 | 
			
		||||
* Which is the current version of OpenSSL?
 | 
			
		||||
 | 
			
		||||
The current version is available from <URL: http://www.openssl.org>.
 | 
			
		||||
OpenSSL 0.9.7l was released on September 28, 2006.
 | 
			
		||||
OpenSSL 0.9.6e was released on 30 May, 2002.
 | 
			
		||||
 | 
			
		||||
In addition to the current stable release, you can also access daily
 | 
			
		||||
snapshots of the OpenSSL development version at <URL:
 | 
			
		||||
@@ -118,14 +109,11 @@ OpenSSL.  Information on the OpenSSL mailing lists is available from
 | 
			
		||||
 | 
			
		||||
* Where can I get a compiled version of OpenSSL?
 | 
			
		||||
 | 
			
		||||
You can finder pointers to binary distributions in
 | 
			
		||||
http://www.openssl.org/related/binaries.html .
 | 
			
		||||
 | 
			
		||||
Some applications that use OpenSSL are distributed in binary form.
 | 
			
		||||
When using such an application, you don't need to install OpenSSL
 | 
			
		||||
yourself; the application will include the required parts (e.g. DLLs).
 | 
			
		||||
 | 
			
		||||
If you want to build OpenSSL on a Windows system and you don't have
 | 
			
		||||
If you want to install OpenSSL on a Windows system and you don't have
 | 
			
		||||
a C compiler, read the "Mingw32" section of INSTALL.W32 for information
 | 
			
		||||
on how to obtain and install the free GNU C compiler.
 | 
			
		||||
 | 
			
		||||
@@ -141,21 +129,8 @@ less Unix-centric, it might have been used much earlier.
 | 
			
		||||
 | 
			
		||||
With version 0.9.6 OpenSSL was extended to interface to external crypto
 | 
			
		||||
hardware. This was realized in a special release '0.9.6-engine'. With
 | 
			
		||||
version 0.9.7 the changes were merged into the main development line,
 | 
			
		||||
so that the special release is no longer necessary.
 | 
			
		||||
 | 
			
		||||
* How do I check the authenticity of the OpenSSL distribution?
 | 
			
		||||
 | 
			
		||||
We provide MD5 digests and ASC signatures of each tarball.
 | 
			
		||||
Use MD5 to check that a tarball from a mirror site is identical:
 | 
			
		||||
 | 
			
		||||
   md5sum TARBALL | awk '{print $1;}' | cmp - TARBALL.md5
 | 
			
		||||
 | 
			
		||||
You can check authenticity using pgp or gpg. You need the OpenSSL team
 | 
			
		||||
member public key used to sign it (download it from a key server). Then
 | 
			
		||||
just do:
 | 
			
		||||
 | 
			
		||||
   pgp TARBALL.asc
 | 
			
		||||
version 0.9.7 (not yet released) the changes were merged into the main
 | 
			
		||||
development line, so that the special release is no longer necessary.
 | 
			
		||||
 | 
			
		||||
[LEGAL] =======================================================================
 | 
			
		||||
 | 
			
		||||
@@ -194,30 +169,18 @@ for permission to use their software with OpenSSL.
 | 
			
		||||
 | 
			
		||||
Cryptographic software needs a source of unpredictable data to work
 | 
			
		||||
correctly.  Many open source operating systems provide a "randomness
 | 
			
		||||
device" (/dev/urandom or /dev/random) that serves this purpose.
 | 
			
		||||
All OpenSSL versions try to use /dev/urandom by default; starting with
 | 
			
		||||
version 0.9.7, OpenSSL also tries /dev/random if /dev/urandom is not
 | 
			
		||||
available.
 | 
			
		||||
device" that serves this purpose.  On other systems, applications have
 | 
			
		||||
to call the RAND_add() or RAND_seed() function with appropriate data
 | 
			
		||||
before generating keys or performing public key encryption.
 | 
			
		||||
(These functions initialize the pseudo-random number generator, PRNG.)
 | 
			
		||||
 | 
			
		||||
On other systems, applications have to call the RAND_add() or
 | 
			
		||||
RAND_seed() function with appropriate data before generating keys or
 | 
			
		||||
performing public key encryption. (These functions initialize the
 | 
			
		||||
pseudo-random number generator, PRNG.)  Some broken applications do
 | 
			
		||||
not do this.  As of version 0.9.5, the OpenSSL functions that need
 | 
			
		||||
randomness report an error if the random number generator has not been
 | 
			
		||||
seeded with at least 128 bits of randomness.  If this error occurs and
 | 
			
		||||
is not discussed in the documentation of the application you are
 | 
			
		||||
using, please contact the author of that application; it is likely
 | 
			
		||||
that it never worked correctly.  OpenSSL 0.9.5 and later make the
 | 
			
		||||
error visible by refusing to perform potentially insecure encryption.
 | 
			
		||||
 | 
			
		||||
If you are using Solaris 8, you can add /dev/urandom and /dev/random
 | 
			
		||||
devices by installing patch 112438 (Sparc) or 112439 (x86), which are
 | 
			
		||||
available via the Patchfinder at <URL: http://sunsolve.sun.com>
 | 
			
		||||
(Solaris 9 includes these devices by default). For /dev/random support
 | 
			
		||||
for earlier Solaris versions, see Sun's statement at
 | 
			
		||||
<URL: http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsrdb/27606&zone_32=SUNWski>
 | 
			
		||||
(the SUNWski package is available in patch 105710).
 | 
			
		||||
Some broken applications do not do this.  As of version 0.9.5, the
 | 
			
		||||
OpenSSL functions that need randomness report an error if the random
 | 
			
		||||
number generator has not been seeded with at least 128 bits of
 | 
			
		||||
randomness.  If this error occurs, please contact the author of the
 | 
			
		||||
application you are using.  It is likely that it never worked
 | 
			
		||||
correctly.  OpenSSL 0.9.5 and later make the error visible by refusing
 | 
			
		||||
to perform potentially insecure encryption.
 | 
			
		||||
 | 
			
		||||
On systems without /dev/urandom and /dev/random, it is a good idea to
 | 
			
		||||
use the Entropy Gathering Demon (EGD); see the RAND_egd() manpage for
 | 
			
		||||
@@ -250,6 +213,16 @@ OpenSSL command line tools. Applications using the OpenSSL library
 | 
			
		||||
provide their own configuration options to specify the entropy source,
 | 
			
		||||
please check out the documentation coming the with application.
 | 
			
		||||
 | 
			
		||||
For Solaris 2.6, Tim Nibbe <tnibbe@sprint.net> and others have suggested
 | 
			
		||||
installing the SUNski package from Sun patch 105710-01 (Sparc) which
 | 
			
		||||
adds a /dev/random device and make sure it gets used, usually through
 | 
			
		||||
$RANDFILE.  There are probably similar patches for the other Solaris
 | 
			
		||||
versions.  An official statement from Sun with respect to /dev/random
 | 
			
		||||
support can be found at
 | 
			
		||||
  http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsrdb/27606&zone_32=SUNWski
 | 
			
		||||
However, be warned that /dev/random is usually a blocking device, which
 | 
			
		||||
may have some effects on OpenSSL.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Why do I get an "unable to write 'random state'" error message?
 | 
			
		||||
 | 
			
		||||
@@ -375,13 +348,6 @@ DO NOT DO THIS! This command will give away your CAs private key and
 | 
			
		||||
reduces its security to zero: allowing anyone to forge certificates in
 | 
			
		||||
whatever name they choose.
 | 
			
		||||
 | 
			
		||||
* Why is OpenSSL x509 DN output not conformant to RFC2253?
 | 
			
		||||
 | 
			
		||||
The ways to print out the oneline format of the DN (Distinguished Name) have
 | 
			
		||||
been extended in version 0.9.7 of OpenSSL. Using the new X509_NAME_print_ex()
 | 
			
		||||
interface, the "-nameopt" option could be introduded. See the manual
 | 
			
		||||
page of the "openssl x509" commandline tool for details. The old behaviour
 | 
			
		||||
has however been left as default for the sake of compatibility.
 | 
			
		||||
 | 
			
		||||
[BUILD] =======================================================================
 | 
			
		||||
 | 
			
		||||
@@ -426,17 +392,6 @@ and compile/install it.  GNU bc (see http://www.gnu.org/software/software.html
 | 
			
		||||
for download instructions) can be safely used, for example.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Why does the OpenSSL test fail with "bc: stack empty"?
 | 
			
		||||
 | 
			
		||||
On some DG/ux versions, bc seems to have a too small stack for calculations
 | 
			
		||||
that the OpenSSL bntest throws at it.  This gets triggered when you run the
 | 
			
		||||
test suite (using "make test").  The message returned is "bc: stack empty".
 | 
			
		||||
 | 
			
		||||
The best way to deal with this is to find another implementation of bc
 | 
			
		||||
and compile/install it.  GNU bc (see http://www.gnu.org/software/software.html
 | 
			
		||||
for download instructions) can be safely used, for example.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Why does the OpenSSL compilation fail on Alpha Tru64 Unix?
 | 
			
		||||
 | 
			
		||||
On some Alpha installations running Tru64 Unix and Compaq C, the compilation
 | 
			
		||||
@@ -462,7 +417,7 @@ get the best result from OpenSSL.  A bit more complicated solution is the
 | 
			
		||||
following:
 | 
			
		||||
 | 
			
		||||
----- snip:start -----
 | 
			
		||||
  make DIRS=crypto SDIRS=sha "`grep '^CFLAG=' Makefile | \
 | 
			
		||||
  make DIRS=crypto SDIRS=sha "`grep '^CFLAG=' Makefile.ssl | \
 | 
			
		||||
       sed -e 's/ -O[0-9] / -O0 /'`"
 | 
			
		||||
  rm `ls crypto/*.o crypto/sha/*.o | grep -v 'sha_dgst\.o'`
 | 
			
		||||
  make
 | 
			
		||||
@@ -472,10 +427,6 @@ This will only compile sha_dgst.c with -O0, the rest with the optimization
 | 
			
		||||
level chosen by the configuration process.  When the above is done, do the
 | 
			
		||||
test and installation and you're set.
 | 
			
		||||
 | 
			
		||||
3. Reconfigure the toolkit with no-sha0 option to leave out SHA0. It
 | 
			
		||||
should not be used and is not used in SSL/TLS nor any other recognized
 | 
			
		||||
protocol in either case.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Why does the OpenSSL compilation fail with "ar: command not found"?
 | 
			
		||||
 | 
			
		||||
@@ -499,13 +450,10 @@ and then redo the compilation.  What you should really do is make sure
 | 
			
		||||
Sometimes, you may get reports from VC++ command line (cl) that it
 | 
			
		||||
can't find standard include files like stdio.h and other weirdnesses.
 | 
			
		||||
One possible cause is that the environment isn't correctly set up.
 | 
			
		||||
To solve that problem for VC++ versions up to 6, one should run
 | 
			
		||||
VCVARS32.BAT which is found in the 'bin' subdirectory of the VC++
 | 
			
		||||
installation directory (somewhere under 'Program Files').  For VC++
 | 
			
		||||
version 7 (and up?), which is also called VS.NET, the file is called
 | 
			
		||||
VSVARS32.BAT instead.
 | 
			
		||||
This needs to be done prior to running NMAKE, and the changes are only
 | 
			
		||||
valid for the current DOS session.
 | 
			
		||||
To solve that problem, one should run VCVARS32.BAT which is found in
 | 
			
		||||
the 'bin' subdirectory of the VC++ installation directory (somewhere
 | 
			
		||||
under 'Program Files').  This needs to be done prior to running NMAKE,
 | 
			
		||||
and the changes are only valid for the current DOS session.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* What is special about OpenSSL on Redhat?
 | 
			
		||||
@@ -541,18 +489,6 @@ IDEA:  5,214,703 25/05/2010
 | 
			
		||||
RC5:   5,724,428 03/03/2015
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Why does the OpenSSL compilation fail on MacOS X?
 | 
			
		||||
 | 
			
		||||
If the failure happens when trying to build the "openssl" binary, with
 | 
			
		||||
a large number of undefined symbols, it's very probable that you have
 | 
			
		||||
OpenSSL 0.9.6b delivered with the operating system (you can find out by
 | 
			
		||||
running '/usr/bin/openssl version') and that you were trying to build
 | 
			
		||||
OpenSSL 0.9.7 or newer.  The problem is that the loader ('ld') in
 | 
			
		||||
MacOS X has a misfeature that's quite difficult to go around.
 | 
			
		||||
Look in the file PROBLEMS for a more detailed explanation and for possible
 | 
			
		||||
solutions.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Why does the OpenSSL test suite fail on MacOS X?
 | 
			
		||||
 | 
			
		||||
If the failure happens when running 'make test' and the RC4 test fails,
 | 
			
		||||
@@ -566,37 +502,6 @@ libraries you just built.
 | 
			
		||||
Look in the file PROBLEMS for a more detailed explanation and for possible
 | 
			
		||||
solutions.
 | 
			
		||||
 | 
			
		||||
* Why does the OpenSSL test suite fail in BN_sqr test [on a 64-bit platform]?
 | 
			
		||||
 | 
			
		||||
Failure in BN_sqr test is most likely caused by a failure to configure the
 | 
			
		||||
toolkit for current platform or lack of support for the platform in question.
 | 
			
		||||
Run './config -t' and './apps/openssl version -p'. Do these platform
 | 
			
		||||
identifiers match? If they don't, then you most likely failed to run
 | 
			
		||||
./config and you're hereby advised to do so before filing a bug report.
 | 
			
		||||
If ./config itself fails to run, then it's most likely problem with your
 | 
			
		||||
local environment and you should turn to your system administrator (or
 | 
			
		||||
similar). If identifiers match (and/or no alternative identifier is
 | 
			
		||||
suggested by ./config script), then the platform is unsupported. There might
 | 
			
		||||
or might not be a workaround. Most notably on SPARC64 platforms with GNU
 | 
			
		||||
C compiler you should be able to produce a working build by running
 | 
			
		||||
'./config -m32'. I understand that -m32 might not be what you want/need,
 | 
			
		||||
but the build should be operational. For further details turn to
 | 
			
		||||
<openssl-dev@openssl.org>.
 | 
			
		||||
 | 
			
		||||
* Why does OpenBSD-i386 build fail on des-586.s with "Unimplemented segment type"?
 | 
			
		||||
 | 
			
		||||
As of 0.9.7 assembler routines were overhauled for position independence
 | 
			
		||||
of the machine code, which is essential for shared library support. For
 | 
			
		||||
some reason OpenBSD is equipped with an out-of-date GNU assembler which
 | 
			
		||||
finds the new code offensive. To work around the problem, configure with
 | 
			
		||||
no-asm (and sacrifice a great deal of performance) or patch your assembler
 | 
			
		||||
according to <URL: http://www.openssl.org/~appro/gas-1.92.3.OpenBSD.patch>.
 | 
			
		||||
For your convenience a pre-compiled replacement binary is provided at
 | 
			
		||||
<URL: http://www.openssl.org/~appro/gas-1.92.3.static.aout.bin>.
 | 
			
		||||
Reportedly elder *BSD a.out platforms also suffer from this problem and
 | 
			
		||||
remedy should be same. Provided binary is statically linked and should be
 | 
			
		||||
working across wider range of *BSD branches, not just OpenBSD.
 | 
			
		||||
 | 
			
		||||
[PROG] ========================================================================
 | 
			
		||||
 | 
			
		||||
* Is OpenSSL thread-safe?
 | 
			
		||||
@@ -608,9 +513,8 @@ libraries.  If your platform is not one of these, consult the INSTALL
 | 
			
		||||
file.
 | 
			
		||||
 | 
			
		||||
Multi-threaded applications must provide two callback functions to
 | 
			
		||||
OpenSSL by calling CRYPTO_set_locking_callback() and
 | 
			
		||||
CRYPTO_set_id_callback().  This is described in the threads(3)
 | 
			
		||||
manpage.
 | 
			
		||||
OpenSSL.  This is described in the threads(3) manpage.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* I've compiled a program under Windows and it crashes: why?
 | 
			
		||||
 | 
			
		||||
@@ -690,20 +594,6 @@ and attempts to free the buffer will have unpredictable results
 | 
			
		||||
because it no longer points to the same address.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* OpenSSL uses DER but I need BER format: does OpenSSL support BER?
 | 
			
		||||
 | 
			
		||||
The short answer is yes, because DER is a special case of BER and OpenSSL
 | 
			
		||||
ASN1 decoders can process BER.
 | 
			
		||||
 | 
			
		||||
The longer answer is that ASN1 structures can be encoded in a number of
 | 
			
		||||
different ways. One set of ways is the Basic Encoding Rules (BER) with various
 | 
			
		||||
permissible encodings. A restriction of BER is the Distinguished Encoding
 | 
			
		||||
Rules (DER): these uniquely specify how a given structure is encoded.
 | 
			
		||||
 | 
			
		||||
Therefore, because DER is a special case of BER, DER is an acceptable encoding
 | 
			
		||||
for BER.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
 | 
			
		||||
 | 
			
		||||
This usually happens when you try compiling something using the PKCS#12
 | 
			
		||||
@@ -756,7 +646,6 @@ The general answer is to check the config.log file generated when running
 | 
			
		||||
the OpenSSH configure script. It should contain the detailed information
 | 
			
		||||
on why the OpenSSL library was not detected or considered incompatible.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Can I use OpenSSL's SSL library with non-blocking I/O?
 | 
			
		||||
 | 
			
		||||
Yes; make sure to read the SSL_get_error(3) manual page!
 | 
			
		||||
@@ -778,36 +667,5 @@ if explicitly asked by the server. Use the SSL_VERIFY_PEER flag of the
 | 
			
		||||
SSL_CTX_set_verify() function to enable the use of client certificates.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Why does compilation fail due to an undefined symbol NID_uniqueIdentifier?
 | 
			
		||||
 | 
			
		||||
For OpenSSL 0.9.7 the OID table was extended and corrected. In earlier
 | 
			
		||||
versions, uniqueIdentifier was incorrectly used for X.509 certificates.
 | 
			
		||||
The correct name according to RFC2256 (LDAP) is x500UniqueIdentifier.
 | 
			
		||||
Change your code to use the new name when compiling against OpenSSL 0.9.7.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* I think I've detected a memory leak, is this a bug?
 | 
			
		||||
 | 
			
		||||
In most cases the cause of an apparent memory leak is an OpenSSL internal table
 | 
			
		||||
that is allocated when an application starts up. Since such tables do not grow
 | 
			
		||||
in size over time they are harmless.
 | 
			
		||||
 | 
			
		||||
These internal tables can be freed up when an application closes using various
 | 
			
		||||
functions.  Currently these include following:
 | 
			
		||||
 | 
			
		||||
Thread-local cleanup functions:
 | 
			
		||||
 | 
			
		||||
  ERR_remove_state()
 | 
			
		||||
 | 
			
		||||
Application-global cleanup functions that are aware of usage (and therefore
 | 
			
		||||
thread-safe):
 | 
			
		||||
 | 
			
		||||
  ENGINE_cleanup() and CONF_modules_unload()
 | 
			
		||||
 | 
			
		||||
"Brutal" (thread-unsafe) Application-global cleanup functions:
 | 
			
		||||
 | 
			
		||||
  ERR_free_strings(), EVP_cleanup() and CRYPTO_cleanup_all_ex_data().
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
===============================================================================
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										61
									
								
								INSTALL
									
									
									
									
									
								
							
							
						
						
									
										61
									
								
								INSTALL
									
									
									
									
									
								
							@@ -2,10 +2,8 @@
 | 
			
		||||
 INSTALLATION ON THE UNIX PLATFORM
 | 
			
		||||
 ---------------------------------
 | 
			
		||||
 | 
			
		||||
 [Installation on DOS (with djgpp), Windows, OpenVMS and MacOS (before MacOS X)
 | 
			
		||||
  is described in INSTALL.DJGPP, INSTALL.W32, INSTALL.VMS and INSTALL.MacOS.
 | 
			
		||||
  This document describes installation on operating systems in the Unix
 | 
			
		||||
  family.]
 | 
			
		||||
 [Installation on Windows, OpenVMS and MacOS (before MacOS X) is described
 | 
			
		||||
  in INSTALL.W32, INSTALL.VMS and INSTALL.MacOS.]
 | 
			
		||||
 | 
			
		||||
 To install OpenSSL, you will need:
 | 
			
		||||
 | 
			
		||||
@@ -55,15 +53,6 @@
 | 
			
		||||
                This will usually require additional system-dependent options!
 | 
			
		||||
                See "Note on multi-threading" below.
 | 
			
		||||
 | 
			
		||||
  no-zlib       Don't try to build with support for zlib compression and
 | 
			
		||||
                decompression.
 | 
			
		||||
 | 
			
		||||
  zlib          Build with support for zlib compression/decompression.
 | 
			
		||||
 | 
			
		||||
  zlib-dynamic  Like "zlib", but has OpenSSL load the zlib library dynamically
 | 
			
		||||
                when needed.  This is only supported on systems where loading
 | 
			
		||||
                of shared libraries is supported.  This is the default choice.
 | 
			
		||||
 | 
			
		||||
  no-shared     Don't try to create shared libraries.
 | 
			
		||||
 | 
			
		||||
  shared        In addition to the usual static libraries, create shared
 | 
			
		||||
@@ -123,7 +112,7 @@
 | 
			
		||||
     generic configurations "cc" or "gcc" should usually work on 32 bit
 | 
			
		||||
     systems.
 | 
			
		||||
 | 
			
		||||
     Configure creates the file Makefile from Makefile.org and
 | 
			
		||||
     Configure creates the file Makefile.ssl from Makefile.org and
 | 
			
		||||
     defines various macros in crypto/opensslconf.h (generated from
 | 
			
		||||
     crypto/opensslconf.h.in).
 | 
			
		||||
 | 
			
		||||
@@ -140,8 +129,8 @@
 | 
			
		||||
     standard headers).  If it is a problem with OpenSSL itself, please
 | 
			
		||||
     report the problem to <openssl-bugs@openssl.org> (note that your
 | 
			
		||||
     message will be recorded in the request tracker publicly readable
 | 
			
		||||
     via http://www.openssl.org/support/rt2.html and will be forwarded to a
 | 
			
		||||
     public mailing list). Include the output of "make report" in your message.
 | 
			
		||||
     via http://www.openssl.org/rt2.html and will be forwarded to a public
 | 
			
		||||
     mailing list). Include the output of "make report" in your message.
 | 
			
		||||
     Please check out the request tracker. Maybe the bug was already
 | 
			
		||||
     reported or has already been fixed.
 | 
			
		||||
 | 
			
		||||
@@ -158,11 +147,11 @@
 | 
			
		||||
     If a test fails, look at the output.  There may be reasons for
 | 
			
		||||
     the failure that isn't a problem in OpenSSL itself (like a missing
 | 
			
		||||
     or malfunctioning bc).  If it is a problem with OpenSSL itself,
 | 
			
		||||
     try removing any compiler optimization flags from the CFLAG line
 | 
			
		||||
     in Makefile and run "make clean; make". Please send a bug
 | 
			
		||||
     try removing any compiler optimization flags from the CFLAGS line
 | 
			
		||||
     in Makefile.ssl and run "make clean; make". Please send a bug
 | 
			
		||||
     report to <openssl-bugs@openssl.org>, including the output of
 | 
			
		||||
     "make report" in order to be added to the request tracker at
 | 
			
		||||
     http://www.openssl.org/support/rt2.html.
 | 
			
		||||
     http://www.openssl.org/rt2.html.
 | 
			
		||||
 | 
			
		||||
  4. If everything tests ok, install OpenSSL with
 | 
			
		||||
 | 
			
		||||
@@ -296,37 +285,3 @@
 | 
			
		||||
 targets for shared library creation, like linux-shared.  Those targets
 | 
			
		||||
 can currently be used on their own just as well, but this is expected
 | 
			
		||||
 to change in future versions of OpenSSL.
 | 
			
		||||
 | 
			
		||||
 Note on random number generation
 | 
			
		||||
 --------------------------------
 | 
			
		||||
 | 
			
		||||
 Availability of cryptographically secure random numbers is required for
 | 
			
		||||
 secret key generation. OpenSSL provides several options to seed the
 | 
			
		||||
 internal PRNG. If not properly seeded, the internal PRNG will refuse
 | 
			
		||||
 to deliver random bytes and a "PRNG not seeded error" will occur.
 | 
			
		||||
 On systems without /dev/urandom (or similar) device, it may be necessary
 | 
			
		||||
 to install additional support software to obtain random seed.
 | 
			
		||||
 Please check out the manual pages for RAND_add(), RAND_bytes(), RAND_egd(),
 | 
			
		||||
 and the FAQ for more information.
 | 
			
		||||
 | 
			
		||||
 Note on support for multiple builds
 | 
			
		||||
 -----------------------------------
 | 
			
		||||
 | 
			
		||||
 OpenSSL is usually built in it's source tree.  Unfortunately, this doesn't
 | 
			
		||||
 support building for multiple platforms from the same source tree very well.
 | 
			
		||||
 It is however possible to build in a separate tree through the use of lots
 | 
			
		||||
 of symbolic links, which should be prepared like this:
 | 
			
		||||
 | 
			
		||||
	mkdir -p objtree/"`uname -s`-`uname -r`-`uname -m`"
 | 
			
		||||
	cd objtree/"`uname -s`-`uname -r`-`uname -m`"
 | 
			
		||||
	(cd $OPENSSL_SOURCE; find . -type f) | while read F; do
 | 
			
		||||
		mkdir -p `dirname $F`
 | 
			
		||||
		rm -f $F; ln -s $OPENSSL_SOURCE/$F $F
 | 
			
		||||
		echo $F '->' $OPENSSL_SOURCE/$F
 | 
			
		||||
	done
 | 
			
		||||
	make -f Makefile.org clean
 | 
			
		||||
 | 
			
		||||
 OPENSSL_SOURCE is an environment variable that contains the absolute (this
 | 
			
		||||
 is important!) path to the OpenSSL source tree.
 | 
			
		||||
 | 
			
		||||
 Also, operations like 'make update' should still be made in the source tree.
 | 
			
		||||
 
 | 
			
		||||
@@ -1,47 +0,0 @@
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
 INSTALLATION ON THE DOS PLATFORM WITH DJGPP
 | 
			
		||||
 -------------------------------------------
 | 
			
		||||
 | 
			
		||||
 OpenSSL has been ported to DJGPP, a Unix look-alike 32-bit run-time
 | 
			
		||||
 environment for 16-bit DOS, but only with long filename support.
 | 
			
		||||
 If you wish to compile on native DOS with 8+3 filenames, you will
 | 
			
		||||
 have to tweak the installation yourself, including renaming files
 | 
			
		||||
 with illegal or duplicate names.
 | 
			
		||||
 | 
			
		||||
 You should have a full DJGPP environment installed, including the
 | 
			
		||||
 latest versions of DJGPP, GCC, BINUTILS, BASH, etc. This package
 | 
			
		||||
 requires that PERL and BC also be installed.
 | 
			
		||||
 | 
			
		||||
 All of these can be obtained from the usual DJGPP mirror sites or
 | 
			
		||||
 directly at "http://www.delorie.com/pub/djgpp". For help on which
 | 
			
		||||
 files to download, see the DJGPP "ZIP PICKER" page at
 | 
			
		||||
 "http://www.delorie.com/djgpp/zip-picker.html". You also need to have
 | 
			
		||||
 the WATT-32 networking package installed before you try to compile
 | 
			
		||||
 OpenSSL. This can be obtained from "http://www.bgnett.no/~giva/".
 | 
			
		||||
 The Makefile assumes that the WATT-32 code is in the directory
 | 
			
		||||
 specified by the environment variable WATT_ROOT. If you have watt-32
 | 
			
		||||
 in directory "watt32" under your main DJGPP directory, specify
 | 
			
		||||
 WATT_ROOT="/dev/env/DJDIR/watt32".
 | 
			
		||||
 | 
			
		||||
 To compile OpenSSL, start your BASH shell, then configure for DJGPP by
 | 
			
		||||
 running "./Configure" with appropriate arguments:
 | 
			
		||||
 | 
			
		||||
	./Configure no-threads --prefix=/dev/env/DJDIR DJGPP
 | 
			
		||||
 
 | 
			
		||||
 And finally fire up "make". You may run out of DPMI selectors when
 | 
			
		||||
 running in a DOS box under Windows. If so, just close the BASH
 | 
			
		||||
 shell, go back to Windows, and restart BASH. Then run "make" again.
 | 
			
		||||
 | 
			
		||||
 RUN-TIME CAVEAT LECTOR
 | 
			
		||||
 --------------
 | 
			
		||||
 | 
			
		||||
 Quoting FAQ:
 | 
			
		||||
 | 
			
		||||
  "Cryptographic software needs a source of unpredictable data to work
 | 
			
		||||
   correctly.  Many open source operating systems provide a "randomness
 | 
			
		||||
   device" (/dev/urandom or /dev/random) that serves this purpose."
 | 
			
		||||
 | 
			
		||||
 As of version 0.9.7f DJGPP port checks upon /dev/urandom$ for a 3rd
 | 
			
		||||
 party "randomness" DOS driver. One such driver, NOISE.SYS, can be
 | 
			
		||||
 obtained from "http://www.rahul.net/dkaufman/index.html".
 | 
			
		||||
@@ -32,17 +32,17 @@ Installation procedure:
 | 
			
		||||
        to 42, change appropriately.
 | 
			
		||||
(**)	If you use SUNtar, then it might have already unbinhexed the files
 | 
			
		||||
	in question.
 | 
			
		||||
(***)	The project file was saved with CW Pro 5.3. If you have an earlier
 | 
			
		||||
(***)	The project file was saved with CW Pro 5.3. If you have earlier
 | 
			
		||||
	version and it refuses to open it, then download
 | 
			
		||||
	http://www.openssl.org/~appro/OpenSSL.mcp.xml and import it
 | 
			
		||||
	overwriting the original OpenSSL.mcp.
 | 
			
		||||
(****)	Other targets are works in progress. If you feel like giving 'em a
 | 
			
		||||
(****)	Other targets are work in progress. If you feel like giving 'em a
 | 
			
		||||
	shot, then you should know that OpenSSL* and Lib* targets are
 | 
			
		||||
	supposed to be built with the GUSI, MacOS library which mimics
 | 
			
		||||
	BSD sockets and some other POSIX APIs. The GUSI distribution is
 | 
			
		||||
	expected to be found in the same directory as the openssl source tree,
 | 
			
		||||
	i.e., in the parent directory to the one where this very file,
 | 
			
		||||
	namely INSTALL.MacOS, resides. For more information about GUSI, see
 | 
			
		||||
	expected to be found in the same directory as openssl source tree,
 | 
			
		||||
	i.e. in the parent directory to the one where this very file,
 | 
			
		||||
	namely INSTALL.MacOS. For more information about GUSI, see
 | 
			
		||||
	http://www.iis.ee.ethz.ch/~neeri/macintosh/gusi-qa.html
 | 
			
		||||
 | 
			
		||||
Finally some essential comments from our generous contributor:-)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										31
									
								
								INSTALL.OS2
									
									
									
									
									
								
							
							
						
						
									
										31
									
								
								INSTALL.OS2
									
									
									
									
									
								
							@@ -1,31 +0,0 @@
 | 
			
		||||
 
 | 
			
		||||
 Installation on OS/2
 | 
			
		||||
 --------------------
 | 
			
		||||
 | 
			
		||||
 You need to have the following tools installed:
 | 
			
		||||
 | 
			
		||||
  * EMX GCC
 | 
			
		||||
  * PERL
 | 
			
		||||
  * GNU make
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 To build the makefile, run
 | 
			
		||||
 | 
			
		||||
 > os2\os2-emx
 | 
			
		||||
 | 
			
		||||
 This will configure OpenSSL and create OS2-EMX.mak which you then use to 
 | 
			
		||||
 build the OpenSSL libraries & programs by running
 | 
			
		||||
 | 
			
		||||
 > make -f os2-emx.mak
 | 
			
		||||
 | 
			
		||||
 If that finishes successfully you will find the libraries and programs in the
 | 
			
		||||
 "out" directory.
 | 
			
		||||
 | 
			
		||||
 Alternatively, you can make a dynamic build that puts the library code into
 | 
			
		||||
 crypto.dll and ssl.dll by running
 | 
			
		||||
 | 
			
		||||
 > make -f os2-emx-dll.mak
 | 
			
		||||
 | 
			
		||||
 This will build the above mentioned dlls and a matching pair of import
 | 
			
		||||
 libraries in the "out_dll" directory along with the set of test programs
 | 
			
		||||
 and the openssl application.
 | 
			
		||||
							
								
								
									
										12
									
								
								INSTALL.VMS
									
									
									
									
									
								
							
							
						
						
									
										12
									
								
								INSTALL.VMS
									
									
									
									
									
								
							@@ -33,11 +33,11 @@ Checking the distribution:
 | 
			
		||||
==========================
 | 
			
		||||
 | 
			
		||||
There have been reports of places where the distribution didn't quite get
 | 
			
		||||
through, for example if you've copied the tree from a NFS-mounted Unix
 | 
			
		||||
through, for example if you've copied the tree from a NFS-mounted unix
 | 
			
		||||
mount point.
 | 
			
		||||
 | 
			
		||||
The easiest way to check if everything got through as it should is to check
 | 
			
		||||
for one of the following files:
 | 
			
		||||
for oen of the following files:
 | 
			
		||||
 | 
			
		||||
	[.CRYPTO]OPENSSLCONF.H_IN
 | 
			
		||||
	[.CRYPTO]OPENSSLCONF_H.IN
 | 
			
		||||
@@ -69,7 +69,7 @@ for a command procedure name xxx-LIB.COM (in the library directories)
 | 
			
		||||
or MAKExxx.COM (in the program directories) and read the comments at
 | 
			
		||||
the top to understand how to use them.  However, if you want to
 | 
			
		||||
compile all you can get, the simplest is to use MAKEVMS.COM in the top
 | 
			
		||||
directory.  The syntax is the following:
 | 
			
		||||
directory.  The syntax is trhe following:
 | 
			
		||||
 | 
			
		||||
  @MAKEVMS <option> <rsaref-p> <debug-p> [<compiler>]
 | 
			
		||||
 | 
			
		||||
@@ -79,7 +79,7 @@ directory.  The syntax is the following:
 | 
			
		||||
      CONFIG    Just build the "[.CRYPTO]OPENSSLCONF.H" file.
 | 
			
		||||
      BUILDINF  Just build the "[.INCLUDE]BUILDINF.H" file.
 | 
			
		||||
      SOFTLINKS Just copies some files, to simulate Unix soft links.
 | 
			
		||||
      BUILDALL  Same as ALL, except CONFIG, BUILDINF and SOFTLINKS aren't done.
 | 
			
		||||
      BUILDALL  Same as ALL, except CONFIG, BUILDINF and SOFTILNKS aren't done.
 | 
			
		||||
      RSAREF    Just build the "[.xxx.EXE.RSAREF]LIBRSAGLUE.OLB" library.
 | 
			
		||||
      CRYPTO    Just build the "[.xxx.EXE.CRYPTO]LIBCRYPTO.OLB" library.
 | 
			
		||||
      SSL       Just build the "[.xxx.EXE.SSL]LIBSSL.OLB" library.
 | 
			
		||||
@@ -92,7 +92,7 @@ directory.  The syntax is the following:
 | 
			
		||||
      RSAREF    compile using the RSAREF Library
 | 
			
		||||
      NORSAREF  compile without using RSAREF
 | 
			
		||||
 | 
			
		||||
Note 0: The RSAREF library IS NO LONGER NEEDED.  The RSA patent
 | 
			
		||||
Note 0: The RASREF library IS NO LONGER NEEDED.  The RSA patent
 | 
			
		||||
        expires September 20, 2000, and RSA Security chose to make
 | 
			
		||||
        the algorithm public domain two weeks before that.
 | 
			
		||||
 | 
			
		||||
@@ -264,7 +264,7 @@ following before you start compiling:
 | 
			
		||||
The USER_CCDISABLEWARNINGS is there because otherwise, DEC C will complain
 | 
			
		||||
that those macros have been changed.
 | 
			
		||||
 | 
			
		||||
Note: Currently, this is only useful for library compilation.  The
 | 
			
		||||
Note: Currently, this is only usefull for library compilation.  The
 | 
			
		||||
      programs will still be linked with the current version of the
 | 
			
		||||
      C library shareable image, and will thus complain if they are
 | 
			
		||||
      faced with an older version of the same C library shareable image.
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										171
									
								
								INSTALL.W32
									
									
									
									
									
								
							
							
						
						
									
										171
									
								
								INSTALL.W32
									
									
									
									
									
								
							@@ -2,28 +2,19 @@
 | 
			
		||||
 INSTALLATION ON THE WIN32 PLATFORM
 | 
			
		||||
 ----------------------------------
 | 
			
		||||
 | 
			
		||||
 [Instructions for building for Windows CE can be found in INSTALL.WCE]
 | 
			
		||||
 | 
			
		||||
 Heres a few comments about building OpenSSL in Windows environments.  Most
 | 
			
		||||
 of this is tested on Win32 but it may also work in Win 3.1 with some
 | 
			
		||||
 modification.
 | 
			
		||||
 | 
			
		||||
 You need Perl for Win32.  Unless you will build on Cygwin, you will need
 | 
			
		||||
 ActiveState Perl, available from http://www.activestate.com/ActivePerl.
 | 
			
		||||
 For Cygwin users, there's more info in the Cygwin section.
 | 
			
		||||
 | 
			
		||||
 and one of the following C compilers:
 | 
			
		||||
 | 
			
		||||
  * Visual C++
 | 
			
		||||
  * Borland C
 | 
			
		||||
  * GNU C (Cygwin or MinGW)
 | 
			
		||||
 | 
			
		||||
 If you are compiling from a tarball or a CVS snapshot then the Win32 files
 | 
			
		||||
 may well be not up to date. This may mean that some "tweaking" is required to
 | 
			
		||||
 get it all to work. See the trouble shooting section later on for if (when?)
 | 
			
		||||
 it goes wrong.
 | 
			
		||||
 | 
			
		||||
 Visual C++
 | 
			
		||||
 ----------
 | 
			
		||||
  * GNU C (Mingw32 or Cygwin)
 | 
			
		||||
 | 
			
		||||
 If you want to compile in the assembly language routines with Visual C++ then
 | 
			
		||||
 you will need an assembler. This is worth doing because it will result in
 | 
			
		||||
@@ -33,26 +24,32 @@
 | 
			
		||||
  * Microsoft MASM (aka "ml")
 | 
			
		||||
  * Free Netwide Assembler NASM.
 | 
			
		||||
 | 
			
		||||
 MASM is distributed with most versions of VC++. For the versions where it is
 | 
			
		||||
 not included in VC++, it is also distributed with some Microsoft DDKs, for
 | 
			
		||||
 example the Windows NT 4.0 DDK and the Windows 98 DDK. If you do not have
 | 
			
		||||
 either of these DDKs then you can just download the binaries for the Windows
 | 
			
		||||
 98 DDK and extract and rename the two files XXXXXml.exe and XXXXXml.err, to
 | 
			
		||||
 ml.exe and ml.err and install somewhere on your PATH. Both DDKs can be
 | 
			
		||||
 downloaded from the Microsoft developers site www.msdn.com.
 | 
			
		||||
 MASM was at one point distributed with VC++. It is now distributed with some
 | 
			
		||||
 Microsoft DDKs, for example the Windows NT 4.0 DDK and the Windows 98 DDK. If
 | 
			
		||||
 you do not have either of these DDKs then you can just download the binaries
 | 
			
		||||
 for the Windows 98 DDK and extract and rename the two files XXXXXml.exe and
 | 
			
		||||
 XXXXXml.err, to ml.exe and ml.err and install somewhere on your PATH. Both
 | 
			
		||||
 DDKs can be downloaded from the Microsoft developers site www.msdn.com.
 | 
			
		||||
 | 
			
		||||
 NASM is freely available. Version 0.98 was used during testing: other versions
 | 
			
		||||
 may also work. It is available from many places, see for example:
 | 
			
		||||
 http://www.kernel.org/pub/software/devel/nasm/binaries/win32/
 | 
			
		||||
 The NASM binary nasmw.exe needs to be installed anywhere on your PATH.
 | 
			
		||||
 | 
			
		||||
 Firstly you should run Configure (to build a FIPS-certified variant of
 | 
			
		||||
 OpenSSL, add the option "fips"):
 | 
			
		||||
 If you are compiling from a tarball or a CVS snapshot then the Win32 files
 | 
			
		||||
 may well be not up to date. This may mean that some "tweaking" is required to
 | 
			
		||||
 get it all to work. See the trouble shooting section later on for if (when?)
 | 
			
		||||
 it goes wrong.
 | 
			
		||||
 | 
			
		||||
 Visual C++
 | 
			
		||||
 ----------
 | 
			
		||||
 | 
			
		||||
 Firstly you should run Configure:
 | 
			
		||||
 | 
			
		||||
 > perl Configure VC-WIN32
 | 
			
		||||
 | 
			
		||||
 Next you need to build the Makefiles and optionally the assembly language
 | 
			
		||||
 files (to build a FIPS-certified variant of OpenSSL, add the argument "fips"):
 | 
			
		||||
 files:
 | 
			
		||||
 | 
			
		||||
 - If you are using MASM then run:
 | 
			
		||||
 | 
			
		||||
@@ -85,8 +82,7 @@
 | 
			
		||||
 There are various changes you can make to the Win32 compile environment. By
 | 
			
		||||
 default the library is not compiled with debugging symbols. If you add 'debug'
 | 
			
		||||
 to the mk1mf.pl lines in the do_* batch file then debugging symbols will be
 | 
			
		||||
 compiled in. Note that mk1mf.pl expects the platform to be the last argument
 | 
			
		||||
 on the command line, so 'debug' must appear before that, as all other options.
 | 
			
		||||
 compiled in.
 | 
			
		||||
 | 
			
		||||
 The default Win32 environment is to leave out any Windows NT specific
 | 
			
		||||
 features.
 | 
			
		||||
@@ -101,12 +97,10 @@
 | 
			
		||||
 Borland C++ builder 5
 | 
			
		||||
 ---------------------
 | 
			
		||||
 | 
			
		||||
 * Configure for building with Borland Builder (to build a FIPS-certified
 | 
			
		||||
   variant of OpenSSL, add the option "fips"):
 | 
			
		||||
 * Configure for building with Borland Builder:
 | 
			
		||||
   > perl Configure BC-32
 | 
			
		||||
 | 
			
		||||
 * Create the appropriate makefile (to build a FIPS-certified variant of
 | 
			
		||||
   OpenSSL, add the argument "fips")
 | 
			
		||||
 * Create the appropriate makefile
 | 
			
		||||
   > ms\do_nasm
 | 
			
		||||
 | 
			
		||||
 * Build
 | 
			
		||||
@@ -122,72 +116,18 @@
 | 
			
		||||
 * Run make:
 | 
			
		||||
   > make -f bcb.mak
 | 
			
		||||
 | 
			
		||||
 GNU C (Cygwin)
 | 
			
		||||
 --------------
 | 
			
		||||
 GNU C (Mingw32)
 | 
			
		||||
 ---------------
 | 
			
		||||
 | 
			
		||||
 Cygwin provides a bash shell and GNU tools environment running
 | 
			
		||||
 on NT 4.0, Windows 9x, Windows ME, Windows 2000, and Windows XP.
 | 
			
		||||
 Consequently, a make of OpenSSL with Cygwin is closer to a GNU
 | 
			
		||||
 bash environment such as Linux than to other the other Win32
 | 
			
		||||
 makes.
 | 
			
		||||
 | 
			
		||||
 Cygwin implements a Posix/Unix runtime system (cygwin1.dll).
 | 
			
		||||
 It is also possible to create Win32 binaries that only use the
 | 
			
		||||
 Microsoft C runtime system (msvcrt.dll or crtdll.dll) using
 | 
			
		||||
 MinGW. MinGW can be used in the Cygwin development environment
 | 
			
		||||
 or in a standalone setup as described in the following section.
 | 
			
		||||
 | 
			
		||||
 To build OpenSSL using Cygwin:
 | 
			
		||||
 | 
			
		||||
 * Install Cygwin (see http://cygwin.com/)
 | 
			
		||||
 | 
			
		||||
 * Install Perl and ensure it is in the path. Both Cygwin perl
 | 
			
		||||
   (5.6.1-2 or newer) and ActivePerl work.
 | 
			
		||||
 | 
			
		||||
 * Run the Cygwin bash shell
 | 
			
		||||
 | 
			
		||||
 * $ tar zxvf openssl-x.x.x.tar.gz
 | 
			
		||||
   $ cd openssl-x.x.x
 | 
			
		||||
 | 
			
		||||
   To build the Cygwin version of OpenSSL:
 | 
			
		||||
 | 
			
		||||
   $ ./config
 | 
			
		||||
   [...]
 | 
			
		||||
   $ make
 | 
			
		||||
   [...]
 | 
			
		||||
   $ make test
 | 
			
		||||
   $ make install
 | 
			
		||||
 | 
			
		||||
   This will create a default install in /usr/local/ssl.
 | 
			
		||||
 | 
			
		||||
   To build the MinGW version (native Windows) in Cygwin:
 | 
			
		||||
 | 
			
		||||
   $ ./Configure mingw
 | 
			
		||||
   [...]
 | 
			
		||||
   $ make
 | 
			
		||||
   [...]
 | 
			
		||||
   $ make test
 | 
			
		||||
   $ make install
 | 
			
		||||
 | 
			
		||||
 Cygwin Notes:
 | 
			
		||||
 | 
			
		||||
 "make test" and normal file operations may fail in directories
 | 
			
		||||
 mounted as text (i.e. mount -t c:\somewhere /home) due to Cygwin
 | 
			
		||||
 stripping of carriage returns. To avoid this ensure that a binary
 | 
			
		||||
 mount is used, e.g. mount -b c:\somewhere /home.
 | 
			
		||||
 | 
			
		||||
 "bc" is not provided in older Cygwin distribution.  This causes a
 | 
			
		||||
 non-fatal error in "make test" but is otherwise harmless.  If
 | 
			
		||||
 desired and needed, GNU bc can be built with Cygwin without change.
 | 
			
		||||
 | 
			
		||||
 GNU C (MinGW)
 | 
			
		||||
 -------------
 | 
			
		||||
 To build OpenSSL, you need the Mingw32 package and GNU make.
 | 
			
		||||
 | 
			
		||||
 * Compiler installation:
 | 
			
		||||
 | 
			
		||||
   MinGW is available from http://www.mingw.org. Run the installer and
 | 
			
		||||
   set the MinGW bin directory to the PATH in "System Properties" or
 | 
			
		||||
   autoexec.bat.
 | 
			
		||||
   Mingw32 is available from <ftp://ftp.xraylith.wisc.edu/pub/khan/
 | 
			
		||||
   gnu-win32/mingw32/gcc-2.95.2/gcc-2.95.2-msvcrt.exe>. GNU make is at
 | 
			
		||||
   <ftp://agnes.dida.physik.uni-essen.de/home/janjaap/mingw32/binaries/
 | 
			
		||||
   make-3.76.1.zip>. Install both of them in C:\egcs-1.1.2 and run
 | 
			
		||||
   C:\egcs-1.1.2\mingw32.bat to set the PATH.
 | 
			
		||||
 | 
			
		||||
 * Compile OpenSSL:
 | 
			
		||||
 | 
			
		||||
@@ -197,8 +137,6 @@
 | 
			
		||||
   occur, try
 | 
			
		||||
   > ms\mingw32 no-asm
 | 
			
		||||
   instead.
 | 
			
		||||
   If you want to build a FIPS-certified variant of OpenSSL, add the argument
 | 
			
		||||
   "fips"
 | 
			
		||||
 | 
			
		||||
   libcrypto.a and libssl.a are the static libraries. To use the DLLs,
 | 
			
		||||
   link with libeay32.a and libssl32.a instead.
 | 
			
		||||
@@ -211,6 +149,53 @@
 | 
			
		||||
   > cd out
 | 
			
		||||
   > ..\ms\test
 | 
			
		||||
 | 
			
		||||
 GNU C (Cygwin)
 | 
			
		||||
 --------------
 | 
			
		||||
 | 
			
		||||
 Cygwin provides a bash shell and GNU tools environment running on
 | 
			
		||||
 NT 4.0, Windows 9x and Windows 2000. Consequently, a make of OpenSSL
 | 
			
		||||
 with Cygwin is closer to a GNU bash environment such as Linux rather
 | 
			
		||||
 than other W32 makes that are based on a single makefile approach.
 | 
			
		||||
 Cygwin implements Posix/Unix calls through cygwin1.dll, and is
 | 
			
		||||
 contrasted to Mingw32 which links dynamically to msvcrt.dll or
 | 
			
		||||
 crtdll.dll.
 | 
			
		||||
 | 
			
		||||
 To build OpenSSL using Cygwin:
 | 
			
		||||
 | 
			
		||||
 * Install Cygwin (see http://sourceware.cygnus.com/cygwin)
 | 
			
		||||
 | 
			
		||||
 * Install Perl and ensure it is in the path (recent Cygwin perl 
 | 
			
		||||
   (version 5.6.1-2 of the latter has been reported to work) or
 | 
			
		||||
   ActivePerl)
 | 
			
		||||
 | 
			
		||||
 * Run the Cygwin bash shell
 | 
			
		||||
 | 
			
		||||
 * $ tar zxvf openssl-x.x.x.tar.gz
 | 
			
		||||
   $ cd openssl-x.x.x
 | 
			
		||||
   $ ./config
 | 
			
		||||
   [...]
 | 
			
		||||
   $ make
 | 
			
		||||
   [...]
 | 
			
		||||
   $ make test
 | 
			
		||||
   $ make install
 | 
			
		||||
 | 
			
		||||
 This will create a default install in /usr/local/ssl.
 | 
			
		||||
 | 
			
		||||
 Cygwin Notes:
 | 
			
		||||
 | 
			
		||||
 "make test" and normal file operations may fail in directories
 | 
			
		||||
 mounted as text (i.e. mount -t c:\somewhere /home) due to Cygwin
 | 
			
		||||
 stripping of carriage returns. To avoid this ensure that a binary
 | 
			
		||||
 mount is used, e.g. mount -b c:\somewhere /home.
 | 
			
		||||
 | 
			
		||||
 As of version 1.1.1 Cygwin is relatively unstable in its handling
 | 
			
		||||
 of cr/lf issues. These make procedures succeeded with versions 1.1 and
 | 
			
		||||
 the snapshot 20000524 (Slow!).
 | 
			
		||||
 | 
			
		||||
 "bc" is not provided in the Cygwin distribution.  This causes a
 | 
			
		||||
 non-fatal error in "make test" but is otherwise harmless.  If
 | 
			
		||||
 desired, GNU bc can be built with Cygwin without change.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 Installation
 | 
			
		||||
 ------------
 | 
			
		||||
@@ -230,7 +215,7 @@
 | 
			
		||||
	$ md c:\openssl\lib
 | 
			
		||||
	$ md c:\openssl\include
 | 
			
		||||
	$ md c:\openssl\include\openssl
 | 
			
		||||
	$ copy /b inc32\openssl\*       c:\openssl\include\openssl
 | 
			
		||||
	$ copy /b inc32\*               c:\openssl\include\openssl
 | 
			
		||||
	$ copy /b out32dll\ssleay32.lib c:\openssl\lib
 | 
			
		||||
	$ copy /b out32dll\libeay32.lib c:\openssl\lib
 | 
			
		||||
	$ copy /b out32dll\ssleay32.dll c:\openssl\bin
 | 
			
		||||
@@ -289,5 +274,5 @@
 | 
			
		||||
 malloc(), free() and realloc() as the application.  However there are many
 | 
			
		||||
 standard library functions used by OpenSSL that call malloc() internally
 | 
			
		||||
 (e.g. fopen()), and OpenSSL cannot change these; so in general you cannot
 | 
			
		||||
 rely on CRYPTO_malloc_init() solving your problem, and you should
 | 
			
		||||
 rely on CYRPTO_malloc_init() solving your problem, and you should
 | 
			
		||||
 consistently use the multithreaded library.
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										71
									
								
								INSTALL.WCE
									
									
									
									
									
								
							
							
						
						
									
										71
									
								
								INSTALL.WCE
									
									
									
									
									
								
							@@ -1,71 +0,0 @@
 | 
			
		||||
 
 | 
			
		||||
 INSTALLATION FOR THE WINDOWS CE PLATFORM
 | 
			
		||||
 ----------------------------------------
 | 
			
		||||
 | 
			
		||||
 Building OpenSSL for Windows CE requires the following external tools:
 | 
			
		||||
 | 
			
		||||
  * Microsoft eMbedded Visual C++ 3.0
 | 
			
		||||
  * wcecompat compatibility library (www.essemer.com.au)
 | 
			
		||||
  * Optionally ceutils for running automated tests (www.essemer.com.au)
 | 
			
		||||
 | 
			
		||||
 You also need Perl for Win32.  You will need ActiveState Perl, available
 | 
			
		||||
 from http://www.activestate.com/ActivePerl.
 | 
			
		||||
 | 
			
		||||
 Windows CE support in OpenSSL relies on wcecompat.  All Windows CE specific
 | 
			
		||||
 issues should be directed to www.essemer.com.au.
 | 
			
		||||
 | 
			
		||||
 The C Runtime Library implementation for Windows CE that is included with
 | 
			
		||||
 Microsoft eMbedded Visual C++ 3.0 is incomplete and in some places
 | 
			
		||||
 incorrect.  wcecompat plugs the holes and tries to bring the Windows CE
 | 
			
		||||
 CRT to a level that is more compatible with ANSI C.  wcecompat goes further
 | 
			
		||||
 and provides low-level IO and stream IO support for stdin/stdout/stderr
 | 
			
		||||
 (which Windows CE does not provide).  This IO functionality is not needed
 | 
			
		||||
 by the OpenSSL library itself but is used for the tests and openssl.exe.
 | 
			
		||||
 More information is available at www.essemer.com.au.
 | 
			
		||||
 | 
			
		||||
 Building
 | 
			
		||||
 --------
 | 
			
		||||
 | 
			
		||||
 Setup the eMbedded Visual C++ environment.  There are batch files for doing
 | 
			
		||||
 this installed with eVC++.  For an ARM processor, for example, execute:
 | 
			
		||||
 | 
			
		||||
 > "C:\Program Files\Microsoft eMbedded Tools\EVC\WCE300\BIN\WCEARM.BAT"
 | 
			
		||||
 | 
			
		||||
 Next indicate where wcecompat is located:
 | 
			
		||||
 | 
			
		||||
 > set WCECOMPAT=C:\wcecompat
 | 
			
		||||
 | 
			
		||||
 Next you should run Configure:
 | 
			
		||||
 | 
			
		||||
 > perl Configure VC-CE
 | 
			
		||||
 | 
			
		||||
 Next you need to build the Makefiles:
 | 
			
		||||
 | 
			
		||||
 > ms\do_ms
 | 
			
		||||
 | 
			
		||||
 If you get errors about things not having numbers assigned then check the
 | 
			
		||||
 troubleshooting section in INSTALL.W32: you probably won't be able to compile
 | 
			
		||||
 it as it stands.
 | 
			
		||||
 | 
			
		||||
 Then from the VC++ environment at a prompt do:
 | 
			
		||||
 | 
			
		||||
 - to build static libraries:
 | 
			
		||||
 | 
			
		||||
   > nmake -f ms\ce.mak
 | 
			
		||||
 | 
			
		||||
 - or to build DLLs:
 | 
			
		||||
 | 
			
		||||
   > nmake -f ms\cedll.mak
 | 
			
		||||
 | 
			
		||||
 If all is well it should compile and you will have some static libraries and
 | 
			
		||||
 executables in out32, or some DLLs and executables in out32dll.  If you want
 | 
			
		||||
 to try the tests then make sure the ceutils are in the path and do:
 | 
			
		||||
 
 | 
			
		||||
 > cd out32
 | 
			
		||||
 > ..\ms\testce
 | 
			
		||||
 | 
			
		||||
 This will copy each of the test programs to the Windows CE device and execute
 | 
			
		||||
 them, displaying the output of the tests on this computer.  The output should
 | 
			
		||||
 look similar to the output produced by running the tests for a regular Windows
 | 
			
		||||
 build.
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										2
									
								
								LICENSE
									
									
									
									
									
								
							
							
						
						
									
										2
									
								
								LICENSE
									
									
									
									
									
								
							@@ -12,7 +12,7 @@
 | 
			
		||||
  ---------------
 | 
			
		||||
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1998-2007 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 * Copyright (c) 1998-2002 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 
 | 
			
		||||
@@ -167,7 +167,7 @@ void main(void)
 | 
			
		||||
		
 | 
			
		||||
		tempString[bytesRead] = '\0';
 | 
			
		||||
		
 | 
			
		||||
		printf("%s", tempString);
 | 
			
		||||
		printf(tempString);
 | 
			
		||||
	}
 | 
			
		||||
	
 | 
			
		||||
	printf("\n\n\n");
 | 
			
		||||
@@ -201,7 +201,7 @@ EXITPOINT:
 | 
			
		||||
	{
 | 
			
		||||
		printf("An error occurred:\n");
 | 
			
		||||
		
 | 
			
		||||
		printf("%s",GetErrorMessage());
 | 
			
		||||
		printf(GetErrorMessage());
 | 
			
		||||
	}
 | 
			
		||||
	
 | 
			
		||||
	
 | 
			
		||||
 
 | 
			
		||||
@@ -1287,7 +1287,7 @@ EXITPOINT:
 | 
			
		||||
 | 
			
		||||
//	Send some bytes
 | 
			
		||||
 | 
			
		||||
int MacSocket_send(const int inSocketNum,const void *inBuff,int inBuffLength)
 | 
			
		||||
int MacSocket_send(const int inSocketNum,void *inBuff,int inBuffLength)
 | 
			
		||||
{
 | 
			
		||||
OSErr			errCode = noErr;
 | 
			
		||||
int				bytesSent = 0;
 | 
			
		||||
 
 | 
			
		||||
@@ -62,7 +62,7 @@ int MacSocket_recv(const int inSocketNum,void *outBuff,int outBuffLength,const B
 | 
			
		||||
 | 
			
		||||
//	Call this to send data on a socket
 | 
			
		||||
 | 
			
		||||
int MacSocket_send(const int inSocketNum,const void *inBuff,int inBuffLength);
 | 
			
		||||
int MacSocket_send(const int inSocketNum,void *inBuff,int inBuffLength);
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
//	If zero bytes were read in a call to MacSocket_recv(), it may be that the remote end has done a half-close
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										470
									
								
								Makefile.org
									
									
									
									
									
								
							
							
						
						
									
										470
									
								
								Makefile.org
									
									
									
									
									
								
							@@ -15,11 +15,6 @@ OPTIONS=
 | 
			
		||||
CONFIGURE_ARGS=
 | 
			
		||||
SHLIB_TARGET=
 | 
			
		||||
 | 
			
		||||
# HERE indicates where this Makefile lives.  This can be used to indicate
 | 
			
		||||
# where sub-Makefiles are expected to be.  Currently has very limited usage,
 | 
			
		||||
# and should probably not be bothered with at all.
 | 
			
		||||
HERE=.
 | 
			
		||||
 | 
			
		||||
# INSTALL_PREFIX is for package builders so that they can configure
 | 
			
		||||
# for, say, /usr/ and yet have everything installed to /tmp/somedir/usr/.
 | 
			
		||||
# Normally it is left empty.
 | 
			
		||||
@@ -29,6 +24,7 @@ INSTALLTOP=/usr/local/ssl
 | 
			
		||||
# Do not edit this manually. Use Configure --openssldir=DIR do change this!
 | 
			
		||||
OPENSSLDIR=/usr/local/ssl
 | 
			
		||||
 | 
			
		||||
# RSAref  - Define if we are to link with RSAref.
 | 
			
		||||
# NO_IDEA - Define to build without the IDEA algorithm
 | 
			
		||||
# NO_RC4  - Define to build without the RC4 algorithm
 | 
			
		||||
# NO_RC2  - Define to build without the RC2 algorithm
 | 
			
		||||
@@ -64,22 +60,11 @@ DEPFLAG=
 | 
			
		||||
PEX_LIBS= 
 | 
			
		||||
EX_LIBS= 
 | 
			
		||||
EXE_EXT= 
 | 
			
		||||
ARFLAGS=
 | 
			
		||||
AR=ar $(ARFLAGS) r
 | 
			
		||||
ARD=ar $(ARFLAGS) d
 | 
			
		||||
AR=ar r
 | 
			
		||||
RANLIB= ranlib
 | 
			
		||||
PERL= perl
 | 
			
		||||
TAR= tar
 | 
			
		||||
TARFLAGS= --no-recursion
 | 
			
		||||
MAKEDEPPROG=makedepend
 | 
			
		||||
 | 
			
		||||
# We let the C compiler driver to take care of .s files. This is done in
 | 
			
		||||
# order to be excused from maintaining a separate set of architecture
 | 
			
		||||
# dependent assembler flags. E.g. if you throw -mcpu=ultrasparc at SPARC
 | 
			
		||||
# gcc, then the driver will automatically translate it to -xarch=v8plus
 | 
			
		||||
# and pass it down to assembler.
 | 
			
		||||
AS=$(CC) -c
 | 
			
		||||
ASFLAG=$(CFLAG)
 | 
			
		||||
 | 
			
		||||
# Set BN_ASM to bn_asm.o if you want to use the C version
 | 
			
		||||
BN_ASM= bn_asm.o
 | 
			
		||||
@@ -102,8 +87,6 @@ PROCESSOR=
 | 
			
		||||
 | 
			
		||||
# Set DES_ENC to des_enc.o if you want to use the C version
 | 
			
		||||
#There are 4 x86 assember options.
 | 
			
		||||
FIPS_DES_ENC= des_enc.o fcrypt_b.o
 | 
			
		||||
FIPS_AES_ENC= fips_aes_core.o
 | 
			
		||||
DES_ENC= asm/dx86-out.o asm/yx86-out.o
 | 
			
		||||
#DES_ENC= des_enc.o fcrypt_b.o          # C
 | 
			
		||||
#DES_ENC= asm/dx86-elf.o asm/yx86-elf.o # elf
 | 
			
		||||
@@ -156,7 +139,6 @@ MD5_ASM_OBJ= asm/mx86-out.o
 | 
			
		||||
 | 
			
		||||
# Also need SHA1_ASM defined
 | 
			
		||||
SHA1_ASM_OBJ= asm/sx86-out.o
 | 
			
		||||
FIPS_SHA1_ASM_OBJ= asm/sx86-out.o
 | 
			
		||||
#SHA1_ASM_OBJ= asm/sx86-elf.o       # elf
 | 
			
		||||
#SHA1_ASM_OBJ= asm/sx86-sol.o       # solaris
 | 
			
		||||
#SHA1_ASM_OBJ= asm/sx86-out.o       # a.out, FreeBSD
 | 
			
		||||
@@ -169,57 +151,27 @@ RMD160_ASM_OBJ= asm/rm86-out.o
 | 
			
		||||
#RMD160_ASM_OBJ= asm/rm86-out.o       # a.out, FreeBSD
 | 
			
		||||
#RMD160_ASM_OBJ= asm/rm86bsdi.o       # bsdi
 | 
			
		||||
 | 
			
		||||
# KRB5 stuff
 | 
			
		||||
KRB5_INCLUDES=
 | 
			
		||||
LIBKRB5=
 | 
			
		||||
 | 
			
		||||
# Zlib stuff
 | 
			
		||||
ZLIB_INCLUDE=
 | 
			
		||||
LIBZLIB=
 | 
			
		||||
 | 
			
		||||
# This is the location of fipscanister.o and friends.
 | 
			
		||||
# The FIPS module build will place it $(INSTALLTOP)/lib
 | 
			
		||||
# but since $(INSTALLTOP) can only take the default value
 | 
			
		||||
# when the module is built it will be in /usr/local/ssl/lib
 | 
			
		||||
# $(INSTALLTOP) for this build make be different so hard
 | 
			
		||||
# code the path.
 | 
			
		||||
 | 
			
		||||
FIPSLIBDIR=/usr/local/ssl/lib/
 | 
			
		||||
FIPSCANISTERINTERNAL=n
 | 
			
		||||
FIPSCANLIB=
 | 
			
		||||
 | 
			
		||||
# Shared library base address. Currently only used on Windows.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
BASEADDR=
 | 
			
		||||
 | 
			
		||||
# When we're prepared to use shared libraries in the programs we link here
 | 
			
		||||
# we might set SHLIB_MARK to '$(SHARED_LIBS)'.
 | 
			
		||||
SHLIB_MARK=
 | 
			
		||||
 | 
			
		||||
DIRS=   crypto fips-1.0 ssl $(SHLIB_MARK) apps test tools
 | 
			
		||||
SHLIBDIRS= crypto ssl fips
 | 
			
		||||
DIRS=   crypto ssl rsaref $(SHLIB_MARK) apps test tools
 | 
			
		||||
SHLIBDIRS= crypto ssl
 | 
			
		||||
 | 
			
		||||
# dirs in crypto to build
 | 
			
		||||
SDIRS=  objects \
 | 
			
		||||
SDIRS=  \
 | 
			
		||||
	md2 md4 md5 sha mdc2 hmac ripemd \
 | 
			
		||||
	des rc2 rc4 rc5 idea bf cast \
 | 
			
		||||
	bn ec rsa dsa dh dso engine aes \
 | 
			
		||||
	buffer bio stack lhash rand err \
 | 
			
		||||
	evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp ocsp ui krb5
 | 
			
		||||
	bn rsa dsa dh dso \
 | 
			
		||||
	buffer bio stack lhash rand err objects \
 | 
			
		||||
	evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp
 | 
			
		||||
 | 
			
		||||
FDIRS=	sha rand des aes dsa rsa dh hmac
 | 
			
		||||
 | 
			
		||||
# tests to perform.  "alltests" is a special word indicating that all tests
 | 
			
		||||
# should be performed.
 | 
			
		||||
TESTS = alltests
 | 
			
		||||
 | 
			
		||||
MAKEFILE= Makefile
 | 
			
		||||
MAKEFILE= Makefile.ssl
 | 
			
		||||
MAKE=     make -f Makefile.ssl
 | 
			
		||||
 | 
			
		||||
MANDIR=$(OPENSSLDIR)/man
 | 
			
		||||
MAN1=1
 | 
			
		||||
MAN3=3
 | 
			
		||||
MANSUFFIX=
 | 
			
		||||
SHELL=/bin/sh
 | 
			
		||||
 | 
			
		||||
TOP=    .
 | 
			
		||||
@@ -229,7 +181,6 @@ WDIRS=  windows
 | 
			
		||||
LIBS=   libcrypto.a libssl.a
 | 
			
		||||
SHARED_CRYPTO=libcrypto$(SHLIB_EXT)
 | 
			
		||||
SHARED_SSL=libssl$(SHLIB_EXT)
 | 
			
		||||
SHARED_FIPS=
 | 
			
		||||
SHARED_LIBS=
 | 
			
		||||
SHARED_LIBS_LINK_EXTS=
 | 
			
		||||
SHARED_LDFLAGS=
 | 
			
		||||
@@ -239,49 +190,36 @@ BASENAME=       openssl
 | 
			
		||||
NAME=           $(BASENAME)-$(VERSION)
 | 
			
		||||
TARFILE=        $(NAME).tar
 | 
			
		||||
WTARFILE=       $(NAME)-win.tar
 | 
			
		||||
EXHEADER=       e_os2.h
 | 
			
		||||
EXHEADER=       e_os.h e_os2.h
 | 
			
		||||
HEADER=         e_os.h
 | 
			
		||||
 | 
			
		||||
# When we're prepared to use shared libraries in the programs we link here
 | 
			
		||||
# we might remove 'clean-shared' from the targets to perform at this stage
 | 
			
		||||
 | 
			
		||||
all: Makefile sub_all openssl.pc
 | 
			
		||||
all: clean-shared Makefile.ssl sub_all
 | 
			
		||||
 | 
			
		||||
sub_all:
 | 
			
		||||
	@for i in $(DIRS); \
 | 
			
		||||
	do \
 | 
			
		||||
	if [ -d "$$i" ]; then \
 | 
			
		||||
		(cd $$i && echo "making all in $$i..." && \
 | 
			
		||||
		$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' AS='${AS}' ASFLAG='${ASFLAG}' SDIRS='$(SDIRS)' FDIRS='$(FDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' FIPS_DES_ENC='${FIPS_DES_ENC}' FIPS_AES_ENC='${FIPS_AES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' FIPS_SHA1_ASM_OBJ='${FIPS_SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' FIPSCANISTERINTERNAL='${FIPSCANISTERINTERNAL}' FIPSLIBDIR='${FIPSLIBDIR}' FIPSCANLIB='${FIPSCANLIB}' all ) || exit 1; \
 | 
			
		||||
		$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' EXE_EXT='${EXE_EXT}' all ) || exit 1; \
 | 
			
		||||
	else \
 | 
			
		||||
		$(MAKE) $$i; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	done;
 | 
			
		||||
	done; \
 | 
			
		||||
	if echo "$(DIRS)" | \
 | 
			
		||||
	    egrep '(^| )(crypto|ssl)( |$$)' > /dev/null 2>&1 && \
 | 
			
		||||
	   [ -n "$(SHARED_LIBS)" ]; then \
 | 
			
		||||
		$(MAKE) $(SHARED_LIBS); \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
sub_target:
 | 
			
		||||
	@for i in $(DIRS); \
 | 
			
		||||
	do \
 | 
			
		||||
	if [ -d "$$i" ]; then \
 | 
			
		||||
		(cd $$i && echo "making $(TARGET) in $$i..." && \
 | 
			
		||||
		$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' AS='${AS}' ASFLAG='${ASFLAG}' SDIRS='$(SDIRS)' FDIRS='$(FDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' FIPS_DES_ENC='${FIPS_DES_ENC}' FIPS_AES_ENC='${FIPS_AES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' FIPS_SHA1_ASM_OBJ='${FIPS_SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' TARGET='$(TARGET)' sub_target ) || exit 1; \
 | 
			
		||||
	else \
 | 
			
		||||
		$(MAKE) $$i; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	done;
 | 
			
		||||
 | 
			
		||||
libcrypto$(SHLIB_EXT): libcrypto.a $(SHARED_FIPS)
 | 
			
		||||
libcrypto$(SHLIB_EXT): libcrypto.a
 | 
			
		||||
	@if [ "$(SHLIB_TARGET)" != "" ]; then \
 | 
			
		||||
		if [ "$(FIPSCANLIB)" = "libfips" ]; then \
 | 
			
		||||
			$(ARD) libcrypto.a fipscanister.o ; \
 | 
			
		||||
			$(MAKE) SHLIBDIRS='crypto' SHLIBDEPS='-lfips' build-shared; \
 | 
			
		||||
			$(AR) libcrypto.a fips-1.0/fipscanister.o ; \
 | 
			
		||||
		else \
 | 
			
		||||
			$(MAKE) SHLIBDIRS='crypto' build-shared; \
 | 
			
		||||
		fi \
 | 
			
		||||
		$(MAKE) SHLIBDIRS=crypto build-shared; \
 | 
			
		||||
	else \
 | 
			
		||||
		echo "There's no support for shared libraries on this platform" >&2; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
 | 
			
		||||
	@if [ "$(SHLIB_TARGET)" != "" ]; then \
 | 
			
		||||
		$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \
 | 
			
		||||
@@ -289,13 +227,6 @@ libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
 | 
			
		||||
		echo "There's no support for shared libraries on this platform" >&2; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
libfips$(SHLIB_EXT):
 | 
			
		||||
	@if [ "$(SHLIB_TARGET)" != "" ]; then \
 | 
			
		||||
		$(MAKE) SHLIBDIRS=fips build-shared; \
 | 
			
		||||
	else \
 | 
			
		||||
		echo "There's no support for shared libraries on this platform" >&2; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
clean-shared:
 | 
			
		||||
	@for i in $(SHLIBDIRS); do \
 | 
			
		||||
		if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
 | 
			
		||||
@@ -306,7 +237,7 @@ clean-shared:
 | 
			
		||||
		fi; \
 | 
			
		||||
		( set -x; rm -f lib$$i$(SHLIB_EXT) ); \
 | 
			
		||||
		if [ "$(PLATFORM)" = "Cygwin" ]; then \
 | 
			
		||||
			( set -x; rm -f cyg$$i-$(SHLIB_VERSION_NUMBER)$(SHLIB_EXT) lib$$i$(SHLIB_EXT).a ); \
 | 
			
		||||
			( set -x; rm -f cyg$$i$(SHLIB_EXT) lib$$i$(SHLIB_EXT).a ); \
 | 
			
		||||
		fi; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
@@ -316,8 +247,7 @@ link-shared:
 | 
			
		||||
		for i in $(SHLIBDIRS); do \
 | 
			
		||||
			prev=lib$$i$(SHLIB_EXT); \
 | 
			
		||||
			for j in $${tmp:-x}; do \
 | 
			
		||||
				( set -x; \
 | 
			
		||||
				rm -f lib$$i$$j; ln -s $$prev lib$$i$$j ); \
 | 
			
		||||
				( set -x; ln -f -s $$prev lib$$i$$j ); \
 | 
			
		||||
				prev=lib$$i$$j; \
 | 
			
		||||
			done; \
 | 
			
		||||
		done; \
 | 
			
		||||
@@ -329,54 +259,41 @@ do_bsd-gcc-shared: do_gnu-shared
 | 
			
		||||
do_linux-shared: do_gnu-shared
 | 
			
		||||
do_gnu-shared:
 | 
			
		||||
	libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
	if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
		libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	( set -x; $${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
	( set -x; ${CC} ${SHARED_LDFLAGS} \
 | 
			
		||||
		-shared -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
		-Wl,-soname=lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
		-Wl,-Bsymbolic \
 | 
			
		||||
		-Wl,--whole-archive lib$$i.a \
 | 
			
		||||
		-Wl,--no-whole-archive $$libs ${EX_LIBS} ) || exit 1; \
 | 
			
		||||
	libs="-l$$i $$libs"; \
 | 
			
		||||
		-Wl,--no-whole-archive $$libs ${EX_LIBS} -lc ) || exit 1; \
 | 
			
		||||
	libs="$$libs -l$$i"; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
DETECT_GNU_LD=(${CC} -Wl,-V /dev/null 2>&1 | grep '^GNU ld' )>/dev/null
 | 
			
		||||
DETECT_GNU_LD=${CC} -v 2>&1 | grep '^gcc' >/dev/null 2>&1 && \
 | 
			
		||||
	collect2=`gcc -print-prog-name=collect2 2>&1` && \
 | 
			
		||||
	[ -n "$$collect2" ] && \
 | 
			
		||||
	my_ld=`$$collect2 --help 2>&1 | grep Usage: | sed 's/^Usage: *\([^ ][^ ]*\).*/\1/'` && \
 | 
			
		||||
	[ -n "$$my_ld" ] && \
 | 
			
		||||
	$$my_ld -v 2>&1 | grep 'GNU ld' >/dev/null 2>&1
 | 
			
		||||
 | 
			
		||||
# For Darwin AKA Mac OS/X (dyld)
 | 
			
		||||
do_darwin-shared: 
 | 
			
		||||
	libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
	if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
		libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	( set -x; $${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
		--verbose -dynamiclib -o lib$$i${SHLIB_EXT} \
 | 
			
		||||
	( set -x ; ${CC} --verbose -dynamiclib -o lib$$i${SHLIB_EXT} \
 | 
			
		||||
		lib$$i.a $$libs -all_load -current_version ${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
		-compatibility_version ${SHLIB_MAJOR}.`echo ${SHLIB_MINOR} | cut -d. -f1` \
 | 
			
		||||
		-install_name ${INSTALLTOP}/lib/lib$$i${SHLIB_EXT} ) || exit 1; \
 | 
			
		||||
	libs="-l`basename $$i${SHLIB_EXT} .dylib` $$libs"; \
 | 
			
		||||
	libs="$$libs -l`basename $$i${SHLIB_EXT} .dylib`"; \
 | 
			
		||||
	echo "" ; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
do_cygwin-shared:
 | 
			
		||||
	libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
	if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
		libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	shlib=cyg$${i}-$(SHLIB_VERSION_NUMBER).dll; \
 | 
			
		||||
	[ "$(PLATFORM)" = "mingw" ] && shlib=$${i}eay32.dll; \
 | 
			
		||||
	[ -f apps/$$shlib ] && rm apps/$$shlib; \
 | 
			
		||||
	[ -f test/$$shlib ] && rm test/$$shlib; \
 | 
			
		||||
	base=;  [ $$i = "crypto" ] && base=-Wl,--image-base,0x63000000; \
 | 
			
		||||
	( set -x; $${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
		-shared $$base -o $$shlib \
 | 
			
		||||
	( set -x; ${CC}  -shared -o cyg$$i.dll \
 | 
			
		||||
		-Wl,-Bsymbolic \
 | 
			
		||||
		-Wl,--whole-archive lib$$i.a \
 | 
			
		||||
		-Wl,--out-implib,lib$$i.dll.a \
 | 
			
		||||
		-Wl,--no-whole-archive $$libs ${EX_LIBS} ) || exit 1; \
 | 
			
		||||
	cp -p $$shlib apps/; cp -p $$shlib test/; \
 | 
			
		||||
	touch -c lib$$i.dll.a; \
 | 
			
		||||
	libs="-l$$i $$libs"; \
 | 
			
		||||
		-Wl,--no-whole-archive $$libs ) || exit 1; \
 | 
			
		||||
	libs="$$libs -l$$i"; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
# This assumes that GNU utilities are *not* used
 | 
			
		||||
@@ -385,14 +302,11 @@ do_alpha-osf1-shared:
 | 
			
		||||
		$(MAKE) do_gnu-shared; \
 | 
			
		||||
	else \
 | 
			
		||||
		libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
		if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
			libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		( set -x; $${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
		( set -x; ${CC} ${SHARED_LDFLAGS} \
 | 
			
		||||
			-shared -o lib$$i.so \
 | 
			
		||||
			-set_version "${SHLIB_VERSION_HISTORY}${SHLIB_VERSION_NUMBER}" \
 | 
			
		||||
			-all lib$$i.a -none $$libs ${EX_LIBS} ) || exit 1; \
 | 
			
		||||
		libs="-l$$i $$libs"; \
 | 
			
		||||
			-all lib$$i.a -none $$libs ${EX_LIBS} -lc ) || exit 1; \
 | 
			
		||||
		libs="$$libs -l$$i"; \
 | 
			
		||||
		done; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
@@ -404,14 +318,11 @@ do_tru64-shared:
 | 
			
		||||
		$(MAKE) do_gnu-shared; \
 | 
			
		||||
	else \
 | 
			
		||||
		libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
		if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
			libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		( set -x; $${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
		( set -x; ${CC} ${SHARED_LDFLAGS} \
 | 
			
		||||
			-shared -msym -o lib$$i.so \
 | 
			
		||||
			-set_version "${SHLIB_VERSION_HISTORY}${SHLIB_VERSION_NUMBER}" \
 | 
			
		||||
			-all lib$$i.a -none $$libs ${EX_LIBS} ) || exit 1; \
 | 
			
		||||
		libs="-l$$i $$libs"; \
 | 
			
		||||
			-all lib$$i.a -none $$libs ${EX_LIBS} -lc ) || exit 1; \
 | 
			
		||||
		libs="$$libs -l$$i"; \
 | 
			
		||||
		done; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
@@ -423,15 +334,12 @@ do_tru64-shared-rpath:
 | 
			
		||||
		$(MAKE) do_gnu-shared; \
 | 
			
		||||
	else \
 | 
			
		||||
		libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
		if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
			libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		( set -x; $${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
		( set -x; ${CC} ${SHARED_LDFLAGS} \
 | 
			
		||||
			-shared -msym -o lib$$i.so \
 | 
			
		||||
			-rpath  ${INSTALLTOP}/lib \
 | 
			
		||||
			-set_version "${SHLIB_VERSION_HISTORY}${SHLIB_VERSION_NUMBER}" \
 | 
			
		||||
			-all lib$$i.a -none $$libs ${EX_LIBS} ) || exit 1; \
 | 
			
		||||
		libs="-l$$i $$libs"; \
 | 
			
		||||
			-all lib$$i.a -none $$libs ${EX_LIBS} -lc ) || exit 1; \
 | 
			
		||||
		libs="$$libs -l$$i"; \
 | 
			
		||||
		done; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
@@ -442,19 +350,12 @@ do_solaris-shared:
 | 
			
		||||
		$(MAKE) do_gnu-shared; \
 | 
			
		||||
	else \
 | 
			
		||||
		libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
		if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
			libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		( PATH=/usr/ccs/bin:$$PATH ; export PATH; \
 | 
			
		||||
		  MINUSZ='-z '; \
 | 
			
		||||
		  (${CC} -v 2>&1 | grep gcc) > /dev/null && MINUSZ='-Wl,-z,'; \
 | 
			
		||||
		  set -x; $${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
			-o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
		  set -x; ${CC} ${SHARED_LDFLAGS} \
 | 
			
		||||
			-G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			-h lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			-Wl,-Bsymbolic \
 | 
			
		||||
			$${MINUSZ}allextract lib$$i.a $${MINUSZ}defaultextract \
 | 
			
		||||
			$$libs ${EX_LIBS} ) || exit 1; \
 | 
			
		||||
		libs="-l$$i $$libs"; \
 | 
			
		||||
			-z allextract lib$$i.a $$libs ${EX_LIBS} -lc ) || exit 1; \
 | 
			
		||||
		libs="$$libs -l$$i"; \
 | 
			
		||||
		done; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
@@ -464,20 +365,16 @@ do_svr3-shared:
 | 
			
		||||
		$(MAKE) do_gnu-shared; \
 | 
			
		||||
	else \
 | 
			
		||||
		libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
		if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
			libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		( PATH=/usr/ccs/bin:$$PATH ; export PATH; \
 | 
			
		||||
		  find . -name "*.o" -print > allobjs ; \
 | 
			
		||||
		  OBJS= ; export OBJS ; \
 | 
			
		||||
		  for obj in `ar t lib$$i.a` ; do \
 | 
			
		||||
		    OBJS="$${OBJS} `grep /$$obj allobjs`" ; \
 | 
			
		||||
		    OBJS="$${OBJS} `grep $$obj allobjs`" ; \
 | 
			
		||||
		  done ; \
 | 
			
		||||
		  set -x; $${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
			-G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
		  set -x; ${CC}  -G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			-h lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			$${OBJS} $$libs ${EX_LIBS} ) || exit 1; \
 | 
			
		||||
		libs="-l$$i $$libs"; \
 | 
			
		||||
		libs="$$libs -l$$i"; \
 | 
			
		||||
		done; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
@@ -487,23 +384,17 @@ do_svr5-shared:
 | 
			
		||||
		$(MAKE) do_gnu-shared; \
 | 
			
		||||
	else \
 | 
			
		||||
		libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
		if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
			libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		( PATH=/usr/ccs/bin:$$PATH ; export PATH; \
 | 
			
		||||
		  SHARE_FLAG='-G'; \
 | 
			
		||||
		  (${CC} -v 2>&1 | grep gcc) > /dev/null && SHARE_FLAG='-shared'; \
 | 
			
		||||
		  find . -name "*.o" -print > allobjs ; \
 | 
			
		||||
		  OBJS= ; export OBJS ; \
 | 
			
		||||
		  for obj in `ar t lib$$i.a` ; do \
 | 
			
		||||
		    OBJS="$${OBJS} `grep /$$obj allobjs`" ; \
 | 
			
		||||
		    OBJS="$${OBJS} `grep $$obj allobjs`" ; \
 | 
			
		||||
		  done ; \
 | 
			
		||||
		  set -x; LD_LIBRARY_PATH=.:$$LD_LIBRARY_PATH \
 | 
			
		||||
			$${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
			$${SHARE_FLAG} -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
		  set -x; ${CC} ${SHARED_LDFLAGS} \
 | 
			
		||||
			-G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			-h lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			$${OBJS} $$libs ${EX_LIBS} ) || exit 1; \
 | 
			
		||||
		libs="-l$$i $$libs"; \
 | 
			
		||||
		libs="$$libs -l$$i"; \
 | 
			
		||||
		done; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
@@ -513,38 +404,35 @@ do_irix-shared:
 | 
			
		||||
		$(MAKE) do_gnu-shared; \
 | 
			
		||||
	else \
 | 
			
		||||
		libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
		if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
			libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
		fi; \
 | 
			
		||||
		( WHOLELIB="-all lib$$i.a -none"; \
 | 
			
		||||
		  (${CC} -v 2>&1 | grep gcc) > /dev/null && WHOLELIB="-Wl,-all,lib$$i.a,-none"; \
 | 
			
		||||
		  set -x; $${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
		( set -x; ${CC} ${SHARED_LDFLAGS} \
 | 
			
		||||
			-shared -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			-Wl,-soname,lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
			$${WHOLELIB} $$libs ${EX_LIBS}) || exit 1; \
 | 
			
		||||
		libs="-l$$i $$libs"; \
 | 
			
		||||
			-all lib$$i.a $$libs ${EX_LIBS} -lc) || exit 1; \
 | 
			
		||||
		libs="$$libs -l$$i"; \
 | 
			
		||||
		done; \
 | 
			
		||||
	fi
 | 
			
		||||
 | 
			
		||||
# This assumes that GNU utilities are *not* used
 | 
			
		||||
#
 | 
			
		||||
do_hpux-shared:
 | 
			
		||||
	for i in ${SHLIBDIRS}; do \
 | 
			
		||||
	if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
		libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	if expr $(PLATFORM) : '.*ia64' > /dev/null; then \
 | 
			
		||||
		shlib=lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR}; \
 | 
			
		||||
	else \
 | 
			
		||||
		shlib=lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR}; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	[ -f $$shlib ] && rm -f $$shlib; \
 | 
			
		||||
	ALLSYMSFLAGS='-Wl,-Fl'; \
 | 
			
		||||
	expr $(PLATFORM) : 'hpux64' > /dev/null && ALLSYMSFLAGS='-Wl,+forceload'; \
 | 
			
		||||
	( set -x; $${FIPSLD:-${CC}} ${SHARED_LDFLAGS} \
 | 
			
		||||
		-Wl,-B,symbolic,+vnocompatwarnings,-z,+h,$$shlib \
 | 
			
		||||
		-o $$shlib $$ALLSYMSFLAGS,lib$$i.a -ldld ) || exit 1; \
 | 
			
		||||
	chmod a=rx $$shlib; \
 | 
			
		||||
	libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
	( set -x; /usr/ccs/bin/ld ${SHARED_LDFLAGS} \
 | 
			
		||||
		+vnocompatwarnings \
 | 
			
		||||
		-b -z -o lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
		+h lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
		-Fl lib$$i.a $$libs ${EX_LIBS} -lc ) || exit 1; \
 | 
			
		||||
	chmod a=rx lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} ; \
 | 
			
		||||
	libs="$$libs -L. -l$$i"; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
# This assumes that GNU utilities are *not* used
 | 
			
		||||
do_hpux64-shared:
 | 
			
		||||
	libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
	( set -x; /usr/ccs/bin/ld ${SHARED_LDFLAGS} \
 | 
			
		||||
		-b -z -o lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
		+h lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
			
		||||
		+forceload lib$$i.a $$libs ${EX_LIBS} -lc ) || exit 1; \
 | 
			
		||||
	chmod a=rx lib$$i.sl.${SHLIB_MAJOR}.${SHLIB_MINOR} ; \
 | 
			
		||||
	libs="$$libs -L. -l$$i"; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
# The following method is said to work on all platforms.  Tests will
 | 
			
		||||
@@ -581,71 +469,34 @@ SHAREDFLAGS=${SHARED_LDFLAGS} -G -bE:lib$$i.exp -bM:SRE
 | 
			
		||||
SHAREDCMD=$(CC)
 | 
			
		||||
do_aix-shared:
 | 
			
		||||
	libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
	if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
		libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	( set -x; \
 | 
			
		||||
	  OBJECT_MODE=`expr x${SHARED_LDFLAGS} : 'x\-[a-z]\([0-9]*\)'`; \
 | 
			
		||||
	  OBJECT_MODE=$${OBJECT_MODE:-32}; export OBJECT_MODE; \
 | 
			
		||||
	  ld -r -o lib$$i.o $(ALLSYMSFLAG) lib$$i.a && \
 | 
			
		||||
	  ld -r -o $$i.o $(ALLSYMSFLAG) lib$$i.a && \
 | 
			
		||||
	  ( nm -Pg lib$$i.o | grep ' [BD] ' | cut -f1 -d' ' > lib$$i.exp; \
 | 
			
		||||
	    $${FIPSLD:-${CC}} $(SHAREDFLAGS) \
 | 
			
		||||
		-o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} lib$$i.o \
 | 
			
		||||
	    $(SHAREDCMD) $(SHAREDFLAG) -o lib$$i.so lib$$i.o \
 | 
			
		||||
		$$libs ${EX_LIBS} ) ) \
 | 
			
		||||
	|| exit 1; \
 | 
			
		||||
	libs="-l$$i $$libs"; \
 | 
			
		||||
	libs="$$libs -l$$i"; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
do_reliantunix-shared:
 | 
			
		||||
	libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
			
		||||
	if [ "${SHLIBDIRS}" = "ssl" -a -n "$(LIBKRB5)" ]; then \
 | 
			
		||||
		libs="$(LIBKRB5) $$libs"; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	tmpdir=/tmp/openssl.$$$$ ; rm -rf $$tmpdir ; \
 | 
			
		||||
	( set -x; \
 | 
			
		||||
	  ( Opwd=`pwd` ; mkdir $$tmpdir || exit 1; \
 | 
			
		||||
	    cd $$tmpdir || exit 1 ; ar x $$Opwd/lib$$i.a ; \
 | 
			
		||||
	    $${FIPSLD:-${CC}} -G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} *.o \
 | 
			
		||||
	  ) || exit 1; \
 | 
			
		||||
	  cp $$tmpdir/lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} . ; \
 | 
			
		||||
	) || exit 1; \
 | 
			
		||||
	rm -rf $$tmpdir ; \
 | 
			
		||||
	libs="-l$$i $$libs"; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
openssl.pc: Makefile
 | 
			
		||||
	@ ( echo 'prefix=$(INSTALLTOP)'; \
 | 
			
		||||
	    echo 'exec_prefix=$${prefix}'; \
 | 
			
		||||
	    echo 'libdir=$${exec_prefix}/lib'; \
 | 
			
		||||
	    echo 'includedir=$${prefix}/include'; \
 | 
			
		||||
	    echo ''; \
 | 
			
		||||
	    echo 'Name: OpenSSL'; \
 | 
			
		||||
	    echo 'Description: Secure Sockets Layer and cryptography libraries and tools'; \
 | 
			
		||||
	    echo 'Version: '$(VERSION); \
 | 
			
		||||
	    echo 'Requires: '; \
 | 
			
		||||
	    echo 'Libs: -L$${libdir} -lssl -lcrypto $(LIBKRB5) $(EX_LIBS)'; \
 | 
			
		||||
	    echo 'Cflags: -I$${includedir} $(KRB5_INCLUDES)' ) > openssl.pc
 | 
			
		||||
 | 
			
		||||
Makefile: Makefile.org
 | 
			
		||||
	@echo "Makefile is older than Makefile.org."
 | 
			
		||||
Makefile.ssl: Makefile.org
 | 
			
		||||
	@echo "Makefile.ssl is older than Makefile.org."
 | 
			
		||||
	@echo "Reconfigure the source tree (via './config' or 'perl Configure'), please."
 | 
			
		||||
	@false
 | 
			
		||||
 | 
			
		||||
libclean:
 | 
			
		||||
	rm -f *.map *.so *.so.* engines/*.so *.a */lib */*/lib
 | 
			
		||||
	rm -f *.a */lib */*/lib
 | 
			
		||||
 | 
			
		||||
clean:	libclean
 | 
			
		||||
	rm -f shlib/*.o *.o core a.out fluff rehash.time testlog make.log cctest cctest.c
 | 
			
		||||
clean:
 | 
			
		||||
	rm -f shlib/*.o *.o core a.out fluff *.map rehash.time testlog make.log cctest cctest.c
 | 
			
		||||
	@for i in $(DIRS) ;\
 | 
			
		||||
	do \
 | 
			
		||||
	if [ -d "$$i" ]; then \
 | 
			
		||||
		(cd $$i && echo "making clean in $$i..." && \
 | 
			
		||||
		$(MAKE) EXE_EXT='${EXE_EXT}' SDIRS='${SDIRS}' clean ) || exit 1; \
 | 
			
		||||
		$(MAKE) SDIRS='${SDIRS}' clean ) || exit 1; \
 | 
			
		||||
		rm -f $(LIBS); \
 | 
			
		||||
	fi; \
 | 
			
		||||
	done;
 | 
			
		||||
	rm -f openssl.pc
 | 
			
		||||
	rm -f speed.* .pure
 | 
			
		||||
	rm -f *.a *.o speed.* *.map *.so .pure core
 | 
			
		||||
	rm -f $(TARFILE)
 | 
			
		||||
	@for i in $(ONEDIRS) ;\
 | 
			
		||||
	do \
 | 
			
		||||
@@ -657,7 +508,7 @@ makefile.one: files
 | 
			
		||||
	sh util/do_ms.sh
 | 
			
		||||
 | 
			
		||||
files:
 | 
			
		||||
	$(PERL) $(TOP)/util/files.pl Makefile > $(TOP)/MINFO
 | 
			
		||||
	$(PERL) $(TOP)/util/files.pl Makefile.ssl > $(TOP)/MINFO
 | 
			
		||||
	@for i in $(DIRS) ;\
 | 
			
		||||
	do \
 | 
			
		||||
	if [ -d "$$i" ]; then \
 | 
			
		||||
@@ -667,19 +518,16 @@ files:
 | 
			
		||||
	done;
 | 
			
		||||
 | 
			
		||||
links:
 | 
			
		||||
	@$(TOP)/util/point.sh Makefile.ssl Makefile
 | 
			
		||||
	@$(PERL) $(TOP)/util/mkdir-p.pl include/openssl
 | 
			
		||||
	@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
 | 
			
		||||
	@for i in $(DIRS); do \
 | 
			
		||||
	if [ -d "$$i" ]; then \
 | 
			
		||||
		(cd $$i && echo "making links in $$i..." && \
 | 
			
		||||
		$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' FIPS_DES_ENC='${FIPS_DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' FIPS_SHA1_ASM_OBJ='${FIPS_SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PERL='${PERL}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' links ) || exit 1; \
 | 
			
		||||
		$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PERL='${PERL}' links ) || exit 1; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	done;
 | 
			
		||||
 | 
			
		||||
gentests:
 | 
			
		||||
	@(cd test && echo "generating dummy tests (if needed)..." && \
 | 
			
		||||
	$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' FIPS_DES_ENC='${FIPS_DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' FIPS_SHA1_ASM_OBJ='${FIPS_SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' TESTS='${TESTS}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on generate );
 | 
			
		||||
 | 
			
		||||
dclean:
 | 
			
		||||
	rm -f *.bak
 | 
			
		||||
	@for i in $(DIRS) ;\
 | 
			
		||||
@@ -692,18 +540,15 @@ dclean:
 | 
			
		||||
 | 
			
		||||
rehash: rehash.time
 | 
			
		||||
rehash.time: certs
 | 
			
		||||
	@(OPENSSL="`pwd`/util/opensslwrap.sh"; \
 | 
			
		||||
	  OPENSSL_DEBUG_MEMORY=on; \
 | 
			
		||||
	  export OPENSSL OPENSSL_DEBUG_MEMORY; \
 | 
			
		||||
	  $(PERL) tools/c_rehash certs)
 | 
			
		||||
	@(OPENSSL="`pwd`/apps/openssl"; export OPENSSL; $(PERL) tools/c_rehash certs)
 | 
			
		||||
	touch rehash.time
 | 
			
		||||
 | 
			
		||||
test:   tests
 | 
			
		||||
 | 
			
		||||
tests: rehash
 | 
			
		||||
	@(cd test && echo "testing..." && \
 | 
			
		||||
	$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' FIPS_DES_ENC='${FIPS_DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' FIPS_SHA1_ASM_OBJ='${FIPS_SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' TESTS='${TESTS}' KRB5_INCLUDES='${KRB5_INCLUDES}' LIBKRB5='${LIBKRB5}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' TESTS='${TESTS}' OPENSSL_DEBUG_MEMORY=on tests );
 | 
			
		||||
	util/shlib_wrap.sh apps/openssl version -a
 | 
			
		||||
	$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' TESTS='${TESTS}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}' OPENSSL_DEBUG_MEMORY=on tests );
 | 
			
		||||
	@apps/openssl version -a
 | 
			
		||||
 | 
			
		||||
report:
 | 
			
		||||
	@$(PERL) util/selftest.pl
 | 
			
		||||
@@ -713,7 +558,7 @@ depend:
 | 
			
		||||
	do \
 | 
			
		||||
	if [ -d "$$i" ]; then \
 | 
			
		||||
		(cd $$i && echo "making dependencies $$i..." && \
 | 
			
		||||
		$(MAKE) SDIRS='${SDIRS}' CFLAG='${CFLAG}' DEPFLAG='${DEPFLAG}' MAKEDEPPROG='${MAKEDEPPROG}' KRB5_INCLUDES='${KRB5_INCLUDES}' PERL='${PERL}' depend ) || exit 1; \
 | 
			
		||||
		$(MAKE) SDIRS='${SDIRS}' DEPFLAG='${DEPFLAG}' PERL='${PERL}' depend ) || exit 1; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	done;
 | 
			
		||||
 | 
			
		||||
@@ -727,12 +572,16 @@ lint:
 | 
			
		||||
	done;
 | 
			
		||||
 | 
			
		||||
tags:
 | 
			
		||||
	rm -f TAGS
 | 
			
		||||
	find . -name '[^.]*.[ch]' | xargs etags -a
 | 
			
		||||
	@for i in $(DIRS) ;\
 | 
			
		||||
	do \
 | 
			
		||||
	if [ -d "$$i" ]; then \
 | 
			
		||||
		(cd $$i && echo "making tags $$i..." && \
 | 
			
		||||
		$(MAKE) SDIRS='${SDIRS}' tags ) || exit 1; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	done;
 | 
			
		||||
 | 
			
		||||
errors:
 | 
			
		||||
	$(PERL) util/mkerr.pl -recurse -write
 | 
			
		||||
	(cd crypto/engine; $(MAKE) PERL=$(PERL) errors)
 | 
			
		||||
 | 
			
		||||
stacks:
 | 
			
		||||
	$(PERL) util/mkstack.pl -write
 | 
			
		||||
@@ -743,23 +592,16 @@ util/libeay.num::
 | 
			
		||||
util/ssleay.num::
 | 
			
		||||
	$(PERL) util/mkdef.pl ssl update
 | 
			
		||||
 | 
			
		||||
crypto/objects/obj_dat.h: crypto/objects/obj_dat.pl crypto/objects/obj_mac.h
 | 
			
		||||
crypto/objects/obj_dat.h: crypto/objects/obj_mac.h crypto/objects/obj_dat.pl
 | 
			
		||||
	$(PERL) crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
 | 
			
		||||
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num
 | 
			
		||||
crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt 
 | 
			
		||||
	$(PERL) crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
 | 
			
		||||
 | 
			
		||||
apps/openssl-vms.cnf: apps/openssl.cnf
 | 
			
		||||
	$(PERL) VMS/VMSify-conf.pl < apps/openssl.cnf > apps/openssl-vms.cnf
 | 
			
		||||
 | 
			
		||||
crypto/bn/bn_prime.h: crypto/bn/bn_prime.pl
 | 
			
		||||
	$(PERL) crypto/bn/bn_prime.pl >crypto/bn/bn_prime.h
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
TABLE: Configure
 | 
			
		||||
	(echo 'Output of `Configure TABLE'"':"; \
 | 
			
		||||
	$(PERL) Configure TABLE) > TABLE
 | 
			
		||||
 | 
			
		||||
update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h apps/openssl-vms.cnf crypto/bn/bn_prime.h TABLE depend
 | 
			
		||||
update: depend errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h TABLE
 | 
			
		||||
 | 
			
		||||
# Build distribution tar-file. As the list of files returned by "find" is
 | 
			
		||||
# pretty long, on several platforms a "too many arguments" error or similar
 | 
			
		||||
@@ -767,9 +609,6 @@ update: errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h a
 | 
			
		||||
# and read directly, requiring GNU-Tar. Call "make TAR=gtar dist" if the normal
 | 
			
		||||
# tar does not support the --files-from option.
 | 
			
		||||
tar:
 | 
			
		||||
	find . -type d -print | xargs chmod 755
 | 
			
		||||
	find . -type f -print | xargs chmod a+r
 | 
			
		||||
	find . -type f -perm -0100 -print | xargs chmod a+x
 | 
			
		||||
	find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE | sort > ../$(TARFILE).list; \
 | 
			
		||||
	$(TAR) $(TARFLAGS) --files-from ../$(TARFILE).list -cvf - | \
 | 
			
		||||
	tardy --user_number=0  --user_name=openssl \
 | 
			
		||||
@@ -779,14 +618,6 @@ tar:
 | 
			
		||||
	rm -f ../$(TARFILE).list; \
 | 
			
		||||
	ls -l ../$(TARFILE).gz
 | 
			
		||||
 | 
			
		||||
tar-snap:
 | 
			
		||||
	@$(TAR) $(TARFLAGS) -cvf - \
 | 
			
		||||
		`find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE \! -name '*.o' \! -name '*.a' \! -name '*.so' \! -name '*.so.*'  \! -name 'openssl' \! -name '*test' \! -name '.#*' \! -name '*~' | sort` |\
 | 
			
		||||
	tardy --user_number=0  --user_name=openssl \
 | 
			
		||||
	      --group_number=0 --group_name=openssl \
 | 
			
		||||
	      --prefix=openssl-$(VERSION) - > ../$(TARFILE);\
 | 
			
		||||
	ls -l ../$(TARFILE)
 | 
			
		||||
 | 
			
		||||
dist:   
 | 
			
		||||
	$(PERL) Configure dist
 | 
			
		||||
	@$(MAKE) dist_pem_h
 | 
			
		||||
@@ -796,17 +627,15 @@ dist:
 | 
			
		||||
dist_pem_h:
 | 
			
		||||
	(cd crypto/pem; $(MAKE) CC='${CC}' SDIRS='${SDIRS}' CFLAG='${CFLAG}' pem.h; $(MAKE) clean)
 | 
			
		||||
 | 
			
		||||
install: all install_docs install_sw
 | 
			
		||||
 | 
			
		||||
install_sw:
 | 
			
		||||
install: all install_docs
 | 
			
		||||
	@$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \
 | 
			
		||||
		$(INSTALL_PREFIX)$(INSTALLTOP)/lib \
 | 
			
		||||
		$(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig \
 | 
			
		||||
		$(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl \
 | 
			
		||||
		$(INSTALL_PREFIX)$(OPENSSLDIR)/misc \
 | 
			
		||||
		$(INSTALL_PREFIX)$(OPENSSLDIR)/certs \
 | 
			
		||||
		$(INSTALL_PREFIX)$(OPENSSLDIR)/private
 | 
			
		||||
	@headerlist="$(EXHEADER)"; for i in $$headerlist ;\
 | 
			
		||||
		$(INSTALL_PREFIX)$(OPENSSLDIR)/private \
 | 
			
		||||
		$(INSTALL_PREFIX)$(OPENSSLDIR)/lib
 | 
			
		||||
	@for i in $(EXHEADER) ;\
 | 
			
		||||
	do \
 | 
			
		||||
	(cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \
 | 
			
		||||
	chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
 | 
			
		||||
@@ -822,16 +651,11 @@ install_sw:
 | 
			
		||||
	do \
 | 
			
		||||
		if [ -f "$$i" ]; then \
 | 
			
		||||
		(       echo installing $$i; \
 | 
			
		||||
			cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
 | 
			
		||||
			if egrep 'define OPENSSL_FIPS' $(TOP)/include/openssl/opensslconf.h > /dev/null; then \
 | 
			
		||||
				: ; \
 | 
			
		||||
			else \
 | 
			
		||||
				$(RANLIB) $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
 | 
			
		||||
			cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
 | 
			
		||||
			$(RANLIB) $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
 | 
			
		||||
			chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i ); \
 | 
			
		||||
		fi; \
 | 
			
		||||
			chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
 | 
			
		||||
			mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i ); \
 | 
			
		||||
		fi; \
 | 
			
		||||
	done;
 | 
			
		||||
	done
 | 
			
		||||
	@if [ -n "$(SHARED_LIBS)" ]; then \
 | 
			
		||||
		tmp="$(SHARED_LIBS)"; \
 | 
			
		||||
		for i in $${tmp:-x}; \
 | 
			
		||||
@@ -839,33 +663,21 @@ install_sw:
 | 
			
		||||
			if [ -f "$$i" -o -f "$$i.a" ]; then \
 | 
			
		||||
			(       echo installing $$i; \
 | 
			
		||||
				if [ "$(PLATFORM)" != "Cygwin" ]; then \
 | 
			
		||||
					cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
 | 
			
		||||
					chmod 555 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new; \
 | 
			
		||||
					mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
 | 
			
		||||
					cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
 | 
			
		||||
					chmod 555 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
 | 
			
		||||
				else \
 | 
			
		||||
					c=`echo $$i | sed 's/^lib\(.*\)\.dll/cyg\1-$(SHLIB_VERSION_NUMBER).dll/'`; \
 | 
			
		||||
					cp $$c $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
 | 
			
		||||
					chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new; \
 | 
			
		||||
					mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c.new $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c; \
 | 
			
		||||
					cp $$i.a $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a.new; \
 | 
			
		||||
					chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a.new; \
 | 
			
		||||
					mv -f $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a.new $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a; \
 | 
			
		||||
					c=`echo $$i | sed 's/^lib/cyg/'`; \
 | 
			
		||||
					cp $$c $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c; \
 | 
			
		||||
					chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$c; \
 | 
			
		||||
					cp $$i.a $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a; \
 | 
			
		||||
					chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i.a; \
 | 
			
		||||
				fi ); \
 | 
			
		||||
			fi; \
 | 
			
		||||
		done; \
 | 
			
		||||
		(	here="`pwd`"; \
 | 
			
		||||
			cd $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
 | 
			
		||||
			set $(MAKE); \
 | 
			
		||||
			$$1 -f $$here/Makefile link-shared ); \
 | 
			
		||||
		if [ "$(INSTALLTOP)" != "/usr" ]; then \
 | 
			
		||||
			echo 'OpenSSL shared libraries have been installed in:'; \
 | 
			
		||||
			echo '  $(INSTALLTOP)'; \
 | 
			
		||||
			echo ''; \
 | 
			
		||||
			sed -e '1,/^$$/d' doc/openssl-shared.txt; \
 | 
			
		||||
		fi; \
 | 
			
		||||
			make -f $$here/Makefile link-shared ); \
 | 
			
		||||
	fi
 | 
			
		||||
	cp openssl.pc $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig
 | 
			
		||||
	chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/pkgconfig/openssl.pc
 | 
			
		||||
 | 
			
		||||
install_docs:
 | 
			
		||||
	@$(PERL) $(TOP)/util/mkdir-p.pl \
 | 
			
		||||
@@ -873,45 +685,25 @@ install_docs:
 | 
			
		||||
		$(INSTALL_PREFIX)$(MANDIR)/man3 \
 | 
			
		||||
		$(INSTALL_PREFIX)$(MANDIR)/man5 \
 | 
			
		||||
		$(INSTALL_PREFIX)$(MANDIR)/man7
 | 
			
		||||
	@pod2man="`cd util; ./pod2mantest $(PERL)`"; \
 | 
			
		||||
	here="`pwd`"; \
 | 
			
		||||
	filecase=; \
 | 
			
		||||
	if [ "$(PLATFORM)" = "DJGPP" -o "$(PLATFORM)" = "Cygwin" -o "$(PLATFORM)" = "mingw" ]; then \
 | 
			
		||||
		filecase=-i; \
 | 
			
		||||
	fi; \
 | 
			
		||||
	for i in doc/apps/*.pod; do \
 | 
			
		||||
	@for i in doc/apps/*.pod; do \
 | 
			
		||||
		fn=`basename $$i .pod`; \
 | 
			
		||||
		if [ "$$fn" = "config" ]; then sec=5; else sec=1; fi; \
 | 
			
		||||
		echo "installing man$$sec/$$fn.$${sec}$(MANSUFFIX)"; \
 | 
			
		||||
		echo "installing man$$sec/`basename $$i .pod`.$$sec"; \
 | 
			
		||||
		(cd `$(PERL) util/dirname.pl $$i`; \
 | 
			
		||||
		sh -c "$$pod2man \
 | 
			
		||||
		sh -c "$(PERL) `cd ../../util; ./pod2mantest ignore` \
 | 
			
		||||
			--section=$$sec --center=OpenSSL \
 | 
			
		||||
			--release=$(VERSION) `basename $$i`") \
 | 
			
		||||
			>  $(INSTALL_PREFIX)$(MANDIR)/man$$sec/$$fn.$${sec}$(MANSUFFIX); \
 | 
			
		||||
		$(PERL) util/extract-names.pl < $$i | \
 | 
			
		||||
			(grep -v $$filecase "^$$fn\$$"; true) | \
 | 
			
		||||
			(grep -v "[	]"; true) | \
 | 
			
		||||
			(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
 | 
			
		||||
			 while read n; do \
 | 
			
		||||
				$$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
 | 
			
		||||
			 done); \
 | 
			
		||||
	done; \
 | 
			
		||||
	for i in doc/crypto/*.pod doc/ssl/*.pod; do \
 | 
			
		||||
			>  $(INSTALL_PREFIX)$(MANDIR)/man$$sec/`basename $$i .pod`.$$sec; \
 | 
			
		||||
	done
 | 
			
		||||
	@for i in doc/crypto/*.pod doc/ssl/*.pod; do \
 | 
			
		||||
		fn=`basename $$i .pod`; \
 | 
			
		||||
		if [ "$$fn" = "des_modes" ]; then sec=7; else sec=3; fi; \
 | 
			
		||||
		echo "installing man$$sec/$$fn.$${sec}$(MANSUFFIX)"; \
 | 
			
		||||
		echo "installing man$$sec/`basename $$i .pod`.$$sec"; \
 | 
			
		||||
		(cd `$(PERL) util/dirname.pl $$i`; \
 | 
			
		||||
		sh -c "$$pod2man \
 | 
			
		||||
		sh -c "$(PERL) `cd ../../util; ./pod2mantest ignore` \
 | 
			
		||||
			--section=$$sec --center=OpenSSL \
 | 
			
		||||
			--release=$(VERSION) `basename $$i`") \
 | 
			
		||||
			>  $(INSTALL_PREFIX)$(MANDIR)/man$$sec/$$fn.$${sec}$(MANSUFFIX); \
 | 
			
		||||
		$(PERL) util/extract-names.pl < $$i | \
 | 
			
		||||
			(grep -v $$filecase "^$$fn\$$"; true) | \
 | 
			
		||||
			(grep -v "[	]"; true) | \
 | 
			
		||||
			(cd $(INSTALL_PREFIX)$(MANDIR)/man$$sec/; \
 | 
			
		||||
			 while read n; do \
 | 
			
		||||
				$$here/util/point.sh $$fn.$${sec}$(MANSUFFIX) "$$n".$${sec}$(MANSUFFIX); \
 | 
			
		||||
			 done); \
 | 
			
		||||
			>  $(INSTALL_PREFIX)$(MANDIR)/man$$sec/`basename $$i .pod`.$$sec; \
 | 
			
		||||
	done
 | 
			
		||||
 | 
			
		||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										172
									
								
								NEWS
									
									
									
									
									
								
							
							
						
						
									
										172
									
								
								NEWS
									
									
									
									
									
								
							@@ -5,178 +5,6 @@
 | 
			
		||||
  This file gives a brief overview of the major changes between each OpenSSL
 | 
			
		||||
  release. For more details please read the CHANGES file.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7k and OpenSSL 0.9.7l:
 | 
			
		||||
 | 
			
		||||
      o Introduce limits to prevent malicious key DoS  (CVE-2006-2940)
 | 
			
		||||
      o Fix security issues (CVE-2006-2937, CVE-2006-3737, CVE-2006-4343)
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7j and OpenSSL 0.9.7k:
 | 
			
		||||
 | 
			
		||||
      o Fix Daniel Bleichenbacher forged signature attack, CVE-2006-4339
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7i and OpenSSL 0.9.7j:
 | 
			
		||||
 | 
			
		||||
      o Visual C++ 2005 fixes.
 | 
			
		||||
      o Update Windows build system for FIPS.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7h and OpenSSL 0.9.7i:
 | 
			
		||||
 | 
			
		||||
      o Give EVP_MAX_MD_SIZE it's old value, except for a FIPS build.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7g and OpenSSL 0.9.7h:
 | 
			
		||||
 | 
			
		||||
      o Fix SSL 2.0 Rollback, CVE-2005-2969
 | 
			
		||||
      o Allow use of fixed-length exponent on DSA signing
 | 
			
		||||
      o Default fixed-window RSA, DSA, DH private-key operations
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7f and OpenSSL 0.9.7g:
 | 
			
		||||
 | 
			
		||||
      o More compilation issues fixed.
 | 
			
		||||
      o Adaptation to more modern Kerberos API.
 | 
			
		||||
      o Enhanced or corrected configuration for Solaris64, Mingw and Cygwin.
 | 
			
		||||
      o Enhanced x86_64 assembler BIGNUM module.
 | 
			
		||||
      o More constification.
 | 
			
		||||
      o Added processing of proxy certificates (RFC 3820).
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7e and OpenSSL 0.9.7f:
 | 
			
		||||
 | 
			
		||||
      o Several compilation issues fixed.
 | 
			
		||||
      o Many memory allocation failure checks added.
 | 
			
		||||
      o Improved comparison of X509 Name type.
 | 
			
		||||
      o Mandatory basic checks on certificates.
 | 
			
		||||
      o Performance improvements.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7d and OpenSSL 0.9.7e:
 | 
			
		||||
 | 
			
		||||
      o Fix race condition in CRL checking code.
 | 
			
		||||
      o Fixes to PKCS#7 (S/MIME) code.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7c and OpenSSL 0.9.7d:
 | 
			
		||||
 | 
			
		||||
      o Security: Fix Kerberos ciphersuite SSL/TLS handshaking bug
 | 
			
		||||
      o Security: Fix null-pointer assignment in do_change_cipher_spec()
 | 
			
		||||
      o Allow multiple active certificates with same subject in CA index
 | 
			
		||||
      o Multiple X509 verification fixes
 | 
			
		||||
      o Speed up HMAC and other operations
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7b and OpenSSL 0.9.7c:
 | 
			
		||||
 | 
			
		||||
      o Security: fix various ASN1 parsing bugs.
 | 
			
		||||
      o New -ignore_err option to OCSP utility.
 | 
			
		||||
      o Various interop and bug fixes in S/MIME code.
 | 
			
		||||
      o SSL/TLS protocol fix for unrequested client certificates.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7a and OpenSSL 0.9.7b:
 | 
			
		||||
 | 
			
		||||
      o Security: counter the Klima-Pokorny-Rosa extension of
 | 
			
		||||
        Bleichbacher's attack 
 | 
			
		||||
      o Security: make RSA blinding default.
 | 
			
		||||
      o Configuration: Irix fixes, AIX fixes, better mingw support.
 | 
			
		||||
      o Support for new platforms: linux-ia64-ecc.
 | 
			
		||||
      o Build: shared library support fixes.
 | 
			
		||||
      o ASN.1: treat domainComponent correctly.
 | 
			
		||||
      o Documentation: fixes and additions.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.7 and OpenSSL 0.9.7a:
 | 
			
		||||
 | 
			
		||||
      o Security: Important security related bugfixes.
 | 
			
		||||
      o Enhanced compatibility with MIT Kerberos.
 | 
			
		||||
      o Can be built without the ENGINE framework.
 | 
			
		||||
      o IA32 assembler enhancements.
 | 
			
		||||
      o Support for new platforms: FreeBSD/IA64 and FreeBSD/Sparc64.
 | 
			
		||||
      o Configuration: the no-err option now works properly.
 | 
			
		||||
      o SSL/TLS: now handles manual certificate chain building.
 | 
			
		||||
      o SSL/TLS: certain session ID malfunctions corrected.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6 and OpenSSL 0.9.7:
 | 
			
		||||
 | 
			
		||||
      o New library section OCSP.
 | 
			
		||||
      o Complete rewrite of ASN1 code.
 | 
			
		||||
      o CRL checking in verify code and openssl utility.
 | 
			
		||||
      o Extension copying in 'ca' utility.
 | 
			
		||||
      o Flexible display options in 'ca' utility.
 | 
			
		||||
      o Provisional support for international characters with UTF8.
 | 
			
		||||
      o Support for external crypto devices ('engine') is no longer
 | 
			
		||||
        a separate distribution.
 | 
			
		||||
      o New elliptic curve library section.
 | 
			
		||||
      o New AES (Rijndael) library section.
 | 
			
		||||
      o Support for new platforms: Windows CE, Tandem OSS, A/UX, AIX 64-bit,
 | 
			
		||||
        Linux x86_64, Linux 64-bit on Sparc v9
 | 
			
		||||
      o Extended support for some platforms: VxWorks
 | 
			
		||||
      o Enhanced support for shared libraries.
 | 
			
		||||
      o Now only builds PIC code when shared library support is requested.
 | 
			
		||||
      o Support for pkg-config.
 | 
			
		||||
      o Lots of new manuals.
 | 
			
		||||
      o Makes symbolic links to or copies of manuals to cover all described
 | 
			
		||||
        functions.
 | 
			
		||||
      o Change DES API to clean up the namespace (some applications link also
 | 
			
		||||
        against libdes providing similar functions having the same name).
 | 
			
		||||
        Provide macros for backward compatibility (will be removed in the
 | 
			
		||||
        future).
 | 
			
		||||
      o Unify handling of cryptographic algorithms (software and engine)
 | 
			
		||||
        to be available via EVP routines for asymmetric and symmetric ciphers.
 | 
			
		||||
      o NCONF: new configuration handling routines.
 | 
			
		||||
      o Change API to use more 'const' modifiers to improve error checking
 | 
			
		||||
        and help optimizers.
 | 
			
		||||
      o Finally remove references to RSAref.
 | 
			
		||||
      o Reworked parts of the BIGNUM code.
 | 
			
		||||
      o Support for new engines: Broadcom ubsec, Accelerated Encryption
 | 
			
		||||
        Processing, IBM 4758.
 | 
			
		||||
      o A few new engines added in the demos area.
 | 
			
		||||
      o Extended and corrected OID (object identifier) table.
 | 
			
		||||
      o PRNG: query at more locations for a random device, automatic query for
 | 
			
		||||
        EGD style random sources at several locations.
 | 
			
		||||
      o SSL/TLS: allow optional cipher choice according to server's preference.
 | 
			
		||||
      o SSL/TLS: allow server to explicitly set new session ids.
 | 
			
		||||
      o SSL/TLS: support Kerberos cipher suites (RFC2712).
 | 
			
		||||
	Only supports MIT Kerberos for now.
 | 
			
		||||
      o SSL/TLS: allow more precise control of renegotiations and sessions.
 | 
			
		||||
      o SSL/TLS: add callback to retrieve SSL/TLS messages.
 | 
			
		||||
      o SSL/TLS: support AES cipher suites (RFC3268).
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6j and OpenSSL 0.9.6k:
 | 
			
		||||
 | 
			
		||||
      o Security: fix various ASN1 parsing bugs.
 | 
			
		||||
      o SSL/TLS protocol fix for unrequested client certificates.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6i and OpenSSL 0.9.6j:
 | 
			
		||||
 | 
			
		||||
      o Security: counter the Klima-Pokorny-Rosa extension of
 | 
			
		||||
        Bleichbacher's attack 
 | 
			
		||||
      o Security: make RSA blinding default.
 | 
			
		||||
      o Build: shared library support fixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6h and OpenSSL 0.9.6i:
 | 
			
		||||
 | 
			
		||||
      o Important security related bugfixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6g and OpenSSL 0.9.6h:
 | 
			
		||||
 | 
			
		||||
      o New configuration targets for Tandem OSS and A/UX.
 | 
			
		||||
      o New OIDs for Microsoft attributes.
 | 
			
		||||
      o Better handling of SSL session caching.
 | 
			
		||||
      o Better comparison of distinguished names.
 | 
			
		||||
      o Better handling of shared libraries in a mixed GNU/non-GNU environment.
 | 
			
		||||
      o Support assembler code with Borland C.
 | 
			
		||||
      o Fixes for length problems.
 | 
			
		||||
      o Fixes for uninitialised variables.
 | 
			
		||||
      o Fixes for memory leaks, some unusual crashes and some race conditions.
 | 
			
		||||
      o Fixes for smaller building problems.
 | 
			
		||||
      o Updates of manuals, FAQ and other instructive documents.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6f and OpenSSL 0.9.6g:
 | 
			
		||||
 | 
			
		||||
      o Important building fixes on Unix.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6e and OpenSSL 0.9.6f:
 | 
			
		||||
 | 
			
		||||
      o Various important bugfixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6d and OpenSSL 0.9.6e:
 | 
			
		||||
 | 
			
		||||
      o Important security related bugfixes.
 | 
			
		||||
      o Various SSL/TLS library bugfixes.
 | 
			
		||||
 | 
			
		||||
  Major changes between OpenSSL 0.9.6c and OpenSSL 0.9.6d:
 | 
			
		||||
 | 
			
		||||
      o Various SSL/TLS library bugfixes.
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										136
									
								
								PROBLEMS
									
									
									
									
									
								
							
							
						
						
									
										136
									
								
								PROBLEMS
									
									
									
									
									
								
							@@ -1,19 +1,13 @@
 | 
			
		||||
* System libcrypto.dylib and libssl.dylib are used by system ld on MacOS X.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
    NOTE: The problem described here only applies when OpenSSL isn't built
 | 
			
		||||
    with shared library support (i.e. without the "shared" configuration
 | 
			
		||||
    option).  If you build with shared library support, you will have no
 | 
			
		||||
    problems as long as you set up DYLD_LIBRARY_PATH properly at all times.
 | 
			
		||||
 | 
			
		||||
[NOTE: This is currently undergoing tests, and may be removed soon]
 | 
			
		||||
 | 
			
		||||
This is really a misfeature in ld, which seems to look for .dylib libraries
 | 
			
		||||
along the whole library path before it bothers looking for .a libraries.  This
 | 
			
		||||
means that -L switches won't matter unless OpenSSL is built with shared
 | 
			
		||||
library support.
 | 
			
		||||
 | 
			
		||||
The workaround may be to change the following lines in apps/Makefile and
 | 
			
		||||
test/Makefile:
 | 
			
		||||
The workaround may be to change the following lines in apps/Makefile.ssl and
 | 
			
		||||
test/Makefile.ssl:
 | 
			
		||||
 | 
			
		||||
  LIBCRYPTO=-L.. -lcrypto
 | 
			
		||||
  LIBSSL=-L.. -lssl
 | 
			
		||||
@@ -38,127 +32,3 @@ may differ on your machine.
 | 
			
		||||
As long as Apple doesn't fix the problem with ld, this problem building
 | 
			
		||||
OpenSSL will remain as is.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Parallell make leads to errors
 | 
			
		||||
 | 
			
		||||
While running tests, running a parallell make is a bad idea.  Many test
 | 
			
		||||
scripts use the same name for output and input files, which means different
 | 
			
		||||
will interfere with each other and lead to test failure.
 | 
			
		||||
 | 
			
		||||
The solution is simple for now: don't run parallell make when testing.
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
* Bugs in gcc triggered
 | 
			
		||||
 | 
			
		||||
- According to a problem report, there are bugs in gcc 3.0 that are
 | 
			
		||||
  triggered by some of the code in OpenSSL, more specifically in
 | 
			
		||||
  PEM_get_EVP_CIPHER_INFO().  The triggering code is the following:
 | 
			
		||||
 | 
			
		||||
	header+=11;
 | 
			
		||||
	if (*header != '4') return(0); header++;
 | 
			
		||||
	if (*header != ',') return(0); header++;
 | 
			
		||||
 | 
			
		||||
  What happens is that gcc might optimize a little too agressively, and
 | 
			
		||||
  you end up with an extra incrementation when *header != '4'.
 | 
			
		||||
 | 
			
		||||
  We recommend that you upgrade gcc to as high a 3.x version as you can.
 | 
			
		||||
 | 
			
		||||
- According to multiple problem reports, some of our message digest
 | 
			
		||||
  implementations trigger bug[s] in code optimizer in gcc 3.3 for sparc64
 | 
			
		||||
  and gcc 2.96 for ppc. Former fails to complete RIPEMD160 test, while
 | 
			
		||||
  latter - SHA one.
 | 
			
		||||
 | 
			
		||||
  The recomendation is to upgrade your compiler. This naturally applies to
 | 
			
		||||
  other similar cases.
 | 
			
		||||
 | 
			
		||||
* solaris64-sparcv9-cc SHA-1 performance with WorkShop 6 compiler.
 | 
			
		||||
 | 
			
		||||
As subject suggests SHA-1 might perform poorly (4 times slower)
 | 
			
		||||
if compiled with WorkShop 6 compiler and -xarch=v9. The cause for
 | 
			
		||||
this seems to be the fact that compiler emits multiplication to
 | 
			
		||||
perform shift operations:-( To work the problem around configure
 | 
			
		||||
with './Configure solaris64-sparcv9-cc -DMD32_REG_T=int'.
 | 
			
		||||
 | 
			
		||||
* Problems with hp-parisc2-cc target when used with "no-asm" flag
 | 
			
		||||
 | 
			
		||||
When using the hp-parisc2-cc target, wrong bignum code is generated.
 | 
			
		||||
This is due to the SIXTY_FOUR_BIT build being compiled with the +O3
 | 
			
		||||
aggressive optimization.
 | 
			
		||||
The problem manifests itself by the BN_kronecker test hanging in an
 | 
			
		||||
endless loop. Reason: the BN_kronecker test calls BN_generate_prime()
 | 
			
		||||
which itself hangs. The reason could be tracked down to the bn_mul_comba8()
 | 
			
		||||
function in bn_asm.c. At some occasions the higher 32bit value of r[7]
 | 
			
		||||
is off by 1 (meaning: calculated=shouldbe+1). Further analysis failed,
 | 
			
		||||
as no debugger support possible at +O3 and additional fprintf()'s
 | 
			
		||||
introduced fixed the bug, therefore it is most likely a bug in the
 | 
			
		||||
optimizer.
 | 
			
		||||
The bug was found in the BN_kronecker test but may also lead to
 | 
			
		||||
failures in other parts of the code.
 | 
			
		||||
(See Ticket #426.)
 | 
			
		||||
 | 
			
		||||
Workaround: modify the target to +O2 when building with no-asm.
 | 
			
		||||
 | 
			
		||||
* Problems building shared libraries on SCO OpenServer Release 5.0.6
 | 
			
		||||
  with gcc 2.95.3
 | 
			
		||||
 | 
			
		||||
The symptoms appear when running the test suite, more specifically
 | 
			
		||||
test/ectest, with the following result:
 | 
			
		||||
 | 
			
		||||
OSSL_LIBPATH="`cd ..; pwd`"; LD_LIBRARY_PATH="$OSSL_LIBPATH:$LD_LIBRARY_PATH"; DYLD_LIBRARY_PATH="$OSSL_LIBPATH:$DYLD_LIBRARY_PATH"; SHLIB_PATH="$OSSL_LIBPATH:$SHLIB_PATH"; LIBPATH="$OSSL_LIBPATH:$LIBPATH"; if [ "debug-sco5-gcc" = "Cygwin" ]; then PATH="${LIBPATH}:$PATH"; fi; export LD_LIBRARY_PATH DYLD_LIBRARY_PATH SHLIB_PATH LIBPATH PATH; ./ectest
 | 
			
		||||
ectest.c:186: ABORT
 | 
			
		||||
 | 
			
		||||
The cause of the problem seems to be that isxdigit(), called from
 | 
			
		||||
BN_hex2bn(), returns 0 on a perfectly legitimate hex digit.  Further
 | 
			
		||||
investigation shows that any of the isxxx() macros return 0 on any
 | 
			
		||||
input.  A direct look in the information array that the isxxx() use,
 | 
			
		||||
called __ctype, shows that it contains all zeroes...
 | 
			
		||||
 | 
			
		||||
Taking a look at the newly created libcrypto.so with nm, one can see
 | 
			
		||||
that the variable __ctype is defined in libcrypto's .bss (which
 | 
			
		||||
explains why it is filled with zeroes):
 | 
			
		||||
 | 
			
		||||
$ nm -Pg libcrypto.so | grep __ctype
 | 
			
		||||
__ctype B 0011659c
 | 
			
		||||
__ctype2 U         
 | 
			
		||||
 | 
			
		||||
Curiously, __ctype2 is undefined, in spite of being declared in
 | 
			
		||||
/usr/include/ctype.h in exactly the same way as __ctype.
 | 
			
		||||
 | 
			
		||||
Any information helping to solve this issue would be deeply
 | 
			
		||||
appreciated.
 | 
			
		||||
 | 
			
		||||
NOTE: building non-shared doesn't come with this problem.
 | 
			
		||||
 | 
			
		||||
* ULTRIX build fails with shell errors, such as "bad substitution"
 | 
			
		||||
  and "test: argument expected"
 | 
			
		||||
 | 
			
		||||
The problem is caused by ULTRIX /bin/sh supporting only original
 | 
			
		||||
Bourne shell syntax/semantics, and the trouble is that the vast
 | 
			
		||||
majority is so accustomed to more modern syntax, that very few
 | 
			
		||||
people [if any] would recognize the ancient syntax even as valid.
 | 
			
		||||
This inevitably results in non-trivial scripts breaking on ULTRIX,
 | 
			
		||||
and OpenSSL isn't an exclusion. Fortunately there is workaround,
 | 
			
		||||
hire /bin/ksh to do the job /bin/sh fails to do.
 | 
			
		||||
 | 
			
		||||
1. Trick make(1) to use /bin/ksh by setting up following environ-
 | 
			
		||||
   ment variables *prior* you execute ./Configure and make:
 | 
			
		||||
 | 
			
		||||
	PROG_ENV=POSIX
 | 
			
		||||
	MAKESHELL=/bin/ksh
 | 
			
		||||
	export PROG_ENV MAKESHELL
 | 
			
		||||
 | 
			
		||||
   or if your shell is csh-compatible:
 | 
			
		||||
 | 
			
		||||
	setenv PROG_ENV POSIX
 | 
			
		||||
	setenv MAKESHELL /bin/ksh
 | 
			
		||||
 | 
			
		||||
2. Trick /bin/sh to use alternative expression evaluator. Create
 | 
			
		||||
   following 'test' script for example in /tmp:
 | 
			
		||||
 | 
			
		||||
	#!/bin/ksh
 | 
			
		||||
	${0##*/} "$@"
 | 
			
		||||
 | 
			
		||||
   Then 'chmod a+x /tmp/test; ln /tmp/test /tmp/[' and *prepend*
 | 
			
		||||
   your $PATH with chosen location, e.g. PATH=/tmp:$PATH. Alter-
 | 
			
		||||
   natively just replace system /bin/test and /bin/[ with the
 | 
			
		||||
   above script.
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										23
									
								
								README
									
									
									
									
									
								
							
							
						
						
									
										23
									
								
								README
									
									
									
									
									
								
							@@ -1,7 +1,7 @@
 | 
			
		||||
 | 
			
		||||
 OpenSSL 0.9.7m-dev xx XXX xxxx
 | 
			
		||||
 OpenSSL 0.9.6e 30 July 2002
 | 
			
		||||
 | 
			
		||||
 Copyright (c) 1998-2007 The OpenSSL Project
 | 
			
		||||
 Copyright (c) 1998-2002 The OpenSSL Project
 | 
			
		||||
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 | 
			
		||||
 All rights reserved.
 | 
			
		||||
 | 
			
		||||
@@ -111,8 +111,6 @@
 | 
			
		||||
 should be contacted if that algorithm is to be used; their web page is
 | 
			
		||||
 http://www.ascom.ch/.
 | 
			
		||||
 | 
			
		||||
 The MDC2 algorithm is patented by IBM.
 | 
			
		||||
 | 
			
		||||
 INSTALLATION
 | 
			
		||||
 ------------
 | 
			
		||||
 | 
			
		||||
@@ -156,7 +154,7 @@
 | 
			
		||||
    - Stack Traceback (if the application dumps core)
 | 
			
		||||
 | 
			
		||||
 Report the bug to the OpenSSL project via the Request Tracker
 | 
			
		||||
 (http://www.openssl.org/support/rt2.html) by mail to:
 | 
			
		||||
 (http://www.openssl.org/rt2.html) by mail to:
 | 
			
		||||
 | 
			
		||||
    openssl-bugs@openssl.org
 | 
			
		||||
 | 
			
		||||
@@ -175,17 +173,11 @@
 | 
			
		||||
 textual explanation of what your patch does.
 | 
			
		||||
 | 
			
		||||
 Note: For legal reasons, contributions from the US can be accepted only
 | 
			
		||||
 if a TSU notification and a copy of the patch are sent to crypt@bis.doc.gov
 | 
			
		||||
 (formerly BXA) with a copy to the ENC Encryption Request Coordinator;
 | 
			
		||||
 please take some time to look at
 | 
			
		||||
    http://www.bis.doc.gov/Encryption/PubAvailEncSourceCodeNofify.html [sic]
 | 
			
		||||
 and
 | 
			
		||||
    http://w3.access.gpo.gov/bis/ear/pdf/740.pdf (EAR Section 740.13(e))
 | 
			
		||||
 for the details. If "your encryption source code is too large to serve as
 | 
			
		||||
 an email attachment", they are glad to receive it by fax instead; hope you
 | 
			
		||||
 have a cheap long-distance plan.
 | 
			
		||||
 if a TSA notification and a copy of the patch is sent to crypt@bis.doc.gov;
 | 
			
		||||
 see http://www.bis.doc.gov/Encryption/PubAvailEncSourceCodeNofify.html [sic]
 | 
			
		||||
 and http://w3.access.gpo.gov/bis/ear/pdf/740.pdf (EAR Section 740.13(e)).
 | 
			
		||||
 | 
			
		||||
 Our preferred format for changes is "diff -u" output. You might
 | 
			
		||||
 The preferred format for changes is "diff -u" output. You might
 | 
			
		||||
 generate it like this:
 | 
			
		||||
 | 
			
		||||
 # cd openssl-work
 | 
			
		||||
@@ -193,4 +185,3 @@
 | 
			
		||||
 # ./Configure dist; make clean
 | 
			
		||||
 # cd ..
 | 
			
		||||
 # diff -ur openssl-orig openssl-work > mydiffs.patch
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										187
									
								
								README.ASN1
									
									
									
									
									
								
							
							
						
						
									
										187
									
								
								README.ASN1
									
									
									
									
									
								
							@@ -1,187 +0,0 @@
 | 
			
		||||
 | 
			
		||||
OpenSSL ASN1 Revision
 | 
			
		||||
=====================
 | 
			
		||||
 | 
			
		||||
This document describes some of the issues relating to the new ASN1 code.
 | 
			
		||||
 | 
			
		||||
Previous OpenSSL ASN1 problems
 | 
			
		||||
=============================
 | 
			
		||||
 | 
			
		||||
OK why did the OpenSSL ASN1 code need revising in the first place? Well
 | 
			
		||||
there are lots of reasons some of which are included below...
 | 
			
		||||
 | 
			
		||||
1. The code is difficult to read and write. For every single ASN1 structure
 | 
			
		||||
(e.g. SEQUENCE) four functions need to be written for new, free, encode and
 | 
			
		||||
decode operations. This is a very painful and error prone operation. Very few
 | 
			
		||||
people have ever written any OpenSSL ASN1 and those that have usually wish
 | 
			
		||||
they hadn't.
 | 
			
		||||
 | 
			
		||||
2. Partly because of 1. the code is bloated and takes up a disproportionate
 | 
			
		||||
amount of space. The SEQUENCE encoder is particularly bad: it essentially
 | 
			
		||||
contains two copies of the same operation, one to compute the SEQUENCE length
 | 
			
		||||
and the other to encode it.
 | 
			
		||||
 | 
			
		||||
3. The code is memory based: that is it expects to be able to read the whole
 | 
			
		||||
structure from memory. This is fine for small structures but if you have a
 | 
			
		||||
(say) 1Gb PKCS#7 signedData structure it isn't such a good idea...
 | 
			
		||||
 | 
			
		||||
4. The code for the ASN1 IMPLICIT tag is evil. It is handled by temporarily
 | 
			
		||||
changing the tag to the expected one, attempting to read it, then changing it
 | 
			
		||||
back again. This means that decode buffers have to be writable even though they
 | 
			
		||||
are ultimately unchanged. This gets in the way of constification.
 | 
			
		||||
 | 
			
		||||
5. The handling of EXPLICIT isn't much better. It adds a chunk of code into 
 | 
			
		||||
the decoder and encoder for every EXPLICIT tag.
 | 
			
		||||
 | 
			
		||||
6. APPLICATION and PRIVATE tags aren't even supported at all.
 | 
			
		||||
 | 
			
		||||
7. Even IMPLICIT isn't complete: there is no support for implicitly tagged
 | 
			
		||||
types that are not OPTIONAL.
 | 
			
		||||
 | 
			
		||||
8. Much of the code assumes that a tag will fit in a single octet. This is
 | 
			
		||||
only true if the tag is 30 or less (mercifully tags over 30 are rare).
 | 
			
		||||
 | 
			
		||||
9. The ASN1 CHOICE type has to be largely handled manually, there aren't any
 | 
			
		||||
macros that properly support it.
 | 
			
		||||
 | 
			
		||||
10. Encoders have no concept of OPTIONAL and have no error checking. If the
 | 
			
		||||
passed structure contains a NULL in a mandatory field it will not be encoded,
 | 
			
		||||
resulting in an invalid structure.
 | 
			
		||||
 | 
			
		||||
11. It is tricky to add ASN1 encoders and decoders to external applications.
 | 
			
		||||
 | 
			
		||||
Template model
 | 
			
		||||
==============
 | 
			
		||||
 | 
			
		||||
One of the major problems with revision is the sheer volume of the ASN1 code.
 | 
			
		||||
Attempts to change (for example) the IMPLICIT behaviour would result in a
 | 
			
		||||
modification of *every* single decode function. 
 | 
			
		||||
 | 
			
		||||
I decided to adopt a template based approach. I'm using the term 'template'
 | 
			
		||||
in a manner similar to SNACC templates: it has nothing to do with C++
 | 
			
		||||
templates.
 | 
			
		||||
 | 
			
		||||
A template is a description of an ASN1 module as several constant C structures.
 | 
			
		||||
It describes in a machine readable way exactly how the ASN1 structure should
 | 
			
		||||
behave. If this template contains enough detail then it is possible to write
 | 
			
		||||
versions of new, free, encode, decode (and possibly others operations) that
 | 
			
		||||
operate on templates.
 | 
			
		||||
 | 
			
		||||
Instead of having to write code to handle each operation only a single
 | 
			
		||||
template needs to be written. If new operations are needed (such as a 'print'
 | 
			
		||||
operation) only a single new template based function needs to be written 
 | 
			
		||||
which will then automatically handle all existing templates.
 | 
			
		||||
 | 
			
		||||
Plans for revision
 | 
			
		||||
==================
 | 
			
		||||
 | 
			
		||||
The revision will consist of the following steps. Other than the first two
 | 
			
		||||
these can be handled in any order.
 | 
			
		||||
 
 | 
			
		||||
o Design and write template new, free, encode and decode operations, initially
 | 
			
		||||
memory based. *DONE*
 | 
			
		||||
 | 
			
		||||
o Convert existing ASN1 code to template form. *IN PROGRESS*
 | 
			
		||||
 | 
			
		||||
o Convert an existing ASN1 compiler (probably SNACC) to output templates
 | 
			
		||||
in OpenSSL form.
 | 
			
		||||
 | 
			
		||||
o Add support for BIO based ASN1 encoders and decoders to handle large
 | 
			
		||||
structures, initially blocking I/O.
 | 
			
		||||
 | 
			
		||||
o Add support for non blocking I/O: this is quite a bit harder than blocking
 | 
			
		||||
I/O.
 | 
			
		||||
 | 
			
		||||
o Add new ASN1 structures, such as OCSP, CRMF, S/MIME v3 (CMS), attribute
 | 
			
		||||
certificates etc etc.
 | 
			
		||||
 | 
			
		||||
Description of major changes
 | 
			
		||||
============================
 | 
			
		||||
 | 
			
		||||
The BOOLEAN type now takes three values. 0xff is TRUE, 0 is FALSE and -1 is
 | 
			
		||||
absent. The meaning of absent depends on the context. If for example the
 | 
			
		||||
boolean type is DEFAULT FALSE (as in the case of the critical flag for
 | 
			
		||||
certificate extensions) then -1 is FALSE, if DEFAULT TRUE then -1 is TRUE.
 | 
			
		||||
Usually the value will only ever be read via an API which will hide this from
 | 
			
		||||
an application.
 | 
			
		||||
 | 
			
		||||
There is an evil bug in the old ASN1 code that mishandles OPTIONAL with
 | 
			
		||||
SEQUENCE OF or SET OF. These are both implemented as a STACK structure. The
 | 
			
		||||
old code would omit the structure if the STACK was NULL (which is fine) or if
 | 
			
		||||
it had zero elements (which is NOT OK). This causes problems because an empty
 | 
			
		||||
SEQUENCE OF or SET OF will result in an empty STACK when it is decoded but when
 | 
			
		||||
it is encoded it will be omitted resulting in different encodings. The new code
 | 
			
		||||
only omits the encoding if the STACK is NULL, if it contains zero elements it
 | 
			
		||||
is encoded and empty. There is an additional problem though: because an empty
 | 
			
		||||
STACK was omitted, sometimes the corresponding *_new() function would
 | 
			
		||||
initialize the STACK to empty so an application could immediately use it, if
 | 
			
		||||
this is done with the new code (i.e. a NULL) it wont work. Therefore a new
 | 
			
		||||
STACK should be allocated first. One instance of this is the X509_CRL list of
 | 
			
		||||
revoked certificates: a helper function X509_CRL_add0_revoked() has been added
 | 
			
		||||
for this purpose.
 | 
			
		||||
 | 
			
		||||
The X509_ATTRIBUTE structure used to have an element called 'set' which took
 | 
			
		||||
the value 1 if the attribute value was a SET OF or 0 if it was a single. Due
 | 
			
		||||
to the behaviour of CHOICE in the new code this has been changed to a field
 | 
			
		||||
called 'single' which is 0 for a SET OF and 1 for single. The old field has
 | 
			
		||||
been deleted to deliberately break source compatibility. Since this structure
 | 
			
		||||
is normally accessed via higher level functions this shouldn't break too much.
 | 
			
		||||
 | 
			
		||||
The X509_REQ_INFO certificate request info structure no longer has a field
 | 
			
		||||
called 'req_kludge'. This used to be set to 1 if the attributes field was
 | 
			
		||||
(incorrectly) omitted. You can check to see if the field is omitted now by
 | 
			
		||||
checking if the attributes field is NULL. Similarly if you need to omit
 | 
			
		||||
the field then free attributes and set it to NULL.
 | 
			
		||||
 | 
			
		||||
The top level 'detached' field in the PKCS7 structure is no longer set when
 | 
			
		||||
a PKCS#7 structure is read in. PKCS7_is_detached() should be called instead.
 | 
			
		||||
The behaviour of PKCS7_get_detached() is unaffected.
 | 
			
		||||
 | 
			
		||||
The values of 'type' in the GENERAL_NAME structure have changed. This is
 | 
			
		||||
because the old code use the ASN1 initial octet as the selector. The new
 | 
			
		||||
code uses the index in the ASN1_CHOICE template.
 | 
			
		||||
 | 
			
		||||
The DIST_POINT_NAME structure has changed to be a true CHOICE type.
 | 
			
		||||
 | 
			
		||||
typedef struct DIST_POINT_NAME_st {
 | 
			
		||||
int type;
 | 
			
		||||
union {
 | 
			
		||||
	STACK_OF(GENERAL_NAME) *fullname;
 | 
			
		||||
	STACK_OF(X509_NAME_ENTRY) *relativename;
 | 
			
		||||
} name;
 | 
			
		||||
} DIST_POINT_NAME;
 | 
			
		||||
 | 
			
		||||
This means that name.fullname or name.relativename should be set
 | 
			
		||||
and type reflects the option. That is if name.fullname is set then
 | 
			
		||||
type is 0 and if name.relativename is set type is 1.
 | 
			
		||||
 | 
			
		||||
With the old code using the i2d functions would typically involve:
 | 
			
		||||
 | 
			
		||||
unsigned char *buf, *p;
 | 
			
		||||
int len;
 | 
			
		||||
/* Find length of encoding */
 | 
			
		||||
len = i2d_SOMETHING(x, NULL);
 | 
			
		||||
/* Allocate buffer */
 | 
			
		||||
buf = OPENSSL_malloc(len);
 | 
			
		||||
if(buf == NULL) {
 | 
			
		||||
	/* Malloc error */
 | 
			
		||||
}
 | 
			
		||||
/* Use temp variable because &p gets updated to point to end of
 | 
			
		||||
 * encoding.
 | 
			
		||||
 */
 | 
			
		||||
p = buf;
 | 
			
		||||
i2d_SOMETHING(x, &p);
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
Using the new i2d you can also do:
 | 
			
		||||
 | 
			
		||||
unsigned char *buf = NULL;
 | 
			
		||||
int len;
 | 
			
		||||
len = i2d_SOMETHING(x, &buf);
 | 
			
		||||
if(len < 0) {
 | 
			
		||||
	/* Malloc error */
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
and it will automatically allocate and populate a buffer with the
 | 
			
		||||
encoding. After this call 'buf' will point to the start of the
 | 
			
		||||
encoding which is len bytes long.
 | 
			
		||||
							
								
								
									
										302
									
								
								README.ENGINE
									
									
									
									
									
								
							
							
						
						
									
										302
									
								
								README.ENGINE
									
									
									
									
									
								
							@@ -1,289 +1,63 @@
 | 
			
		||||
 | 
			
		||||
  ENGINE
 | 
			
		||||
  ======
 | 
			
		||||
 | 
			
		||||
  With OpenSSL 0.9.6, a new component was added to support alternative
 | 
			
		||||
  cryptography implementations, most commonly for interfacing with external
 | 
			
		||||
  crypto devices (eg. accelerator cards). This component is called ENGINE,
 | 
			
		||||
  and its presence in OpenSSL 0.9.6 (and subsequent bug-fix releases)
 | 
			
		||||
  caused a little confusion as 0.9.6** releases were rolled in two
 | 
			
		||||
  versions, a "standard" and an "engine" version. In development for 0.9.7,
 | 
			
		||||
  the ENGINE code has been merged into the main branch and will be present
 | 
			
		||||
  in the standard releases from 0.9.7 forwards.
 | 
			
		||||
  With OpenSSL 0.9.6, a new component has been added to support external 
 | 
			
		||||
  crypto devices, for example accelerator cards.  The component is called
 | 
			
		||||
  ENGINE, and has still a pretty experimental status and almost no
 | 
			
		||||
  documentation.  It's designed to be fairly easily extensible by the
 | 
			
		||||
  calling programs.
 | 
			
		||||
 | 
			
		||||
  There are currently built-in ENGINE implementations for the following
 | 
			
		||||
  crypto devices:
 | 
			
		||||
  There's currently built-in support for the following crypto devices:
 | 
			
		||||
 | 
			
		||||
      o CryptoSwift
 | 
			
		||||
      o Compaq Atalla
 | 
			
		||||
      o nCipher CHIL
 | 
			
		||||
      o Nuron
 | 
			
		||||
      o Broadcom uBSec
 | 
			
		||||
 | 
			
		||||
  In addition, dynamic binding to external ENGINE implementations is now
 | 
			
		||||
  provided by a special ENGINE called "dynamic". See the "DYNAMIC ENGINE"
 | 
			
		||||
  section below for details.
 | 
			
		||||
  A number of things are still needed and are being worked on:
 | 
			
		||||
 | 
			
		||||
  At this stage, a number of things are still needed and are being worked on:
 | 
			
		||||
 | 
			
		||||
      1 Integration of EVP support.
 | 
			
		||||
      2 Configuration support.
 | 
			
		||||
      3 Documentation!
 | 
			
		||||
 | 
			
		||||
1 With respect to EVP, this relates to support for ciphers and digests in
 | 
			
		||||
  the ENGINE model so that alternative implementations of existing
 | 
			
		||||
  algorithms/modes (or previously unimplemented ones) can be provided by
 | 
			
		||||
  ENGINE implementations.
 | 
			
		||||
 | 
			
		||||
2 Configuration support currently exists in the ENGINE API itself, in the
 | 
			
		||||
  form of "control commands". These allow an application to expose to the
 | 
			
		||||
  user/admin the set of commands and parameter types a given ENGINE
 | 
			
		||||
  implementation supports, and for an application to directly feed string
 | 
			
		||||
  based input to those ENGINEs, in the form of name-value pairs. This is an
 | 
			
		||||
  extensible way for ENGINEs to define their own "configuration" mechanisms
 | 
			
		||||
  that are specific to a given ENGINE (eg. for a particular hardware
 | 
			
		||||
  device) but that should be consistent across *all* OpenSSL-based
 | 
			
		||||
  applications when they use that ENGINE. Work is in progress (or at least
 | 
			
		||||
  in planning) for supporting these control commands from the CONF (or
 | 
			
		||||
  NCONF) code so that applications using OpenSSL's existing configuration
 | 
			
		||||
  file format can have ENGINE settings specified in much the same way.
 | 
			
		||||
  Presently however, applications must use the ENGINE API itself to provide
 | 
			
		||||
  such functionality. To see first hand the types of commands available
 | 
			
		||||
  with the various compiled-in ENGINEs (see further down for dynamic
 | 
			
		||||
  ENGINEs), use the "engine" openssl utility with full verbosity, ie;
 | 
			
		||||
       openssl engine -vvvv
 | 
			
		||||
 | 
			
		||||
3 Documentation? Volunteers welcome! The source code is reasonably well
 | 
			
		||||
  self-documenting, but some summaries and usage instructions are needed -
 | 
			
		||||
  moreover, they are needed in the same POD format the existing OpenSSL
 | 
			
		||||
  documentation is provided in. Any complete or incomplete contributions
 | 
			
		||||
  would help make this happen.
 | 
			
		||||
 | 
			
		||||
  STABILITY & BUG-REPORTS
 | 
			
		||||
  =======================
 | 
			
		||||
      o An openssl utility command to handle or at least check available
 | 
			
		||||
        engines.
 | 
			
		||||
      o A better way of handling the methods that are handled by the
 | 
			
		||||
        engines.
 | 
			
		||||
      o Documentation!
 | 
			
		||||
 | 
			
		||||
  What already exists is fairly stable as far as it has been tested, but
 | 
			
		||||
  the test base has been a bit small most of the time. For the most part,
 | 
			
		||||
  the vendors of the devices these ENGINEs support have contributed to the
 | 
			
		||||
  development and/or testing of the implementations, and *usually* (with no
 | 
			
		||||
  guarantees) have experience in using the ENGINE support to drive their
 | 
			
		||||
  devices from common OpenSSL-based applications. Bugs and/or inexplicable
 | 
			
		||||
  behaviour in using a specific ENGINE implementation should be sent to the
 | 
			
		||||
  author of that implementation (if it is mentioned in the corresponding C
 | 
			
		||||
  file), and in the case of implementations for commercial hardware
 | 
			
		||||
  devices, also through whatever vendor support channels are available.  If
 | 
			
		||||
  none of this is possible, or the problem seems to be something about the
 | 
			
		||||
  ENGINE API itself (ie. not necessarily specific to a particular ENGINE
 | 
			
		||||
  implementation) then you should mail complete details to the relevant
 | 
			
		||||
  OpenSSL mailing list. For a definition of "complete details", refer to
 | 
			
		||||
  the OpenSSL "README" file. As for which list to send it to;
 | 
			
		||||
  the test base has been a bit small most of the time.
 | 
			
		||||
 | 
			
		||||
     openssl-users: if you are *using* the ENGINE abstraction, either in an
 | 
			
		||||
          pre-compiled application or in your own application code.
 | 
			
		||||
  Because of this experimental status and what's lacking, the ENGINE
 | 
			
		||||
  component is not yet part of the default OpenSSL distribution.  However,
 | 
			
		||||
  we have made a separate kit for those who want to try this out, to be
 | 
			
		||||
  found in the same places as the default OpenSSL distribution, but with
 | 
			
		||||
  "-engine-" being part of the kit file name.  For example, version 0.9.6
 | 
			
		||||
  is distributed in the following two files:
 | 
			
		||||
 | 
			
		||||
     openssl-dev: if you are discussing problems with OpenSSL source code.
 | 
			
		||||
      openssl-0.9.6.tar.gz
 | 
			
		||||
      openssl-engine-0.9.6.tar.gz
 | 
			
		||||
 | 
			
		||||
  USAGE
 | 
			
		||||
  NOTES
 | 
			
		||||
  =====
 | 
			
		||||
 | 
			
		||||
  The default "openssl" ENGINE is always chosen when performing crypto
 | 
			
		||||
  operations unless you specify otherwise. You must actively tell the
 | 
			
		||||
  openssl utility commands to use anything else through a new command line
 | 
			
		||||
  switch called "-engine". Also, if you want to use the ENGINE support in
 | 
			
		||||
  your own code to do something similar, you must likewise explicitly
 | 
			
		||||
  select the ENGINE implementation you want.
 | 
			
		||||
  openssl-engine-0.9.6.tar.gz does not depend on openssl-0.9.6.tar, you do
 | 
			
		||||
  not need to download both.
 | 
			
		||||
 | 
			
		||||
  Depending on the type of hardware, system, and configuration, "settings"
 | 
			
		||||
  may need to be applied to an ENGINE for it to function as expected/hoped.
 | 
			
		||||
  The recommended way of doing this is for the application to support
 | 
			
		||||
  ENGINE "control commands" so that each ENGINE implementation can provide
 | 
			
		||||
  whatever configuration primitives it might require and the application
 | 
			
		||||
  can allow the user/admin (and thus the hardware vendor's support desk
 | 
			
		||||
  also) to provide any such input directly to the ENGINE implementation.
 | 
			
		||||
  This way, applications do not need to know anything specific to any
 | 
			
		||||
  device, they only need to provide the means to carry such user/admin
 | 
			
		||||
  input through to the ENGINE in question. Ie. this connects *you* (and
 | 
			
		||||
  your helpdesk) to the specific ENGINE implementation (and device), and
 | 
			
		||||
  allows application authors to not get buried in hassle supporting
 | 
			
		||||
  arbitrary devices they know (and care) nothing about.
 | 
			
		||||
  openssl-engine-0.9.6.tar.gz is usable even if you don't have an external
 | 
			
		||||
  crypto device.  The internal OpenSSL functions are contained in the
 | 
			
		||||
  engine "openssl", and will be used by default.
 | 
			
		||||
 | 
			
		||||
  A new "openssl" utility, "openssl engine", has been added in that allows
 | 
			
		||||
  for testing and examination of ENGINE implementations. Basic usage
 | 
			
		||||
  instructions are available by specifying the "-?" command line switch.
 | 
			
		||||
  No external crypto device is chosen unless you say so.  You have actively
 | 
			
		||||
  tell the openssl utility commands to use it through a new command line
 | 
			
		||||
  switch called "-engine".  And if you want to use the ENGINE library to
 | 
			
		||||
  do something similar, you must also explicitly choose an external crypto
 | 
			
		||||
  device, or the built-in crypto routines will be used, just as in the
 | 
			
		||||
  default OpenSSL distribution.
 | 
			
		||||
 | 
			
		||||
  DYNAMIC ENGINES
 | 
			
		||||
  ===============
 | 
			
		||||
 | 
			
		||||
  The new "dynamic" ENGINE provides a low-overhead way to support ENGINE
 | 
			
		||||
  implementations that aren't pre-compiled and linked into OpenSSL-based
 | 
			
		||||
  applications. This could be because existing compiled-in implementations
 | 
			
		||||
  have known problems and you wish to use a newer version with an existing
 | 
			
		||||
  application. It could equally be because the application (or OpenSSL
 | 
			
		||||
  library) you are using simply doesn't have support for the ENGINE you
 | 
			
		||||
  wish to use, and the ENGINE provider (eg. hardware vendor) is providing
 | 
			
		||||
  you with a self-contained implementation in the form of a shared-library.
 | 
			
		||||
  The other use-case for "dynamic" is with applications that wish to
 | 
			
		||||
  maintain the smallest foot-print possible and so do not link in various
 | 
			
		||||
  ENGINE implementations from OpenSSL, but instead leaves you to provide
 | 
			
		||||
  them, if you want them, in the form of "dynamic"-loadable
 | 
			
		||||
  shared-libraries. It should be possible for hardware vendors to provide
 | 
			
		||||
  their own shared-libraries to support arbitrary hardware to work with
 | 
			
		||||
  applications based on OpenSSL 0.9.7 or later. If you're using an
 | 
			
		||||
  application based on 0.9.7 (or later) and the support you desire is only
 | 
			
		||||
  announced for versions later than the one you need, ask the vendor to
 | 
			
		||||
  backport their ENGINE to the version you need.
 | 
			
		||||
 | 
			
		||||
  How does "dynamic" work?
 | 
			
		||||
  ------------------------
 | 
			
		||||
    The dynamic ENGINE has a special flag in its implementation such that
 | 
			
		||||
    every time application code asks for the 'dynamic' ENGINE, it in fact
 | 
			
		||||
    gets its own copy of it. As such, multi-threaded code (or code that
 | 
			
		||||
    multiplexes multiple uses of 'dynamic' in a single application in any
 | 
			
		||||
    way at all) does not get confused by 'dynamic' being used to do many
 | 
			
		||||
    independent things. Other ENGINEs typically don't do this so there is
 | 
			
		||||
    only ever 1 ENGINE structure of its type (and reference counts are used
 | 
			
		||||
    to keep order). The dynamic ENGINE itself provides absolutely no
 | 
			
		||||
    cryptographic functionality, and any attempt to "initialise" the ENGINE
 | 
			
		||||
    automatically fails. All it does provide are a few "control commands"
 | 
			
		||||
    that can be used to control how it will load an external ENGINE
 | 
			
		||||
    implementation from a shared-library. To see these control commands,
 | 
			
		||||
    use the command-line;
 | 
			
		||||
 | 
			
		||||
       openssl engine -vvvv dynamic
 | 
			
		||||
 | 
			
		||||
    The "SO_PATH" control command should be used to identify the
 | 
			
		||||
    shared-library that contains the ENGINE implementation, and "NO_VCHECK"
 | 
			
		||||
    might possibly be useful if there is a minor version conflict and you
 | 
			
		||||
    (or a vendor helpdesk) is convinced you can safely ignore it.
 | 
			
		||||
    "ID" is probably only needed if a shared-library implements
 | 
			
		||||
    multiple ENGINEs, but if you know the engine id you expect to be using,
 | 
			
		||||
    it doesn't hurt to specify it (and this provides a sanity check if
 | 
			
		||||
    nothing else). "LIST_ADD" is only required if you actually wish the
 | 
			
		||||
    loaded ENGINE to be discoverable by application code later on using the
 | 
			
		||||
    ENGINE's "id". For most applications, this isn't necessary - but some
 | 
			
		||||
    application authors may have nifty reasons for using it. The "LOAD"
 | 
			
		||||
    command is the only one that takes no parameters and is the command
 | 
			
		||||
    that uses the settings from any previous commands to actually *load*
 | 
			
		||||
    the shared-library ENGINE implementation. If this command succeeds, the
 | 
			
		||||
    (copy of the) 'dynamic' ENGINE will magically morph into the ENGINE
 | 
			
		||||
    that has been loaded from the shared-library. As such, any control
 | 
			
		||||
    commands supported by the loaded ENGINE could then be executed as per
 | 
			
		||||
    normal. Eg. if ENGINE "foo" is implemented in the shared-library
 | 
			
		||||
    "libfoo.so" and it supports some special control command "CMD_FOO", the
 | 
			
		||||
    following code would load and use it (NB: obviously this code has no
 | 
			
		||||
    error checking);
 | 
			
		||||
 | 
			
		||||
       ENGINE *e = ENGINE_by_id("dynamic");
 | 
			
		||||
       ENGINE_ctrl_cmd_string(e, "SO_PATH", "/lib/libfoo.so", 0);
 | 
			
		||||
       ENGINE_ctrl_cmd_string(e, "ID", "foo", 0);
 | 
			
		||||
       ENGINE_ctrl_cmd_string(e, "LOAD", NULL, 0);
 | 
			
		||||
       ENGINE_ctrl_cmd_string(e, "CMD_FOO", "some input data", 0);
 | 
			
		||||
 | 
			
		||||
    For testing, the "openssl engine" utility can be useful for this sort
 | 
			
		||||
    of thing. For example the above code excerpt would achieve much the
 | 
			
		||||
    same result as;
 | 
			
		||||
 | 
			
		||||
       openssl engine dynamic \
 | 
			
		||||
                 -pre SO_PATH:/lib/libfoo.so \
 | 
			
		||||
                 -pre ID:foo \
 | 
			
		||||
                 -pre LOAD \
 | 
			
		||||
                 -pre "CMD_FOO:some input data"
 | 
			
		||||
 | 
			
		||||
    Or to simply see the list of commands supported by the "foo" ENGINE;
 | 
			
		||||
 | 
			
		||||
       openssl engine -vvvv dynamic \
 | 
			
		||||
                 -pre SO_PATH:/lib/libfoo.so \
 | 
			
		||||
                 -pre ID:foo \
 | 
			
		||||
                 -pre LOAD
 | 
			
		||||
 | 
			
		||||
    Applications that support the ENGINE API and more specifically, the
 | 
			
		||||
    "control commands" mechanism, will provide some way for you to pass
 | 
			
		||||
    such commands through to ENGINEs. As such, you would select "dynamic"
 | 
			
		||||
    as the ENGINE to use, and the parameters/commands you pass would
 | 
			
		||||
    control the *actual* ENGINE used. Each command is actually a name-value
 | 
			
		||||
    pair and the value can sometimes be omitted (eg. the "LOAD" command).
 | 
			
		||||
    Whilst the syntax demonstrated in "openssl engine" uses a colon to
 | 
			
		||||
    separate the command name from the value, applications may provide
 | 
			
		||||
    their own syntax for making that separation (eg. a win32 registry
 | 
			
		||||
    key-value pair may be used by some applications). The reason for the
 | 
			
		||||
    "-pre" syntax in the "openssl engine" utility is that some commands
 | 
			
		||||
    might be issued to an ENGINE *after* it has been initialised for use.
 | 
			
		||||
    Eg. if an ENGINE implementation requires a smart-card to be inserted
 | 
			
		||||
    during initialisation (or a PIN to be typed, or whatever), there may be
 | 
			
		||||
    a control command you can issue afterwards to "forget" the smart-card
 | 
			
		||||
    so that additional initialisation is no longer possible. In
 | 
			
		||||
    applications such as web-servers, where potentially volatile code may
 | 
			
		||||
    run on the same host system, this may provide some arguable security
 | 
			
		||||
    value. In such a case, the command would be passed to the ENGINE after
 | 
			
		||||
    it has been initialised for use, and so the "-post" switch would be
 | 
			
		||||
    used instead. Applications may provide a different syntax for
 | 
			
		||||
    supporting this distinction, and some may simply not provide it at all
 | 
			
		||||
    ("-pre" is almost always what you're after, in reality).
 | 
			
		||||
 | 
			
		||||
  How do I build a "dynamic" ENGINE?
 | 
			
		||||
  ----------------------------------
 | 
			
		||||
    This question is trickier - currently OpenSSL bundles various ENGINE
 | 
			
		||||
    implementations that are statically built in, and any application that
 | 
			
		||||
    calls the "ENGINE_load_builtin_engines()" function will automatically
 | 
			
		||||
    have all such ENGINEs available (and occupying memory). Applications
 | 
			
		||||
    that don't call that function have no ENGINEs available like that and
 | 
			
		||||
    would have to use "dynamic" to load any such ENGINE - but on the other
 | 
			
		||||
    hand such applications would only have the memory footprint of any
 | 
			
		||||
    ENGINEs explicitly loaded using user/admin provided control commands.
 | 
			
		||||
    The main advantage of not statically linking ENGINEs and only using
 | 
			
		||||
    "dynamic" for hardware support is that any installation using no
 | 
			
		||||
    "external" ENGINE suffers no unnecessary memory footprint from unused
 | 
			
		||||
    ENGINEs. Likewise, installations that do require an ENGINE incur the
 | 
			
		||||
    overheads from only *that* ENGINE once it has been loaded.
 | 
			
		||||
 | 
			
		||||
    Sounds good? Maybe, but currently building an ENGINE implementation as
 | 
			
		||||
    a shared-library that can be loaded by "dynamic" isn't automated in
 | 
			
		||||
    OpenSSL's build process. It can be done manually quite easily however.
 | 
			
		||||
    Such a shared-library can either be built with any OpenSSL code it
 | 
			
		||||
    needs statically linked in, or it can link dynamically against OpenSSL
 | 
			
		||||
    if OpenSSL itself is built as a shared library. The instructions are
 | 
			
		||||
    the same in each case, but in the former (statically linked any
 | 
			
		||||
    dependencies on OpenSSL) you must ensure OpenSSL is built with
 | 
			
		||||
    position-independent code ("PIC"). The default OpenSSL compilation may
 | 
			
		||||
    already specify the relevant flags to do this, but you should consult
 | 
			
		||||
    with your compiler documentation if you are in any doubt.
 | 
			
		||||
 | 
			
		||||
    This example will show building the "atalla" ENGINE in the
 | 
			
		||||
    crypto/engine/ directory as a shared-library for use via the "dynamic"
 | 
			
		||||
    ENGINE.
 | 
			
		||||
    1) "cd" to the crypto/engine/ directory of a pre-compiled OpenSSL
 | 
			
		||||
       source tree.
 | 
			
		||||
    2) Recompile at least one source file so you can see all the compiler
 | 
			
		||||
       flags (and syntax) being used to build normally. Eg;
 | 
			
		||||
           touch hw_atalla.c ; make
 | 
			
		||||
       will rebuild "hw_atalla.o" using all such flags.
 | 
			
		||||
    3) Manually enter the same compilation line to compile the
 | 
			
		||||
       "hw_atalla.c" file but with the following two changes;
 | 
			
		||||
         (a) add "-DENGINE_DYNAMIC_SUPPORT" to the command line switches,
 | 
			
		||||
	 (b) change the output file from "hw_atalla.o" to something new,
 | 
			
		||||
             eg. "tmp_atalla.o"
 | 
			
		||||
    4) Link "tmp_atalla.o" into a shared-library using the top-level
 | 
			
		||||
       OpenSSL libraries to resolve any dependencies. The syntax for doing
 | 
			
		||||
       this depends heavily on your system/compiler and is a nightmare
 | 
			
		||||
       known well to anyone who has worked with shared-library portability
 | 
			
		||||
       before. 'gcc' on Linux, for example, would use the following syntax;
 | 
			
		||||
          gcc -shared -o dyn_atalla.so tmp_atalla.o -L../.. -lcrypto
 | 
			
		||||
    5) Test your shared library using "openssl engine" as explained in the
 | 
			
		||||
       previous section. Eg. from the top-level directory, you might try;
 | 
			
		||||
          apps/openssl engine -vvvv dynamic \
 | 
			
		||||
              -pre SO_PATH:./crypto/engine/dyn_atalla.so -pre LOAD
 | 
			
		||||
       If the shared-library loads successfully, you will see both "-pre"
 | 
			
		||||
       commands marked as "SUCCESS" and the list of control commands
 | 
			
		||||
       displayed (because of "-vvvv") will be the control commands for the
 | 
			
		||||
       *atalla* ENGINE (ie. *not* the 'dynamic' ENGINE). You can also add
 | 
			
		||||
       the "-t" switch to the utility if you want it to try and initialise
 | 
			
		||||
       the atalla ENGINE for use to test any possible hardware/driver
 | 
			
		||||
       issues.
 | 
			
		||||
 | 
			
		||||
  PROBLEMS
 | 
			
		||||
  ========
 | 
			
		||||
 | 
			
		||||
  It seems like the ENGINE part doesn't work too well with CryptoSwift on Win32.
 | 
			
		||||
  A quick test done right before the release showed that trying "openssl speed
 | 
			
		||||
  -engine cswift" generated errors. If the DSO gets enabled, an attempt is made
 | 
			
		||||
  to write at memory address 0x00000002.
 | 
			
		||||
  It seems like the ENGINE part doesn't work too well with CryptoSwift on
 | 
			
		||||
  Win32.  A quick test done right before the release showed that trying
 | 
			
		||||
  "openssl speed -engine cswift" generated errors.  If the DSO gets enabled,
 | 
			
		||||
  an attempt is made to write at memory address 0x00000002.
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										60
									
								
								STATUS
									
									
									
									
									
								
							
							
						
						
									
										60
									
								
								STATUS
									
									
									
									
									
								
							@@ -1,36 +1,10 @@
 | 
			
		||||
 | 
			
		||||
  OpenSSL STATUS                           Last modified at
 | 
			
		||||
  ______________                           $Date: 2006/09/28 11:56:56 $
 | 
			
		||||
  ______________                           $Date: 2002/07/30 10:33:28 $
 | 
			
		||||
 | 
			
		||||
  DEVELOPMENT STATE
 | 
			
		||||
 | 
			
		||||
    o  OpenSSL 0.9.9:  Under development...
 | 
			
		||||
    o  OpenSSL 0.9.8d: Released on September 28th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.8c: Released on September  5th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.8b: Released on May        4th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.8a: Released on October   11th, 2005
 | 
			
		||||
    o  OpenSSL 0.9.8:  Released on July       5th, 2005
 | 
			
		||||
    o  OpenSSL 0.9.7l: Released on September 28th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.7k: Released on September  5th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.7j: Released on May        4th, 2006
 | 
			
		||||
    o  OpenSSL 0.9.7i: Released on October   14th, 2005
 | 
			
		||||
    o  OpenSSL 0.9.7h: Released on October   11th, 2005
 | 
			
		||||
    o  OpenSSL 0.9.7g: Released on April     11th, 2005
 | 
			
		||||
    o  OpenSSL 0.9.7f: Released on March     22nd, 2005
 | 
			
		||||
    o  OpenSSL 0.9.7e: Released on October   25th, 2004
 | 
			
		||||
    o  OpenSSL 0.9.7d: Released on March     17th, 2004
 | 
			
		||||
    o  OpenSSL 0.9.7c: Released on September 30th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.7b: Released on April     10th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.7a: Released on February  19th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.7:  Released on December  31st, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6m: Released on March     17th, 2004
 | 
			
		||||
    o  OpenSSL 0.9.6l: Released on November   4th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.6k: Released on September 30th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.6j: Released on April     10th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.6i: Released on February  19th, 2003
 | 
			
		||||
    o  OpenSSL 0.9.6h: Released on December   5th, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6g: Released on August     9th, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6f: Released on August     8th, 2002
 | 
			
		||||
    o  OpenSSL 0.9.7:  Under development...
 | 
			
		||||
    o  OpenSSL 0.9.6e: Released on July      30th, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6d: Released on May        9th, 2002
 | 
			
		||||
    o  OpenSSL 0.9.6c: Released on December  21st, 2001
 | 
			
		||||
@@ -45,12 +19,8 @@
 | 
			
		||||
    o  OpenSSL 0.9.2b: Released on March     22th, 1999
 | 
			
		||||
    o  OpenSSL 0.9.1c: Released on December  23th, 1998
 | 
			
		||||
 | 
			
		||||
  [See also http://www.openssl.org/support/rt2.html]
 | 
			
		||||
 | 
			
		||||
  RELEASE SHOWSTOPPERS
 | 
			
		||||
 | 
			
		||||
    o 
 | 
			
		||||
 | 
			
		||||
  AVAILABLE PATCHES
 | 
			
		||||
 | 
			
		||||
    o 
 | 
			
		||||
@@ -72,13 +42,17 @@
 | 
			
		||||
	UTIL (a new set of library functions to support some higher level
 | 
			
		||||
	      functionality that is currently missing).
 | 
			
		||||
	Shared library support for VMS.
 | 
			
		||||
	Kerberos 5 authentication (Heimdal)
 | 
			
		||||
	Kerberos 5 authentication
 | 
			
		||||
	Constification
 | 
			
		||||
	OCSP
 | 
			
		||||
 | 
			
		||||
  NEEDS PATCH
 | 
			
		||||
 | 
			
		||||
    o  apps/ca.c: "Sign the certificate?" - "n" creates empty certificate file
 | 
			
		||||
 | 
			
		||||
    o  Whenever strncpy is used, make sure the resulting string is NULL-terminated
 | 
			
		||||
       or an error is reported
 | 
			
		||||
 | 
			
		||||
    o  "OpenSSL STATUS" is never up-to-date.
 | 
			
		||||
 | 
			
		||||
  OPEN ISSUES
 | 
			
		||||
@@ -107,11 +81,23 @@
 | 
			
		||||
                    which apparently is not flexible enough to generate
 | 
			
		||||
                    libcrypto)
 | 
			
		||||
 | 
			
		||||
  WISHES
 | 
			
		||||
 | 
			
		||||
    o  Add variants of DH_generate_parameters() and BN_generate_prime() [etc?]
 | 
			
		||||
       where the callback function can request that the function be aborted.
 | 
			
		||||
       [Gregory Stark <ghstark@pobox.com>, <rayyang2000@yahoo.com>]
 | 
			
		||||
    o  The perl/ stuff needs a major overhaul. Currently it's
 | 
			
		||||
       totally obsolete. Either we clean it up and enhance it to be up-to-date
 | 
			
		||||
       with the C code or we also could replace it with the really nice
 | 
			
		||||
       Net::SSLeay package we can find under
 | 
			
		||||
       http://www.neuronio.pt/SSLeay.pm.html.  Ralf uses this package for a
 | 
			
		||||
       longer time and it works fine and is a nice Perl module. Best would be
 | 
			
		||||
       to convince the author to work for the OpenSSL project and create a
 | 
			
		||||
       Net::OpenSSL or Crypt::OpenSSL package out of it and maintains it for
 | 
			
		||||
       us.
 | 
			
		||||
 | 
			
		||||
       Status: Ralf thinks we should both contact the author of Net::SSLeay
 | 
			
		||||
               and look how much effort it is to bring Eric's perl/ stuff up
 | 
			
		||||
               to date.
 | 
			
		||||
               Paul +1
 | 
			
		||||
 | 
			
		||||
  WISHES
 | 
			
		||||
 | 
			
		||||
    o  SRP in TLS.
 | 
			
		||||
       [wished by:
 | 
			
		||||
 
 | 
			
		||||
@@ -1,34 +0,0 @@
 | 
			
		||||
#! /usr/bin/perl
 | 
			
		||||
 | 
			
		||||
use strict;
 | 
			
		||||
use warnings;
 | 
			
		||||
 | 
			
		||||
my @directory_vars = ( "dir", "certs", "crl_dir", "new_certs_dir" );
 | 
			
		||||
my @file_vars = ( "database", "certificate", "serial", "crlnumber",
 | 
			
		||||
		  "crl", "private_key", "RANDFILE" );
 | 
			
		||||
while(<STDIN>) {
 | 
			
		||||
    chomp;
 | 
			
		||||
    foreach my $d (@directory_vars) {
 | 
			
		||||
	if (/^(\s*\#?\s*${d}\s*=\s*)\.\/([^\s\#]*)([\s\#].*)$/) {
 | 
			
		||||
	    $_ = "$1sys\\\$disk:\[.$2$3";
 | 
			
		||||
	} elsif (/^(\s*\#?\s*${d}\s*=\s*)(\w[^\s\#]*)([\s\#].*)$/) {
 | 
			
		||||
	    $_ = "$1sys\\\$disk:\[.$2$3";
 | 
			
		||||
	}
 | 
			
		||||
	s/^(\s*\#?\s*${d}\s*=\s*\$\w+)\/([^\s\#]*)([\s\#].*)$/$1.$2\]$3/;
 | 
			
		||||
	while(/^(\s*\#?\s*${d}\s*=\s*(\$\w+\.|sys\\\$disk:\[\.)[\w\.]+)\/([^\]]*)\](.*)$/) {
 | 
			
		||||
	    $_ = "$1.$3]$4";
 | 
			
		||||
	}
 | 
			
		||||
    }
 | 
			
		||||
    foreach my $f (@file_vars) {
 | 
			
		||||
	s/^(\s*\#?\s*${f}\s*=\s*)\.\/(.*)$/$1sys\\\$disk:\[\/$2/;
 | 
			
		||||
	while(/^(\s*\#?\s*${f}\s*=\s*(\$\w+|sys\\\$disk:\[)[^\/]*)\/(\w+\/[^\s\#]*)([\s\#].*)$/) {
 | 
			
		||||
	    $_ = "$1.$3$4";
 | 
			
		||||
	}
 | 
			
		||||
	if (/^(\s*\#?\s*${f}\s*=\s*(\$\w+|sys\\\$disk:\[)[^\/]*)\/(\w+)([\s\#].*)$/) {
 | 
			
		||||
	    $_ = "$1]$3.$4";
 | 
			
		||||
	} elsif  (/^(\s*\#?\s*${f}\s*=\s*(\$\w+|sys\\\$disk:\[)[^\/]*)\/([^\s\#]*)([\s\#].*)$/) {
 | 
			
		||||
	    $_ = "$1]$3$4";
 | 
			
		||||
	}
 | 
			
		||||
   }
 | 
			
		||||
    print $_,"\n";
 | 
			
		||||
}
 | 
			
		||||
							
								
								
									
										361
									
								
								VMS/mkshared.com
									
									
									
									
									
								
							
							
						
						
									
										361
									
								
								VMS/mkshared.com
									
									
									
									
									
								
							@@ -1,361 +0,0 @@
 | 
			
		||||
$! MKSHARED.COM -- script to created shareable images on VMS
 | 
			
		||||
$!
 | 
			
		||||
$! No command line parameters.  This should be run at the start of the source
 | 
			
		||||
$! tree (the same directory where one finds INSTALL.VMS).
 | 
			
		||||
$!
 | 
			
		||||
$! Input:	[.UTIL]LIBEAY.NUM,[.AXP.EXE.CRYPTO]LIBCRYPTO.OLB
 | 
			
		||||
$!		[.UTIL]SSLEAY.NUM,[.AXP.EXE.SSL]LIBSSL.OLB
 | 
			
		||||
$! Output:	[.AXP.EXE.CRYPTO]LIBCRYPTO.OPT,.MAP,.EXE
 | 
			
		||||
$!		[.AXP.EXE.SSL]LIBSSL.OPT,.MAP,.EXE
 | 
			
		||||
$!
 | 
			
		||||
$! So far, tests have only been made on VMS for Alpha.  VAX will come in time.
 | 
			
		||||
$! ===========================================================================
 | 
			
		||||
$
 | 
			
		||||
$! ----- Prepare info for processing: version number and file info
 | 
			
		||||
$ gosub read_version_info
 | 
			
		||||
$ if libver .eqs. ""
 | 
			
		||||
$ then
 | 
			
		||||
$   write sys$error "ERROR: Couldn't find any library version info..."
 | 
			
		||||
$   exit
 | 
			
		||||
$ endif
 | 
			
		||||
$
 | 
			
		||||
$ if f$getsyi("CPU") .ge. 128
 | 
			
		||||
$ then
 | 
			
		||||
$   libid  = "Crypto"
 | 
			
		||||
$   libnum = "[.UTIL]LIBEAY.NUM"
 | 
			
		||||
$   libdir = "[.AXP.EXE.CRYPTO]"
 | 
			
		||||
$   libolb = "''libdir'LIBCRYPTO.OLB"
 | 
			
		||||
$   libopt = "''libdir'LIBCRYPTO.OPT"
 | 
			
		||||
$   libmap = "''libdir'LIBCRYPTO.MAP"
 | 
			
		||||
$   libgoal= "''libdir'LIBCRYPTO.EXE"
 | 
			
		||||
$   libref = ""
 | 
			
		||||
$   gosub create_axp_shr
 | 
			
		||||
$   libid  = "SSL"
 | 
			
		||||
$   libnum = "[.UTIL]SSLEAY.NUM"
 | 
			
		||||
$   libdir = "[.AXP.EXE.SSL]"
 | 
			
		||||
$   libolb = "''libdir'LIBSSL.OLB"
 | 
			
		||||
$   libopt = "''libdir'LIBSSL.OPT"
 | 
			
		||||
$   libmap = "''libdir'LIBSSL.MAP"
 | 
			
		||||
$   libgoal= "''libdir'LIBSSL.EXE"
 | 
			
		||||
$   libref = "[.AXP.EXE.CRYPTO]LIBCRYPTO.EXE"
 | 
			
		||||
$   gosub create_axp_shr
 | 
			
		||||
$ else
 | 
			
		||||
$   libtit = "CRYPTO_TRANSFER_VECTOR"
 | 
			
		||||
$   libid  = "Crypto"
 | 
			
		||||
$   libnum = "[.UTIL]LIBEAY.NUM"
 | 
			
		||||
$   libdir = "[.VAX.EXE.CRYPTO]"
 | 
			
		||||
$   libmar = "''libdir'LIBCRYPTO.MAR"
 | 
			
		||||
$   libolb = "''libdir'LIBCRYPTO.OLB"
 | 
			
		||||
$   libopt = "''libdir'LIBCRYPTO.OPT"
 | 
			
		||||
$   libobj = "''libdir'LIBCRYPTO.OBJ"
 | 
			
		||||
$   libmap = "''libdir'LIBCRYPTO.MAP"
 | 
			
		||||
$   libgoal= "''libdir'LIBCRYPTO.EXE"
 | 
			
		||||
$   libref = ""
 | 
			
		||||
$   libvec = "LIBCRYPTO"
 | 
			
		||||
$   gosub create_vax_shr
 | 
			
		||||
$   libtit = "SSL_TRANSFER_VECTOR"
 | 
			
		||||
$   libid  = "SSL"
 | 
			
		||||
$   libnum = "[.UTIL]SSLEAY.NUM"
 | 
			
		||||
$   libdir = "[.VAX.EXE.SSL]"
 | 
			
		||||
$   libmar = "''libdir'LIBSSL.MAR"
 | 
			
		||||
$   libolb = "''libdir'LIBSSL.OLB"
 | 
			
		||||
$   libopt = "''libdir'LIBSSL.OPT"
 | 
			
		||||
$   libobj = "''libdir'LIBSSL.OBJ"
 | 
			
		||||
$   libmap = "''libdir'LIBSSL.MAP"
 | 
			
		||||
$   libgoal= "''libdir'LIBSSL.EXE"
 | 
			
		||||
$   libref = "[.VAX.EXE.CRYPTO]LIBCRYPTO.EXE"
 | 
			
		||||
$   libvec = "LIBSSL"
 | 
			
		||||
$   gosub create_vax_shr
 | 
			
		||||
$ endif
 | 
			
		||||
$ exit
 | 
			
		||||
$
 | 
			
		||||
$! ----- Soubroutines to actually build the shareable libraries
 | 
			
		||||
$! The way things work, there's a main shareable library creator for each
 | 
			
		||||
$! supported architecture, which is called from the main code above.
 | 
			
		||||
$! The creator will define a number of variables to tell the next levels of
 | 
			
		||||
$! subroutines what routines to use to write to the option files, call the
 | 
			
		||||
$! main processor, read_func_num, and when that is done, it will write version
 | 
			
		||||
$! data at the end of the .opt file, close it, and link the library.
 | 
			
		||||
$!
 | 
			
		||||
$! read_func_num reads through a .num file and calls the writer routine for
 | 
			
		||||
$! each line.  It's also responsible for checking that order is properly kept
 | 
			
		||||
$! in the .num file, check that each line applies to VMS and the architecture,
 | 
			
		||||
$! and to fill in "holes" with dummy entries.
 | 
			
		||||
$!
 | 
			
		||||
$! The creator routines depend on the following variables:
 | 
			
		||||
$! libnum	The name of the .num file to use as input
 | 
			
		||||
$! libolb	The name of the object library to build from
 | 
			
		||||
$! libid	The identification string of the shareable library
 | 
			
		||||
$! libopt	The name of the .opt file to write
 | 
			
		||||
$! libtit	The title of the assembler transfer vector file (VAX only)
 | 
			
		||||
$! libmar	The name of the assembler transfer vector file (VAX only)
 | 
			
		||||
$! libmap	The name of the map file to write
 | 
			
		||||
$! libgoal	The name of the shareable library to write
 | 
			
		||||
$! libref	The name of a shareable library to link in
 | 
			
		||||
$!
 | 
			
		||||
$! read_func_num depends on the following variables from the creator:
 | 
			
		||||
$! libwriter	The name of the writer routine to call for each .num file line
 | 
			
		||||
$! -----
 | 
			
		||||
$
 | 
			
		||||
$! ----- Subroutines for AXP
 | 
			
		||||
$! -----
 | 
			
		||||
$! The creator routine
 | 
			
		||||
$ create_axp_shr:
 | 
			
		||||
$   open/write opt 'libopt'
 | 
			
		||||
$   write opt "identification=""",libid," ",libverstr,""""
 | 
			
		||||
$   write opt libolb,"/lib"
 | 
			
		||||
$   if libref .nes. "" then write opt libref,"/SHARE"
 | 
			
		||||
$   write opt "SYMBOL_VECTOR=(-"
 | 
			
		||||
$   libfirstentry := true
 | 
			
		||||
$   libwrch   := opt
 | 
			
		||||
$   libwriter := write_axp_transfer_entry
 | 
			
		||||
$   textcount = 0
 | 
			
		||||
$   gosub read_func_num
 | 
			
		||||
$   write opt ")"
 | 
			
		||||
$   write opt "GSMATCH=",libvmatch,",",libver
 | 
			
		||||
$   close opt
 | 
			
		||||
$   link/map='libmap'/full/share='libgoal' 'libopt'/option
 | 
			
		||||
$   return
 | 
			
		||||
$
 | 
			
		||||
$! The record writer routine
 | 
			
		||||
$ write_axp_transfer_entry:
 | 
			
		||||
$   if libentry .eqs. ".dummy" then return
 | 
			
		||||
$   if info_kind .eqs. "VARIABLE"
 | 
			
		||||
$   then
 | 
			
		||||
$     pr:=DATA
 | 
			
		||||
$   else
 | 
			
		||||
$     pr:=PROCEDURE
 | 
			
		||||
$   endif
 | 
			
		||||
$   textcount_this = f$length(pr) + f$length(libentry) + 5
 | 
			
		||||
$   if textcount + textcount_this .gt. 1024
 | 
			
		||||
$   then
 | 
			
		||||
$     write opt ")"
 | 
			
		||||
$     write opt "SYMBOL_VECTOR=(-"
 | 
			
		||||
$     textcount = 16
 | 
			
		||||
$     libfirstentry := true
 | 
			
		||||
$   endif
 | 
			
		||||
$   if libfirstentry
 | 
			
		||||
$   then
 | 
			
		||||
$     write 'libwrch' "    ",libentry,"=",pr," -"
 | 
			
		||||
$   else
 | 
			
		||||
$     write 'libwrch' "    ,",libentry,"=",pr," -"
 | 
			
		||||
$   endif
 | 
			
		||||
$   libfirstentry := false
 | 
			
		||||
$   textcount = textcount + textcount_this
 | 
			
		||||
$   return
 | 
			
		||||
$
 | 
			
		||||
$! ----- Subroutines for AXP
 | 
			
		||||
$! -----
 | 
			
		||||
$! The creator routine
 | 
			
		||||
$ create_vax_shr:
 | 
			
		||||
$   open/write mar 'libmar'
 | 
			
		||||
$   type sys$input:/out=mar:
 | 
			
		||||
;
 | 
			
		||||
; Transfer vector for VAX shareable image
 | 
			
		||||
;
 | 
			
		||||
$   write mar "	.TITLE ",libtit
 | 
			
		||||
$   write mar "	.IDENT /",libid,"/"
 | 
			
		||||
$   type sys$input:/out=mar:
 | 
			
		||||
;
 | 
			
		||||
; Define macro to assist in building transfer vector entries.  Each entry
 | 
			
		||||
; should take no more than 8 bytes.
 | 
			
		||||
;
 | 
			
		||||
	.MACRO FTRANSFER_ENTRY routine
 | 
			
		||||
	.ALIGN QUAD
 | 
			
		||||
	.TRANSFER routine
 | 
			
		||||
	.MASK	routine
 | 
			
		||||
	JMP	routine+2
 | 
			
		||||
	.ENDM FTRANSFER_ENTRY
 | 
			
		||||
;
 | 
			
		||||
; Place entries in own program section.
 | 
			
		||||
;
 | 
			
		||||
$   write mar "	.PSECT $$",libvec,",QUAD,PIC,USR,CON,REL,LCL,SHR,EXE,RD,NOWRT"
 | 
			
		||||
$   write mar libvec,"_xfer:"
 | 
			
		||||
$   libwrch   := mar
 | 
			
		||||
$   libwriter := write_vax_ftransfer_entry
 | 
			
		||||
$   gosub read_func_num
 | 
			
		||||
$   type sys$input:/out=mar:
 | 
			
		||||
;
 | 
			
		||||
; Allocate extra storage at end of vector to allow for expansion.
 | 
			
		||||
;
 | 
			
		||||
$   write mar "	.BLKB 32768-<.-",libvec,"_xfer>	; 64 pages total."
 | 
			
		||||
$!   libwriter := write_vax_vtransfer_entry
 | 
			
		||||
$!   gosub read_func_num
 | 
			
		||||
$   write mar "	.END"
 | 
			
		||||
$   close mar
 | 
			
		||||
$   open/write opt 'libopt'
 | 
			
		||||
$   write opt "identification=""",libid," ",libverstr,""""
 | 
			
		||||
$   write opt libobj
 | 
			
		||||
$   write opt libolb,"/lib"
 | 
			
		||||
$   if libref .nes. "" then write opt libref,"/SHARE"
 | 
			
		||||
$   type sys$input:/out=opt:
 | 
			
		||||
!
 | 
			
		||||
! Ensure transfer vector is at beginning of image
 | 
			
		||||
!
 | 
			
		||||
CLUSTER=FIRST
 | 
			
		||||
$   write opt "COLLECT=FIRST,$$",libvec
 | 
			
		||||
$   write opt "GSMATCH=",libvmatch,",",libver
 | 
			
		||||
$   type sys$input:/out=opt:
 | 
			
		||||
!
 | 
			
		||||
! make psects nonshareable so image can be installed.
 | 
			
		||||
!
 | 
			
		||||
PSECT_ATTR=$CHAR_STRING_CONSTANTS,NOWRT
 | 
			
		||||
$   libwrch   := opt
 | 
			
		||||
$   libwriter := write_vax_psect_attr
 | 
			
		||||
$   gosub read_func_num
 | 
			
		||||
$   close opt
 | 
			
		||||
$   macro/obj='libobj' 'libmar'
 | 
			
		||||
$   link/map='libmap'/full/share='libgoal' 'libopt'/option
 | 
			
		||||
$   return
 | 
			
		||||
$
 | 
			
		||||
$! The record writer routine for VAX functions
 | 
			
		||||
$ write_vax_ftransfer_entry:
 | 
			
		||||
$   if info_kind .nes. "FUNCTION" then return
 | 
			
		||||
$   if libentry .eqs ".dummy"
 | 
			
		||||
$   then
 | 
			
		||||
$     write 'libwrch' "	.BLKB 8" ! Dummy is zeroes...
 | 
			
		||||
$   else
 | 
			
		||||
$     write 'libwrch' "	FTRANSFER_ENTRY ",libentry
 | 
			
		||||
$   endif
 | 
			
		||||
$   return
 | 
			
		||||
$! The record writer routine for VAX variables (should never happen!)
 | 
			
		||||
$ write_vax_psect_attr:
 | 
			
		||||
$   if info_kind .nes. "VARIABLE" then return
 | 
			
		||||
$   if libentry .eqs ".dummy" then return
 | 
			
		||||
$   write 'libwrch' "PSECT_ATTR=",libentry,",NOSHR"
 | 
			
		||||
$   return
 | 
			
		||||
$
 | 
			
		||||
$! ----- Common subroutines
 | 
			
		||||
$! -----
 | 
			
		||||
$! The .num file reader.  This one has great responsability.
 | 
			
		||||
$ read_func_num:
 | 
			
		||||
$   open libnum 'libnum'
 | 
			
		||||
$   goto read_nums
 | 
			
		||||
$
 | 
			
		||||
$ read_nums:
 | 
			
		||||
$   libentrynum=0
 | 
			
		||||
$   liblastentry:=false
 | 
			
		||||
$   entrycount=0
 | 
			
		||||
$   loop:
 | 
			
		||||
$     read/end=loop_end/err=loop_end libnum line
 | 
			
		||||
$     entrynum=f$int(f$element(1," ",f$edit(line,"COMPRESS,TRIM")))
 | 
			
		||||
$     entryinfo=f$element(2," ",f$edit(line,"COMPRESS,TRIM"))
 | 
			
		||||
$     curentry=f$element(0," ",f$edit(line,"COMPRESS,TRIM"))
 | 
			
		||||
$     info_exist=f$element(0,":",entryinfo)
 | 
			
		||||
$     info_platforms=","+f$element(1,":",entryinfo)+","
 | 
			
		||||
$     info_kind=f$element(2,":",entryinfo)
 | 
			
		||||
$     info_algorithms=","+f$element(3,":",entryinfo)+","
 | 
			
		||||
$     if info_exist .eqs. "NOEXIST" then goto loop
 | 
			
		||||
$     truesum = 0
 | 
			
		||||
$     falsesum = 0
 | 
			
		||||
$     negatives = 1
 | 
			
		||||
$     plat_i = 0
 | 
			
		||||
$     loop1:
 | 
			
		||||
$       plat_entry = f$element(plat_i,",",info_platforms)
 | 
			
		||||
$       plat_i = plat_i + 1
 | 
			
		||||
$       if plat_entry .eqs. "" then goto loop1
 | 
			
		||||
$       if plat_entry .nes. ","
 | 
			
		||||
$       then
 | 
			
		||||
$         if f$extract(0,1,plat_entry) .nes. "!" then negatives = 0
 | 
			
		||||
$         if f$getsyi("CPU") .lt. 128
 | 
			
		||||
$         then
 | 
			
		||||
$           if plat_entry .eqs. "EXPORT_VAR_AS_FUNCTION" then -
 | 
			
		||||
$             truesum = truesum + 1
 | 
			
		||||
$           if plat_entry .eqs. "!EXPORT_VAR_AS_FUNCTION" then -
 | 
			
		||||
$             falsesum = falsesum + 1
 | 
			
		||||
$         endif
 | 
			
		||||
$         if plat_entry .eqs. "VMS" then truesum = truesum + 1
 | 
			
		||||
$         if plat_entry .eqs. "!VMS" then falsesum = falsesum + 1
 | 
			
		||||
$         if f$trnlnm("OPENSSL_FIPS") .nes. ""
 | 
			
		||||
$         then
 | 
			
		||||
$           if plat_entry .eqs. "OPENSSL_FIPS" then truesum = truesum + 1
 | 
			
		||||
$           if plat_entry .eqs. "!OPENSSL_FIPS" then falsesum = falsesum + 1
 | 
			
		||||
$         else
 | 
			
		||||
$           if plat_entry .eqs. "OPENSSL_FIPS" then falsesum = falsesum + 1
 | 
			
		||||
$           if plat_entry .eqs. "!OPENSSL_FIPS" then truesum = truesum + 1
 | 
			
		||||
$         endif
 | 
			
		||||
$	  goto loop1
 | 
			
		||||
$       endif
 | 
			
		||||
$     endloop1:
 | 
			
		||||
$!DEBUG!$     if info_platforms - "EXPORT_VAR_AS_FUNCTION" .nes. info_platforms
 | 
			
		||||
$!DEBUG!$     then
 | 
			
		||||
$!DEBUG!$       write sys$output line
 | 
			
		||||
$!DEBUG!$       write sys$output "        truesum = ",truesum,-
 | 
			
		||||
$!DEBUG!		", negatives = ",negatives,", falsesum = ",falsesum
 | 
			
		||||
$!DEBUG!$     endif
 | 
			
		||||
$     if falsesum .ne. 0 then goto loop
 | 
			
		||||
$     if truesum+negatives .eq. 0 then goto loop
 | 
			
		||||
$     alg_i = 0
 | 
			
		||||
$     loop2:
 | 
			
		||||
$       alg_entry = f$element(alg_i,",",info_algorithms)
 | 
			
		||||
$	alg_i = alg_i + 1
 | 
			
		||||
$       if alg_entry .eqs. "" then goto loop2
 | 
			
		||||
$       if alg_entry .nes. ","
 | 
			
		||||
$       then
 | 
			
		||||
$         if alg_entry .eqs. "KRB5" then goto loop ! Special for now
 | 
			
		||||
$         if f$trnlnm("OPENSSL_NO_"+alg_entry) .nes. "" then goto loop
 | 
			
		||||
$	  goto loop2
 | 
			
		||||
$       endif
 | 
			
		||||
$     endloop2:
 | 
			
		||||
$     if info_platforms - "EXPORT_VAR_AS_FUNCTION" .nes. info_platforms
 | 
			
		||||
$     then
 | 
			
		||||
$!DEBUG!$     write sys$output curentry," ; ",entrynum," ; ",entryinfo
 | 
			
		||||
$     endif
 | 
			
		||||
$   redo:
 | 
			
		||||
$     next:=loop
 | 
			
		||||
$     tolibentry=curentry
 | 
			
		||||
$     if libentrynum .ne. entrynum
 | 
			
		||||
$     then
 | 
			
		||||
$       entrycount=entrycount+1
 | 
			
		||||
$       if entrycount .lt. entrynum
 | 
			
		||||
$       then
 | 
			
		||||
$!DEBUG!$         write sys$output "Info: entrycount: ''entrycount', entrynum: ''entrynum' => 0"
 | 
			
		||||
$         tolibentry=".dummy"
 | 
			
		||||
$         next:=redo
 | 
			
		||||
$       endif
 | 
			
		||||
$       if entrycount .gt. entrynum
 | 
			
		||||
$       then
 | 
			
		||||
$         write sys$error "Decreasing library entry numbers!  Can't continue"
 | 
			
		||||
$         write sys$error """",line,""""
 | 
			
		||||
$         close libnum
 | 
			
		||||
$         return
 | 
			
		||||
$       endif
 | 
			
		||||
$       libentry=tolibentry
 | 
			
		||||
$!DEBUG!$       write sys$output entrycount," ",libentry," ",entryinfo
 | 
			
		||||
$       if libentry .nes. "" .and. libwriter .nes. "" then gosub 'libwriter'
 | 
			
		||||
$     else
 | 
			
		||||
$       write sys$error "Info: ""''curentry'"" is an alias for ""''libentry'"".  Overriding..."
 | 
			
		||||
$     endif
 | 
			
		||||
$     libentrynum=entrycount
 | 
			
		||||
$     goto 'next'
 | 
			
		||||
$   loop_end:
 | 
			
		||||
$   close libnum
 | 
			
		||||
$   return
 | 
			
		||||
$
 | 
			
		||||
$! The version number reader
 | 
			
		||||
$ read_version_info:
 | 
			
		||||
$   libver = ""
 | 
			
		||||
$   open/read vf [.CRYPTO]OPENSSLV.H
 | 
			
		||||
$   loop_rvi:
 | 
			
		||||
$     read/err=endloop_rvi/end=endloop_rvi vf rvi_line
 | 
			
		||||
$     if rvi_line - "SHLIB_VERSION_NUMBER """ .eqs. rvi_line then -
 | 
			
		||||
	goto loop_rvi
 | 
			
		||||
$     libverstr = f$element(1,"""",rvi_line)
 | 
			
		||||
$     libvmajor = f$element(0,".",libverstr)
 | 
			
		||||
$     libvminor = f$element(1,".",libverstr)
 | 
			
		||||
$     libvedit = f$element(2,".",libverstr)
 | 
			
		||||
$     libvpatch = f$cvui(0,8,f$extract(1,1,libvedit)+"@")-f$cvui(0,8,"@")
 | 
			
		||||
$     libvedit = f$extract(0,1,libvedit)
 | 
			
		||||
$     libver = f$string(f$int(libvmajor)*100)+","+-
 | 
			
		||||
	f$string(f$int(libvminor)*100+f$int(libvedit)*10+f$int(libvpatch))
 | 
			
		||||
$     if libvmajor .eqs. "0"
 | 
			
		||||
$     then
 | 
			
		||||
$       libvmatch = "EQUAL"
 | 
			
		||||
$     else
 | 
			
		||||
$       ! Starting with the 1.0 release, backward compatibility should be
 | 
			
		||||
$       ! kept, so switch over to the following
 | 
			
		||||
$       libvmatch = "LEQUAL"
 | 
			
		||||
$     endif
 | 
			
		||||
$   endloop_rvi:
 | 
			
		||||
$   close vf
 | 
			
		||||
$   return
 | 
			
		||||
@@ -1 +0,0 @@
 | 
			
		||||
sys$share:tcpip$ipc_shr.exe/share
 | 
			
		||||
@@ -3,6 +3,3 @@ Makefile.save
 | 
			
		||||
der_chop
 | 
			
		||||
der_chop.bak
 | 
			
		||||
CA.pl
 | 
			
		||||
openssl.sha1
 | 
			
		||||
*.flc
 | 
			
		||||
semantic.cache
 | 
			
		||||
 
 | 
			
		||||
@@ -5,7 +5,7 @@
 | 
			
		||||
#      things easier between now and when Eric is convinced to fix it :-)
 | 
			
		||||
#
 | 
			
		||||
# CA -newca ... will setup the right stuff
 | 
			
		||||
# CA -newreq[-nodes] ... will generate a certificate request 
 | 
			
		||||
# CA -newreq ... will generate a certificate request 
 | 
			
		||||
# CA -sign ... will sign the generated request and output 
 | 
			
		||||
#
 | 
			
		||||
# At the end of that grab newreq.pem and newcert.pem (one has the key 
 | 
			
		||||
@@ -36,21 +36,13 @@
 | 
			
		||||
# default openssl.cnf file has setup as per the following
 | 
			
		||||
# demoCA ... where everything is stored
 | 
			
		||||
 | 
			
		||||
my $openssl;
 | 
			
		||||
if(defined $ENV{OPENSSL}) {
 | 
			
		||||
	$openssl = $ENV{OPENSSL};
 | 
			
		||||
} else {
 | 
			
		||||
	$openssl = "openssl";
 | 
			
		||||
	$ENV{OPENSSL} = $openssl;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
$SSLEAY_CONFIG=$ENV{"SSLEAY_CONFIG"};
 | 
			
		||||
$DAYS="-days 365";
 | 
			
		||||
$REQ="$openssl req $SSLEAY_CONFIG";
 | 
			
		||||
$CA="$openssl ca $SSLEAY_CONFIG";
 | 
			
		||||
$VERIFY="$openssl verify";
 | 
			
		||||
$X509="$openssl x509";
 | 
			
		||||
$PKCS12="$openssl pkcs12";
 | 
			
		||||
$REQ="openssl req $SSLEAY_CONFIG";
 | 
			
		||||
$CA="openssl ca $SSLEAY_CONFIG";
 | 
			
		||||
$VERIFY="openssl verify";
 | 
			
		||||
$X509="openssl x509";
 | 
			
		||||
$PKCS12="openssl pkcs12";
 | 
			
		||||
 | 
			
		||||
$CATOP="./demoCA";
 | 
			
		||||
$CAKEY="cakey.pem";
 | 
			
		||||
@@ -62,23 +54,18 @@ $RET = 0;
 | 
			
		||||
 | 
			
		||||
foreach (@ARGV) {
 | 
			
		||||
	if ( /^(-\?|-h|-help)$/ ) {
 | 
			
		||||
	    print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n";
 | 
			
		||||
	    print STDERR "usage: CA -newcert|-newreq|-newca|-sign|-verify\n";
 | 
			
		||||
	    exit 0;
 | 
			
		||||
	} elsif (/^-newcert$/) {
 | 
			
		||||
	    # create a certificate
 | 
			
		||||
	    system ("$REQ -new -x509 -keyout newkey.pem -out newcert.pem $DAYS");
 | 
			
		||||
	    system ("$REQ -new -x509 -keyout newreq.pem -out newreq.pem $DAYS");
 | 
			
		||||
	    $RET=$?;
 | 
			
		||||
	    print "Certificate is in newcert.pem, private key is in newkey.pem\n"
 | 
			
		||||
	    print "Certificate (and private key) is in newreq.pem\n"
 | 
			
		||||
	} elsif (/^-newreq$/) {
 | 
			
		||||
	    # create a certificate request
 | 
			
		||||
	    system ("$REQ -new -keyout newkey.pem -out newreq.pem $DAYS");
 | 
			
		||||
	    system ("$REQ -new -keyout newreq.pem -out newreq.pem $DAYS");
 | 
			
		||||
	    $RET=$?;
 | 
			
		||||
	    print "Request is in newreq.pem, private key is in newkey.pem\n";
 | 
			
		||||
	} elsif (/^-newreq-nodes$/) {
 | 
			
		||||
	    # create a certificate request
 | 
			
		||||
	    system ("$REQ -new -nodes -keyout newkey.pem -out newreq.pem $DAYS");
 | 
			
		||||
	    $RET=$?;
 | 
			
		||||
	    print "Request is in newreq.pem, private key is in newkey.pem\n";
 | 
			
		||||
	    print "Request (and private key) is in newreq.pem\n";
 | 
			
		||||
	} elsif (/^-newca$/) {
 | 
			
		||||
		# if explicitly asked for or it doesn't exist then setup the
 | 
			
		||||
		# directory structure that Eric likes to manage things 
 | 
			
		||||
@@ -90,6 +77,9 @@ foreach (@ARGV) {
 | 
			
		||||
		mkdir "${CATOP}/crl", $DIRMODE ;
 | 
			
		||||
		mkdir "${CATOP}/newcerts", $DIRMODE;
 | 
			
		||||
		mkdir "${CATOP}/private", $DIRMODE;
 | 
			
		||||
		open OUT, ">${CATOP}/serial";
 | 
			
		||||
		print OUT "01\n";
 | 
			
		||||
		close OUT;
 | 
			
		||||
		open OUT, ">${CATOP}/index.txt";
 | 
			
		||||
		close OUT;
 | 
			
		||||
	    }
 | 
			
		||||
@@ -111,18 +101,13 @@ foreach (@ARGV) {
 | 
			
		||||
		    $RET=$?;
 | 
			
		||||
		}
 | 
			
		||||
	    }
 | 
			
		||||
	    if (! -f "${CATOP}/serial" ) {
 | 
			
		||||
		system ("$X509 -in ${CATOP}/$CACERT -noout "
 | 
			
		||||
			. "-next_serial -out ${CATOP}/serial");
 | 
			
		||||
	    }
 | 
			
		||||
	} elsif (/^-pkcs12$/) {
 | 
			
		||||
	    my $cname = $ARGV[1];
 | 
			
		||||
	    $cname = "My Certificate" unless defined $cname;
 | 
			
		||||
	    system ("$PKCS12 -in newcert.pem -inkey newkey.pem " .
 | 
			
		||||
	    system ("$PKCS12 -in newcert.pem -inkey newreq.pem " .
 | 
			
		||||
			"-certfile ${CATOP}/$CACERT -out newcert.p12 " .
 | 
			
		||||
			"-export -name \"$cname\"");
 | 
			
		||||
	    $RET=$?;
 | 
			
		||||
	    print "PKCS #12 file is in newcert.p12\n";
 | 
			
		||||
	    exit $RET;
 | 
			
		||||
	} elsif (/^-xsign$/) {
 | 
			
		||||
	    system ("$CA -policy policy_anything -infiles newreq.pem");
 | 
			
		||||
@@ -158,7 +143,7 @@ foreach (@ARGV) {
 | 
			
		||||
	    }
 | 
			
		||||
	} else {
 | 
			
		||||
	    print STDERR "Unknown arg $_\n";
 | 
			
		||||
	    print STDERR "usage: CA -newcert|-newreq|-newreq-nodes|-newca|-sign|-verify\n";
 | 
			
		||||
	    print STDERR "usage: CA -newcert|-newreq|-newca|-sign|-verify\n";
 | 
			
		||||
	    exit 1;
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										18
									
								
								apps/CA.sh
									
									
									
									
									
								
							
							
						
						
									
										18
									
								
								apps/CA.sh
									
									
									
									
									
								
							@@ -30,13 +30,11 @@
 | 
			
		||||
# default openssl.cnf file has setup as per the following
 | 
			
		||||
# demoCA ... where everything is stored
 | 
			
		||||
 | 
			
		||||
if [ -z "$OPENSSL" ]; then OPENSSL=openssl; fi
 | 
			
		||||
 | 
			
		||||
DAYS="-days 365"
 | 
			
		||||
REQ="$OPENSSL req $SSLEAY_CONFIG"
 | 
			
		||||
CA="$OPENSSL ca $SSLEAY_CONFIG"
 | 
			
		||||
VERIFY="$OPENSSL verify"
 | 
			
		||||
X509="$OPENSSL x509"
 | 
			
		||||
REQ="openssl req $SSLEAY_CONFIG"
 | 
			
		||||
CA="openssl ca $SSLEAY_CONFIG"
 | 
			
		||||
VERIFY="openssl verify"
 | 
			
		||||
X509="openssl x509"
 | 
			
		||||
 | 
			
		||||
CATOP=./demoCA
 | 
			
		||||
CAKEY=./cakey.pem
 | 
			
		||||
@@ -51,15 +49,15 @@ case $i in
 | 
			
		||||
    ;;
 | 
			
		||||
-newcert) 
 | 
			
		||||
    # create a certificate
 | 
			
		||||
    $REQ -new -x509 -keyout newkey.pem -out newcert.pem $DAYS
 | 
			
		||||
    $REQ -new -x509 -keyout newreq.pem -out newreq.pem $DAYS
 | 
			
		||||
    RET=$?
 | 
			
		||||
    echo "Certificate is in newcert.pem, private key is in newkey.pem"
 | 
			
		||||
    echo "Certificate (and private key) is in newreq.pem"
 | 
			
		||||
    ;;
 | 
			
		||||
-newreq) 
 | 
			
		||||
    # create a certificate request
 | 
			
		||||
    $REQ -new -keyout newkey.pem -out newreq.pem $DAYS
 | 
			
		||||
    $REQ -new -keyout newreq.pem -out newreq.pem $DAYS
 | 
			
		||||
    RET=$?
 | 
			
		||||
    echo "Request is in newreq.pem, private key is in newkey.pem"
 | 
			
		||||
    echo "Request (and private key) is in newreq.pem"
 | 
			
		||||
    ;;
 | 
			
		||||
-newca)     
 | 
			
		||||
    # if explicitly asked for or it doesn't exist then setup the directory
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1171
									
								
								apps/Makefile
									
									
									
									
									
								
							
							
						
						
									
										1171
									
								
								apps/Makefile
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										929
									
								
								apps/Makefile.ssl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										929
									
								
								apps/Makefile.ssl
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,929 @@
 | 
			
		||||
#
 | 
			
		||||
#  apps/Makefile.ssl
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
DIR=		apps
 | 
			
		||||
TOP=		..
 | 
			
		||||
CC=		cc
 | 
			
		||||
INCLUDES=	-I../include
 | 
			
		||||
CFLAG=		-g -static
 | 
			
		||||
INSTALL_PREFIX=
 | 
			
		||||
INSTALLTOP=	/usr/local/ssl
 | 
			
		||||
OPENSSLDIR=	/usr/local/ssl
 | 
			
		||||
MAKE=		make -f Makefile.ssl
 | 
			
		||||
MAKEDEPEND=	$(TOP)/util/domd $(TOP)
 | 
			
		||||
MAKEFILE=	Makefile.ssl
 | 
			
		||||
PERL=		perl
 | 
			
		||||
RM=		rm -f
 | 
			
		||||
 | 
			
		||||
PEX_LIBS=
 | 
			
		||||
EX_LIBS= 
 | 
			
		||||
EXE_EXT= 
 | 
			
		||||
 | 
			
		||||
CFLAGS= -DMONOLITH $(INCLUDES) $(CFLAG)
 | 
			
		||||
 | 
			
		||||
GENERAL=Makefile makeapps.com install.com
 | 
			
		||||
 | 
			
		||||
DLIBCRYPTO=../libcrypto.a
 | 
			
		||||
DLIBSSL=../libssl.a
 | 
			
		||||
LIBCRYPTO=-L.. -lcrypto
 | 
			
		||||
LIBSSL=-L.. -lssl
 | 
			
		||||
 | 
			
		||||
PROGRAM= openssl
 | 
			
		||||
 | 
			
		||||
SCRIPTS=CA.sh CA.pl der_chop
 | 
			
		||||
 | 
			
		||||
EXE= $(PROGRAM)$(EXE_EXT)
 | 
			
		||||
 | 
			
		||||
E_EXE=	verify asn1pars req dgst dh dhparam enc passwd gendh errstr \
 | 
			
		||||
	ca crl rsa rsautl dsa dsaparam \
 | 
			
		||||
	x509 genrsa gendsa s_server s_client speed \
 | 
			
		||||
	s_time version pkcs7 crl2pkcs7 sess_id ciphers nseq pkcs12 \
 | 
			
		||||
	pkcs8 spkac smime rand
 | 
			
		||||
 | 
			
		||||
PROGS= $(PROGRAM).c
 | 
			
		||||
 | 
			
		||||
A_OBJ=apps.o
 | 
			
		||||
A_SRC=apps.c
 | 
			
		||||
S_OBJ=	s_cb.o s_socket.o
 | 
			
		||||
S_SRC=	s_cb.c s_socket.c
 | 
			
		||||
RAND_OBJ=app_rand.o
 | 
			
		||||
RAND_SRC=app_rand.c
 | 
			
		||||
 | 
			
		||||
E_OBJ=	verify.o asn1pars.o req.o dgst.o dh.o dhparam.o enc.o passwd.o gendh.o errstr.o \
 | 
			
		||||
	ca.o pkcs7.o crl2p7.o crl.o \
 | 
			
		||||
	rsa.o rsautl.o dsa.o dsaparam.o \
 | 
			
		||||
	x509.o genrsa.o gendsa.o s_server.o s_client.o speed.o \
 | 
			
		||||
	s_time.o $(A_OBJ) $(S_OBJ) $(RAND_OBJ) version.o sess_id.o \
 | 
			
		||||
	ciphers.o nseq.o pkcs12.o pkcs8.o spkac.o smime.o rand.o
 | 
			
		||||
 | 
			
		||||
E_SRC=	verify.c asn1pars.c req.c dgst.c dh.c enc.c passwd.c gendh.c errstr.c ca.c \
 | 
			
		||||
	pkcs7.c crl2p7.c crl.c \
 | 
			
		||||
	rsa.c rsautl.c dsa.c dsaparam.c \
 | 
			
		||||
	x509.c genrsa.c gendsa.c s_server.c s_client.c speed.c \
 | 
			
		||||
	s_time.c $(A_SRC) $(S_SRC) $(RAND_SRC) version.c sess_id.c \
 | 
			
		||||
	ciphers.c nseq.c pkcs12.c pkcs8.c spkac.c smime.c rand.c
 | 
			
		||||
 | 
			
		||||
SRC=$(E_SRC)
 | 
			
		||||
 | 
			
		||||
EXHEADER=
 | 
			
		||||
HEADER=	apps.h progs.h s_apps.h \
 | 
			
		||||
	testdsa.h testrsa.h \
 | 
			
		||||
	$(EXHEADER)
 | 
			
		||||
 | 
			
		||||
ALL=    $(GENERAL) $(SRC) $(HEADER)
 | 
			
		||||
 | 
			
		||||
top:
 | 
			
		||||
	@(cd ..; $(MAKE) DIRS=$(DIR) all)
 | 
			
		||||
 | 
			
		||||
all:	exe
 | 
			
		||||
 | 
			
		||||
exe:	$(PROGRAM)
 | 
			
		||||
 | 
			
		||||
req: sreq.o $(A_OBJ) $(DLIBCRYPTO)
 | 
			
		||||
	$(CC) -o req $(CFLAG) sreq.o $(A_OBJ) $(RAND_OBJ) $(PEX_LIBS) $(LIBCRYPTO) $(EX_LIBS)
 | 
			
		||||
 | 
			
		||||
sreq.o: req.c 
 | 
			
		||||
	$(CC) -c $(INCLUDES) $(CFLAG) -o sreq.o req.c
 | 
			
		||||
 | 
			
		||||
files:
 | 
			
		||||
	$(PERL) $(TOP)/util/files.pl Makefile.ssl >> $(TOP)/MINFO
 | 
			
		||||
 | 
			
		||||
install:
 | 
			
		||||
	@for i in $(EXE); \
 | 
			
		||||
	do  \
 | 
			
		||||
	(echo installing $$i; \
 | 
			
		||||
	 cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i; \
 | 
			
		||||
	 chmod 755 $(INSTALL_PREFIX)$(INSTALLTOP)/bin/$$i ); \
 | 
			
		||||
	 done;
 | 
			
		||||
	@for i in $(SCRIPTS); \
 | 
			
		||||
	do  \
 | 
			
		||||
	(echo installing $$i; \
 | 
			
		||||
	 cp $$i $(INSTALL_PREFIX)$(OPENSSLDIR)/misc/$$i; \
 | 
			
		||||
	 chmod 755 $(INSTALL_PREFIX)$(OPENSSLDIR)/misc/$$i ); \
 | 
			
		||||
	 done
 | 
			
		||||
	@cp openssl.cnf $(INSTALL_PREFIX)$(OPENSSLDIR); \
 | 
			
		||||
	chmod 644 $(INSTALL_PREFIX)$(OPENSSLDIR)/openssl.cnf
 | 
			
		||||
 | 
			
		||||
tags:
 | 
			
		||||
	ctags $(SRC)
 | 
			
		||||
 | 
			
		||||
tests:
 | 
			
		||||
 | 
			
		||||
links:
 | 
			
		||||
	@$(TOP)/util/point.sh Makefile.ssl Makefile
 | 
			
		||||
 | 
			
		||||
lint:
 | 
			
		||||
	lint -DLINT $(INCLUDES) $(SRC)>fluff
 | 
			
		||||
 | 
			
		||||
depend:
 | 
			
		||||
	$(MAKEDEPEND) $(INCLUDES) $(DEPFLAG) $(PROGS) $(SRC)
 | 
			
		||||
 | 
			
		||||
dclean:
 | 
			
		||||
	$(PERL) -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new
 | 
			
		||||
	mv -f Makefile.new $(MAKEFILE)
 | 
			
		||||
 | 
			
		||||
clean:
 | 
			
		||||
	rm -f *.o *.obj lib tags core .pure .nfs* *.old *.bak fluff $(EXE)
 | 
			
		||||
	rm -f req
 | 
			
		||||
 | 
			
		||||
$(DLIBSSL):
 | 
			
		||||
	(cd ../ssl; $(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' TESTS='${TESTS}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}')
 | 
			
		||||
 | 
			
		||||
$(DLIBCRYPTO):
 | 
			
		||||
	(cd ../crypto; $(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' TESTS='${TESTS}' EXE_EXT='${EXE_EXT}' SHARED_LIBS='${SHARED_LIBS}' SHLIB_EXT='${SHLIB_EXT}' SHLIB_TARGET='${SHLIB_TARGET}')
 | 
			
		||||
 | 
			
		||||
$(PROGRAM): progs.h $(E_OBJ) $(PROGRAM).o $(DLIBCRYPTO) $(DLIBSSL)
 | 
			
		||||
	$(RM) $(PROGRAM)
 | 
			
		||||
	$(CC) -o $(PROGRAM) $(CFLAGS) $(PROGRAM).o $(E_OBJ) $(PEX_LIBS) $(LIBSSL) $(LIBCRYPTO) $(EX_LIBS)
 | 
			
		||||
	-(cd ..; OPENSSL="`pwd`/apps/openssl"; export OPENSSL; $(PERL) tools/c_rehash certs)
 | 
			
		||||
 | 
			
		||||
progs.h: progs.pl
 | 
			
		||||
	$(PERL) progs.pl $(E_EXE) >progs.h
 | 
			
		||||
	$(RM) $(PROGRAM).o
 | 
			
		||||
 | 
			
		||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
 | 
			
		||||
 | 
			
		||||
app_rand.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
app_rand.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
app_rand.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
app_rand.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
app_rand.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
app_rand.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
app_rand.o: ../include/openssl/e_os2.h ../include/openssl/evp.h
 | 
			
		||||
app_rand.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
app_rand.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
app_rand.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
app_rand.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
app_rand.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
app_rand.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
 | 
			
		||||
app_rand.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
app_rand.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
app_rand.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
app_rand.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
app_rand.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
app_rand.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
apps.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
apps.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
apps.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
apps.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
apps.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
apps.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
apps.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
apps.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
apps.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
apps.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
apps.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
apps.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
apps.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
apps.o: ../include/openssl/pem2.h ../include/openssl/pkcs12.h
 | 
			
		||||
apps.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
apps.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
apps.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
apps.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
apps.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
apps.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
asn1pars.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
asn1pars.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
asn1pars.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
asn1pars.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
asn1pars.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
asn1pars.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
asn1pars.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
asn1pars.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
asn1pars.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
asn1pars.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
asn1pars.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
asn1pars.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
asn1pars.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
asn1pars.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
asn1pars.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
asn1pars.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
asn1pars.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
asn1pars.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
asn1pars.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
asn1pars.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
ca.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
ca.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
ca.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
ca.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
ca.o: ../include/openssl/des.h ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
ca.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
ca.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
ca.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
ca.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
ca.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
ca.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
ca.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
ca.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
ca.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
ca.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
ca.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
ca.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
ca.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
ca.o: ../include/openssl/txt_db.h ../include/openssl/x509.h
 | 
			
		||||
ca.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
ciphers.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
ciphers.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
ciphers.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
ciphers.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
ciphers.o: ../include/openssl/crypto.h ../include/openssl/des.h
 | 
			
		||||
ciphers.o: ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
ciphers.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
ciphers.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
ciphers.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
ciphers.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
ciphers.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
ciphers.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
ciphers.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
ciphers.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
ciphers.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
ciphers.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
ciphers.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
ciphers.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
ciphers.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
ciphers.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
ciphers.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
ciphers.o: ../include/openssl/tls1.h ../include/openssl/x509.h
 | 
			
		||||
ciphers.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
crl.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
crl.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
crl.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
crl.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
crl.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
crl.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
crl.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
crl.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
crl.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
crl.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
crl.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
crl.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
crl.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
crl.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
crl.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
crl.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
crl.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
crl.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
crl.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
crl.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
crl2p7.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
crl2p7.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
crl2p7.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
crl2p7.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
crl2p7.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
crl2p7.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
crl2p7.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
crl2p7.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
crl2p7.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
crl2p7.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
crl2p7.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
crl2p7.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
crl2p7.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
crl2p7.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
crl2p7.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
crl2p7.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
crl2p7.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
crl2p7.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
crl2p7.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
crl2p7.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
dgst.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
dgst.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
dgst.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
dgst.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
dgst.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
dgst.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
dgst.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
dgst.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
dgst.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
dgst.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
dgst.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
dgst.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
dgst.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
dgst.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
dgst.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
dgst.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
dgst.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
dgst.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
dgst.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
dgst.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
dh.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
dh.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
dh.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
dh.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
dh.o: ../include/openssl/des.h ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
dh.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
dh.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
dh.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
dh.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
dh.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
dh.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
dh.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
dh.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
dh.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
dh.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
dh.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
dh.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
dh.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
dh.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
dsa.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
dsa.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
dsa.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
dsa.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
dsa.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
dsa.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
dsa.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
dsa.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
dsa.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
dsa.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
dsa.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
dsa.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
dsa.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
dsa.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
dsa.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
dsa.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
dsa.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
dsa.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
dsa.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
dsa.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
dsaparam.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
dsaparam.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
dsaparam.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
dsaparam.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
dsaparam.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
dsaparam.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
dsaparam.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
dsaparam.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
dsaparam.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
dsaparam.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
dsaparam.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
dsaparam.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
dsaparam.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
dsaparam.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
dsaparam.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
dsaparam.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
dsaparam.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
dsaparam.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
dsaparam.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
dsaparam.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
enc.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
enc.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
enc.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
enc.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
enc.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
enc.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
enc.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
enc.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
enc.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
enc.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
enc.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
enc.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
enc.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
enc.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
enc.o: ../include/openssl/rand.h ../include/openssl/rc2.h
 | 
			
		||||
enc.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
enc.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
enc.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
enc.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
enc.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
errstr.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
errstr.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
errstr.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
errstr.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
errstr.o: ../include/openssl/crypto.h ../include/openssl/des.h
 | 
			
		||||
errstr.o: ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
errstr.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
errstr.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
errstr.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
errstr.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
errstr.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
errstr.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
errstr.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
errstr.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
errstr.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
errstr.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
errstr.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
errstr.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
errstr.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
errstr.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
errstr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
errstr.o: ../include/openssl/tls1.h ../include/openssl/x509.h
 | 
			
		||||
errstr.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
gendh.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
gendh.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
gendh.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
gendh.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
gendh.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
gendh.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
gendh.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
gendh.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
gendh.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
gendh.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
gendh.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
gendh.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
gendh.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
gendh.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
gendh.o: ../include/openssl/rand.h ../include/openssl/rc2.h
 | 
			
		||||
gendh.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
gendh.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
gendh.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
gendh.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
gendh.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
gendsa.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
gendsa.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
gendsa.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
gendsa.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
gendsa.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
gendsa.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
gendsa.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
gendsa.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
gendsa.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
gendsa.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
gendsa.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
gendsa.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
gendsa.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
gendsa.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
gendsa.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
gendsa.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
gendsa.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
gendsa.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
gendsa.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
gendsa.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
genrsa.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
genrsa.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
genrsa.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
genrsa.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
genrsa.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
genrsa.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
genrsa.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
genrsa.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
genrsa.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
genrsa.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
genrsa.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
genrsa.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
genrsa.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
genrsa.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
genrsa.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
genrsa.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
genrsa.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
genrsa.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
genrsa.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
genrsa.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
nseq.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
nseq.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
nseq.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
nseq.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
nseq.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
nseq.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
nseq.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
nseq.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
nseq.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
nseq.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
nseq.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
nseq.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
nseq.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
nseq.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
nseq.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
nseq.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
nseq.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
nseq.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
nseq.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
nseq.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
openssl.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
openssl.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
openssl.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
openssl.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
openssl.o: ../include/openssl/crypto.h ../include/openssl/des.h
 | 
			
		||||
openssl.o: ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
openssl.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
openssl.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
openssl.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
openssl.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
openssl.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
openssl.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
openssl.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
openssl.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
openssl.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
openssl.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
openssl.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
openssl.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
openssl.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
openssl.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
openssl.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
openssl.o: ../include/openssl/tls1.h ../include/openssl/x509.h
 | 
			
		||||
openssl.o: ../include/openssl/x509_vfy.h apps.h progs.h s_apps.h
 | 
			
		||||
passwd.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
passwd.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
passwd.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
passwd.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
passwd.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
passwd.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
passwd.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
passwd.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
passwd.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
passwd.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
passwd.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
passwd.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
passwd.o: ../include/openssl/opensslv.h ../include/openssl/pkcs7.h
 | 
			
		||||
passwd.o: ../include/openssl/rand.h ../include/openssl/rc2.h
 | 
			
		||||
passwd.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
passwd.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
passwd.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
passwd.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
passwd.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
pkcs12.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
pkcs12.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
pkcs12.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
pkcs12.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
pkcs12.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
pkcs12.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
pkcs12.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
pkcs12.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
pkcs12.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
pkcs12.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
pkcs12.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
pkcs12.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
pkcs12.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
pkcs12.o: ../include/openssl/pem2.h ../include/openssl/pkcs12.h
 | 
			
		||||
pkcs12.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
pkcs12.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
pkcs12.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
pkcs12.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
pkcs12.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
pkcs12.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
pkcs7.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
pkcs7.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
pkcs7.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
pkcs7.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
pkcs7.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
pkcs7.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
pkcs7.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
pkcs7.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
pkcs7.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
pkcs7.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
pkcs7.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
pkcs7.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
pkcs7.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
pkcs7.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
pkcs7.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
pkcs7.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
pkcs7.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
pkcs7.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
pkcs7.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
pkcs7.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
pkcs8.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
pkcs8.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
pkcs8.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
pkcs8.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
pkcs8.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
pkcs8.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
pkcs8.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
pkcs8.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
pkcs8.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
pkcs8.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
pkcs8.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
pkcs8.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
pkcs8.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
pkcs8.o: ../include/openssl/pem2.h ../include/openssl/pkcs12.h
 | 
			
		||||
pkcs8.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
pkcs8.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
pkcs8.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
pkcs8.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
pkcs8.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
pkcs8.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
rand.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
rand.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
rand.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
rand.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
rand.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
rand.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
rand.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
rand.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
rand.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
rand.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
rand.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
rand.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
rand.o: ../include/openssl/opensslv.h ../include/openssl/pkcs7.h
 | 
			
		||||
rand.o: ../include/openssl/rand.h ../include/openssl/rc2.h
 | 
			
		||||
rand.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
rand.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
rand.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
rand.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
rand.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
req.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
req.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
req.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
req.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
req.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
req.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
req.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
req.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
req.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
req.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
req.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
req.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
req.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
req.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
req.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
req.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
req.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
req.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
req.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
req.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
rsa.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
rsa.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
rsa.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
rsa.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
rsa.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
rsa.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
rsa.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
rsa.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
rsa.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
rsa.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
rsa.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
rsa.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
rsa.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
rsa.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
rsa.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
rsa.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
rsa.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
rsa.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
rsa.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
rsa.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
rsautl.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
rsautl.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
rsautl.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
rsautl.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
rsautl.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
rsautl.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
rsautl.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
rsautl.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
rsautl.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
rsautl.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
rsautl.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
rsautl.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
rsautl.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
rsautl.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
rsautl.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
rsautl.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
rsautl.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
rsautl.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
rsautl.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
rsautl.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
s_cb.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
s_cb.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
s_cb.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
s_cb.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
s_cb.o: ../include/openssl/crypto.h ../include/openssl/des.h
 | 
			
		||||
s_cb.o: ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
s_cb.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
s_cb.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
s_cb.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
s_cb.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
s_cb.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
s_cb.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
s_cb.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
s_cb.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
s_cb.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
s_cb.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
s_cb.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
s_cb.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
s_cb.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
s_cb.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
s_cb.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
s_cb.o: ../include/openssl/tls1.h ../include/openssl/x509.h
 | 
			
		||||
s_cb.o: ../include/openssl/x509_vfy.h apps.h s_apps.h
 | 
			
		||||
s_client.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
s_client.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
s_client.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
s_client.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
s_client.o: ../include/openssl/crypto.h ../include/openssl/des.h
 | 
			
		||||
s_client.o: ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
s_client.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
s_client.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
s_client.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
s_client.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
s_client.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
s_client.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
s_client.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
s_client.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
s_client.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
 | 
			
		||||
s_client.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
s_client.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
s_client.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
s_client.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
s_client.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_client.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_client.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
s_client.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
s_client.o: s_apps.h
 | 
			
		||||
s_server.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
s_server.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
s_server.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
s_server.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
s_server.o: ../include/openssl/crypto.h ../include/openssl/des.h
 | 
			
		||||
s_server.o: ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
s_server.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
s_server.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
s_server.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
s_server.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
s_server.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
s_server.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
s_server.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
s_server.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
s_server.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
 | 
			
		||||
s_server.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
s_server.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
s_server.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
s_server.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
s_server.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_server.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_server.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
s_server.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
s_server.o: s_apps.h
 | 
			
		||||
s_socket.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
s_socket.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
s_socket.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
s_socket.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
s_socket.o: ../include/openssl/crypto.h ../include/openssl/des.h
 | 
			
		||||
s_socket.o: ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
s_socket.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
s_socket.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
s_socket.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
s_socket.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
s_socket.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
s_socket.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
s_socket.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
s_socket.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
s_socket.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
s_socket.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
s_socket.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
s_socket.o: ../include/openssl/sha.h ../include/openssl/ssl.h
 | 
			
		||||
s_socket.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
 | 
			
		||||
s_socket.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
 | 
			
		||||
s_socket.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
 | 
			
		||||
s_socket.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
s_socket.o: s_apps.h
 | 
			
		||||
s_time.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
s_time.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
s_time.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
s_time.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
s_time.o: ../include/openssl/crypto.h ../include/openssl/des.h
 | 
			
		||||
s_time.o: ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
s_time.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
s_time.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
s_time.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
s_time.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
s_time.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
s_time.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
s_time.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
s_time.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
s_time.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
s_time.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
s_time.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
s_time.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
s_time.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
s_time.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
s_time.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
s_time.o: ../include/openssl/tls1.h ../include/openssl/x509.h
 | 
			
		||||
s_time.o: ../include/openssl/x509_vfy.h apps.h s_apps.h
 | 
			
		||||
sess_id.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
sess_id.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
sess_id.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
sess_id.o: ../include/openssl/comp.h ../include/openssl/conf.h
 | 
			
		||||
sess_id.o: ../include/openssl/crypto.h ../include/openssl/des.h
 | 
			
		||||
sess_id.o: ../include/openssl/dh.h ../include/openssl/dsa.h
 | 
			
		||||
sess_id.o: ../include/openssl/e_os.h ../include/openssl/e_os2.h
 | 
			
		||||
sess_id.o: ../include/openssl/err.h ../include/openssl/evp.h
 | 
			
		||||
sess_id.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
sess_id.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
sess_id.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
sess_id.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
sess_id.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
sess_id.o: ../include/openssl/pem.h ../include/openssl/pem2.h
 | 
			
		||||
sess_id.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
sess_id.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
sess_id.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
sess_id.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
sess_id.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
 | 
			
		||||
sess_id.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
 | 
			
		||||
sess_id.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
sess_id.o: ../include/openssl/tls1.h ../include/openssl/x509.h
 | 
			
		||||
sess_id.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
smime.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
smime.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
smime.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
smime.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
smime.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
smime.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
smime.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
smime.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
smime.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
smime.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
smime.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
smime.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
smime.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
smime.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
smime.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
smime.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
smime.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
smime.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
smime.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
smime.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
speed.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
speed.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
speed.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
speed.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
speed.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
speed.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
speed.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
speed.o: ../include/openssl/evp.h ../include/openssl/hmac.h
 | 
			
		||||
speed.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
speed.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
speed.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
speed.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
speed.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
speed.o: ../include/openssl/pkcs7.h ../include/openssl/rand.h
 | 
			
		||||
speed.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
speed.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
speed.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
speed.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
speed.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
speed.o: ../include/openssl/x509_vfy.h ./testdsa.h ./testrsa.h apps.h
 | 
			
		||||
spkac.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
spkac.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
spkac.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
spkac.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
spkac.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
spkac.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
spkac.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
spkac.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
spkac.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
spkac.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
spkac.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
spkac.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
spkac.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
spkac.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
spkac.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
spkac.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
spkac.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
spkac.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
spkac.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
spkac.o: ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
verify.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
verify.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
verify.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
verify.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
verify.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
verify.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
verify.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
verify.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
verify.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
verify.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
verify.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
verify.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
verify.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
verify.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
verify.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
verify.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
verify.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
verify.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
verify.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
verify.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
version.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
version.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
version.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
version.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
version.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
version.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
version.o: ../include/openssl/e_os2.h ../include/openssl/evp.h
 | 
			
		||||
version.o: ../include/openssl/idea.h ../include/openssl/lhash.h
 | 
			
		||||
version.o: ../include/openssl/md2.h ../include/openssl/md4.h
 | 
			
		||||
version.o: ../include/openssl/md5.h ../include/openssl/mdc2.h
 | 
			
		||||
version.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
 | 
			
		||||
version.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
 | 
			
		||||
version.o: ../include/openssl/pkcs7.h ../include/openssl/rc2.h
 | 
			
		||||
version.o: ../include/openssl/rc4.h ../include/openssl/rc5.h
 | 
			
		||||
version.o: ../include/openssl/ripemd.h ../include/openssl/rsa.h
 | 
			
		||||
version.o: ../include/openssl/safestack.h ../include/openssl/sha.h
 | 
			
		||||
version.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
 | 
			
		||||
version.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h apps.h
 | 
			
		||||
x509.o: ../include/openssl/asn1.h ../include/openssl/bio.h
 | 
			
		||||
x509.o: ../include/openssl/blowfish.h ../include/openssl/bn.h
 | 
			
		||||
x509.o: ../include/openssl/buffer.h ../include/openssl/cast.h
 | 
			
		||||
x509.o: ../include/openssl/conf.h ../include/openssl/crypto.h
 | 
			
		||||
x509.o: ../include/openssl/des.h ../include/openssl/dh.h
 | 
			
		||||
x509.o: ../include/openssl/dsa.h ../include/openssl/e_os.h
 | 
			
		||||
x509.o: ../include/openssl/e_os2.h ../include/openssl/err.h
 | 
			
		||||
x509.o: ../include/openssl/evp.h ../include/openssl/idea.h
 | 
			
		||||
x509.o: ../include/openssl/lhash.h ../include/openssl/md2.h
 | 
			
		||||
x509.o: ../include/openssl/md4.h ../include/openssl/md5.h
 | 
			
		||||
x509.o: ../include/openssl/mdc2.h ../include/openssl/obj_mac.h
 | 
			
		||||
x509.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
 | 
			
		||||
x509.o: ../include/openssl/opensslv.h ../include/openssl/pem.h
 | 
			
		||||
x509.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
 | 
			
		||||
x509.o: ../include/openssl/rc2.h ../include/openssl/rc4.h
 | 
			
		||||
x509.o: ../include/openssl/rc5.h ../include/openssl/ripemd.h
 | 
			
		||||
x509.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
 | 
			
		||||
x509.o: ../include/openssl/sha.h ../include/openssl/stack.h
 | 
			
		||||
x509.o: ../include/openssl/symhacks.h ../include/openssl/x509.h
 | 
			
		||||
x509.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h apps.h
 | 
			
		||||
@@ -124,7 +124,7 @@ int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
 | 
			
		||||
	int consider_randfile = (file == NULL);
 | 
			
		||||
	char buffer[200];
 | 
			
		||||
	
 | 
			
		||||
#ifdef OPENSSL_SYS_WINDOWS
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
	BIO_printf(bio_e,"Loading 'screen' into random state -");
 | 
			
		||||
	BIO_flush(bio_e);
 | 
			
		||||
	RAND_screen();
 | 
			
		||||
@@ -142,9 +142,7 @@ int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
 | 
			
		||||
		}
 | 
			
		||||
	if (file == NULL || !RAND_load_file(file, -1))
 | 
			
		||||
		{
 | 
			
		||||
		if (RAND_status() == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (!dont_warn)
 | 
			
		||||
		if (RAND_status() == 0 && !dont_warn)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_e,"unable to load 'random state'\n");
 | 
			
		||||
			BIO_printf(bio_e,"This means that the random number generator has not been seeded\n");
 | 
			
		||||
@@ -157,7 +155,6 @@ int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
 | 
			
		||||
			}
 | 
			
		||||
		return 0;
 | 
			
		||||
		}
 | 
			
		||||
		}
 | 
			
		||||
	seeded = 1;
 | 
			
		||||
	return 1;
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1401
									
								
								apps/apps.c
									
									
									
									
									
								
							
							
						
						
									
										1401
									
								
								apps/apps.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										212
									
								
								apps/apps.h
									
									
									
									
									
								
							
							
						
						
									
										212
									
								
								apps/apps.h
									
									
									
									
									
								
							@@ -55,64 +55,11 @@
 | 
			
		||||
 * copied and put under another distribution licence
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    openssl-core@openssl.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef HEADER_APPS_H
 | 
			
		||||
#define HEADER_APPS_H
 | 
			
		||||
 | 
			
		||||
#include "e_os.h"
 | 
			
		||||
#include "openssl/e_os.h"
 | 
			
		||||
 | 
			
		||||
#include <openssl/buffer.h>
 | 
			
		||||
#include <openssl/bio.h>
 | 
			
		||||
@@ -120,11 +67,6 @@
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/lhash.h>
 | 
			
		||||
#include <openssl/conf.h>
 | 
			
		||||
#include <openssl/txt_db.h>
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
#include <openssl/engine.h>
 | 
			
		||||
#endif
 | 
			
		||||
#include <openssl/ossl_typ.h>
 | 
			
		||||
 | 
			
		||||
int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn);
 | 
			
		||||
int app_RAND_write_file(const char *file, BIO *bio_e);
 | 
			
		||||
@@ -136,7 +78,11 @@ long app_RAND_load_files(char *file); /* `file' is a list of files to read,
 | 
			
		||||
                                       * (see e_os.h).  The string is
 | 
			
		||||
                                       * destroyed! */
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_WIN32
 | 
			
		||||
#ifdef NO_STDIO
 | 
			
		||||
BIO_METHOD *BIO_s_file();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef WIN32
 | 
			
		||||
#define rename(from,to) WIN32_rename((from),(to))
 | 
			
		||||
int WIN32_rename(char *oldname,char *newname);
 | 
			
		||||
#endif
 | 
			
		||||
@@ -146,22 +92,17 @@ int WIN32_rename(char *oldname,char *newname);
 | 
			
		||||
#define MAIN(a,v)	main(a,v)
 | 
			
		||||
 | 
			
		||||
#ifndef NON_MAIN
 | 
			
		||||
CONF *config=NULL;
 | 
			
		||||
BIO *bio_err=NULL;
 | 
			
		||||
int in_FIPS_mode=0;
 | 
			
		||||
#else
 | 
			
		||||
extern CONF *config;
 | 
			
		||||
extern BIO *bio_err;
 | 
			
		||||
extern int in_FIPS_mode;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#else
 | 
			
		||||
 | 
			
		||||
#define MAIN(a,v)	PROG(a,v)
 | 
			
		||||
extern CONF *config;
 | 
			
		||||
extern LHASH *config;
 | 
			
		||||
extern char *default_config_file;
 | 
			
		||||
extern BIO *bio_err;
 | 
			
		||||
extern int in_FIPS_mode;
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -174,60 +115,20 @@ extern int in_FIPS_mode;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if defined(MONOLITH) && !defined(OPENSSL_C)
 | 
			
		||||
#  define apps_startup() \
 | 
			
		||||
		do_pipe_sig()
 | 
			
		||||
#  define apps_shutdown()
 | 
			
		||||
#  define apps_startup()	do_pipe_sig()
 | 
			
		||||
#else
 | 
			
		||||
#  ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
#    if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
 | 
			
		||||
     defined(OPENSSL_SYS_WIN32)
 | 
			
		||||
#  if defined(MSDOS) || defined(WIN16) || defined(WIN32)
 | 
			
		||||
#    ifdef _O_BINARY
 | 
			
		||||
#      define apps_startup() \
 | 
			
		||||
			do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
			ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
			ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
 | 
			
		||||
		_fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
		SSLeay_add_all_algorithms()
 | 
			
		||||
#    else
 | 
			
		||||
#      define apps_startup() \
 | 
			
		||||
			do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
			ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
			ENGINE_load_builtin_engines(); setup_ui_method(); } while(0)
 | 
			
		||||
		_fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
		SSLeay_add_all_algorithms()
 | 
			
		||||
#    endif
 | 
			
		||||
#  else
 | 
			
		||||
#      define apps_startup() \
 | 
			
		||||
			do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
			ERR_load_crypto_strings(); ENGINE_load_builtin_engines(); \
 | 
			
		||||
			setup_ui_method(); } while(0)
 | 
			
		||||
#    endif
 | 
			
		||||
#    define apps_shutdown() \
 | 
			
		||||
			do { CONF_modules_unload(1); destroy_ui_method(); \
 | 
			
		||||
			EVP_cleanup(); ENGINE_cleanup(); \
 | 
			
		||||
			CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
 | 
			
		||||
			ERR_free_strings(); } while(0)
 | 
			
		||||
#  else
 | 
			
		||||
#    if defined(OPENSSL_SYS_MSDOS) || defined(OPENSSL_SYS_WIN16) || \
 | 
			
		||||
     defined(OPENSSL_SYS_WIN32)
 | 
			
		||||
#      ifdef _O_BINARY
 | 
			
		||||
#        define apps_startup() \
 | 
			
		||||
			do { _fmode=_O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
			ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
			setup_ui_method(); } while(0)
 | 
			
		||||
#      else
 | 
			
		||||
#        define apps_startup() \
 | 
			
		||||
			do { _fmode=O_BINARY; do_pipe_sig(); CRYPTO_malloc_init(); \
 | 
			
		||||
			ERR_load_crypto_strings(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
			setup_ui_method(); } while(0)
 | 
			
		||||
#      endif
 | 
			
		||||
#    else
 | 
			
		||||
#      define apps_startup() \
 | 
			
		||||
			do { do_pipe_sig(); OpenSSL_add_all_algorithms(); \
 | 
			
		||||
			ERR_load_crypto_strings(); \
 | 
			
		||||
			setup_ui_method(); } while(0)
 | 
			
		||||
#    endif
 | 
			
		||||
#    define apps_shutdown() \
 | 
			
		||||
			do { CONF_modules_unload(1); destroy_ui_method(); \
 | 
			
		||||
			EVP_cleanup(); \
 | 
			
		||||
			CRYPTO_cleanup_all_ex_data(); ERR_remove_state(0); \
 | 
			
		||||
			ERR_free_strings(); } while(0)
 | 
			
		||||
#    define apps_startup()	do_pipe_sig(); SSLeay_add_all_algorithms();
 | 
			
		||||
#  endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -237,19 +138,6 @@ typedef struct args_st
 | 
			
		||||
	int count;
 | 
			
		||||
	} ARGS;
 | 
			
		||||
 | 
			
		||||
#define PW_MIN_LENGTH 4
 | 
			
		||||
typedef struct pw_cb_data
 | 
			
		||||
	{
 | 
			
		||||
	const void *password;
 | 
			
		||||
	const char *prompt_info;
 | 
			
		||||
	} PW_CB_DATA;
 | 
			
		||||
 | 
			
		||||
int password_callback(char *buf, int bufsiz, int verify,
 | 
			
		||||
	PW_CB_DATA *cb_data);
 | 
			
		||||
 | 
			
		||||
int setup_ui_method(void);
 | 
			
		||||
void destroy_ui_method(void);
 | 
			
		||||
 | 
			
		||||
int should_retry(int i);
 | 
			
		||||
int args_from_file(char *file, int *argc, char **argv[]);
 | 
			
		||||
int str2fmt(char *s);
 | 
			
		||||
@@ -259,66 +147,13 @@ int chopup_args(ARGS *arg,char *buf, int *argc, char **argv[]);
 | 
			
		||||
int dump_cert_text(BIO *out, X509 *x);
 | 
			
		||||
void print_name(BIO *out, char *title, X509_NAME *nm, unsigned long lflags);
 | 
			
		||||
#endif
 | 
			
		||||
int set_cert_ex(unsigned long *flags, const char *arg);
 | 
			
		||||
int set_name_ex(unsigned long *flags, const char *arg);
 | 
			
		||||
int set_ext_copy(int *copy_type, const char *arg);
 | 
			
		||||
int copy_extensions(X509 *x, X509_REQ *req, int copy_type);
 | 
			
		||||
int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2);
 | 
			
		||||
int add_oid_section(BIO *err, CONF *conf);
 | 
			
		||||
X509 *load_cert(BIO *err, const char *file, int format,
 | 
			
		||||
	const char *pass, ENGINE *e, const char *cert_descrip);
 | 
			
		||||
EVP_PKEY *load_key(BIO *err, const char *file, int format, int maybe_stdin,
 | 
			
		||||
	const char *pass, ENGINE *e, const char *key_descrip);
 | 
			
		||||
EVP_PKEY *load_pubkey(BIO *err, const char *file, int format, int maybe_stdin,
 | 
			
		||||
	const char *pass, ENGINE *e, const char *key_descrip);
 | 
			
		||||
STACK_OF(X509) *load_certs(BIO *err, const char *file, int format,
 | 
			
		||||
	const char *pass, ENGINE *e, const char *cert_descrip);
 | 
			
		||||
X509_STORE *setup_verify(BIO *bp, char *CAfile, char *CApath);
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
ENGINE *setup_engine(BIO *err, const char *engine, int debug);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
int load_config(BIO *err, CONF *cnf);
 | 
			
		||||
char *make_config_name(void);
 | 
			
		||||
 | 
			
		||||
/* Functions defined in ca.c and also used in ocsp.c */
 | 
			
		||||
int unpack_revinfo(ASN1_TIME **prevtm, int *preason, ASN1_OBJECT **phold,
 | 
			
		||||
			ASN1_GENERALIZEDTIME **pinvtm, char *str);
 | 
			
		||||
 | 
			
		||||
#define DB_type         0
 | 
			
		||||
#define DB_exp_date     1
 | 
			
		||||
#define DB_rev_date     2
 | 
			
		||||
#define DB_serial       3       /* index - unique */
 | 
			
		||||
#define DB_file         4       
 | 
			
		||||
#define DB_name         5       /* index - unique when active and not disabled */
 | 
			
		||||
#define DB_NUMBER       6
 | 
			
		||||
 | 
			
		||||
#define DB_TYPE_REV	'R'
 | 
			
		||||
#define DB_TYPE_EXP	'E'
 | 
			
		||||
#define DB_TYPE_VAL	'V'
 | 
			
		||||
 | 
			
		||||
typedef struct db_attr_st
 | 
			
		||||
	{
 | 
			
		||||
	int unique_subject;
 | 
			
		||||
	} DB_ATTR;
 | 
			
		||||
typedef struct ca_db_st
 | 
			
		||||
	{
 | 
			
		||||
	DB_ATTR attributes;
 | 
			
		||||
	TXT_DB *db;
 | 
			
		||||
	} CA_DB;
 | 
			
		||||
 | 
			
		||||
BIGNUM *load_serial(char *serialfile, int create, ASN1_INTEGER **retai);
 | 
			
		||||
int save_serial(char *serialfile, char *suffix, BIGNUM *serial, ASN1_INTEGER **retai);
 | 
			
		||||
int rotate_serial(char *serialfile, char *new_suffix, char *old_suffix);
 | 
			
		||||
int rand_serial(BIGNUM *b, ASN1_INTEGER *ai);
 | 
			
		||||
CA_DB *load_index(char *dbfile, DB_ATTR *dbattr);
 | 
			
		||||
int index_index(CA_DB *db);
 | 
			
		||||
int save_index(char *dbfile, char *suffix, CA_DB *db);
 | 
			
		||||
int rotate_index(char *dbfile, char *new_suffix, char *old_suffix);
 | 
			
		||||
void free_index(CA_DB *db);
 | 
			
		||||
int index_name_cmp(const char **a, const char **b);
 | 
			
		||||
 | 
			
		||||
X509_NAME *do_subject(char *str, long chtype);
 | 
			
		||||
int add_oid_section(BIO *err, LHASH *conf);
 | 
			
		||||
X509 *load_cert(BIO *err, char *file, int format);
 | 
			
		||||
EVP_PKEY *load_key(BIO *err, char *file, int format, char *pass);
 | 
			
		||||
EVP_PKEY *load_pubkey(BIO *err, char *file, int format);
 | 
			
		||||
STACK_OF(X509) *load_certs(BIO *err, char *file, int format);
 | 
			
		||||
 | 
			
		||||
#define FORMAT_UNDEF    0
 | 
			
		||||
#define FORMAT_ASN1     1
 | 
			
		||||
@@ -327,18 +162,9 @@ X509_NAME *do_subject(char *str, long chtype);
 | 
			
		||||
#define FORMAT_NETSCAPE 4
 | 
			
		||||
#define FORMAT_PKCS12   5
 | 
			
		||||
#define FORMAT_SMIME    6
 | 
			
		||||
#define FORMAT_ENGINE   7
 | 
			
		||||
#define FORMAT_IISSGC	8	/* XXX this stupid macro helps us to avoid
 | 
			
		||||
				 * adding yet another param to load_*key() */
 | 
			
		||||
 | 
			
		||||
#define EXT_COPY_NONE	0
 | 
			
		||||
#define EXT_COPY_ADD	1
 | 
			
		||||
#define EXT_COPY_ALL	2
 | 
			
		||||
 | 
			
		||||
#define NETSCAPE_CERT_HDR	"certificate"
 | 
			
		||||
 | 
			
		||||
#define APP_PASS_LEN	1024
 | 
			
		||||
 | 
			
		||||
#define SERIAL_RAND_BITS	64
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -103,9 +103,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	prog=argv[0];
 | 
			
		||||
	argc--;
 | 
			
		||||
	argv++;
 | 
			
		||||
@@ -182,7 +179,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
bad:
 | 
			
		||||
		BIO_printf(bio_err,"%s [options] <infile\n",prog);
 | 
			
		||||
		BIO_printf(bio_err,"where options are\n");
 | 
			
		||||
		BIO_printf(bio_err," -inform arg   input format - one of DER PEM\n");
 | 
			
		||||
		BIO_printf(bio_err," -inform arg   input format - one of DER TXT PEM\n");
 | 
			
		||||
		BIO_printf(bio_err," -in arg       input file\n");
 | 
			
		||||
		BIO_printf(bio_err," -out arg      output file (output format is always DER\n");
 | 
			
		||||
		BIO_printf(bio_err," -noout arg    don't produce any output\n");
 | 
			
		||||
@@ -208,7 +205,7 @@ bad:
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	BIO_set_fp(out,stdout,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
	{
 | 
			
		||||
	BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
	out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -278,7 +275,6 @@ bad:
 | 
			
		||||
		tmplen=num;
 | 
			
		||||
		for (i=0; i<sk_num(osk); i++)
 | 
			
		||||
			{
 | 
			
		||||
			int typ;
 | 
			
		||||
			ASN1_TYPE *atmp;
 | 
			
		||||
			j=atoi(sk_value(osk,i));
 | 
			
		||||
			if (j == 0)
 | 
			
		||||
@@ -297,15 +293,6 @@ bad:
 | 
			
		||||
				ERR_print_errors(bio_err);
 | 
			
		||||
				goto end;
 | 
			
		||||
				}
 | 
			
		||||
			typ = ASN1_TYPE_get(at);
 | 
			
		||||
			if ((typ == V_ASN1_OBJECT)
 | 
			
		||||
				|| (typ == V_ASN1_NULL))
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err, "Can't parse %s type\n",
 | 
			
		||||
					typ == V_ASN1_NULL ? "NULL" : "OBJECT");
 | 
			
		||||
				ERR_print_errors(bio_err);
 | 
			
		||||
				goto end;
 | 
			
		||||
				}
 | 
			
		||||
			/* hmm... this is a little evil but it works */
 | 
			
		||||
			tmpbuf=at->value.asn1_string->data;
 | 
			
		||||
			tmplen=at->value.asn1_string->length;
 | 
			
		||||
@@ -314,15 +301,7 @@ bad:
 | 
			
		||||
		num=tmplen;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (offset >= num)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "Error: offset too large\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	num -= offset;
 | 
			
		||||
 | 
			
		||||
	if ((length == 0) || ((long)length > num)) length=(unsigned int)num;
 | 
			
		||||
	if (length == 0) length=(unsigned int)num;
 | 
			
		||||
	if(derout) {
 | 
			
		||||
		if(BIO_write(derout, str + offset, length) != (int)length) {
 | 
			
		||||
			BIO_printf(bio_err, "Error writing output\n");
 | 
			
		||||
@@ -349,7 +328,6 @@ end:
 | 
			
		||||
	if (at != NULL) ASN1_TYPE_free(at);
 | 
			
		||||
	if (osk != NULL) sk_free(osk);
 | 
			
		||||
	OBJ_cleanup();
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -59,7 +59,7 @@
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#ifdef OPENSSL_NO_STDIO
 | 
			
		||||
#ifdef NO_STDIO
 | 
			
		||||
#define APPS_WIN16
 | 
			
		||||
#endif
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
@@ -95,11 +95,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char buf[512];
 | 
			
		||||
	BIO *STDout=NULL;
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
#if !defined(NO_SSL2) && !defined(NO_SSL3)
 | 
			
		||||
	meth=SSLv23_server_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
#elif !defined(NO_SSL3)
 | 
			
		||||
	meth=SSLv3_server_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
#elif !defined(NO_SSL2)
 | 
			
		||||
	meth=SSLv2_server_method();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -108,7 +108,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
			
		||||
	STDout=BIO_new_fp(stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
	{
 | 
			
		||||
	BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
	STDout = BIO_push(tmpbio, STDout);
 | 
			
		||||
@@ -121,15 +121,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		{
 | 
			
		||||
		if (strcmp(*argv,"-v") == 0)
 | 
			
		||||
			verbose=1;
 | 
			
		||||
#ifndef OPENSSL_NO_SSL2
 | 
			
		||||
#ifndef NO_SSL2
 | 
			
		||||
		else if (strcmp(*argv,"-ssl2") == 0)
 | 
			
		||||
			meth=SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3
 | 
			
		||||
#ifndef NO_SSL3
 | 
			
		||||
		else if (strcmp(*argv,"-ssl3") == 0)
 | 
			
		||||
			meth=SSLv3_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_TLS1
 | 
			
		||||
#ifndef NO_TLS1
 | 
			
		||||
		else if (strcmp(*argv,"-tls1") == 0)
 | 
			
		||||
			meth=TLSv1_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
@@ -150,7 +150,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	if (badops)
 | 
			
		||||
		{
 | 
			
		||||
		for (pp=ciphers_usage; (*pp != NULL); pp++)
 | 
			
		||||
			BIO_printf(bio_err,"%s",*pp);
 | 
			
		||||
			BIO_printf(bio_err,*pp);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
@@ -187,7 +187,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_puts(STDout,SSL_CIPHER_description(
 | 
			
		||||
				sk_SSL_CIPHER_value(sk,i),
 | 
			
		||||
				buf,sizeof buf));
 | 
			
		||||
				buf,512));
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
@@ -202,7 +202,6 @@ end:
 | 
			
		||||
	if (ctx != NULL) SSL_CTX_free(ctx);
 | 
			
		||||
	if (ssl != NULL) SSL_free(ssl);
 | 
			
		||||
	if (STDout != NULL) BIO_free_all(STDout);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										38
									
								
								apps/crl.c
									
									
									
									
									
								
							
							
						
						
									
										38
									
								
								apps/crl.c
									
									
									
									
									
								
							@@ -81,14 +81,12 @@ static char *crl_usage[]={
 | 
			
		||||
" -in arg         - input file - default stdin\n",
 | 
			
		||||
" -out arg        - output file - default stdout\n",
 | 
			
		||||
" -hash           - print hash value\n",
 | 
			
		||||
" -fingerprint    - print the crl fingerprint\n",
 | 
			
		||||
" -issuer         - print issuer DN\n",
 | 
			
		||||
" -lastupdate     - lastUpdate field\n",
 | 
			
		||||
" -nextupdate     - nextUpdate field\n",
 | 
			
		||||
" -noout          - no CRL output\n",
 | 
			
		||||
" -CAfile  name   - verify CRL using certificates in file \"name\"\n",
 | 
			
		||||
" -CApath  dir    - verify CRL using certificates in \"dir\"\n",
 | 
			
		||||
" -nameopt arg    - various certificate name options\n",
 | 
			
		||||
NULL
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
@@ -99,7 +97,6 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	unsigned long nmflag = 0;
 | 
			
		||||
	X509_CRL *x=NULL;
 | 
			
		||||
	char *CAfile = NULL, *CApath = NULL;
 | 
			
		||||
	int ret=1,i,num,badops=0;
 | 
			
		||||
@@ -108,7 +105,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char *infile=NULL,*outfile=NULL;
 | 
			
		||||
	int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
 | 
			
		||||
	int fingerprint = 0;
 | 
			
		||||
	char **pp;
 | 
			
		||||
	char **pp,buf[256];
 | 
			
		||||
	X509_STORE *store = NULL;
 | 
			
		||||
	X509_STORE_CTX ctx;
 | 
			
		||||
	X509_LOOKUP *lookup = NULL;
 | 
			
		||||
@@ -123,14 +120,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	if (bio_out == NULL)
 | 
			
		||||
		if ((bio_out=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_set_fp(bio_out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
			{
 | 
			
		||||
			BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
			bio_out = BIO_push(tmpbio, bio_out);
 | 
			
		||||
@@ -191,11 +185,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			text = 1;
 | 
			
		||||
		else if (strcmp(*argv,"-hash") == 0)
 | 
			
		||||
			hash= ++num;
 | 
			
		||||
		else if (strcmp(*argv,"-nameopt") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			if (!set_name_ex(&nmflag, *(++argv))) goto bad;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-issuer") == 0)
 | 
			
		||||
			issuer= ++num;
 | 
			
		||||
		else if (strcmp(*argv,"-lastupdate") == 0)
 | 
			
		||||
@@ -225,7 +214,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		{
 | 
			
		||||
bad:
 | 
			
		||||
		for (pp=crl_usage; (*pp != NULL); pp++)
 | 
			
		||||
			BIO_printf(bio_err,"%s",*pp);
 | 
			
		||||
			BIO_printf(bio_err,*pp);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
@@ -246,11 +235,7 @@ bad:
 | 
			
		||||
			X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
			
		||||
		ERR_clear_error();
 | 
			
		||||
 | 
			
		||||
		if(!X509_STORE_CTX_init(&ctx, store, NULL, NULL)) {
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				"Error initialising X509 store\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
		X509_STORE_CTX_init(&ctx, store, NULL, NULL);
 | 
			
		||||
 | 
			
		||||
		i = X509_STORE_get_by_subject(&ctx, X509_LU_X509, 
 | 
			
		||||
					X509_CRL_get_issuer(x), &xobj);
 | 
			
		||||
@@ -279,7 +264,9 @@ bad:
 | 
			
		||||
			{
 | 
			
		||||
			if (issuer == i)
 | 
			
		||||
				{
 | 
			
		||||
				print_name(bio_out, "issuer=", X509_CRL_get_issuer(x), nmflag);
 | 
			
		||||
				X509_NAME_oneline(X509_CRL_get_issuer(x),
 | 
			
		||||
								buf,256);
 | 
			
		||||
				BIO_printf(bio_out,"issuer= %s\n",buf);
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
			if (hash == i)
 | 
			
		||||
@@ -337,7 +324,7 @@ bad:
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -355,11 +342,7 @@ bad:
 | 
			
		||||
 | 
			
		||||
	if (text) X509_CRL_print(out, x);
 | 
			
		||||
 | 
			
		||||
	if (noout) 
 | 
			
		||||
		{
 | 
			
		||||
		ret = 0;
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	if (noout) goto end;
 | 
			
		||||
 | 
			
		||||
	if 	(outformat == FORMAT_ASN1)
 | 
			
		||||
		i=(int)i2d_X509_CRL_bio(out,x);
 | 
			
		||||
@@ -381,8 +364,7 @@ end:
 | 
			
		||||
		X509_STORE_CTX_cleanup(&ctx);
 | 
			
		||||
		X509_STORE_free(store);
 | 
			
		||||
	}
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static X509_CRL *load_crl(char *infile, int format)
 | 
			
		||||
 
 | 
			
		||||
@@ -166,8 +166,7 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err," -certfile arg  certificates file of chain to a trusted CA\n");
 | 
			
		||||
		BIO_printf(bio_err,"                (can be used more than once)\n");
 | 
			
		||||
		BIO_printf(bio_err," -nocrl         no crl to load, just certs from '-certfile'\n");
 | 
			
		||||
		ret = 1;
 | 
			
		||||
		goto end;
 | 
			
		||||
		EXIT(1);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
@@ -242,7 +241,7 @@ bad:
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -279,8 +278,7 @@ end:
 | 
			
		||||
	if (p7 != NULL) PKCS7_free(p7);
 | 
			
		||||
	if (crl != NULL) X509_CRL_free(crl);
 | 
			
		||||
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										305
									
								
								apps/der_chop.in
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										305
									
								
								apps/der_chop.in
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,305 @@
 | 
			
		||||
#!/usr/local/bin/perl
 | 
			
		||||
#
 | 
			
		||||
# der_chop ... this is one total hack that Eric is really not proud of
 | 
			
		||||
#              so don't look at it and don't ask for support
 | 
			
		||||
#
 | 
			
		||||
# The "documentation" for this (i.e. all the comments) are my fault --tjh
 | 
			
		||||
#
 | 
			
		||||
# This program takes the "raw" output of derparse/asn1parse and 
 | 
			
		||||
# converts it into tokens and then runs regular expression matches
 | 
			
		||||
# to try to figure out what to grab to get the things that are needed
 | 
			
		||||
# and it is possible that this will do the wrong thing as it is a *hack*
 | 
			
		||||
#
 | 
			
		||||
# SSLeay 0.5.2+ should have direct read support for x509 (via -inform NET)
 | 
			
		||||
# [I know ... promises promises :-)]
 | 
			
		||||
#
 | 
			
		||||
# To convert a Netscape Certificate:
 | 
			
		||||
#    der_chop < ServerCert.der > cert.pem
 | 
			
		||||
# To convert a Netscape Key (and encrypt it again to protect it)
 | 
			
		||||
#    rsa -inform NET -in ServerKey.der -des > key.pem
 | 
			
		||||
#
 | 
			
		||||
# 23-Apr-96 eay    Added the extra ASN.1 string types, I still think this
 | 
			
		||||
#		   is an evil hack.  If nothing else the parsing should
 | 
			
		||||
#		   be relative, not absolute.
 | 
			
		||||
# 19-Apr-96 tjh    hacked (with eay) into 0.5.x format
 | 
			
		||||
#
 | 
			
		||||
# Tim Hudson
 | 
			
		||||
# tjh@cryptsoft.com
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
require 'getopts.pl';
 | 
			
		||||
 | 
			
		||||
$debug=0;
 | 
			
		||||
 | 
			
		||||
# this was the 0.4.x way of doing things ...
 | 
			
		||||
$cmd="derparse";
 | 
			
		||||
$x509_cmd="x509";
 | 
			
		||||
$crl_cmd="crl";
 | 
			
		||||
$rc4_cmd="rc4";
 | 
			
		||||
$md2_cmd="md2";
 | 
			
		||||
$md4_cmd="md4";
 | 
			
		||||
$rsa_cmd="rsa -des -inform der ";
 | 
			
		||||
 | 
			
		||||
# this was the 0.5.x way of doing things ...
 | 
			
		||||
$cmd="openssl asn1parse";
 | 
			
		||||
$x509_cmd="openssl x509";
 | 
			
		||||
$crl_cmd="openssl crl";
 | 
			
		||||
$rc4_cmd="openssl rc4";
 | 
			
		||||
$md2_cmd="openssl md2";
 | 
			
		||||
$md4_cmd="openssl md4";
 | 
			
		||||
$rsa_cmd="openssl rsa -des -inform der ";
 | 
			
		||||
 | 
			
		||||
&Getopts('vd:') || die "usage:$0 [-v] [-d num] file";
 | 
			
		||||
$depth=($opt_d =~ /^\d+$/)?$opt_d:0;
 | 
			
		||||
 | 
			
		||||
&init_der();
 | 
			
		||||
 | 
			
		||||
if ($#ARGV != -1)
 | 
			
		||||
	{
 | 
			
		||||
	foreach $file (@ARGV)
 | 
			
		||||
		{
 | 
			
		||||
		print STDERR "doing $file\n";
 | 
			
		||||
		&dofile($file);
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
else
 | 
			
		||||
	{
 | 
			
		||||
	$file="/tmp/a$$.DER";
 | 
			
		||||
	open(OUT,">$file") || die "unable to open $file:$!\n";
 | 
			
		||||
	for (;;)
 | 
			
		||||
		{
 | 
			
		||||
		$i=sysread(STDIN,$b,1024*10);
 | 
			
		||||
		last if ($i <= 0);
 | 
			
		||||
		$i=syswrite(OUT,$b,$i);
 | 
			
		||||
		}
 | 
			
		||||
	&dofile($file);
 | 
			
		||||
	unlink($file);
 | 
			
		||||
	}
 | 
			
		||||
	
 | 
			
		||||
sub dofile
 | 
			
		||||
	{
 | 
			
		||||
	local($file)=@_;
 | 
			
		||||
	local(@p);
 | 
			
		||||
 | 
			
		||||
	$b=&load_file($file);
 | 
			
		||||
	@p=&load_file_parse($file);
 | 
			
		||||
 | 
			
		||||
	foreach $_ (@p)
 | 
			
		||||
		{
 | 
			
		||||
		($off,$d,$hl,$len)=&parse_line($_);
 | 
			
		||||
		$d-=$depth;
 | 
			
		||||
		next if ($d != 0);
 | 
			
		||||
		next if ($len == 0);
 | 
			
		||||
 | 
			
		||||
		$o=substr($b,$off,$len+$hl);
 | 
			
		||||
		($str,@data)=&der_str($o);
 | 
			
		||||
		print "$str\n" if ($opt_v);
 | 
			
		||||
		if ($str =~ /^$crl/)
 | 
			
		||||
			{
 | 
			
		||||
			open(OUT,"|$crl_cmd -inform d -hash -issuer") ||
 | 
			
		||||
				die "unable to run $crl_cmd:$!\n";
 | 
			
		||||
			print OUT $o;
 | 
			
		||||
			close(OUT);
 | 
			
		||||
			}
 | 
			
		||||
		elsif ($str =~ /^$x509/)
 | 
			
		||||
			{
 | 
			
		||||
			open(OUT,"|$x509_cmd -inform d -hash -subject -issuer")
 | 
			
		||||
				|| die "unable to run $x509_cmd:$!\n";
 | 
			
		||||
			print OUT $o;
 | 
			
		||||
			close(OUT);
 | 
			
		||||
			}
 | 
			
		||||
		elsif ($str =~ /^$rsa/)
 | 
			
		||||
			{
 | 
			
		||||
			($type)=($data[3] =~ /OBJECT_IDENTIFIER :(.*)\s*$/);
 | 
			
		||||
			next unless ($type eq "rsaEncryption");
 | 
			
		||||
			($off,$d,$hl,$len)=&parse_line($data[5]);
 | 
			
		||||
			$os=substr($o,$off+$hl,$len);
 | 
			
		||||
			open(OUT,"|$rsa_cmd")
 | 
			
		||||
				|| die "unable to run $rsa_cmd:$!\n";
 | 
			
		||||
			print OUT $os;
 | 
			
		||||
			close(OUT);
 | 
			
		||||
			}
 | 
			
		||||
		elsif ($str =~ /^0G-1D-1G/)
 | 
			
		||||
			{
 | 
			
		||||
			($off,$d,$hl,$len)=&parse_line($data[1]);
 | 
			
		||||
			$os=substr($o,$off+$hl,$len);
 | 
			
		||||
			print STDERR "<$os>\n" if $opt_v;
 | 
			
		||||
			&do_certificate($o,@data)
 | 
			
		||||
				if (($os eq "certificate") &&
 | 
			
		||||
				    ($str =! /^0G-1D-1G-2G-3F-3E-2D/));
 | 
			
		||||
			&do_private_key($o,@data)
 | 
			
		||||
				if (($os eq "private-key") &&
 | 
			
		||||
				    ($str =! /^0G-1D-1G-2G-3F-3E-2D/));
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
sub der_str
 | 
			
		||||
	{
 | 
			
		||||
	local($str)=@_;
 | 
			
		||||
	local(*OUT,*IN,@a,$t,$d,$ret);
 | 
			
		||||
	local($file)="/tmp/b$$.DER";
 | 
			
		||||
	local(@ret);
 | 
			
		||||
 | 
			
		||||
	open(OUT,">$file");
 | 
			
		||||
	print OUT $str;
 | 
			
		||||
	close(OUT);
 | 
			
		||||
	open(IN,"$cmd -inform 'd' -in $file |") ||
 | 
			
		||||
		die "unable to run $cmd:$!\n";
 | 
			
		||||
	$ret="";
 | 
			
		||||
	while (<IN>)
 | 
			
		||||
		{
 | 
			
		||||
		chop;
 | 
			
		||||
		push(@ret,$_);
 | 
			
		||||
 | 
			
		||||
		print STDERR "$_\n" if ($debug);
 | 
			
		||||
 | 
			
		||||
		@a=split(/\s*:\s*/);
 | 
			
		||||
		($d)=($a[1] =~ /d=\s*(\d+)/);
 | 
			
		||||
		$a[2] =~ s/\s+$//;
 | 
			
		||||
		$t=$DER_s2i{$a[2]};
 | 
			
		||||
		$ret.="$d$t-";
 | 
			
		||||
		}
 | 
			
		||||
	close(IN);
 | 
			
		||||
	unlink($file);
 | 
			
		||||
	chop $ret;
 | 
			
		||||
	$ret =~ s/(-3H(-4G-5F-5[IJKMQRS])+)+/-NAME/g;
 | 
			
		||||
	$ret =~ s/(-3G-4B-4L)+/-RCERT/g;
 | 
			
		||||
	return($ret,@ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
sub init_der
 | 
			
		||||
	{
 | 
			
		||||
	$crl= "0G-1G-2G-3F-3E-2G-NAME-2L-2L-2G-RCERT-1G-2F-2E-1C";
 | 
			
		||||
	$x509="0G-1G-2B-2G-3F-3E-2G-NAME-2G-3L-3L-2G-NAME-2G-3G-4F-4E-3C-1G-2F-2E-1C";
 | 
			
		||||
	$rsa= "0G-1B-1G-2F-2E-1D";
 | 
			
		||||
 | 
			
		||||
	%DER_i2s=(
 | 
			
		||||
		# SSLeay 0.4.x has this list
 | 
			
		||||
		"A","EOC",
 | 
			
		||||
		"B","INTEGER",
 | 
			
		||||
		"C","BIT STRING",
 | 
			
		||||
		"D","OCTET STRING",
 | 
			
		||||
		"E","NULL",
 | 
			
		||||
		"F","OBJECT",
 | 
			
		||||
		"G","SEQUENCE",
 | 
			
		||||
		"H","SET",
 | 
			
		||||
		"I","PRINTABLESTRING",
 | 
			
		||||
		"J","T61STRING",
 | 
			
		||||
		"K","IA5STRING",
 | 
			
		||||
		"L","UTCTIME",
 | 
			
		||||
		"M","NUMERICSTRING",
 | 
			
		||||
		"N","VIDEOTEXSTRING",
 | 
			
		||||
		"O","GENERALIZEDTIME",
 | 
			
		||||
		"P","GRAPHICSTRING",
 | 
			
		||||
		"Q","ISO64STRING",
 | 
			
		||||
		"R","GENERALSTRING",
 | 
			
		||||
		"S","UNIVERSALSTRING",
 | 
			
		||||
 | 
			
		||||
		# SSLeay 0.5.x changed some things ... and I'm
 | 
			
		||||
		# leaving in the old stuff but adding in these
 | 
			
		||||
		# to handle the new as well --tjh
 | 
			
		||||
		# - Well I've just taken them out and added the extra new
 | 
			
		||||
		# ones :-) - eay
 | 
			
		||||
		);
 | 
			
		||||
 | 
			
		||||
	foreach (keys %DER_i2s)
 | 
			
		||||
		{ $DER_s2i{$DER_i2s{$_}}=$_; }
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
sub parse_line
 | 
			
		||||
	{
 | 
			
		||||
	local($_)=@_;
 | 
			
		||||
 | 
			
		||||
	return(/\s*(\d+):d=\s*(\d+)\s+hl=\s*(\d+)\s+l=\s*(\d+|inf)\s/);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#  0:d=0 hl=4 l=377 cons: univ: SEQUENCE          
 | 
			
		||||
#  4:d=1 hl=2 l= 11 prim: univ: OCTET_STRING      
 | 
			
		||||
# 17:d=1 hl=4 l=360 cons: univ: SEQUENCE          
 | 
			
		||||
# 21:d=2 hl=2 l= 12 cons: univ: SEQUENCE          
 | 
			
		||||
# 23:d=3 hl=2 l=  8 prim: univ: OBJECT_IDENTIFIER :rc4
 | 
			
		||||
# 33:d=3 hl=2 l=  0 prim: univ: NULL              
 | 
			
		||||
# 35:d=2 hl=4 l=342 prim: univ: OCTET_STRING
 | 
			
		||||
sub do_private_key
 | 
			
		||||
	{
 | 
			
		||||
	local($data,@struct)=@_;
 | 
			
		||||
	local($file)="/tmp/b$$.DER";
 | 
			
		||||
	local($off,$d,$hl,$len,$_,$b,@p,$s);
 | 
			
		||||
 | 
			
		||||
	($type)=($struct[4] =~ /OBJECT_IDENTIFIER :(.*)\s*$/);
 | 
			
		||||
	if ($type eq "rc4")
 | 
			
		||||
		{
 | 
			
		||||
		($off,$d,$hl,$len)=&parse_line($struct[6]);
 | 
			
		||||
		open(OUT,"|$rc4_cmd >$file") ||
 | 
			
		||||
			die "unable to run $rc4_cmd:$!\n";
 | 
			
		||||
		print OUT substr($data,$off+$hl,$len);
 | 
			
		||||
		close(OUT);
 | 
			
		||||
 | 
			
		||||
		$b=&load_file($file);
 | 
			
		||||
		unlink($file);
 | 
			
		||||
 | 
			
		||||
		($s,@p)=&der_str($b);
 | 
			
		||||
		die "unknown rsa key type\n$s\n"
 | 
			
		||||
			if ($s ne '0G-1B-1G-2F-2E-1D');
 | 
			
		||||
		local($off,$d,$hl,$len)=&parse_line($p[5]);
 | 
			
		||||
		$b=substr($b,$off+$hl,$len);
 | 
			
		||||
		($s,@p)=&der_str($b);
 | 
			
		||||
		open(OUT,"|$rsa_cmd") || die "unable to run $rsa_cmd:$!\n";
 | 
			
		||||
		print OUT $b;
 | 
			
		||||
		close(OUT);
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		print "'$type' is unknown\n";
 | 
			
		||||
		exit(1);
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
sub do_certificate
 | 
			
		||||
	{
 | 
			
		||||
	local($data,@struct)=@_;
 | 
			
		||||
	local($file)="/tmp/b$$.DER";
 | 
			
		||||
	local($off,$d,$hl,$len,$_,$b,@p,$s);
 | 
			
		||||
 | 
			
		||||
	($off,$d,$hl,$len)=&parse_line($struct[2]);
 | 
			
		||||
	$b=substr($data,$off,$len+$hl);
 | 
			
		||||
 | 
			
		||||
	open(OUT,"|$x509_cmd -inform d") || die "unable to run $x509_cmd:$!\n";
 | 
			
		||||
	print OUT $b;
 | 
			
		||||
	close(OUT);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
sub load_file
 | 
			
		||||
	{
 | 
			
		||||
	local($file)=@_;
 | 
			
		||||
	local(*IN,$r,$b,$i);
 | 
			
		||||
 | 
			
		||||
	$r="";
 | 
			
		||||
	open(IN,"<$file") || die "unable to open $file:$!\n";
 | 
			
		||||
	for (;;)
 | 
			
		||||
		{
 | 
			
		||||
		$i=sysread(IN,$b,10240);
 | 
			
		||||
		last if ($i <= 0);
 | 
			
		||||
		$r.=$b;
 | 
			
		||||
		}
 | 
			
		||||
	close(IN);
 | 
			
		||||
	return($r);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
sub load_file_parse
 | 
			
		||||
	{
 | 
			
		||||
	local($file)=@_;
 | 
			
		||||
	local(*IN,$r,@ret,$_,$i,$n,$b);
 | 
			
		||||
 | 
			
		||||
	open(IN,"$cmd -inform d -in $file|")
 | 
			
		||||
		|| die "unable to run der_parse\n";
 | 
			
		||||
	while (<IN>)
 | 
			
		||||
		{
 | 
			
		||||
		chop;
 | 
			
		||||
		push(@ret,$_);
 | 
			
		||||
		}
 | 
			
		||||
	return($r,@ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
							
								
								
									
										194
									
								
								apps/dgst.c
									
									
									
									
									
								
							
							
						
						
									
										194
									
								
								apps/dgst.c
									
									
									
									
									
								
							@@ -66,7 +66,6 @@
 | 
			
		||||
#include <openssl/objects.h>
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include <openssl/hmac.h>
 | 
			
		||||
 | 
			
		||||
#undef BUFSIZE
 | 
			
		||||
#define BUFSIZE	1024*8
 | 
			
		||||
@@ -74,17 +73,13 @@
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	dgst_main
 | 
			
		||||
 | 
			
		||||
static HMAC_CTX hmac_ctx;
 | 
			
		||||
 | 
			
		||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
	  EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
 | 
			
		||||
	  const char *file,BIO *bmd,const char *hmac_key, int non_fips_allow);
 | 
			
		||||
void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
		EVP_PKEY *key, unsigned char *sigin, int siglen);
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
	unsigned char *buf=NULL;
 | 
			
		||||
	int i,err=0;
 | 
			
		||||
	const EVP_MD *md=NULL,*m;
 | 
			
		||||
@@ -96,19 +91,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char pname[PROG_NAME_SIZE+1];
 | 
			
		||||
	int separator=0;
 | 
			
		||||
	int debug=0;
 | 
			
		||||
	int keyform=FORMAT_PEM;
 | 
			
		||||
	const char *outfile = NULL, *keyfile = NULL;
 | 
			
		||||
	const char *sigfile = NULL, *randfile = NULL;
 | 
			
		||||
	int out_bin = -1, want_pub = 0, do_verify = 0;
 | 
			
		||||
	EVP_PKEY *sigkey = NULL;
 | 
			
		||||
	unsigned char *sigbuf = NULL;
 | 
			
		||||
	int siglen = 0;
 | 
			
		||||
	char *passargin = NULL, *passin = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	char *hmac_key=NULL;
 | 
			
		||||
	int non_fips_allow = 0;
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -121,11 +109,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	/* first check the program name */
 | 
			
		||||
	program_name(argv[0],pname,sizeof pname);
 | 
			
		||||
	program_name(argv[0],pname,PROG_NAME_SIZE);
 | 
			
		||||
 | 
			
		||||
	md=EVP_get_digestbyname(pname);
 | 
			
		||||
 | 
			
		||||
@@ -151,12 +136,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) break;
 | 
			
		||||
			keyfile=*(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (!strcmp(*argv,"-passin"))
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1)
 | 
			
		||||
				break;
 | 
			
		||||
			passargin=*++argv;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-verify") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) break;
 | 
			
		||||
@@ -175,32 +154,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) break;
 | 
			
		||||
			sigfile=*(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-keyform") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) break;
 | 
			
		||||
			keyform=str2fmt(*(++argv));
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) break;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-hex") == 0)
 | 
			
		||||
			out_bin = 0;
 | 
			
		||||
		else if (strcmp(*argv,"-binary") == 0)
 | 
			
		||||
			out_bin = 1;
 | 
			
		||||
		else if (strcmp(*argv,"-d") == 0)
 | 
			
		||||
			debug=1;
 | 
			
		||||
		else if (strcmp(*argv,"-non-fips-allow") == 0)
 | 
			
		||||
			non_fips_allow=1;
 | 
			
		||||
		else if (!strcmp(*argv,"-hmac"))
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1)
 | 
			
		||||
				break;
 | 
			
		||||
			hmac_key=*++argv;
 | 
			
		||||
			}
 | 
			
		||||
		else if ((m=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
 | 
			
		||||
			md=m;
 | 
			
		||||
		else
 | 
			
		||||
@@ -229,12 +188,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf(bio_err,"-sign   file    sign digest using private key in file\n");
 | 
			
		||||
		BIO_printf(bio_err,"-verify file    verify a signature using public key in file\n");
 | 
			
		||||
		BIO_printf(bio_err,"-prverify file  verify a signature using private key in file\n");
 | 
			
		||||
		BIO_printf(bio_err,"-keyform arg    key file format (PEM or ENGINE)\n");
 | 
			
		||||
		BIO_printf(bio_err,"-signature file signature to verify\n");
 | 
			
		||||
		BIO_printf(bio_err,"-binary         output in binary form\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err,"-engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm (default)\n",
 | 
			
		||||
			LN_md5,LN_md5);
 | 
			
		||||
@@ -254,10 +209,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	in=BIO_new(BIO_s_file());
 | 
			
		||||
	bmd=BIO_new(BIO_f_md());
 | 
			
		||||
	if (debug)
 | 
			
		||||
@@ -267,12 +218,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_set_callback_arg(in,bio_err);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if(!app_passwd(bio_err, passargin, NULL, &passin, NULL))
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "Error getting password\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if ((in == NULL) || (bmd == NULL))
 | 
			
		||||
		{
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
@@ -293,7 +238,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		else    out = BIO_new_file(outfile, "w");
 | 
			
		||||
	} else {
 | 
			
		||||
		out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -308,18 +253,24 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		goto end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if(keyfile)
 | 
			
		||||
		{
 | 
			
		||||
	if(keyfile) {
 | 
			
		||||
		BIO *keybio;
 | 
			
		||||
		keybio = BIO_new_file(keyfile, "r");
 | 
			
		||||
		if(!keybio) {
 | 
			
		||||
			BIO_printf(bio_err, "Error opening key file %s\n",
 | 
			
		||||
								keyfile);
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
		
 | 
			
		||||
		if(want_pub) 
 | 
			
		||||
			sigkey = load_pubkey(bio_err, keyfile, keyform, 0, NULL,
 | 
			
		||||
				e, "key file");
 | 
			
		||||
		else
 | 
			
		||||
			sigkey = load_key(bio_err, keyfile, keyform, 0, passin,
 | 
			
		||||
				e, "key file");
 | 
			
		||||
		if (!sigkey)
 | 
			
		||||
			{
 | 
			
		||||
			/* load_[pub]key() has already printed an appropriate
 | 
			
		||||
			   message */
 | 
			
		||||
			sigkey = PEM_read_bio_PUBKEY(keybio, NULL, NULL, NULL);
 | 
			
		||||
		else sigkey = PEM_read_bio_PrivateKey(keybio, NULL, NULL, NULL);
 | 
			
		||||
		BIO_free(keybio);
 | 
			
		||||
		if(!sigkey) {
 | 
			
		||||
			BIO_printf(bio_err, "Error reading key file %s\n",
 | 
			
		||||
								keyfile);
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
@@ -345,130 +296,72 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
		
 | 
			
		||||
	if (non_fips_allow)
 | 
			
		||||
		{
 | 
			
		||||
		EVP_MD_CTX *md_ctx;
 | 
			
		||||
		BIO_get_md_ctx(bmd,&md_ctx);
 | 
			
		||||
		EVP_MD_CTX_set_flags(md_ctx, EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
	/* we use md as a filter, reading from 'in' */
 | 
			
		||||
	if (!BIO_set_md(bmd,md))
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "Error setting digest %s\n",
 | 
			
		||||
							EVP_MD_name(md));
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
		
 | 
			
		||||
	BIO_set_md(bmd,md);
 | 
			
		||||
	inp=BIO_push(bmd,in);
 | 
			
		||||
 | 
			
		||||
	if (argc == 0)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
			
		||||
		err=do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf,
 | 
			
		||||
			  siglen,"","(stdin)",bmd,hmac_key, non_fips_allow);
 | 
			
		||||
		do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf, siglen);
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		name=OBJ_nid2sn(md->type);
 | 
			
		||||
		for (i=0; i<argc; i++)
 | 
			
		||||
			{
 | 
			
		||||
			char *tmp,*tofree=NULL;
 | 
			
		||||
			int r;
 | 
			
		||||
 | 
			
		||||
			if (BIO_read_filename(in,argv[i]) <= 0)
 | 
			
		||||
				{
 | 
			
		||||
				perror(argv[i]);
 | 
			
		||||
				err++;
 | 
			
		||||
				continue;
 | 
			
		||||
				}
 | 
			
		||||
			if(!out_bin)
 | 
			
		||||
				{
 | 
			
		||||
				size_t len = strlen(name)+strlen(argv[i])+(hmac_key ? 5 : 0)+5;
 | 
			
		||||
				tmp=tofree=OPENSSL_malloc(len);
 | 
			
		||||
				BIO_snprintf(tmp,len,"%s%s(%s)= ",
 | 
			
		||||
							 hmac_key ? "HMAC-" : "",name,argv[i]);
 | 
			
		||||
				}
 | 
			
		||||
			else
 | 
			
		||||
				tmp="";
 | 
			
		||||
			r=do_fp(out,buf,inp,separator,out_bin,sigkey,sigbuf,
 | 
			
		||||
				siglen,tmp,argv[i],bmd,hmac_key,non_fips_allow);
 | 
			
		||||
			if(r)
 | 
			
		||||
			    err=r;
 | 
			
		||||
			if(tofree)
 | 
			
		||||
				OPENSSL_free(tofree);
 | 
			
		||||
			if(!out_bin) BIO_printf(out, "%s(%s)= ",name,argv[i]);
 | 
			
		||||
			do_fp(out, buf,inp,separator, out_bin, sigkey, 
 | 
			
		||||
								sigbuf, siglen);
 | 
			
		||||
			(void)BIO_reset(bmd);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
end:
 | 
			
		||||
	if (buf != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		OPENSSL_cleanse(buf,BUFSIZE);
 | 
			
		||||
		memset(buf,0,BUFSIZE);
 | 
			
		||||
		OPENSSL_free(buf);
 | 
			
		||||
		}
 | 
			
		||||
	if (in != NULL) BIO_free(in);
 | 
			
		||||
	if (passin)
 | 
			
		||||
		OPENSSL_free(passin);
 | 
			
		||||
	BIO_free_all(out);
 | 
			
		||||
	EVP_PKEY_free(sigkey);
 | 
			
		||||
	if(sigbuf) OPENSSL_free(sigbuf);
 | 
			
		||||
	if (bmd != NULL) BIO_free(bmd);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(err);
 | 
			
		||||
	EXIT(err);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
	  EVP_PKEY *key, unsigned char *sigin, int siglen, const char *title,
 | 
			
		||||
	  const char *file,BIO *bmd,const char *hmac_key, int non_fips_allow)
 | 
			
		||||
void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
			EVP_PKEY *key, unsigned char *sigin, int siglen)
 | 
			
		||||
	{
 | 
			
		||||
	unsigned int len;
 | 
			
		||||
	int len;
 | 
			
		||||
	int i;
 | 
			
		||||
	EVP_MD_CTX *md_ctx;
 | 
			
		||||
 | 
			
		||||
	if (hmac_key)
 | 
			
		||||
		{
 | 
			
		||||
		EVP_MD *md;
 | 
			
		||||
 | 
			
		||||
		BIO_get_md(bmd,&md);
 | 
			
		||||
		HMAC_CTX_init(&hmac_ctx);
 | 
			
		||||
		if (non_fips_allow)
 | 
			
		||||
			HMAC_CTX_set_flags(&hmac_ctx,
 | 
			
		||||
					EVP_MD_CTX_FLAG_NON_FIPS_ALLOW);
 | 
			
		||||
		HMAC_Init_ex(&hmac_ctx,hmac_key,strlen(hmac_key),md, NULL);
 | 
			
		||||
		BIO_get_md_ctx(bmd,&md_ctx);
 | 
			
		||||
		BIO_set_md_ctx(bmd,&hmac_ctx.md_ctx);
 | 
			
		||||
		}
 | 
			
		||||
	for (;;)
 | 
			
		||||
		{
 | 
			
		||||
		i=BIO_read(bp,(char *)buf,BUFSIZE);
 | 
			
		||||
		if(i < 0)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Read Error in %s\n",file);
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			return 1;
 | 
			
		||||
			}
 | 
			
		||||
		if (i == 0) break;
 | 
			
		||||
		if (i <= 0) break;
 | 
			
		||||
		}
 | 
			
		||||
	if(sigin)
 | 
			
		||||
		{
 | 
			
		||||
		EVP_MD_CTX *ctx;
 | 
			
		||||
		BIO_get_md_ctx(bp, &ctx);
 | 
			
		||||
		i = EVP_VerifyFinal(ctx, sigin, (unsigned int)siglen, key); 
 | 
			
		||||
		if(i > 0)
 | 
			
		||||
			BIO_printf(out, "Verified OK\n");
 | 
			
		||||
		else if(i == 0)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(out, "Verification Failure\n");
 | 
			
		||||
			return 1;
 | 
			
		||||
			}
 | 
			
		||||
		if(i > 0) BIO_printf(out, "Verified OK\n");
 | 
			
		||||
		else if(i == 0) BIO_printf(out, "Verification Failure\n");
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Error Verifying Data\n");
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			return 1;
 | 
			
		||||
			}
 | 
			
		||||
		return 0;
 | 
			
		||||
		return;
 | 
			
		||||
		}
 | 
			
		||||
	if(key)
 | 
			
		||||
		{
 | 
			
		||||
@@ -478,22 +371,16 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Error Signing Data\n");
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			return 1;
 | 
			
		||||
			return;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	else if(hmac_key)
 | 
			
		||||
		{
 | 
			
		||||
		HMAC_Final(&hmac_ctx,buf,&len);
 | 
			
		||||
		HMAC_CTX_cleanup(&hmac_ctx);
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		len=BIO_gets(bp,(char *)buf,BUFSIZE);
 | 
			
		||||
 | 
			
		||||
	if(binout) BIO_write(out, buf, len);
 | 
			
		||||
	else 
 | 
			
		||||
		{
 | 
			
		||||
		BIO_write(out,title,strlen(title));
 | 
			
		||||
		for (i=0; (unsigned int)i<len; i++)
 | 
			
		||||
		for (i=0; i<len; i++)
 | 
			
		||||
			{
 | 
			
		||||
			if (sep && (i != 0))
 | 
			
		||||
				BIO_printf(out, ":");
 | 
			
		||||
@@ -501,10 +388,5 @@ int do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, int binout,
 | 
			
		||||
			}
 | 
			
		||||
		BIO_printf(out, "\n");
 | 
			
		||||
		}
 | 
			
		||||
	if (hmac_key)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_md_ctx(bmd,md_ctx);
 | 
			
		||||
		}
 | 
			
		||||
	return 0;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										33
									
								
								apps/dh.c
									
									
									
									
									
								
							
							
						
						
									
										33
									
								
								apps/dh.c
									
									
									
									
									
								
							@@ -57,7 +57,7 @@
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <time.h>
 | 
			
		||||
@@ -87,17 +87,11 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	DH *dh=NULL;
 | 
			
		||||
	int i,badops=0,text=0;
 | 
			
		||||
	BIO *in=NULL,*out=NULL;
 | 
			
		||||
	int informat,outformat,check=0,noout=0,C=0,ret=1;
 | 
			
		||||
	char *infile,*outfile,*prog;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -105,12 +99,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	infile=NULL;
 | 
			
		||||
	outfile=NULL;
 | 
			
		||||
	informat=FORMAT_PEM;
 | 
			
		||||
@@ -141,13 +129,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			outfile= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-check") == 0)
 | 
			
		||||
			check=1;
 | 
			
		||||
		else if (strcmp(*argv,"-text") == 0)
 | 
			
		||||
@@ -179,18 +160,11 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err," -text         print a text form of the DH parameters\n");
 | 
			
		||||
		BIO_printf(bio_err," -C            Output C code\n");
 | 
			
		||||
		BIO_printf(bio_err," -noout        no output\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e     use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	in=BIO_new(BIO_s_file());
 | 
			
		||||
	out=BIO_new(BIO_s_file());
 | 
			
		||||
	if ((in == NULL) || (out == NULL))
 | 
			
		||||
@@ -212,7 +186,7 @@ bad:
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -345,7 +319,6 @@ end:
 | 
			
		||||
	if (in != NULL) BIO_free(in);
 | 
			
		||||
	if (out != NULL) BIO_free_all(out);
 | 
			
		||||
	if (dh != NULL) DH_free(dh);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -109,7 +109,7 @@
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <time.h>
 | 
			
		||||
@@ -122,7 +122,7 @@
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
#include <openssl/dsa.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -148,21 +148,15 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	DH *dh=NULL;
 | 
			
		||||
	int i,badops=0,text=0;
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
	int dsaparam=0;
 | 
			
		||||
#endif
 | 
			
		||||
	BIO *in=NULL,*out=NULL;
 | 
			
		||||
	int informat,outformat,check=0,noout=0,C=0,ret=1;
 | 
			
		||||
	char *infile,*outfile,*prog;
 | 
			
		||||
	char *inrand=NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	int num = 0, g = 0;
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
@@ -171,9 +165,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	infile=NULL;
 | 
			
		||||
	outfile=NULL;
 | 
			
		||||
	informat=FORMAT_PEM;
 | 
			
		||||
@@ -204,18 +195,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			outfile= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-check") == 0)
 | 
			
		||||
			check=1;
 | 
			
		||||
		else if (strcmp(*argv,"-text") == 0)
 | 
			
		||||
			text=1;
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
		else if (strcmp(*argv,"-dsaparam") == 0)
 | 
			
		||||
			dsaparam=1;
 | 
			
		||||
#endif
 | 
			
		||||
@@ -247,7 +231,7 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err," -outform arg  output format - one of DER PEM\n");
 | 
			
		||||
		BIO_printf(bio_err," -in arg       input file\n");
 | 
			
		||||
		BIO_printf(bio_err," -out arg      output file\n");
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
		BIO_printf(bio_err," -dsaparam     read or generate DSA parameters, convert to DH\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," -check        check the DH parameters\n");
 | 
			
		||||
@@ -256,9 +240,6 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err," -2            generate parameters using  2 as the generator value\n");
 | 
			
		||||
		BIO_printf(bio_err," -5            generate parameters using  5 as the generator value\n");
 | 
			
		||||
		BIO_printf(bio_err," numbits       number of bits in to generate (default 512)\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e     use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
			
		||||
		BIO_printf(bio_err,"               - load the file (or the files in the directory) into\n");
 | 
			
		||||
		BIO_printf(bio_err,"               the random number generator\n");
 | 
			
		||||
@@ -268,14 +249,10 @@ bad:
 | 
			
		||||
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (g && !num)
 | 
			
		||||
		num = DEFBITS;
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
	if (dsaparam)
 | 
			
		||||
		{
 | 
			
		||||
		if (g)
 | 
			
		||||
@@ -302,7 +279,7 @@ bad:
 | 
			
		||||
			BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
			
		||||
				app_RAND_load_files(inrand));
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
		if (dsaparam)
 | 
			
		||||
			{
 | 
			
		||||
			DSA *dsa;
 | 
			
		||||
@@ -363,7 +340,7 @@ bad:
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
		if (dsaparam)
 | 
			
		||||
			{
 | 
			
		||||
			DSA *dsa;
 | 
			
		||||
@@ -416,7 +393,7 @@ bad:
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -501,7 +478,7 @@ bad:
 | 
			
		||||
		printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
 | 
			
		||||
		printf("\t\t{ DH_free(dh); return(NULL); }\n");
 | 
			
		||||
		if (dh->length)
 | 
			
		||||
			printf("\tdh->length = %ld;\n", dh->length);
 | 
			
		||||
			printf("\tdh->length = %d;\n", dh->length);
 | 
			
		||||
		printf("\treturn(dh);\n\t}\n");
 | 
			
		||||
		OPENSSL_free(data);
 | 
			
		||||
		}
 | 
			
		||||
@@ -529,8 +506,7 @@ end:
 | 
			
		||||
	if (in != NULL) BIO_free(in);
 | 
			
		||||
	if (out != NULL) BIO_free_all(out);
 | 
			
		||||
	if (dh != NULL) DH_free(dh);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
/* dh_cb is identical to dsa_cb in apps/dsaparam.c */
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										42
									
								
								apps/dsa.c
									
									
									
									
									
								
							
							
						
						
									
										42
									
								
								apps/dsa.c
									
									
									
									
									
								
							@@ -56,7 +56,7 @@
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
@@ -79,9 +79,6 @@
 | 
			
		||||
 * -des		- encrypt output if PEM format with DES in cbc mode
 | 
			
		||||
 * -des3	- encrypt output if PEM format
 | 
			
		||||
 * -idea	- encrypt output if PEM format
 | 
			
		||||
 * -aes128	- encrypt output if PEM format
 | 
			
		||||
 * -aes192	- encrypt output if PEM format
 | 
			
		||||
 * -aes256	- encrypt output if PEM format
 | 
			
		||||
 * -text	- print a text version
 | 
			
		||||
 * -modulus	- print the DSA public key
 | 
			
		||||
 */
 | 
			
		||||
@@ -90,9 +87,6 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	int ret=1;
 | 
			
		||||
	DSA *dsa=NULL;
 | 
			
		||||
	int i,badops=0;
 | 
			
		||||
@@ -101,9 +95,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	int informat,outformat,text=0,noout=0;
 | 
			
		||||
	int pubin = 0, pubout = 0;
 | 
			
		||||
	char *infile,*outfile,*prog;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine;
 | 
			
		||||
#endif
 | 
			
		||||
	char *passargin = NULL, *passargout = NULL;
 | 
			
		||||
	char *passin = NULL, *passout = NULL;
 | 
			
		||||
	int modulus=0;
 | 
			
		||||
@@ -114,12 +105,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	infile=NULL;
 | 
			
		||||
	outfile=NULL;
 | 
			
		||||
	informat=FORMAT_PEM;
 | 
			
		||||
@@ -160,13 +145,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			passargout= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-noout") == 0)
 | 
			
		||||
			noout=1;
 | 
			
		||||
		else if (strcmp(*argv,"-text") == 0)
 | 
			
		||||
@@ -198,17 +176,10 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err," -passin arg     input file pass phrase source\n");
 | 
			
		||||
		BIO_printf(bio_err," -out arg        output file\n");
 | 
			
		||||
		BIO_printf(bio_err," -passout arg    output file pass phrase source\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," -des            encrypt PEM output with cbc des\n");
 | 
			
		||||
		BIO_printf(bio_err," -des3           encrypt PEM output with ede cbc des using 168 bit key\n");
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
		BIO_printf(bio_err," -idea           encrypt PEM output with cbc idea\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
		BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
			
		||||
		BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," -text           print the key in text\n");
 | 
			
		||||
		BIO_printf(bio_err," -noout          don't print key out\n");
 | 
			
		||||
@@ -218,10 +189,6 @@ bad:
 | 
			
		||||
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
			
		||||
		BIO_printf(bio_err, "Error getting passwords\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
@@ -268,7 +235,7 @@ bad:
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -326,7 +293,6 @@ end:
 | 
			
		||||
	if(dsa != NULL) DSA_free(dsa);
 | 
			
		||||
	if(passin) OPENSSL_free(passin);
 | 
			
		||||
	if(passout) OPENSSL_free(passout);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -56,7 +56,7 @@
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
#include <assert.h>
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
@@ -90,9 +90,6 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	DSA *dsa=NULL;
 | 
			
		||||
	int i,badops=0,text=0;
 | 
			
		||||
	BIO *in=NULL,*out=NULL;
 | 
			
		||||
@@ -100,9 +97,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char *infile,*outfile,*prog,*inrand=NULL;
 | 
			
		||||
	int numbits= -1,num,genkey=0;
 | 
			
		||||
	int need_rand=0;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -110,9 +104,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	infile=NULL;
 | 
			
		||||
	outfile=NULL;
 | 
			
		||||
	informat=FORMAT_PEM;
 | 
			
		||||
@@ -143,13 +134,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			outfile= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if(strcmp(*argv, "-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine = *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-text") == 0)
 | 
			
		||||
			text=1;
 | 
			
		||||
		else if (strcmp(*argv,"-C") == 0)
 | 
			
		||||
@@ -195,11 +179,7 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err," -text         print as text\n");
 | 
			
		||||
		BIO_printf(bio_err," -C            Output C code\n");
 | 
			
		||||
		BIO_printf(bio_err," -noout        no output\n");
 | 
			
		||||
		BIO_printf(bio_err," -genkey       generate a DSA key\n");
 | 
			
		||||
		BIO_printf(bio_err," -rand         files to use for random number input\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e     use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," number        number of bits to use for generating private key\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
@@ -227,7 +207,7 @@ bad:
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -243,10 +223,6 @@ bad:
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (need_rand)
 | 
			
		||||
		{
 | 
			
		||||
		app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
			
		||||
@@ -381,8 +357,7 @@ end:
 | 
			
		||||
	if (in != NULL) BIO_free(in);
 | 
			
		||||
	if (out != NULL) BIO_free_all(out);
 | 
			
		||||
	if (dsa != NULL) DSA_free(dsa);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static void MS_CALLBACK dsa_cb(int p, int n, void *arg)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										231
									
								
								apps/enc.c
									
									
									
									
									
								
							
							
						
						
									
										231
									
								
								apps/enc.c
									
									
									
									
									
								
							@@ -66,8 +66,10 @@
 | 
			
		||||
#include <openssl/objects.h>
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#ifndef NO_MD5
 | 
			
		||||
#include <openssl/md5.h>
 | 
			
		||||
#endif
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include <ctype.h>
 | 
			
		||||
 | 
			
		||||
int set_hex(char *in,unsigned char *out,int size);
 | 
			
		||||
#undef SIZE
 | 
			
		||||
@@ -78,56 +80,27 @@ int set_hex(char *in,unsigned char *out,int size);
 | 
			
		||||
#define BSIZE	(8*1024)
 | 
			
		||||
#define	PROG	enc_main
 | 
			
		||||
 | 
			
		||||
static void show_ciphers(const OBJ_NAME *name,void *bio_)
 | 
			
		||||
	{
 | 
			
		||||
	BIO *bio=bio_;
 | 
			
		||||
	static int n;
 | 
			
		||||
 | 
			
		||||
	if(!islower((unsigned char)*name->name))
 | 
			
		||||
		return;
 | 
			
		||||
 | 
			
		||||
	BIO_printf(bio,"-%-25s",name->name);
 | 
			
		||||
	if(++n == 3)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio,"\n");
 | 
			
		||||
		n=0;
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		BIO_printf(bio," ");
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	static const char magic[]="Salted__";
 | 
			
		||||
	char mbuf[sizeof magic-1];
 | 
			
		||||
	char mbuf[8];	/* should be 1 smaller than magic */
 | 
			
		||||
	char *strbuf=NULL;
 | 
			
		||||
	unsigned char *buff=NULL,*bufsize=NULL;
 | 
			
		||||
	int bsize=BSIZE,verbose=0;
 | 
			
		||||
	int ret=1,inl;
 | 
			
		||||
	int nopad = 0;
 | 
			
		||||
	unsigned char key[EVP_MAX_KEY_LENGTH],iv[EVP_MAX_IV_LENGTH];
 | 
			
		||||
	unsigned char key[24],iv[MD5_DIGEST_LENGTH];
 | 
			
		||||
	unsigned char salt[PKCS5_SALT_LEN];
 | 
			
		||||
	char *str=NULL, *passarg = NULL, *pass = NULL;
 | 
			
		||||
	char *hkey=NULL,*hiv=NULL,*hsalt = NULL;
 | 
			
		||||
	char *md=NULL;
 | 
			
		||||
	int enc=1,printkey=0,i,base64=0;
 | 
			
		||||
	int debug=0,olb64=0,nosalt=0;
 | 
			
		||||
	const EVP_CIPHER *cipher=NULL,*c;
 | 
			
		||||
	EVP_CIPHER_CTX *ctx = NULL;
 | 
			
		||||
	char *inf=NULL,*outf=NULL;
 | 
			
		||||
	BIO *in=NULL,*out=NULL,*b64=NULL,*benc=NULL,*rbio=NULL,*wbio=NULL;
 | 
			
		||||
#define PROG_NAME_SIZE  39
 | 
			
		||||
	char pname[PROG_NAME_SIZE+1];
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	const EVP_MD *dgst=NULL;
 | 
			
		||||
	int non_fips_allow = 0;
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -135,11 +108,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	/* first check the program name */
 | 
			
		||||
	program_name(argv[0],pname,sizeof pname);
 | 
			
		||||
	program_name(argv[0],pname,PROG_NAME_SIZE);
 | 
			
		||||
	if (strcmp(pname,"base64") == 0)
 | 
			
		||||
		base64=1;
 | 
			
		||||
 | 
			
		||||
@@ -171,21 +141,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			passarg= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if	(strcmp(*argv,"-d") == 0)
 | 
			
		||||
			enc=0;
 | 
			
		||||
		else if	(strcmp(*argv,"-p") == 0)
 | 
			
		||||
			printkey=1;
 | 
			
		||||
		else if	(strcmp(*argv,"-v") == 0)
 | 
			
		||||
			verbose=1;
 | 
			
		||||
		else if	(strcmp(*argv,"-nopad") == 0)
 | 
			
		||||
			nopad=1;
 | 
			
		||||
		else if	(strcmp(*argv,"-salt") == 0)
 | 
			
		||||
			nosalt=0;
 | 
			
		||||
		else if	(strcmp(*argv,"-nosalt") == 0)
 | 
			
		||||
@@ -226,7 +187,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
				goto bad;
 | 
			
		||||
				}
 | 
			
		||||
			buf[0]='\0';
 | 
			
		||||
			fgets(buf,sizeof buf,infile);
 | 
			
		||||
			fgets(buf,128,infile);
 | 
			
		||||
			fclose(infile);
 | 
			
		||||
			i=strlen(buf);
 | 
			
		||||
			if ((i > 0) &&
 | 
			
		||||
@@ -257,13 +218,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			hiv= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-md") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			md= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-non-fips-allow") == 0)
 | 
			
		||||
			non_fips_allow = 1;
 | 
			
		||||
		else if	((argv[0][0] == '-') &&
 | 
			
		||||
			((c=EVP_get_cipherbyname(&(argv[0][1]))) != NULL))
 | 
			
		||||
			{
 | 
			
		||||
@@ -282,47 +236,84 @@ bad:
 | 
			
		||||
			BIO_printf(bio_err,"%-14s encrypt\n","-e");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s decrypt\n","-d");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s base64 encode/decode, depending on encryption flag\n","-a/-base64");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s passphrase is the next argument\n","-k");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s passphrase is the first line of the file argument\n","-kfile");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s the next argument is the md to use to create a key\n","-md");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s   from a passphrase.  One of md2, md5, sha or sha1\n","");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s key is the next argument\n","-k");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s key is the first line of the file argument\n","-kfile");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
 | 
			
		||||
			BIO_printf(bio_err,"%-14s buffer size\n","-bufsize <n>");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
			BIO_printf(bio_err,"%-14s use engine e, possibly a hardware device.\n","-engine e");
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
			BIO_printf(bio_err,"Cipher Types\n");
 | 
			
		||||
			OBJ_NAME_do_all_sorted(OBJ_NAME_TYPE_CIPHER_METH,
 | 
			
		||||
					       show_ciphers,
 | 
			
		||||
					       bio_err);
 | 
			
		||||
			BIO_printf(bio_err,"\n");
 | 
			
		||||
			BIO_printf(bio_err,"des     : 56 bit key DES encryption\n");
 | 
			
		||||
			BIO_printf(bio_err,"des_ede :112 bit key ede DES encryption\n");
 | 
			
		||||
			BIO_printf(bio_err,"des_ede3:168 bit key ede DES encryption\n");
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
			BIO_printf(bio_err,"idea    :128 bit key IDEA encryption\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef NO_RC4
 | 
			
		||||
			BIO_printf(bio_err,"rc2     :128 bit key RC2 encryption\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef NO_BF
 | 
			
		||||
			BIO_printf(bio_err,"bf      :128 bit key Blowfish encryption\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef NO_RC4
 | 
			
		||||
			BIO_printf(bio_err," -%-5s :128 bit key RC4 encryption\n",
 | 
			
		||||
				LN_rc4);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
			BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
 | 
			
		||||
				LN_des_ecb,LN_des_cbc,
 | 
			
		||||
				LN_des_cfb64,LN_des_ofb64);
 | 
			
		||||
			BIO_printf(bio_err," -%-4s (%s)\n",
 | 
			
		||||
				"des", LN_des_cbc);
 | 
			
		||||
 | 
			
		||||
			BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
 | 
			
		||||
				LN_des_ede,LN_des_ede_cbc,
 | 
			
		||||
				LN_des_ede_cfb64,LN_des_ede_ofb64);
 | 
			
		||||
			BIO_printf(bio_err," -desx -none\n");
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
			BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
 | 
			
		||||
				LN_des_ede3,LN_des_ede3_cbc,
 | 
			
		||||
				LN_des_ede3_cfb64,LN_des_ede3_ofb64);
 | 
			
		||||
			BIO_printf(bio_err," -%-4s (%s)\n",
 | 
			
		||||
				"des3", LN_des_ede3_cbc);
 | 
			
		||||
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
			BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
 | 
			
		||||
				LN_idea_ecb, LN_idea_cbc,
 | 
			
		||||
				LN_idea_cfb64, LN_idea_ofb64);
 | 
			
		||||
			BIO_printf(bio_err," -%-4s (%s)\n","idea",LN_idea_cbc);
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef NO_RC2
 | 
			
		||||
			BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
 | 
			
		||||
				LN_rc2_ecb, LN_rc2_cbc,
 | 
			
		||||
				LN_rc2_cfb64, LN_rc2_ofb64);
 | 
			
		||||
			BIO_printf(bio_err," -%-4s (%s)\n","rc2", LN_rc2_cbc);
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef NO_BF
 | 
			
		||||
			BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
 | 
			
		||||
				LN_bf_ecb, LN_bf_cbc,
 | 
			
		||||
				LN_bf_cfb64, LN_bf_ofb64);
 | 
			
		||||
			BIO_printf(bio_err," -%-4s (%s)\n","bf", LN_bf_cbc);
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef NO_CAST
 | 
			
		||||
			BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
 | 
			
		||||
				LN_cast5_ecb, LN_cast5_cbc,
 | 
			
		||||
				LN_cast5_cfb64, LN_cast5_ofb64);
 | 
			
		||||
			BIO_printf(bio_err," -%-4s (%s)\n","cast", LN_cast5_cbc);
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef NO_RC5
 | 
			
		||||
			BIO_printf(bio_err," -%-12s -%-12s -%-12s -%-12s",
 | 
			
		||||
				LN_rc5_ecb, LN_rc5_cbc,
 | 
			
		||||
				LN_rc5_cfb64, LN_rc5_ofb64);
 | 
			
		||||
			BIO_printf(bio_err," -%-4s (%s)\n","rc5", LN_rc5_cbc);
 | 
			
		||||
#endif
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		argc--;
 | 
			
		||||
		argv++;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (md && (dgst=EVP_get_digestbyname(md)) == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"%s is an unsupported message digest type\n",md);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (dgst == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		if (in_FIPS_mode)
 | 
			
		||||
			dgst = EVP_sha1();
 | 
			
		||||
		else
 | 
			
		||||
			dgst = EVP_md5();
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (bufsize != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		unsigned long n;
 | 
			
		||||
@@ -346,7 +337,7 @@ bad:
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		/* It must be large enough for a base64 encoded line */
 | 
			
		||||
		if (base64 && n < 80) n=80;
 | 
			
		||||
		if (n < 80) n=80;
 | 
			
		||||
 | 
			
		||||
		bsize=(int)n;
 | 
			
		||||
		if (verbose) BIO_printf(bio_err,"bufsize=%d\n",bsize);
 | 
			
		||||
@@ -376,11 +367,7 @@ bad:
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (inf == NULL)
 | 
			
		||||
	        {
 | 
			
		||||
		if (bufsize != NULL)
 | 
			
		||||
			setvbuf(stdin, (char *)NULL, _IONBF, 0);
 | 
			
		||||
		BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
			
		||||
	        }
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		if (BIO_read_filename(in,inf) <= 0)
 | 
			
		||||
@@ -404,7 +391,7 @@ bad:
 | 
			
		||||
			{
 | 
			
		||||
			char buf[200];
 | 
			
		||||
 | 
			
		||||
			BIO_snprintf(buf,sizeof buf,"enter %s %s password:",
 | 
			
		||||
			sprintf(buf,"enter %s %s password:",
 | 
			
		||||
				OBJ_nid2ln(EVP_CIPHER_nid(cipher)),
 | 
			
		||||
				(enc)?"encryption":"decryption");
 | 
			
		||||
			strbuf[0]='\0';
 | 
			
		||||
@@ -431,9 +418,7 @@ bad:
 | 
			
		||||
	if (outf == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
		if (bufsize != NULL)
 | 
			
		||||
			setvbuf(stdout, (char *)NULL, _IONBF, 0);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -471,9 +456,6 @@ bad:
 | 
			
		||||
 | 
			
		||||
	if (cipher != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		/* Note that str is NULL if a key was passed on the command
 | 
			
		||||
		 * line, so we get no salt in that case. Is this a bug?
 | 
			
		||||
		 */
 | 
			
		||||
		if (str != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			/* Salt handling: if encrypting generate a salt and
 | 
			
		||||
@@ -485,12 +467,12 @@ bad:
 | 
			
		||||
			else {
 | 
			
		||||
				if(enc) {
 | 
			
		||||
					if(hsalt) {
 | 
			
		||||
						if(!set_hex(hsalt,salt,sizeof salt)) {
 | 
			
		||||
						if(!set_hex(hsalt,salt,PKCS5_SALT_LEN)) {
 | 
			
		||||
							BIO_printf(bio_err,
 | 
			
		||||
								"invalid hex salt value\n");
 | 
			
		||||
							goto end;
 | 
			
		||||
						}
 | 
			
		||||
					} else if (RAND_pseudo_bytes(salt, sizeof salt) < 0)
 | 
			
		||||
					} else if (RAND_pseudo_bytes(salt, PKCS5_SALT_LEN) < 0)
 | 
			
		||||
						goto end;
 | 
			
		||||
					/* If -P option then don't bother writing */
 | 
			
		||||
					if((printkey != 2)
 | 
			
		||||
@@ -498,14 +480,14 @@ bad:
 | 
			
		||||
							 sizeof magic-1) != sizeof magic-1
 | 
			
		||||
					       || BIO_write(wbio,
 | 
			
		||||
							    (char *)salt,
 | 
			
		||||
							    sizeof salt) != sizeof salt)) {
 | 
			
		||||
							    PKCS5_SALT_LEN) != PKCS5_SALT_LEN)) {
 | 
			
		||||
						BIO_printf(bio_err,"error writing output file\n");
 | 
			
		||||
						goto end;
 | 
			
		||||
					}
 | 
			
		||||
				} else if(BIO_read(rbio,mbuf,sizeof mbuf) != sizeof mbuf
 | 
			
		||||
					  || BIO_read(rbio,
 | 
			
		||||
						      (unsigned char *)salt,
 | 
			
		||||
				    sizeof salt) != sizeof salt) {
 | 
			
		||||
				    PKCS5_SALT_LEN) != PKCS5_SALT_LEN) {
 | 
			
		||||
					BIO_printf(bio_err,"error reading input file\n");
 | 
			
		||||
					goto end;
 | 
			
		||||
				} else if(memcmp(mbuf,magic,sizeof magic-1)) {
 | 
			
		||||
@@ -516,7 +498,7 @@ bad:
 | 
			
		||||
				sptr = salt;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			EVP_BytesToKey(cipher,dgst,sptr,
 | 
			
		||||
			EVP_BytesToKey(cipher,EVP_md5(),sptr,
 | 
			
		||||
				(unsigned char *)str,
 | 
			
		||||
				strlen(str),1,key,iv);
 | 
			
		||||
			/* zero the complete buffer or the string
 | 
			
		||||
@@ -524,11 +506,11 @@ bad:
 | 
			
		||||
			 * bug picked up by
 | 
			
		||||
			 * Larry J. Hughes Jr. <hughes@indiana.edu> */
 | 
			
		||||
			if (str == strbuf)
 | 
			
		||||
				OPENSSL_cleanse(str,SIZE);
 | 
			
		||||
				memset(str,0,SIZE);
 | 
			
		||||
			else
 | 
			
		||||
				OPENSSL_cleanse(str,strlen(str));
 | 
			
		||||
				memset(str,0,strlen(str));
 | 
			
		||||
			}
 | 
			
		||||
		if ((hiv != NULL) && !set_hex(hiv,iv,sizeof iv))
 | 
			
		||||
		if ((hiv != NULL) && !set_hex(hiv,iv,8))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"invalid hex iv value\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
@@ -541,7 +523,7 @@ bad:
 | 
			
		||||
			BIO_printf(bio_err, "iv undefined\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		if ((hkey != NULL) && !set_hex(hkey,key,sizeof key))
 | 
			
		||||
		if ((hkey != NULL) && !set_hex(hkey,key,24))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"invalid hex key value\n");
 | 
			
		||||
			goto end;
 | 
			
		||||
@@ -549,43 +531,7 @@ bad:
 | 
			
		||||
 | 
			
		||||
		if ((benc=BIO_new(BIO_f_cipher())) == NULL)
 | 
			
		||||
			goto end;
 | 
			
		||||
 | 
			
		||||
		/* Since we may be changing parameters work on the encryption
 | 
			
		||||
		 * context rather than calling BIO_set_cipher().
 | 
			
		||||
		 */
 | 
			
		||||
 | 
			
		||||
		BIO_get_cipher_ctx(benc, &ctx);
 | 
			
		||||
		if (!EVP_CipherInit_ex(ctx, cipher, NULL, NULL, NULL, enc))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Error setting cipher %s\n",
 | 
			
		||||
					EVP_CIPHER_name(cipher));
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (non_fips_allow)
 | 
			
		||||
			EVP_CIPHER_CTX_set_flags(ctx,
 | 
			
		||||
				EVP_CIPH_FLAG_NON_FIPS_ALLOW);
 | 
			
		||||
 | 
			
		||||
		if (!EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, enc))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Error setting cipher %s\n",
 | 
			
		||||
					EVP_CIPHER_name(cipher));
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (nopad)
 | 
			
		||||
			EVP_CIPHER_CTX_set_padding(ctx, 0);
 | 
			
		||||
 | 
			
		||||
		if (!EVP_CipherInit_ex(ctx, NULL, NULL, key, iv, enc))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Error setting cipher %s\n",
 | 
			
		||||
					EVP_CIPHER_name(cipher));
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		BIO_set_cipher(benc,cipher,key,iv,enc);
 | 
			
		||||
		if (debug)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_set_callback(benc,BIO_debug_callback);
 | 
			
		||||
@@ -597,7 +543,7 @@ bad:
 | 
			
		||||
			if (!nosalt)
 | 
			
		||||
				{
 | 
			
		||||
				printf("salt=");
 | 
			
		||||
				for (i=0; i<sizeof salt; i++)
 | 
			
		||||
				for (i=0; i<PKCS5_SALT_LEN; i++)
 | 
			
		||||
					printf("%02X",salt[i]);
 | 
			
		||||
				printf("\n");
 | 
			
		||||
				}
 | 
			
		||||
@@ -658,8 +604,7 @@ end:
 | 
			
		||||
	if (benc != NULL) BIO_free(benc);
 | 
			
		||||
	if (b64 != NULL) BIO_free(b64);
 | 
			
		||||
	if(pass) OPENSSL_free(pass);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
int set_hex(char *in, unsigned char *out, int size)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										533
									
								
								apps/engine.c
									
									
									
									
									
								
							
							
						
						
									
										533
									
								
								apps/engine.c
									
									
									
									
									
								
							@@ -1,533 +0,0 @@
 | 
			
		||||
/* apps/engine.c -*- mode: C; c-file-style: "eay" -*- */
 | 
			
		||||
/* Written by Richard Levitte <richard@levitte.org> for the OpenSSL
 | 
			
		||||
 * project 2000.
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 2000 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    licensing@OpenSSL.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#ifdef OPENSSL_NO_STDIO
 | 
			
		||||
#define APPS_WIN16
 | 
			
		||||
#endif
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#include <openssl/engine.h>
 | 
			
		||||
#include <openssl/ssl.h>
 | 
			
		||||
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	engine_main
 | 
			
		||||
 | 
			
		||||
static char *engine_usage[]={
 | 
			
		||||
"usage: engine opts [engine ...]\n",
 | 
			
		||||
" -v[v[v[v]]] - verbose mode, for each engine, list its 'control commands'\n",
 | 
			
		||||
"               -vv will additionally display each command's description\n",
 | 
			
		||||
"               -vvv will also add the input flags for each command\n",
 | 
			
		||||
"               -vvvv will also show internal input flags\n",
 | 
			
		||||
" -c          - for each engine, also list the capabilities\n",
 | 
			
		||||
" -t          - for each engine, check that they are really available\n",
 | 
			
		||||
" -pre <cmd>  - runs command 'cmd' against the ENGINE before any attempts\n",
 | 
			
		||||
"               to load it (if -t is used)\n",
 | 
			
		||||
" -post <cmd> - runs command 'cmd' against the ENGINE after loading it\n",
 | 
			
		||||
"               (only used if -t is also provided)\n",
 | 
			
		||||
" NB: -pre and -post will be applied to all ENGINEs supplied on the command\n",
 | 
			
		||||
" line, or all supported ENGINEs if none are specified.\n",
 | 
			
		||||
" Eg. '-pre \"SO_PATH:/lib/libdriver.so\"' calls command \"SO_PATH\" with\n",
 | 
			
		||||
" argument \"/lib/libdriver.so\".\n",
 | 
			
		||||
NULL
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
static void identity(void *ptr)
 | 
			
		||||
	{
 | 
			
		||||
	return;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int append_buf(char **buf, const char *s, int *size, int step)
 | 
			
		||||
	{
 | 
			
		||||
	int l = strlen(s);
 | 
			
		||||
 | 
			
		||||
	if (*buf == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		*size = step;
 | 
			
		||||
		*buf = OPENSSL_malloc(*size);
 | 
			
		||||
		if (*buf == NULL)
 | 
			
		||||
			return 0;
 | 
			
		||||
		**buf = '\0';
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (**buf != '\0')
 | 
			
		||||
		l += 2;		/* ", " */
 | 
			
		||||
 | 
			
		||||
	if (strlen(*buf) + strlen(s) >= (unsigned int)*size)
 | 
			
		||||
		{
 | 
			
		||||
		*size += step;
 | 
			
		||||
		*buf = OPENSSL_realloc(*buf, *size);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (*buf == NULL)
 | 
			
		||||
		return 0;
 | 
			
		||||
 | 
			
		||||
	if (**buf != '\0')
 | 
			
		||||
		BUF_strlcat(*buf, ", ", *size);
 | 
			
		||||
	BUF_strlcat(*buf, s, *size);
 | 
			
		||||
 | 
			
		||||
	return 1;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int util_flags(BIO *bio_out, unsigned int flags, const char *indent)
 | 
			
		||||
	{
 | 
			
		||||
	int started = 0, err = 0;
 | 
			
		||||
	/* Indent before displaying input flags */
 | 
			
		||||
	BIO_printf(bio_out, "%s%s(input flags): ", indent, indent);
 | 
			
		||||
	if(flags == 0)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_out, "<no flags>\n");
 | 
			
		||||
		return 1;
 | 
			
		||||
		}
 | 
			
		||||
        /* If the object is internal, mark it in a way that shows instead of
 | 
			
		||||
         * having it part of all the other flags, even if it really is. */
 | 
			
		||||
	if(flags & ENGINE_CMD_FLAG_INTERNAL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_out, "[Internal] ");
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if(flags & ENGINE_CMD_FLAG_NUMERIC)
 | 
			
		||||
		{
 | 
			
		||||
		if(started)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_out, "|");
 | 
			
		||||
			err = 1;
 | 
			
		||||
			}
 | 
			
		||||
		BIO_printf(bio_out, "NUMERIC");
 | 
			
		||||
		started = 1;
 | 
			
		||||
		}
 | 
			
		||||
	/* Now we check that no combinations of the mutually exclusive NUMERIC,
 | 
			
		||||
	 * STRING, and NO_INPUT flags have been used. Future flags that can be
 | 
			
		||||
	 * OR'd together with these would need to added after these to preserve
 | 
			
		||||
	 * the testing logic. */
 | 
			
		||||
	if(flags & ENGINE_CMD_FLAG_STRING)
 | 
			
		||||
		{
 | 
			
		||||
		if(started)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_out, "|");
 | 
			
		||||
			err = 1;
 | 
			
		||||
			}
 | 
			
		||||
		BIO_printf(bio_out, "STRING");
 | 
			
		||||
		started = 1;
 | 
			
		||||
		}
 | 
			
		||||
	if(flags & ENGINE_CMD_FLAG_NO_INPUT)
 | 
			
		||||
		{
 | 
			
		||||
		if(started)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_out, "|");
 | 
			
		||||
			err = 1;
 | 
			
		||||
			}
 | 
			
		||||
		BIO_printf(bio_out, "NO_INPUT");
 | 
			
		||||
		started = 1;
 | 
			
		||||
		}
 | 
			
		||||
	/* Check for unknown flags */
 | 
			
		||||
	flags = flags & ~ENGINE_CMD_FLAG_NUMERIC &
 | 
			
		||||
			~ENGINE_CMD_FLAG_STRING &
 | 
			
		||||
			~ENGINE_CMD_FLAG_NO_INPUT &
 | 
			
		||||
			~ENGINE_CMD_FLAG_INTERNAL;
 | 
			
		||||
	if(flags)
 | 
			
		||||
		{
 | 
			
		||||
		if(started) BIO_printf(bio_out, "|");
 | 
			
		||||
		BIO_printf(bio_out, "<0x%04X>", flags);
 | 
			
		||||
		}
 | 
			
		||||
	if(err)
 | 
			
		||||
		BIO_printf(bio_out, "  <illegal flags!>");
 | 
			
		||||
	BIO_printf(bio_out, "\n");
 | 
			
		||||
	return 1;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int util_verbose(ENGINE *e, int verbose, BIO *bio_out, const char *indent)
 | 
			
		||||
	{
 | 
			
		||||
	static const int line_wrap = 78;
 | 
			
		||||
	int num;
 | 
			
		||||
	int ret = 0;
 | 
			
		||||
	char *name = NULL;
 | 
			
		||||
	char *desc = NULL;
 | 
			
		||||
	int flags;
 | 
			
		||||
	int xpos = 0;
 | 
			
		||||
	STACK *cmds = NULL;
 | 
			
		||||
	if(!ENGINE_ctrl(e, ENGINE_CTRL_HAS_CTRL_FUNCTION, 0, NULL, NULL) ||
 | 
			
		||||
			((num = ENGINE_ctrl(e, ENGINE_CTRL_GET_FIRST_CMD_TYPE,
 | 
			
		||||
					0, NULL, NULL)) <= 0))
 | 
			
		||||
		{
 | 
			
		||||
#if 0
 | 
			
		||||
		BIO_printf(bio_out, "%s<no control commands>\n", indent);
 | 
			
		||||
#endif
 | 
			
		||||
		return 1;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	cmds = sk_new_null();
 | 
			
		||||
 | 
			
		||||
	if(!cmds)
 | 
			
		||||
		goto err;
 | 
			
		||||
	do {
 | 
			
		||||
		int len;
 | 
			
		||||
		/* Get the command input flags */
 | 
			
		||||
		if((flags = ENGINE_ctrl(e, ENGINE_CTRL_GET_CMD_FLAGS, num,
 | 
			
		||||
					NULL, NULL)) < 0)
 | 
			
		||||
			goto err;
 | 
			
		||||
                if (!(flags & ENGINE_CMD_FLAG_INTERNAL) || verbose >= 4)
 | 
			
		||||
                        {
 | 
			
		||||
                        /* Get the command name */
 | 
			
		||||
                        if((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_LEN_FROM_CMD, num,
 | 
			
		||||
                                NULL, NULL)) <= 0)
 | 
			
		||||
                                goto err;
 | 
			
		||||
                        if((name = OPENSSL_malloc(len + 1)) == NULL)
 | 
			
		||||
                                goto err;
 | 
			
		||||
                        if(ENGINE_ctrl(e, ENGINE_CTRL_GET_NAME_FROM_CMD, num, name,
 | 
			
		||||
                                NULL) <= 0)
 | 
			
		||||
                                goto err;
 | 
			
		||||
                        /* Get the command description */
 | 
			
		||||
                        if((len = ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_LEN_FROM_CMD, num,
 | 
			
		||||
                                NULL, NULL)) < 0)
 | 
			
		||||
                                goto err;
 | 
			
		||||
                        if(len > 0)
 | 
			
		||||
                                {
 | 
			
		||||
                                if((desc = OPENSSL_malloc(len + 1)) == NULL)
 | 
			
		||||
                                        goto err;
 | 
			
		||||
                                if(ENGINE_ctrl(e, ENGINE_CTRL_GET_DESC_FROM_CMD, num, desc,
 | 
			
		||||
                                        NULL) <= 0)
 | 
			
		||||
                                        goto err;
 | 
			
		||||
                                }
 | 
			
		||||
                        /* Now decide on the output */
 | 
			
		||||
                        if(xpos == 0)
 | 
			
		||||
                                /* Do an indent */
 | 
			
		||||
                                xpos = BIO_printf(bio_out, indent);
 | 
			
		||||
                        else
 | 
			
		||||
                                /* Otherwise prepend a ", " */
 | 
			
		||||
                                xpos += BIO_printf(bio_out, ", ");
 | 
			
		||||
                        if(verbose == 1)
 | 
			
		||||
                                {
 | 
			
		||||
                                /* We're just listing names, comma-delimited */
 | 
			
		||||
                                if((xpos > (int)strlen(indent)) &&
 | 
			
		||||
					(xpos + (int)strlen(name) > line_wrap))
 | 
			
		||||
                                        {
 | 
			
		||||
                                        BIO_printf(bio_out, "\n");
 | 
			
		||||
                                        xpos = BIO_printf(bio_out, indent);
 | 
			
		||||
                                        }
 | 
			
		||||
                                xpos += BIO_printf(bio_out, "%s", name);
 | 
			
		||||
                                }
 | 
			
		||||
                        else
 | 
			
		||||
                                {
 | 
			
		||||
                                /* We're listing names plus descriptions */
 | 
			
		||||
                                BIO_printf(bio_out, "%s: %s\n", name,
 | 
			
		||||
                                        (desc == NULL) ? "<no description>" : desc);
 | 
			
		||||
                                /* ... and sometimes input flags */
 | 
			
		||||
                                if((verbose >= 3) && !util_flags(bio_out, flags,
 | 
			
		||||
                                        indent))
 | 
			
		||||
                                        goto err;
 | 
			
		||||
                                xpos = 0;
 | 
			
		||||
                                }
 | 
			
		||||
                        }
 | 
			
		||||
		OPENSSL_free(name); name = NULL;
 | 
			
		||||
		if(desc) { OPENSSL_free(desc); desc = NULL; }
 | 
			
		||||
		/* Move to the next command */
 | 
			
		||||
		num = ENGINE_ctrl(e, ENGINE_CTRL_GET_NEXT_CMD_TYPE,
 | 
			
		||||
					num, NULL, NULL);
 | 
			
		||||
		} while(num > 0);
 | 
			
		||||
	if(xpos > 0)
 | 
			
		||||
		BIO_printf(bio_out, "\n");
 | 
			
		||||
	ret = 1;
 | 
			
		||||
err:
 | 
			
		||||
	if(cmds) sk_pop_free(cmds, identity);
 | 
			
		||||
	if(name) OPENSSL_free(name);
 | 
			
		||||
	if(desc) OPENSSL_free(desc);
 | 
			
		||||
	return ret;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static void util_do_cmds(ENGINE *e, STACK *cmds, BIO *bio_out, const char *indent)
 | 
			
		||||
	{
 | 
			
		||||
	int loop, res, num = sk_num(cmds);
 | 
			
		||||
	if(num < 0)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_out, "[Error]: internal stack error\n");
 | 
			
		||||
		return;
 | 
			
		||||
		}
 | 
			
		||||
	for(loop = 0; loop < num; loop++)
 | 
			
		||||
		{
 | 
			
		||||
		char buf[256];
 | 
			
		||||
		const char *cmd, *arg;
 | 
			
		||||
		cmd = sk_value(cmds, loop);
 | 
			
		||||
		res = 1; /* assume success */
 | 
			
		||||
		/* Check if this command has no ":arg" */
 | 
			
		||||
		if((arg = strstr(cmd, ":")) == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			if(!ENGINE_ctrl_cmd_string(e, cmd, NULL, 0))
 | 
			
		||||
				res = 0;
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			if((int)(arg - cmd) > 254)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_out,"[Error]: command name too long\n");
 | 
			
		||||
				return;
 | 
			
		||||
				}
 | 
			
		||||
			memcpy(buf, cmd, (int)(arg - cmd));
 | 
			
		||||
			buf[arg-cmd] = '\0';
 | 
			
		||||
			arg++; /* Move past the ":" */
 | 
			
		||||
			/* Call the command with the argument */
 | 
			
		||||
			if(!ENGINE_ctrl_cmd_string(e, buf, arg, 0))
 | 
			
		||||
				res = 0;
 | 
			
		||||
			}
 | 
			
		||||
		if(res)
 | 
			
		||||
			BIO_printf(bio_out, "[Success]: %s\n", cmd);
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_out, "[Failure]: %s\n", cmd);
 | 
			
		||||
			ERR_print_errors(bio_out);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	int ret=1,i;
 | 
			
		||||
	char **pp;
 | 
			
		||||
	int verbose=0, list_cap=0, test_avail=0;
 | 
			
		||||
	ENGINE *e;
 | 
			
		||||
	STACK *engines = sk_new_null();
 | 
			
		||||
	STACK *pre_cmds = sk_new_null();
 | 
			
		||||
	STACK *post_cmds = sk_new_null();
 | 
			
		||||
	int badops=1;
 | 
			
		||||
	BIO *bio_out=NULL;
 | 
			
		||||
	const char *indent = "     ";
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
	SSL_load_error_strings();
 | 
			
		||||
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
	bio_out=BIO_new_fp(stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
	{
 | 
			
		||||
	BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
	bio_out = BIO_push(tmpbio, bio_out);
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	argc--;
 | 
			
		||||
	argv++;
 | 
			
		||||
	while (argc >= 1)
 | 
			
		||||
		{
 | 
			
		||||
		if (strncmp(*argv,"-v",2) == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if(strspn(*argv + 1, "v") < strlen(*argv + 1))
 | 
			
		||||
				goto skip_arg_loop;
 | 
			
		||||
			if((verbose=strlen(*argv + 1)) > 4)
 | 
			
		||||
				goto skip_arg_loop;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-c") == 0)
 | 
			
		||||
			list_cap=1;
 | 
			
		||||
		else if (strcmp(*argv,"-t") == 0)
 | 
			
		||||
			test_avail=1;
 | 
			
		||||
		else if (strcmp(*argv,"-pre") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			argc--; argv++;
 | 
			
		||||
			if (argc == 0)
 | 
			
		||||
				goto skip_arg_loop;
 | 
			
		||||
			sk_push(pre_cmds,*argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-post") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			argc--; argv++;
 | 
			
		||||
			if (argc == 0)
 | 
			
		||||
				goto skip_arg_loop;
 | 
			
		||||
			sk_push(post_cmds,*argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if ((strncmp(*argv,"-h",2) == 0) ||
 | 
			
		||||
				(strcmp(*argv,"-?") == 0))
 | 
			
		||||
			goto skip_arg_loop;
 | 
			
		||||
		else
 | 
			
		||||
			sk_push(engines,*argv);
 | 
			
		||||
		argc--;
 | 
			
		||||
		argv++;
 | 
			
		||||
		}
 | 
			
		||||
	/* Looks like everything went OK */
 | 
			
		||||
	badops = 0;
 | 
			
		||||
skip_arg_loop:
 | 
			
		||||
 | 
			
		||||
	if (badops)
 | 
			
		||||
		{
 | 
			
		||||
		for (pp=engine_usage; (*pp != NULL); pp++)
 | 
			
		||||
			BIO_printf(bio_err,"%s",*pp);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (sk_num(engines) == 0)
 | 
			
		||||
		{
 | 
			
		||||
		for(e = ENGINE_get_first(); e != NULL; e = ENGINE_get_next(e))
 | 
			
		||||
			{
 | 
			
		||||
			sk_push(engines,(char *)ENGINE_get_id(e));
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	for (i=0; i<sk_num(engines); i++)
 | 
			
		||||
		{
 | 
			
		||||
		const char *id = sk_value(engines,i);
 | 
			
		||||
		if ((e = ENGINE_by_id(id)) != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			const char *name = ENGINE_get_name(e);
 | 
			
		||||
			/* Do "id" first, then "name". Easier to auto-parse. */
 | 
			
		||||
			BIO_printf(bio_out, "(%s) %s\n", id, name);
 | 
			
		||||
			util_do_cmds(e, pre_cmds, bio_out, indent);
 | 
			
		||||
			if (strcmp(ENGINE_get_id(e), id) != 0)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_out, "Loaded: (%s) %s\n",
 | 
			
		||||
					ENGINE_get_id(e), ENGINE_get_name(e));
 | 
			
		||||
				}
 | 
			
		||||
			if (list_cap)
 | 
			
		||||
				{
 | 
			
		||||
				int cap_size = 256;
 | 
			
		||||
				char *cap_buf = NULL;
 | 
			
		||||
				int k,n;
 | 
			
		||||
				const int *nids;
 | 
			
		||||
				ENGINE_CIPHERS_PTR fn_c;
 | 
			
		||||
				ENGINE_DIGESTS_PTR fn_d;
 | 
			
		||||
 | 
			
		||||
				if (ENGINE_get_RSA(e) != NULL
 | 
			
		||||
					&& !append_buf(&cap_buf, "RSA",
 | 
			
		||||
						&cap_size, 256))
 | 
			
		||||
					goto end;
 | 
			
		||||
				if (ENGINE_get_DSA(e) != NULL
 | 
			
		||||
					&& !append_buf(&cap_buf, "DSA",
 | 
			
		||||
						&cap_size, 256))
 | 
			
		||||
					goto end;
 | 
			
		||||
				if (ENGINE_get_DH(e) != NULL
 | 
			
		||||
					&& !append_buf(&cap_buf, "DH",
 | 
			
		||||
						&cap_size, 256))
 | 
			
		||||
					goto end;
 | 
			
		||||
				if (ENGINE_get_RAND(e) != NULL
 | 
			
		||||
					&& !append_buf(&cap_buf, "RAND",
 | 
			
		||||
						&cap_size, 256))
 | 
			
		||||
					goto end;
 | 
			
		||||
 | 
			
		||||
				fn_c = ENGINE_get_ciphers(e);
 | 
			
		||||
				if(!fn_c) goto skip_ciphers;
 | 
			
		||||
				n = fn_c(e, NULL, &nids, 0);
 | 
			
		||||
				for(k=0 ; k < n ; ++k)
 | 
			
		||||
					if(!append_buf(&cap_buf,
 | 
			
		||||
						       OBJ_nid2sn(nids[k]),
 | 
			
		||||
						       &cap_size, 256))
 | 
			
		||||
						goto end;
 | 
			
		||||
 | 
			
		||||
skip_ciphers:
 | 
			
		||||
				fn_d = ENGINE_get_digests(e);
 | 
			
		||||
				if(!fn_d) goto skip_digests;
 | 
			
		||||
				n = fn_d(e, NULL, &nids, 0);
 | 
			
		||||
				for(k=0 ; k < n ; ++k)
 | 
			
		||||
					if(!append_buf(&cap_buf,
 | 
			
		||||
						       OBJ_nid2sn(nids[k]),
 | 
			
		||||
						       &cap_size, 256))
 | 
			
		||||
						goto end;
 | 
			
		||||
 | 
			
		||||
skip_digests:
 | 
			
		||||
				if (cap_buf && (*cap_buf != '\0'))
 | 
			
		||||
					BIO_printf(bio_out, " [%s]\n", cap_buf);
 | 
			
		||||
 | 
			
		||||
				OPENSSL_free(cap_buf);
 | 
			
		||||
				}
 | 
			
		||||
			if(test_avail)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_out, "%s", indent);
 | 
			
		||||
				if (ENGINE_init(e))
 | 
			
		||||
					{
 | 
			
		||||
					BIO_printf(bio_out, "[ available ]\n");
 | 
			
		||||
					util_do_cmds(e, post_cmds, bio_out, indent);
 | 
			
		||||
					ENGINE_finish(e);
 | 
			
		||||
					}
 | 
			
		||||
				else
 | 
			
		||||
					{
 | 
			
		||||
					BIO_printf(bio_out, "[ unavailable ]\n");
 | 
			
		||||
					ERR_print_errors_fp(stdout);
 | 
			
		||||
					ERR_clear_error();
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			if((verbose > 0) && !util_verbose(e, verbose, bio_out, indent))
 | 
			
		||||
				goto end;
 | 
			
		||||
			ENGINE_free(e);
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	ret=0;
 | 
			
		||||
end:
 | 
			
		||||
	ERR_print_errors(bio_err);
 | 
			
		||||
	sk_pop_free(engines, identity);
 | 
			
		||||
	sk_pop_free(pre_cmds, identity);
 | 
			
		||||
	sk_pop_free(post_cmds, identity);
 | 
			
		||||
	if (bio_out != NULL) BIO_free_all(bio_out);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
#else
 | 
			
		||||
 | 
			
		||||
# if PEDANTIC
 | 
			
		||||
static void *dummy=&dummy;
 | 
			
		||||
# endif
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
@@ -91,7 +91,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		out=BIO_new(BIO_s_file());
 | 
			
		||||
		if ((out != NULL) && BIO_set_fp(out,stdout,BIO_NOCLOSE))
 | 
			
		||||
			{
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
			{
 | 
			
		||||
			BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
			out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -121,6 +121,5 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			ret++;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										36
									
								
								apps/gendh.c
									
									
									
									
									
								
							
							
						
						
									
										36
									
								
								apps/gendh.c
									
									
									
									
									
								
							@@ -57,7 +57,7 @@
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <sys/types.h>
 | 
			
		||||
@@ -81,17 +81,11 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	DH *dh=NULL;
 | 
			
		||||
	int ret=1,num=DEFBITS;
 | 
			
		||||
	int g=2;
 | 
			
		||||
	char *outfile=NULL;
 | 
			
		||||
	char *inrand=NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	BIO *out=NULL;
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
@@ -100,9 +94,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	argv++;
 | 
			
		||||
	argc--;
 | 
			
		||||
	for (;;)
 | 
			
		||||
@@ -119,13 +110,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			g=3; */
 | 
			
		||||
		else if (strcmp(*argv,"-5") == 0)
 | 
			
		||||
			g=5;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-rand") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
@@ -141,22 +125,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
bad:
 | 
			
		||||
		BIO_printf(bio_err,"usage: gendh [args] [numbits]\n");
 | 
			
		||||
		BIO_printf(bio_err," -out file - output the key to 'file\n");
 | 
			
		||||
		BIO_printf(bio_err," -2        - use 2 as the generator value\n");
 | 
			
		||||
	/*	BIO_printf(bio_err," -3        - use 3 as the generator value\n"); */
 | 
			
		||||
		BIO_printf(bio_err," -5        - use 5 as the generator value\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," -2    use 2 as the generator value\n");
 | 
			
		||||
	/*	BIO_printf(bio_err," -3    use 3 as the generator value\n"); */
 | 
			
		||||
		BIO_printf(bio_err," -5    use 5 as the generator value\n");
 | 
			
		||||
		BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
			
		||||
		BIO_printf(bio_err,"           - load the file (or the files in the directory) into\n");
 | 
			
		||||
		BIO_printf(bio_err,"             the random number generator\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
		
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	out=BIO_new(BIO_s_file());
 | 
			
		||||
	if (out == NULL)
 | 
			
		||||
		{
 | 
			
		||||
@@ -167,7 +144,7 @@ bad:
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -207,8 +184,7 @@ end:
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
	if (out != NULL) BIO_free_all(out);
 | 
			
		||||
	if (dh != NULL) DH_free(dh);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static void MS_CALLBACK dh_cb(int p, int n, void *arg)
 | 
			
		||||
 
 | 
			
		||||
@@ -56,7 +56,7 @@
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <sys/types.h>
 | 
			
		||||
@@ -77,19 +77,13 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	DSA *dsa=NULL;
 | 
			
		||||
	int ret=1;
 | 
			
		||||
	char *outfile=NULL;
 | 
			
		||||
	char *inrand=NULL,*dsaparams=NULL;
 | 
			
		||||
	char *passargout = NULL, *passout = NULL;
 | 
			
		||||
	BIO *out=NULL,*in=NULL;
 | 
			
		||||
	const EVP_CIPHER *enc=NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	EVP_CIPHER *enc=NULL;
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -97,9 +91,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	argv++;
 | 
			
		||||
	argc--;
 | 
			
		||||
	for (;;)
 | 
			
		||||
@@ -115,13 +106,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			passargout= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-rand") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
@@ -129,23 +113,15 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-") == 0)
 | 
			
		||||
			goto bad;
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
		else if (strcmp(*argv,"-des") == 0)
 | 
			
		||||
			enc=EVP_des_cbc();
 | 
			
		||||
		else if (strcmp(*argv,"-des3") == 0)
 | 
			
		||||
			enc=EVP_des_ede3_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
		else if (strcmp(*argv,"-idea") == 0)
 | 
			
		||||
			enc=EVP_idea_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
		else if (strcmp(*argv,"-aes128") == 0)
 | 
			
		||||
			enc=EVP_aes_128_cbc();
 | 
			
		||||
		else if (strcmp(*argv,"-aes192") == 0)
 | 
			
		||||
			enc=EVP_aes_192_cbc();
 | 
			
		||||
		else if (strcmp(*argv,"-aes256") == 0)
 | 
			
		||||
			enc=EVP_aes_256_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
		else if (**argv != '-' && dsaparams == NULL)
 | 
			
		||||
			{
 | 
			
		||||
@@ -162,19 +138,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
bad:
 | 
			
		||||
		BIO_printf(bio_err,"usage: gendsa [args] dsaparam-file\n");
 | 
			
		||||
		BIO_printf(bio_err," -out file - output the key to 'file'\n");
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
		BIO_printf(bio_err," -des      - encrypt the generated key with DES in cbc mode\n");
 | 
			
		||||
		BIO_printf(bio_err," -des3     - encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
		BIO_printf(bio_err," -idea     - encrypt the generated key with IDEA in cbc mode\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
		BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
			
		||||
		BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
			
		||||
		BIO_printf(bio_err,"           - load the file (or the files in the directory) into\n");
 | 
			
		||||
@@ -184,10 +153,6 @@ bad:
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
 | 
			
		||||
		BIO_printf(bio_err, "Error getting password\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
@@ -215,7 +180,7 @@ bad:
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -255,7 +220,6 @@ end:
 | 
			
		||||
	if (out != NULL) BIO_free_all(out);
 | 
			
		||||
	if (dsa != NULL) DSA_free(dsa);
 | 
			
		||||
	if(passout) OPENSSL_free(passout);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -56,7 +56,7 @@
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#ifndef NO_RSA
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <sys/types.h>
 | 
			
		||||
@@ -69,7 +69,6 @@
 | 
			
		||||
#include <openssl/evp.h>
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
 | 
			
		||||
#define DEFBITS	512
 | 
			
		||||
#undef PROG
 | 
			
		||||
@@ -81,23 +80,14 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	int ret=1;
 | 
			
		||||
	RSA *rsa=NULL;
 | 
			
		||||
	int i,num=DEFBITS;
 | 
			
		||||
	long l;
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
	int use_x931 = 0;
 | 
			
		||||
#endif
 | 
			
		||||
	const EVP_CIPHER *enc=NULL;
 | 
			
		||||
	EVP_CIPHER *enc=NULL;
 | 
			
		||||
	unsigned long f4=RSA_F4;
 | 
			
		||||
	char *outfile=NULL;
 | 
			
		||||
	char *passargout = NULL, *passout = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	char *inrand=NULL;
 | 
			
		||||
	BIO *out=NULL;
 | 
			
		||||
 | 
			
		||||
@@ -106,9 +96,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto err;
 | 
			
		||||
	if ((out=BIO_new(BIO_s_file())) == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"unable to create BIO for output\n");
 | 
			
		||||
@@ -129,39 +116,20 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			f4=3;
 | 
			
		||||
		else if (strcmp(*argv,"-F4") == 0 || strcmp(*argv,"-f4") == 0)
 | 
			
		||||
			f4=RSA_F4;
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
		else if (strcmp(*argv,"-x931") == 0)
 | 
			
		||||
			use_x931 = 1;
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-rand") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			inrand= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
		else if (strcmp(*argv,"-des") == 0)
 | 
			
		||||
			enc=EVP_des_cbc();
 | 
			
		||||
		else if (strcmp(*argv,"-des3") == 0)
 | 
			
		||||
			enc=EVP_des_ede3_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
		else if (strcmp(*argv,"-idea") == 0)
 | 
			
		||||
			enc=EVP_idea_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
		else if (strcmp(*argv,"-aes128") == 0)
 | 
			
		||||
			enc=EVP_aes_128_cbc();
 | 
			
		||||
		else if (strcmp(*argv,"-aes192") == 0)
 | 
			
		||||
			enc=EVP_aes_192_cbc();
 | 
			
		||||
		else if (strcmp(*argv,"-aes256") == 0)
 | 
			
		||||
			enc=EVP_aes_256_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-passout") == 0)
 | 
			
		||||
			{
 | 
			
		||||
@@ -179,20 +147,13 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err,"usage: genrsa [args] [numbits]\n");
 | 
			
		||||
		BIO_printf(bio_err," -des            encrypt the generated key with DES in cbc mode\n");
 | 
			
		||||
		BIO_printf(bio_err," -des3           encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
		BIO_printf(bio_err," -idea           encrypt the generated key with IDEA in cbc mode\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
		BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
			
		||||
		BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," -out file       output the key to 'file\n");
 | 
			
		||||
		BIO_printf(bio_err," -passout arg    output file pass phrase source\n");
 | 
			
		||||
		BIO_printf(bio_err," -f4             use F4 (0x10001) for the E value\n");
 | 
			
		||||
		BIO_printf(bio_err," -3              use 3 for the E value\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
			
		||||
		BIO_printf(bio_err,"                 load the file (or the files in the directory) into\n");
 | 
			
		||||
		BIO_printf(bio_err,"                 the random number generator\n");
 | 
			
		||||
@@ -206,14 +167,10 @@ bad:
 | 
			
		||||
		goto err;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -229,8 +186,7 @@ bad:
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
 | 
			
		||||
		&& !RAND_status())
 | 
			
		||||
	if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
			
		||||
		}
 | 
			
		||||
@@ -240,27 +196,11 @@ bad:
 | 
			
		||||
 | 
			
		||||
	BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
 | 
			
		||||
		num);
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
	if (use_x931)
 | 
			
		||||
		{
 | 
			
		||||
		BIGNUM *pubexp;
 | 
			
		||||
		pubexp = BN_new();
 | 
			
		||||
		BN_set_word(pubexp, f4);
 | 
			
		||||
		rsa = RSA_X931_generate_key(num, pubexp, genrsa_cb, bio_err);
 | 
			
		||||
		BN_free(pubexp);
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
#endif
 | 
			
		||||
	rsa=RSA_generate_key(num,f4,genrsa_cb,bio_err);
 | 
			
		||||
		
 | 
			
		||||
	app_RAND_write_file(NULL, bio_err);
 | 
			
		||||
 | 
			
		||||
	if (rsa == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "Key Generation error\n");
 | 
			
		||||
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
	if (rsa == NULL) goto err;
 | 
			
		||||
	
 | 
			
		||||
	/* We need to do the following for when the base number size is <
 | 
			
		||||
	 * long, esp windows 3.1 :-(. */
 | 
			
		||||
@@ -274,14 +214,8 @@ bad:
 | 
			
		||||
		l+=rsa->e->d[i];
 | 
			
		||||
		}
 | 
			
		||||
	BIO_printf(bio_err,"e is %ld (0x%lX)\n",l,l);
 | 
			
		||||
	{
 | 
			
		||||
	PW_CB_DATA cb_data;
 | 
			
		||||
	cb_data.password = passout;
 | 
			
		||||
	cb_data.prompt_info = outfile;
 | 
			
		||||
	if (!PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0,
 | 
			
		||||
		(pem_password_cb *)password_callback,&cb_data))
 | 
			
		||||
	if (!PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0,NULL, passout))
 | 
			
		||||
		goto err;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ret=0;
 | 
			
		||||
err:
 | 
			
		||||
@@ -290,8 +224,7 @@ err:
 | 
			
		||||
	if(passout) OPENSSL_free(passout);
 | 
			
		||||
	if (ret != 0)
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static void MS_CALLBACK genrsa_cb(int p, int n, void *arg)
 | 
			
		||||
@@ -308,7 +241,7 @@ static void MS_CALLBACK genrsa_cb(int p, int n, void *arg)
 | 
			
		||||
	p=n;
 | 
			
		||||
#endif
 | 
			
		||||
	}
 | 
			
		||||
#else /* !OPENSSL_NO_RSA */
 | 
			
		||||
#else /* !NO_RSA */
 | 
			
		||||
 | 
			
		||||
# if PEDANTIC
 | 
			
		||||
static void *dummy=&dummy;
 | 
			
		||||
 
 | 
			
		||||
@@ -15,10 +15,22 @@ $!
 | 
			
		||||
$!  It was written so it would try to determine what "C" compiler to
 | 
			
		||||
$!  use or you can specify which "C" compiler to use.
 | 
			
		||||
$!
 | 
			
		||||
$!  Specify DEBUG or NODEBUG as P1 to compile with or without debugger
 | 
			
		||||
$!  Specify RSAREF as P1 to compile with the RSAREF library instead of
 | 
			
		||||
$!  the regular one.  If you specify NORSAREF it will compile with the
 | 
			
		||||
$!  regular RSAREF routines.  (Note: If you are in the United States
 | 
			
		||||
$!  you MUST compile with RSAREF unless you have a license from RSA).
 | 
			
		||||
$!
 | 
			
		||||
$!  Note: The RSAREF libraries are NOT INCLUDED and you have to
 | 
			
		||||
$!        download it from "ftp://ftp.rsa.com/rsaref".  You have to
 | 
			
		||||
$!        get the ".tar-Z" file as the ".zip" file dosen't have the
 | 
			
		||||
$!        directory structure stored.  You have to extract the file
 | 
			
		||||
$!        into the [.RSAREF] directory under the root directory as that
 | 
			
		||||
$!        is where the scripts will look for the files.
 | 
			
		||||
$!
 | 
			
		||||
$!  Specify DEBUG or NODEBUG as P2 to compile with or without debugger
 | 
			
		||||
$!  information.
 | 
			
		||||
$!
 | 
			
		||||
$!  Specify which compiler at P2 to try to compile under.
 | 
			
		||||
$!  Specify which compiler at P3 to try to compile under.
 | 
			
		||||
$!
 | 
			
		||||
$!	   VAXC	 For VAX C.
 | 
			
		||||
$!	   DECC	 For DEC C.
 | 
			
		||||
@@ -27,16 +39,15 @@ $!
 | 
			
		||||
$!  If you don't speficy a compiler, it will try to determine which
 | 
			
		||||
$!  "C" compiler to use.
 | 
			
		||||
$!
 | 
			
		||||
$!  P3, if defined, sets a TCP/IP library to use, through one of the following
 | 
			
		||||
$!  P4, if defined, sets a TCP/IP library to use, through one of the following
 | 
			
		||||
$!  keywords:
 | 
			
		||||
$!
 | 
			
		||||
$!	UCX		for UCX
 | 
			
		||||
$!	SOCKETSHR	for SOCKETSHR+NETLIB
 | 
			
		||||
$!	TCPIP		for TCPIP (post UCX)
 | 
			
		||||
$!
 | 
			
		||||
$!  P4, if defined, sets a compiler thread NOT needed on OpenVMS 7.1 (and up)
 | 
			
		||||
$!  P5, if defined, sets a compiler thread NOT needed on OpenVMS 7.1 (and up)
 | 
			
		||||
$!
 | 
			
		||||
$!  P5, if defined, sets a choice of programs to compile.
 | 
			
		||||
$!  P6, if defined, sets a choice of programs to compile.
 | 
			
		||||
$!
 | 
			
		||||
$!
 | 
			
		||||
$! Define A TCP/IP Library That We Will Need To Link To.
 | 
			
		||||
@@ -89,6 +100,10 @@ $! Define The CRYPTO Library.
 | 
			
		||||
$!
 | 
			
		||||
$ CRYPTO_LIB := SYS$DISK:[-.'ARCH'.EXE.CRYPTO]LIBCRYPTO.OLB
 | 
			
		||||
$!
 | 
			
		||||
$! Define The RSAREF Library.
 | 
			
		||||
$!
 | 
			
		||||
$ RSAREF_LIB := SYS$DISK:[-.'ARCH'.EXE.RSAREF]LIBRSAGLUE.OLB
 | 
			
		||||
$!
 | 
			
		||||
$! Define The SSL Library.
 | 
			
		||||
$!
 | 
			
		||||
$ SSL_LIB := SYS$DISK:[-.'ARCH'.EXE.SSL]LIBSSL.OLB
 | 
			
		||||
@@ -142,13 +157,13 @@ $ LIB_FILES = "VERIFY;ASN1PARS;REQ;DGST;DH;DHPARAM;ENC;PASSWD;GENDH;ERRSTR;"+-
 | 
			
		||||
	      "RSA;RSAUTL;DSA;DSAPARAM;"+-
 | 
			
		||||
	      "X509;GENRSA;GENDSA;S_SERVER;S_CLIENT;SPEED;"+-
 | 
			
		||||
	      "S_TIME;APPS;S_CB;S_SOCKET;APP_RAND;VERSION;SESS_ID;"+-
 | 
			
		||||
	      "CIPHERS;NSEQ;PKCS12;PKCS8;SPKAC;SMIME;RAND;ENGINE;OCSP;PRIME"
 | 
			
		||||
	      "CIPHERS;NSEQ;PKCS12;PKCS8;SPKAC;SMIME;RAND"
 | 
			
		||||
$ APP_FILES := OPENSSL,'OBJ_DIR'VERIFY.OBJ,ASN1PARS.OBJ,REQ.OBJ,DGST.OBJ,DH.OBJ,DHPARAM.OBJ,ENC.OBJ,PASSWD.OBJ,GENDH.OBJ,ERRSTR.OBJ,-
 | 
			
		||||
	       CA.OBJ,PKCS7.OBJ,CRL2P7.OBJ,CRL.OBJ,-
 | 
			
		||||
	       RSA.OBJ,RSAUTL.OBJ,DSA.OBJ,DSAPARAM.OBJ,-
 | 
			
		||||
	       X509.OBJ,GENRSA.OBJ,GENDSA.OBJ,S_SERVER.OBJ,S_CLIENT.OBJ,SPEED.OBJ,-
 | 
			
		||||
	       S_TIME.OBJ,APPS.OBJ,S_CB.OBJ,S_SOCKET.OBJ,APP_RAND.OBJ,VERSION.OBJ,SESS_ID.OBJ,-
 | 
			
		||||
	       CIPHERS.OBJ,NSEQ.OBJ,PKCS12.OBJ,PKCS8.OBJ,SPKAC.OBJ,SMIME.OBJ,RAND.OBJ,ENGINE.OBJ,OCSP.OBJ,PRIME.OBJ
 | 
			
		||||
	       CIPHERS.OBJ,NSEQ.OBJ,PKCS12.OBJ,PKCS8.OBJ,SPKAC.OBJ,SMIME.OBJ,RAND.OBJ
 | 
			
		||||
$ TCPIP_PROGRAMS = ",,"
 | 
			
		||||
$ IF COMPILER .EQS. "VAXC" THEN -
 | 
			
		||||
     TCPIP_PROGRAMS = ",OPENSSL,"
 | 
			
		||||
@@ -166,7 +181,7 @@ $!     TCPIP_PROGRAMS = ",S_SERVER,S_CLIENT,SESS_ID,CIPHERS,S_TIME,"
 | 
			
		||||
$!
 | 
			
		||||
$! Setup exceptional compilations
 | 
			
		||||
$!
 | 
			
		||||
$ COMPILEWITH_CC2 = ",S_SERVER,S_CLIENT,"
 | 
			
		||||
$ COMPILEWITH_CC2 = ",S_SOCKET,S_SERVER,S_CLIENT,"
 | 
			
		||||
$!
 | 
			
		||||
$ PHASE := LIB
 | 
			
		||||
$!
 | 
			
		||||
@@ -277,7 +292,45 @@ $   WRITE SYS$OUTPUT FILE_NAME," needs a TCP/IP library.  Can't link.  Skipping.
 | 
			
		||||
$   GOTO NEXT_FILE
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Link The Program.
 | 
			
		||||
$! Link The Program, Check To See If We Need To Link With RSAREF Or Not.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (RSAREF.EQS."TRUE")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!  Check To See If We Are To Link With A Specific TCP/IP Library.
 | 
			
		||||
$!
 | 
			
		||||
$   IF (TCPIP_LIB.NES."")
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Link With The RSAREF Library And A Specific TCP/IP Library.
 | 
			
		||||
$!
 | 
			
		||||
$     LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
 | 
			
		||||
	  'OBJECT_FILE''EXTRA_OBJ', -
 | 
			
		||||
          'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY,'RSAREF_LIB'/LIBRARY, -
 | 
			
		||||
          'TCPIP_LIB','OPT_FILE'/OPTION
 | 
			
		||||
$!
 | 
			
		||||
$!  Else...
 | 
			
		||||
$!
 | 
			
		||||
$   ELSE
 | 
			
		||||
$!
 | 
			
		||||
$!    Link With The RSAREF Library And NO TCP/IP Library.
 | 
			
		||||
$!
 | 
			
		||||
$     LINK/'DEBUGGER'/'TRACEBACK' /EXE='EXE_FILE' -
 | 
			
		||||
	  'OBJECT_FILE''EXTRA_OBJ', -
 | 
			
		||||
          'SSL_LIB'/LIBRARY,'CRYPTO_LIB'/LIBRARY,'RSAREF_LIB'/LIBRARY, -
 | 
			
		||||
          'OPT_FILE'/OPTION
 | 
			
		||||
$!
 | 
			
		||||
$!  End The TCP/IP Library Check.
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Else...
 | 
			
		||||
$!
 | 
			
		||||
$ ELSE
 | 
			
		||||
$!
 | 
			
		||||
$!  Don't Link With The RSAREF Routines.
 | 
			
		||||
$!
 | 
			
		||||
$!
 | 
			
		||||
$!  Check To See If We Are To Link With A Specific TCP/IP Library.
 | 
			
		||||
$!
 | 
			
		||||
$   IF (TCPIP_LIB.NES."")
 | 
			
		||||
@@ -305,6 +358,10 @@ $! End The TCP/IP Library Check.
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! End The RSAREF Link Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Go Back And Do It Again.
 | 
			
		||||
$!
 | 
			
		||||
$ GOTO NEXT_FILE
 | 
			
		||||
@@ -468,6 +525,32 @@ $! End The Crypto Library Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! See If We Need The RSAREF Library.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (RSAREF.EQS."TRUE")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!  Look For The Library LIBRSAGLUE.OLB.
 | 
			
		||||
$!
 | 
			
		||||
$   IF (F$SEARCH(RSAREF_LIB).EQS."")
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Tell The User We Can't Find The LIBRSAGLUE.OLB Library.
 | 
			
		||||
$!
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$     WRITE SYS$OUTPUT "Can't Find The Library ",RSAREF_LIB,"."
 | 
			
		||||
$     WRITE SYS$OUTPUT "We Can't Link Without It."
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$!
 | 
			
		||||
$!    Since We Can't Link Without It, Exit.
 | 
			
		||||
$!
 | 
			
		||||
$     EXIT
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! End The RSAREF Library Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Look For The Library LIBSSL.OLB.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (F$SEARCH(SSL_LIB).EQS."")
 | 
			
		||||
@@ -498,10 +581,86 @@ $ CHECK_OPTIONS:
 | 
			
		||||
$!
 | 
			
		||||
$! Check To See If P1 Is Blank.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (P1.EQS."NODEBUG")
 | 
			
		||||
$ IF (P1.EQS."NORSAREF")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!   P1 Is NODEBUG, So Compile Without Debugger Information.
 | 
			
		||||
$!   P1 Is NORSAREF, So Compile With The Regular RSA Libraries.
 | 
			
		||||
$!
 | 
			
		||||
$    RSAREF = "FALSE"
 | 
			
		||||
$!
 | 
			
		||||
$! Else...
 | 
			
		||||
$!
 | 
			
		||||
$ ELSE
 | 
			
		||||
$!
 | 
			
		||||
$!  Check To See If We Are To Use The RSAREF Library.
 | 
			
		||||
$!
 | 
			
		||||
$   IF (P1.EQS."RSAREF")
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Check To Make Sure We Have The RSAREF Source Code Directory.
 | 
			
		||||
$!
 | 
			
		||||
$     IF (F$SEARCH("SYS$DISK:[-.RSAREF]SOURCE.DIR").EQS."")
 | 
			
		||||
$     THEN
 | 
			
		||||
$!
 | 
			
		||||
$!      We Don't Have The RSAREF Souce Code Directory, So Tell The
 | 
			
		||||
$!      User This.
 | 
			
		||||
$!
 | 
			
		||||
$       WRITE SYS$OUTPUT ""
 | 
			
		||||
$       WRITE SYS$OUTPUT "It appears that you don't have the RSAREF Souce Code."
 | 
			
		||||
$       WRITE SYS$OUTPUT "You need to go to 'ftp://ftp.rsa.com/rsaref'.  You have to"
 | 
			
		||||
$       WRITE SYS$OUTPUT "get the '.tar-Z' file as the '.zip' file dosen't have the"
 | 
			
		||||
$       WRITE SYS$OUTPUT "directory structure stored.  You have to extract the file"
 | 
			
		||||
$       WRITE SYS$OUTPUT "into the [.RSAREF] directory under the root directory"
 | 
			
		||||
$       WRITE SYS$OUTPUT "as that is where the scripts will look for the files."
 | 
			
		||||
$       WRITE SYS$OUTPUT ""
 | 
			
		||||
$!
 | 
			
		||||
$!      Time To Exit.
 | 
			
		||||
$!
 | 
			
		||||
$       EXIT
 | 
			
		||||
$!
 | 
			
		||||
$!    Else...
 | 
			
		||||
$!
 | 
			
		||||
$     ELSE
 | 
			
		||||
$!
 | 
			
		||||
$!      Compile Using The RSAREF Library.
 | 
			
		||||
$!
 | 
			
		||||
$       RSAREF = "TRUE"
 | 
			
		||||
$!
 | 
			
		||||
$!    End The RSAREF Soure Directory Check.
 | 
			
		||||
$!
 | 
			
		||||
$     ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Else...
 | 
			
		||||
$!
 | 
			
		||||
$   ELSE 
 | 
			
		||||
$!
 | 
			
		||||
$!    They Entered An Invalid Option..
 | 
			
		||||
$!
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$     WRITE SYS$OUTPUT "The Option ",P1," Is Invalid.  The Valid Options Are:"
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$     WRITE SYS$OUTPUT "     RSAREF   :  Compile With The RSAREF Library."
 | 
			
		||||
$     WRITE SYS$OUTPUT "     NORSAREF :  Compile With The Regular RSA Library."
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$!
 | 
			
		||||
$!    Time To EXIT.
 | 
			
		||||
$!
 | 
			
		||||
$     EXIT
 | 
			
		||||
$!
 | 
			
		||||
$!  End The Valid Arguement Check.
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! End P1 Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Check To See If P2 Is Blank.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (P2.EQS."NODEBUG")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!   P2 Is NODEBUG, So Compile Without Debugger Information.
 | 
			
		||||
$!
 | 
			
		||||
$    DEBUGGER  = "NODEBUG"
 | 
			
		||||
$    TRACEBACK = "NOTRACEBACK" 
 | 
			
		||||
@@ -516,7 +675,7 @@ $ ELSE
 | 
			
		||||
$!
 | 
			
		||||
$!  Check To See If We Are To Compile With Debugger Information.
 | 
			
		||||
$!
 | 
			
		||||
$   IF (P1.EQS."DEBUG")
 | 
			
		||||
$   IF (P2.EQS."DEBUG")
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Compile With Debugger Information.
 | 
			
		||||
@@ -532,7 +691,7 @@ $!
 | 
			
		||||
$!    Tell The User Entered An Invalid Option..
 | 
			
		||||
$!
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$     WRITE SYS$OUTPUT "The Option ",P1," Is Invalid.  The Valid Options Are:"
 | 
			
		||||
$     WRITE SYS$OUTPUT "The Option ",P2," Is Invalid.  The Valid Options Are:"
 | 
			
		||||
$     WRITE SYS$OUTPUT ""
 | 
			
		||||
$     WRITE SYS$OUTPUT "    DEBUG    :  Compile With The Debugger Information."
 | 
			
		||||
$     WRITE SYS$OUTPUT "    NODEBUG  :  Compile Without The Debugger Information."
 | 
			
		||||
@@ -546,13 +705,13 @@ $!  End The Valid Arguement Check.
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! End The P1 Check.
 | 
			
		||||
$! End The P2 Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Check To See If P2 Is Blank.
 | 
			
		||||
$! Check To See If P3 Is Blank.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (P2.EQS."")
 | 
			
		||||
$ IF (P3.EQS."")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!  O.K., The User Didn't Specify A Compiler, Let's Try To
 | 
			
		||||
@@ -565,7 +724,7 @@ $   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Looks Like GNUC, Set To Use GNUC.
 | 
			
		||||
$!
 | 
			
		||||
$     P2 = "GNUC"
 | 
			
		||||
$     P3 = "GNUC"
 | 
			
		||||
$!
 | 
			
		||||
$!  Else...
 | 
			
		||||
$!
 | 
			
		||||
@@ -578,7 +737,7 @@ $     THEN
 | 
			
		||||
$!
 | 
			
		||||
$!      Looks Like DECC, Set To Use DECC.
 | 
			
		||||
$!
 | 
			
		||||
$       P2 = "DECC"
 | 
			
		||||
$       P3 = "DECC"
 | 
			
		||||
$!
 | 
			
		||||
$!    Else...
 | 
			
		||||
$!
 | 
			
		||||
@@ -586,7 +745,7 @@ $     ELSE
 | 
			
		||||
$!
 | 
			
		||||
$!      Looks Like VAXC, Set To Use VAXC.
 | 
			
		||||
$!
 | 
			
		||||
$       P2 = "VAXC"
 | 
			
		||||
$       P3 = "VAXC"
 | 
			
		||||
$!
 | 
			
		||||
$!    End The VAXC Compiler Check.
 | 
			
		||||
$!
 | 
			
		||||
@@ -600,9 +759,9 @@ $!  End The Compiler Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Check To See If We Have A Option For P3.
 | 
			
		||||
$! Check To See If We Have A Option For P4.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (P3.EQS."")
 | 
			
		||||
$ IF (P4.EQS."")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!  Find out what socket library we have available
 | 
			
		||||
@@ -612,7 +771,7 @@ $   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    We have SOCKETSHR, and it is my opinion that it's the best to use.
 | 
			
		||||
$!
 | 
			
		||||
$     P3 = "SOCKETSHR"
 | 
			
		||||
$     P4 = "SOCKETSHR"
 | 
			
		||||
$!
 | 
			
		||||
$!    Tell the user
 | 
			
		||||
$!
 | 
			
		||||
@@ -632,7 +791,7 @@ $     THEN
 | 
			
		||||
$!
 | 
			
		||||
$!	Last resort: a UCX or UCX-compatible library
 | 
			
		||||
$!
 | 
			
		||||
$	P3 = "UCX"
 | 
			
		||||
$	P4 = "UCX"
 | 
			
		||||
$!
 | 
			
		||||
$!      Tell the user
 | 
			
		||||
$!
 | 
			
		||||
@@ -646,22 +805,46 @@ $ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Set Up Initial CC Definitions, Possibly With User Ones
 | 
			
		||||
$!
 | 
			
		||||
$ CCDEFS = "MONOLITH"
 | 
			
		||||
$ CCDEFS = "VMS=1,MONOLITH"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_ASM") THEN CCDEFS = CCDEFS + ",NO_ASM"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_RSA") THEN CCDEFS = CCDEFS + ",NO_RSA"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_DSA") THEN CCDEFS = CCDEFS + ",NO_DSA"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_DH") THEN CCDEFS = CCDEFS + ",NO_DH"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_MD2") THEN CCDEFS = CCDEFS + ",NO_MD2"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_MD5") THEN CCDEFS = CCDEFS + ",NO_MD5"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_RIPEMD") THEN CCDEFS = CCDEFS + ",NO_RIPEMD"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_SHA") THEN CCDEFS = CCDEFS + ",NO_SHA"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_SHA0") THEN CCDEFS = CCDEFS + ",NO_SHA0"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_SHA1") THEN CCDEFS = CCDEFS + ",NO_SHA1"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_DES")
 | 
			
		||||
$ THEN
 | 
			
		||||
$   CCDEFS = CCDEFS + ",NO_DES,NO_MDC2"
 | 
			
		||||
$ ELSE
 | 
			
		||||
$   IF F$TRNLNM("OPENSSL_NO_MDC2") THEN CCDEFS = CCDEFS + ",NO_MDC2"
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_RC2") THEN CCDEFS = CCDEFS + ",NO_RC2"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_RC4") THEN CCDEFS = CCDEFS + ",NO_RC4"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_RC5") THEN CCDEFS = CCDEFS + ",NO_RC5"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_IDEA") THEN CCDEFS = CCDEFS + ",NO_IDEA"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_BF") THEN CCDEFS = CCDEFS + ",NO_BF"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_CAST") THEN CCDEFS = CCDEFS + ",NO_CAST"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_HMAC") THEN CCDEFS = CCDEFS + ",NO_HMAC"
 | 
			
		||||
$ IF F$TRNLNM("OPENSSL_NO_SSL2") THEN CCDEFS = CCDEFS + ",NO_SSL2"
 | 
			
		||||
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
 | 
			
		||||
$ CCEXTRAFLAGS = ""
 | 
			
		||||
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
 | 
			
		||||
$ CCDISABLEWARNINGS = "LONGLONGTYPE,LONGLONGSUFX,FOUNDCR"
 | 
			
		||||
$ CCDISABLEWARNINGS = "LONGLONGTYPE,LONGLONGSUFX"
 | 
			
		||||
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. "" THEN -
 | 
			
		||||
	CCDISABLEWARNINGS = CCDISABLEWARNINGS + "," + USER_CCDISABLEWARNINGS
 | 
			
		||||
$!
 | 
			
		||||
$!  Check To See If The User Entered A Valid Paramter.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (P2.EQS."VAXC").OR.(P2.EQS."DECC").OR.(P2.EQS."GNUC")
 | 
			
		||||
$ IF (P3.EQS."VAXC").OR.(P3.EQS."DECC").OR.(P3.EQS."GNUC")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!  Check To See If The User Wanted DECC.
 | 
			
		||||
$!
 | 
			
		||||
$   IF (P2.EQS."DECC")
 | 
			
		||||
$   IF (P3.EQS."DECC")
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Looks Like DECC, Set To Use DECC.
 | 
			
		||||
@@ -678,8 +861,7 @@ $     CC = "CC"
 | 
			
		||||
$     IF ARCH.EQS."VAX" .AND. F$TRNLNM("DECC$CC_DEFAULT").NES."/DECC" -
 | 
			
		||||
	 THEN CC = "CC/DECC"
 | 
			
		||||
$     CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/STANDARD=ANSI89" + -
 | 
			
		||||
           "/NOLIST/PREFIX=ALL" + -
 | 
			
		||||
	   "/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
 | 
			
		||||
           "/NOLIST/PREFIX=ALL" + CCEXTRAFLAGS
 | 
			
		||||
$!
 | 
			
		||||
$!    Define The Linker Options File Name.
 | 
			
		||||
$!
 | 
			
		||||
@@ -691,7 +873,7 @@ $   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Check To See If We Are To Use VAXC.
 | 
			
		||||
$!
 | 
			
		||||
$   IF (P2.EQS."VAXC")
 | 
			
		||||
$   IF (P3.EQS."VAXC")
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Looks Like VAXC, Set To Use VAXC.
 | 
			
		||||
@@ -710,8 +892,7 @@ $	WRITE SYS$OUTPUT "There is no VAX C on Alpha!"
 | 
			
		||||
$	EXIT
 | 
			
		||||
$     ENDIF
 | 
			
		||||
$     IF F$TRNLNM("DECC$CC_DEFAULT").EQS."/DECC" THEN CC = "CC/VAXC"
 | 
			
		||||
$     CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
 | 
			
		||||
	   "/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
 | 
			
		||||
$     CC = CC + "/''CC_OPTIMIZE'/''DEBUGGER'/NOLIST" + CCEXTRAFLAGS
 | 
			
		||||
$     CCDEFS = CCDEFS + ",""VAXC"""
 | 
			
		||||
$!
 | 
			
		||||
$!    Define <sys> As SYS$COMMON:[SYSLIB]
 | 
			
		||||
@@ -728,7 +909,7 @@ $   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Check To See If We Are To Use GNU C.
 | 
			
		||||
$!
 | 
			
		||||
$   IF (P2.EQS."GNUC")
 | 
			
		||||
$   IF (P3.EQS."GNUC")
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Looks Like GNUC, Set To Use GNUC.
 | 
			
		||||
@@ -742,8 +923,7 @@ $!
 | 
			
		||||
$!    Use GNU C...
 | 
			
		||||
$!
 | 
			
		||||
$     IF F$TYPE(GCC) .EQS. "" THEN GCC := GCC
 | 
			
		||||
$     CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + -
 | 
			
		||||
	   "/INCLUDE=(SYS$DISK:[-],SYS$DISK:[-.CRYPTO])" + CCEXTRAFLAGS
 | 
			
		||||
$     CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + CCEXTRAFLAGS
 | 
			
		||||
$!
 | 
			
		||||
$!    Define The Linker Options File Name.
 | 
			
		||||
$!
 | 
			
		||||
@@ -757,6 +937,31 @@ $!  Set up default defines
 | 
			
		||||
$!
 | 
			
		||||
$   CCDEFS = """FLAT_INC=1""," + CCDEFS
 | 
			
		||||
$!
 | 
			
		||||
$!  Check To See If We Are To Compile With RSAREF Routines.
 | 
			
		||||
$!
 | 
			
		||||
$   IF (RSAREF.EQS."TRUE")
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Compile With RSAREF.
 | 
			
		||||
$!
 | 
			
		||||
$     CCDEFS = CCDEFS + ",""RSAref=1"""
 | 
			
		||||
$!
 | 
			
		||||
$!    Tell The User This.
 | 
			
		||||
$!
 | 
			
		||||
$     WRITE SYS$OUTPUT "Compiling With RSAREF Routines."
 | 
			
		||||
$!
 | 
			
		||||
$!    Else, We Don't Care.  Compile Without The RSAREF Library.
 | 
			
		||||
$!
 | 
			
		||||
$   ELSE
 | 
			
		||||
$!
 | 
			
		||||
$!    Tell The User We Are Compile Without The RSAREF Routines.
 | 
			
		||||
$!
 | 
			
		||||
$     WRITE SYS$OUTPUT "Compiling Without The RSAREF Routines.
 | 
			
		||||
$!
 | 
			
		||||
$!  End The RSAREF Check.
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Else The User Entered An Invalid Arguement.
 | 
			
		||||
$!
 | 
			
		||||
$ ELSE
 | 
			
		||||
@@ -764,7 +969,7 @@ $!
 | 
			
		||||
$!  Tell The User We Don't Know What They Want.
 | 
			
		||||
$!
 | 
			
		||||
$   WRITE SYS$OUTPUT ""
 | 
			
		||||
$   WRITE SYS$OUTPUT "The Option ",P2," Is Invalid.  The Valid Options Are:"
 | 
			
		||||
$   WRITE SYS$OUTPUT "The Option ",P3," Is Invalid.  The Valid Options Are:"
 | 
			
		||||
$   WRITE SYS$OUTPUT ""
 | 
			
		||||
$   WRITE SYS$OUTPUT "    VAXC  :  To Compile With VAX C."
 | 
			
		||||
$   WRITE SYS$OUTPUT "    DECC  :  To Compile With DEC C."
 | 
			
		||||
@@ -778,18 +983,17 @@ $ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Time to check the contents, and to make sure we get the correct library.
 | 
			
		||||
$!
 | 
			
		||||
$ IF P3.EQS."SOCKETSHR" .OR. P3.EQS."MULTINET" .OR. P3.EQS."UCX" -
 | 
			
		||||
     .OR. P3.EQS."TCPIP" .OR. P3.EQS."NONE"
 | 
			
		||||
$ IF P4.EQS."SOCKETSHR" .OR. P4.EQS."MULTINET" .OR. P4.EQS."UCX"
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!  Check to see if SOCKETSHR was chosen
 | 
			
		||||
$!
 | 
			
		||||
$   IF P3.EQS."SOCKETSHR"
 | 
			
		||||
$   IF P4.EQS."SOCKETSHR"
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Set the library to use SOCKETSHR
 | 
			
		||||
$!
 | 
			
		||||
$     TCPIP_LIB = "SYS$DISK:[-.VMS]SOCKETSHR_SHR.OPT/OPT"
 | 
			
		||||
$     TCPIP_LIB = "[-.VMS]SOCKETSHR_SHR.OPT/OPT"
 | 
			
		||||
$!
 | 
			
		||||
$!    Done with SOCKETSHR
 | 
			
		||||
$!
 | 
			
		||||
@@ -797,12 +1001,12 @@ $   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Check to see if MULTINET was chosen
 | 
			
		||||
$!
 | 
			
		||||
$   IF P3.EQS."MULTINET"
 | 
			
		||||
$   IF P4.EQS."MULTINET"
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Set the library to use UCX emulation.
 | 
			
		||||
$!
 | 
			
		||||
$     P3 = "UCX"
 | 
			
		||||
$     P4 = "UCX"
 | 
			
		||||
$!
 | 
			
		||||
$!    Done with MULTINET
 | 
			
		||||
$!
 | 
			
		||||
@@ -810,53 +1014,27 @@ $   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Check to see if UCX was chosen
 | 
			
		||||
$!
 | 
			
		||||
$   IF P3.EQS."UCX"
 | 
			
		||||
$   IF P4.EQS."UCX"
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Set the library to use UCX.
 | 
			
		||||
$!
 | 
			
		||||
$     TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC.OPT/OPT"
 | 
			
		||||
$     TCPIP_LIB = "[-.VMS]UCX_SHR_DECC.OPT/OPT"
 | 
			
		||||
$     IF F$TRNLNM("UCX$IPC_SHR") .NES. ""
 | 
			
		||||
$     THEN
 | 
			
		||||
$       TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_DECC_LOG.OPT/OPT"
 | 
			
		||||
$       TCPIP_LIB = "[-.VMS]UCX_SHR_DECC_LOG.OPT/OPT"
 | 
			
		||||
$     ELSE
 | 
			
		||||
$       IF COMPILER .NES. "DECC" .AND. ARCH .EQS. "VAX" THEN -
 | 
			
		||||
	  TCPIP_LIB = "SYS$DISK:[-.VMS]UCX_SHR_VAXC.OPT/OPT"
 | 
			
		||||
	  TCPIP_LIB = "[-.VMS]UCX_SHR_VAXC.OPT/OPT"
 | 
			
		||||
$     ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!    Done with UCX
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Check to see if TCPIP (post UCX) was chosen
 | 
			
		||||
$!
 | 
			
		||||
$   IF P3.EQS."TCPIP"
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Set the library to use TCPIP.
 | 
			
		||||
$!
 | 
			
		||||
$     TCPIP_LIB = "SYS$DISK:[-.VMS]TCPIP_SHR_DECC.OPT/OPT"
 | 
			
		||||
$!
 | 
			
		||||
$!    Done with TCPIP
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Check to see if NONE was chosen
 | 
			
		||||
$!
 | 
			
		||||
$   IF P3.EQS."NONE"
 | 
			
		||||
$   THEN
 | 
			
		||||
$!
 | 
			
		||||
$!    Do not use TCPIP.
 | 
			
		||||
$!
 | 
			
		||||
$     TCPIP_LIB = ""
 | 
			
		||||
$!
 | 
			
		||||
$!    Done with TCPIP
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Add TCP/IP type to CC definitions.
 | 
			
		||||
$!
 | 
			
		||||
$   CCDEFS = CCDEFS + ",TCPIP_TYPE_''P3'"
 | 
			
		||||
$   CCDEFS = CCDEFS + ",TCPIP_TYPE_''P4'"
 | 
			
		||||
$!
 | 
			
		||||
$!  Print info
 | 
			
		||||
$!
 | 
			
		||||
@@ -869,11 +1047,10 @@ $!
 | 
			
		||||
$!  Tell The User We Don't Know What They Want.
 | 
			
		||||
$!
 | 
			
		||||
$   WRITE SYS$OUTPUT ""
 | 
			
		||||
$   WRITE SYS$OUTPUT "The Option ",P3," Is Invalid.  The Valid Options Are:"
 | 
			
		||||
$   WRITE SYS$OUTPUT "The Option ",P4," Is Invalid.  The Valid Options Are:"
 | 
			
		||||
$   WRITE SYS$OUTPUT ""
 | 
			
		||||
$   WRITE SYS$OUTPUT "    SOCKETSHR  :  To link with SOCKETSHR TCP/IP library."
 | 
			
		||||
$   WRITE SYS$OUTPUT "    UCX        :  To link with UCX TCP/IP library."
 | 
			
		||||
$   WRITE SYS$OUTPUT "    TCPIP      :  To link with TCPIP (post UCX) TCP/IP library."
 | 
			
		||||
$   WRITE SYS$OUTPUT ""
 | 
			
		||||
$!
 | 
			
		||||
$!  Time To EXIT.
 | 
			
		||||
@@ -900,7 +1077,7 @@ $ CC = CC + "/DEFINE=(" + CCDEFS + ")" + CCDISABLEWARNINGS
 | 
			
		||||
$!
 | 
			
		||||
$! Show user the result
 | 
			
		||||
$!
 | 
			
		||||
$ WRITE/SYMBOL SYS$OUTPUT "Main Compiling Command: ",CC
 | 
			
		||||
$ WRITE SYS$OUTPUT "Main Compiling Command: ",CC
 | 
			
		||||
$!
 | 
			
		||||
$! Special Threads For OpenVMS v7.1 Or Later
 | 
			
		||||
$!
 | 
			
		||||
@@ -908,9 +1085,9 @@ $! Written By:  Richard Levitte
 | 
			
		||||
$!              richard@levitte.org
 | 
			
		||||
$!
 | 
			
		||||
$!
 | 
			
		||||
$! Check To See If We Have A Option For P4.
 | 
			
		||||
$! Check To See If We Have A Option For P5.
 | 
			
		||||
$!
 | 
			
		||||
$ IF (P4.EQS."")
 | 
			
		||||
$ IF (P5.EQS."")
 | 
			
		||||
$ THEN
 | 
			
		||||
$!
 | 
			
		||||
$!  Get The Version Of VMS We Are Using.
 | 
			
		||||
@@ -932,15 +1109,15 @@ $!  End The VMS Version Check.
 | 
			
		||||
$!
 | 
			
		||||
$   ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! End The P4 Check.
 | 
			
		||||
$! End The P5 Check.
 | 
			
		||||
$!
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$! Check if the user wanted to compile just a subset of all the programs.
 | 
			
		||||
$!
 | 
			
		||||
$ IF P5 .NES. ""
 | 
			
		||||
$ IF P6 .NES. ""
 | 
			
		||||
$ THEN
 | 
			
		||||
$   PROGRAMS = P5
 | 
			
		||||
$   PROGRAMS = P6
 | 
			
		||||
$ ENDIF
 | 
			
		||||
$!
 | 
			
		||||
$!  Time To RETURN...
 | 
			
		||||
 
 | 
			
		||||
@@ -58,9 +58,9 @@
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG nseq_main
 | 
			
		||||
@@ -102,7 +102,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf (bio_err, "-in file  input file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-out file output file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-toseq    output NS Sequence file\n");
 | 
			
		||||
		OPENSSL_EXIT(1);
 | 
			
		||||
		EXIT(1);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (infile) {
 | 
			
		||||
@@ -121,7 +121,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -162,6 +162,6 @@ end:
 | 
			
		||||
	BIO_free_all(out);
 | 
			
		||||
	NETSCAPE_CERT_SEQUENCE_free(seq);
 | 
			
		||||
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1227
									
								
								apps/ocsp.c
									
									
									
									
									
								
							
							
						
						
									
										1227
									
								
								apps/ocsp.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							@@ -3,13 +3,8 @@
 | 
			
		||||
# This is mostly being used for generation of certificate requests.
 | 
			
		||||
#
 | 
			
		||||
 | 
			
		||||
# This definition stops the following lines choking if HOME isn't
 | 
			
		||||
# defined.
 | 
			
		||||
HOME			= .
 | 
			
		||||
RANDFILE		= $ENV::HOME/.rnd
 | 
			
		||||
 | 
			
		||||
# Extra OBJECT IDENTIFIER info:
 | 
			
		||||
#oid_file		= $ENV::HOME/.oid
 | 
			
		||||
oid_file		= $ENV::HOME/.oid
 | 
			
		||||
oid_section		= new_oids
 | 
			
		||||
 | 
			
		||||
# To use this configuration file with the "-extfile" option of the
 | 
			
		||||
@@ -38,31 +33,18 @@ dir		= sys\$disk:[.demoCA		# Where everything is kept
 | 
			
		||||
certs		= $dir.certs]		# Where the issued certs are kept
 | 
			
		||||
crl_dir		= $dir.crl]		# Where the issued crl are kept
 | 
			
		||||
database	= $dir]index.txt	# database index file.
 | 
			
		||||
#unique_subject	= no			# Set to 'no' to allow creation of
 | 
			
		||||
					# several ctificates with same subject.
 | 
			
		||||
new_certs_dir	= $dir.newcerts]	# default place for new certs.
 | 
			
		||||
 | 
			
		||||
certificate	= $dir]cacert.pem 	# The CA certificate
 | 
			
		||||
serial		= $dir]serial.		# The current serial number
 | 
			
		||||
#crlnumber	= $dir]crlnumber.	# the current crl number must be
 | 
			
		||||
					# commented out to leave a V1 CRL
 | 
			
		||||
crl		= $dir]crl.pem 		# The current CRL
 | 
			
		||||
private_key	= $dir.private]cakey.pem# The private key
 | 
			
		||||
RANDFILE	= $dir.private].rand	# private random number file
 | 
			
		||||
 | 
			
		||||
x509_extensions	= usr_cert		# The extentions to add to the cert
 | 
			
		||||
 | 
			
		||||
# Comment out the following two lines for the "traditional"
 | 
			
		||||
# (and highly broken) format.
 | 
			
		||||
name_opt 	= ca_default		# Subject Name options
 | 
			
		||||
cert_opt 	= ca_default		# Certificate field options
 | 
			
		||||
 | 
			
		||||
# Extension copying option: use with caution.
 | 
			
		||||
# copy_extensions = copy
 | 
			
		||||
 | 
			
		||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
 | 
			
		||||
# so this is commented out by default to leave a V1 CRL.
 | 
			
		||||
# crlnumber must also be commented out to leave a V1 CRL.
 | 
			
		||||
# crl_extensions	= crl_ext
 | 
			
		||||
 | 
			
		||||
default_days	= 365			# how long to certify for
 | 
			
		||||
@@ -104,19 +86,16 @@ distinguished_name	= req_distinguished_name
 | 
			
		||||
attributes		= req_attributes
 | 
			
		||||
x509_extensions	= v3_ca	# The extentions to add to the self signed cert
 | 
			
		||||
 | 
			
		||||
# Passwords for private keys if not present they will be prompted for
 | 
			
		||||
# input_password = secret
 | 
			
		||||
# output_password = secret
 | 
			
		||||
 | 
			
		||||
# This sets a mask for permitted string types. There are several options. 
 | 
			
		||||
# This sets the permitted types in a DirectoryString. There are several
 | 
			
		||||
# options. 
 | 
			
		||||
# default: PrintableString, T61String, BMPString.
 | 
			
		||||
# pkix	 : PrintableString, BMPString.
 | 
			
		||||
# utf8only: only UTF8Strings.
 | 
			
		||||
# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
 | 
			
		||||
# nobmp : PrintableString, T61String (no BMPStrings).
 | 
			
		||||
# MASK:XXXX a literal mask value.
 | 
			
		||||
# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
 | 
			
		||||
# so use this option with caution!
 | 
			
		||||
string_mask = nombstr
 | 
			
		||||
dirstring_type = nobmp
 | 
			
		||||
 | 
			
		||||
# req_extensions = v3_req # The extensions to add to a certificate request
 | 
			
		||||
 | 
			
		||||
@@ -145,7 +124,7 @@ commonName			= Common Name (eg, YOUR name)
 | 
			
		||||
commonName_max			= 64
 | 
			
		||||
 | 
			
		||||
emailAddress			= Email Address
 | 
			
		||||
emailAddress_max		= 64
 | 
			
		||||
emailAddress_max		= 40
 | 
			
		||||
 | 
			
		||||
# SET-ex3			= SET extension number 3
 | 
			
		||||
 | 
			
		||||
@@ -193,9 +172,6 @@ authorityKeyIdentifier=keyid,issuer:always
 | 
			
		||||
# This stuff is for subjectAltName and issuerAltname.
 | 
			
		||||
# Import the email address.
 | 
			
		||||
# subjectAltName=email:copy
 | 
			
		||||
# An alternative to produce certificates that aren't
 | 
			
		||||
# deprecated according to PKIX.
 | 
			
		||||
# subjectAltName=email:move
 | 
			
		||||
 | 
			
		||||
# Copy subject details
 | 
			
		||||
# issuerAltName=issuer:copy
 | 
			
		||||
@@ -258,56 +234,3 @@ basicConstraints = CA:true
 | 
			
		||||
 | 
			
		||||
# issuerAltName=issuer:copy
 | 
			
		||||
authorityKeyIdentifier=keyid:always,issuer:always
 | 
			
		||||
 | 
			
		||||
[ proxy_cert_ext ]
 | 
			
		||||
# These extensions should be added when creating a proxy certificate
 | 
			
		||||
 | 
			
		||||
# This goes against PKIX guidelines but some CAs do it and some software
 | 
			
		||||
# requires this to avoid interpreting an end user certificate as a CA.
 | 
			
		||||
 | 
			
		||||
basicConstraints=CA:FALSE
 | 
			
		||||
 | 
			
		||||
# Here are some examples of the usage of nsCertType. If it is omitted
 | 
			
		||||
# the certificate can be used for anything *except* object signing.
 | 
			
		||||
 | 
			
		||||
# This is OK for an SSL server.
 | 
			
		||||
# nsCertType			= server
 | 
			
		||||
 | 
			
		||||
# For an object signing certificate this would be used.
 | 
			
		||||
# nsCertType = objsign
 | 
			
		||||
 | 
			
		||||
# For normal client use this is typical
 | 
			
		||||
# nsCertType = client, email
 | 
			
		||||
 | 
			
		||||
# and for everything including object signing:
 | 
			
		||||
# nsCertType = client, email, objsign
 | 
			
		||||
 | 
			
		||||
# This is typical in keyUsage for a client certificate.
 | 
			
		||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
 | 
			
		||||
 | 
			
		||||
# This will be displayed in Netscape's comment listbox.
 | 
			
		||||
nsComment			= "OpenSSL Generated Certificate"
 | 
			
		||||
 | 
			
		||||
# PKIX recommendations harmless if included in all certificates.
 | 
			
		||||
subjectKeyIdentifier=hash
 | 
			
		||||
authorityKeyIdentifier=keyid,issuer:always
 | 
			
		||||
 | 
			
		||||
# This stuff is for subjectAltName and issuerAltname.
 | 
			
		||||
# Import the email address.
 | 
			
		||||
# subjectAltName=email:copy
 | 
			
		||||
# An alternative to produce certificates that aren't
 | 
			
		||||
# deprecated according to PKIX.
 | 
			
		||||
# subjectAltName=email:move
 | 
			
		||||
 | 
			
		||||
# Copy subject details
 | 
			
		||||
# issuerAltName=issuer:copy
 | 
			
		||||
 | 
			
		||||
#nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem
 | 
			
		||||
#nsBaseUrl
 | 
			
		||||
#nsRevocationUrl
 | 
			
		||||
#nsRenewalUrl
 | 
			
		||||
#nsCaPolicyUrl
 | 
			
		||||
#nsSslServerName
 | 
			
		||||
 | 
			
		||||
# This really needs to be in place for it to be a proxy certificate.
 | 
			
		||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										233
									
								
								apps/openssl.c
									
									
									
									
									
								
							
							
						
						
									
										233
									
								
								apps/openssl.c
									
									
									
									
									
								
							@@ -55,66 +55,11 @@
 | 
			
		||||
 * copied and put under another distribution licence
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    openssl-core@openssl.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#define OPENSSL_C /* tells apps.h to use complete apps_startup() */
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/bio.h>
 | 
			
		||||
#include <openssl/crypto.h>
 | 
			
		||||
#include <openssl/lhash.h>
 | 
			
		||||
@@ -122,108 +67,31 @@
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include <openssl/ssl.h>
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
#include <openssl/engine.h>
 | 
			
		||||
#endif
 | 
			
		||||
#define USE_SOCKETS /* needed for the _O_BINARY defs in the MS world */
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include "progs.h"
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#include <openssl/fips.h>
 | 
			
		||||
 | 
			
		||||
/* The LHASH callbacks ("hash" & "cmp") have been replaced by functions with the
 | 
			
		||||
 * base prototypes (we cast each variable inside the function to the required
 | 
			
		||||
 * type of "FUNCTION*"). This removes the necessity for macro-generated wrapper
 | 
			
		||||
 * functions. */
 | 
			
		||||
 | 
			
		||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a); */
 | 
			
		||||
static unsigned long MS_CALLBACK hash(const void *a_void);
 | 
			
		||||
/* static int MS_CALLBACK cmp(FUNCTION *a,FUNCTION *b); */
 | 
			
		||||
static int MS_CALLBACK cmp(const void *a_void,const void *b_void);
 | 
			
		||||
static unsigned long MS_CALLBACK hash(FUNCTION *a);
 | 
			
		||||
static int MS_CALLBACK cmp(FUNCTION *a,FUNCTION *b);
 | 
			
		||||
static LHASH *prog_init(void );
 | 
			
		||||
static int do_cmd(LHASH *prog,int argc,char *argv[]);
 | 
			
		||||
LHASH *config=NULL;
 | 
			
		||||
char *default_config_file=NULL;
 | 
			
		||||
 | 
			
		||||
/* Make sure there is only one when MONOLITH is defined */
 | 
			
		||||
#ifdef MONOLITH
 | 
			
		||||
CONF *config=NULL;
 | 
			
		||||
BIO *bio_err=NULL;
 | 
			
		||||
int in_FIPS_mode=0;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
static void lock_dbg_cb(int mode, int type, const char *file, int line)
 | 
			
		||||
	{
 | 
			
		||||
	static int modes[CRYPTO_NUM_LOCKS]; /* = {0, 0, ... } */
 | 
			
		||||
	const char *errstr = NULL;
 | 
			
		||||
	int rw;
 | 
			
		||||
	
 | 
			
		||||
	rw = mode & (CRYPTO_READ|CRYPTO_WRITE);
 | 
			
		||||
	if (!((rw == CRYPTO_READ) || (rw == CRYPTO_WRITE)))
 | 
			
		||||
		{
 | 
			
		||||
		errstr = "invalid mode";
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (type < 0 || type >= CRYPTO_NUM_LOCKS)
 | 
			
		||||
		{
 | 
			
		||||
		errstr = "type out of bounds";
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (mode & CRYPTO_LOCK)
 | 
			
		||||
		{
 | 
			
		||||
		if (modes[type])
 | 
			
		||||
			{
 | 
			
		||||
			errstr = "already locked";
 | 
			
		||||
			/* must not happen in a single-threaded program
 | 
			
		||||
			 * (would deadlock) */
 | 
			
		||||
			goto err;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		modes[type] = rw;
 | 
			
		||||
		}
 | 
			
		||||
	else if (mode & CRYPTO_UNLOCK)
 | 
			
		||||
		{
 | 
			
		||||
		if (!modes[type])
 | 
			
		||||
			{
 | 
			
		||||
			errstr = "not locked";
 | 
			
		||||
			goto err;
 | 
			
		||||
			}
 | 
			
		||||
		
 | 
			
		||||
		if (modes[type] != rw)
 | 
			
		||||
			{
 | 
			
		||||
			errstr = (rw == CRYPTO_READ) ?
 | 
			
		||||
				"CRYPTO_r_unlock on write lock" :
 | 
			
		||||
				"CRYPTO_w_unlock on read lock";
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		modes[type] = 0;
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		errstr = "invalid mode";
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
 err:
 | 
			
		||||
	if (errstr)
 | 
			
		||||
		{
 | 
			
		||||
		/* we cannot use bio_err here */
 | 
			
		||||
		fprintf(stderr, "openssl (lock_dbg_cb): %s (mode=%d, type=%d) at %s:%d\n",
 | 
			
		||||
			errstr, mode, type, file, line);
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
int main(int Argc, char *Argv[])
 | 
			
		||||
	{
 | 
			
		||||
	ARGS arg;
 | 
			
		||||
#define PROG_NAME_SIZE	39
 | 
			
		||||
	char pname[PROG_NAME_SIZE+1];
 | 
			
		||||
	FUNCTION f,*fp;
 | 
			
		||||
	MS_STATIC char *prompt,buf[1024];
 | 
			
		||||
	char *to_free=NULL;
 | 
			
		||||
	MS_STATIC char *prompt,buf[1024],config_name[256];
 | 
			
		||||
	int n,i,ret=0;
 | 
			
		||||
	int argc;
 | 
			
		||||
	char **argv,*p;
 | 
			
		||||
@@ -233,68 +101,41 @@ int main(int Argc, char *Argv[])
 | 
			
		||||
	arg.data=NULL;
 | 
			
		||||
	arg.count=0;
 | 
			
		||||
 | 
			
		||||
	in_FIPS_mode = 0;
 | 
			
		||||
	if (getenv("OPENSSL_DEBUG_MEMORY") != NULL)
 | 
			
		||||
		CRYPTO_malloc_debug_init();
 | 
			
		||||
	CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
	if(getenv("OPENSSL_FIPS")) {
 | 
			
		||||
		if (!FIPS_mode_set(1)) {
 | 
			
		||||
			ERR_load_crypto_strings();
 | 
			
		||||
			ERR_print_errors(BIO_new_fp(stderr,BIO_NOCLOSE));
 | 
			
		||||
			EXIT(1);
 | 
			
		||||
		}
 | 
			
		||||
		in_FIPS_mode = 1;
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (getenv("OPENSSL_DEBUG_MEMORY") != NULL) /* if not defined, use compiled-in library defaults */
 | 
			
		||||
		{
 | 
			
		||||
		if (!(0 == strcmp(getenv("OPENSSL_DEBUG_MEMORY"), "off")))
 | 
			
		||||
			{
 | 
			
		||||
			CRYPTO_malloc_debug_init();
 | 
			
		||||
			CRYPTO_set_mem_debug_options(V_CRYPTO_MDEBUG_ALL);
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			/* OPENSSL_DEBUG_MEMORY=off */
 | 
			
		||||
			CRYPTO_set_mem_debug_functions(0, 0, 0, 0, 0);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
 | 
			
		||||
 | 
			
		||||
#if 0
 | 
			
		||||
	if (getenv("OPENSSL_DEBUG_LOCKING") != NULL)
 | 
			
		||||
#endif
 | 
			
		||||
		{
 | 
			
		||||
		CRYPTO_set_locking_callback(lock_dbg_cb);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
 | 
			
		||||
	/* Lets load up our environment a little */
 | 
			
		||||
	p=getenv("OPENSSL_CONF");
 | 
			
		||||
	if (p == NULL)
 | 
			
		||||
		p=getenv("SSLEAY_CONF");
 | 
			
		||||
	if (p == NULL)
 | 
			
		||||
		p=to_free=make_config_name();
 | 
			
		||||
		{
 | 
			
		||||
		strcpy(config_name,X509_get_default_cert_area());
 | 
			
		||||
#ifndef VMS
 | 
			
		||||
		strcat(config_name,"/");
 | 
			
		||||
#endif
 | 
			
		||||
		strcat(config_name,OPENSSL_CONF);
 | 
			
		||||
		p=config_name;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	default_config_file=p;
 | 
			
		||||
 | 
			
		||||
	config=NCONF_new(NULL);
 | 
			
		||||
	i=NCONF_load(config,p,&errline);
 | 
			
		||||
	if (i == 0)
 | 
			
		||||
		{
 | 
			
		||||
		NCONF_free(config);
 | 
			
		||||
		config = NULL;
 | 
			
		||||
		ERR_clear_error();
 | 
			
		||||
		}
 | 
			
		||||
	config=CONF_load(config,p,&errline);
 | 
			
		||||
	if (config == NULL) ERR_clear_error();
 | 
			
		||||
 | 
			
		||||
	prog=prog_init();
 | 
			
		||||
 | 
			
		||||
	/* first check the program name */
 | 
			
		||||
	program_name(Argv[0],pname,sizeof pname);
 | 
			
		||||
	program_name(Argv[0],pname,PROG_NAME_SIZE);
 | 
			
		||||
 | 
			
		||||
	f.name=pname;
 | 
			
		||||
	fp=(FUNCTION *)lh_retrieve(prog,&f);
 | 
			
		||||
@@ -322,7 +163,7 @@ int main(int Argc, char *Argv[])
 | 
			
		||||
		{
 | 
			
		||||
		ret=0;
 | 
			
		||||
		p=buf;
 | 
			
		||||
		n=sizeof buf;
 | 
			
		||||
		n=1024;
 | 
			
		||||
		i=0;
 | 
			
		||||
		for (;;)
 | 
			
		||||
			{
 | 
			
		||||
@@ -356,17 +197,17 @@ int main(int Argc, char *Argv[])
 | 
			
		||||
	BIO_printf(bio_err,"bad exit\n");
 | 
			
		||||
	ret=1;
 | 
			
		||||
end:
 | 
			
		||||
	if (to_free)
 | 
			
		||||
		OPENSSL_free(to_free);
 | 
			
		||||
	if (config != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		NCONF_free(config);
 | 
			
		||||
		CONF_free(config);
 | 
			
		||||
		config=NULL;
 | 
			
		||||
		}
 | 
			
		||||
	if (prog != NULL) lh_free(prog);
 | 
			
		||||
	if (arg.data != NULL) OPENSSL_free(arg.data);
 | 
			
		||||
	ERR_remove_state(0);
 | 
			
		||||
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	EVP_cleanup();
 | 
			
		||||
	ERR_free_strings();
 | 
			
		||||
	
 | 
			
		||||
	CRYPTO_mem_leaks(bio_err);
 | 
			
		||||
	if (bio_err != NULL)
 | 
			
		||||
@@ -374,7 +215,7 @@ end:
 | 
			
		||||
		BIO_free(bio_err);
 | 
			
		||||
		bio_err=NULL;
 | 
			
		||||
		}
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#define LIST_STANDARD_COMMANDS "list-standard-commands"
 | 
			
		||||
@@ -397,7 +238,7 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
 | 
			
		||||
	else if ((strncmp(argv[0],"no-",3)) == 0)
 | 
			
		||||
		{
 | 
			
		||||
		BIO *bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		bio_stdout = BIO_push(tmpbio, bio_stdout);
 | 
			
		||||
@@ -434,7 +275,7 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
 | 
			
		||||
		else /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
 | 
			
		||||
			list_type = FUNC_TYPE_CIPHER;
 | 
			
		||||
		bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		bio_stdout = BIO_push(tmpbio, bio_stdout);
 | 
			
		||||
@@ -509,23 +350,19 @@ static LHASH *prog_init(void)
 | 
			
		||||
	    ;
 | 
			
		||||
	qsort(functions,i,sizeof *functions,SortFnByName);
 | 
			
		||||
 | 
			
		||||
	if ((ret=lh_new(hash, cmp)) == NULL)
 | 
			
		||||
		return(NULL);
 | 
			
		||||
	if ((ret=lh_new(hash,cmp)) == NULL) return(NULL);
 | 
			
		||||
 | 
			
		||||
	for (f=functions; f->name != NULL; f++)
 | 
			
		||||
		lh_insert(ret,f);
 | 
			
		||||
	return(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
/* static int MS_CALLBACK cmp(FUNCTION *a, FUNCTION *b) */
 | 
			
		||||
static int MS_CALLBACK cmp(const void *a_void, const void *b_void)
 | 
			
		||||
static int MS_CALLBACK cmp(FUNCTION *a, FUNCTION *b)
 | 
			
		||||
	{
 | 
			
		||||
	return(strncmp(((FUNCTION *)a_void)->name,
 | 
			
		||||
			((FUNCTION *)b_void)->name,8));
 | 
			
		||||
	return(strncmp(a->name,b->name,8));
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
/* static unsigned long MS_CALLBACK hash(FUNCTION *a) */
 | 
			
		||||
static unsigned long MS_CALLBACK hash(const void *a_void)
 | 
			
		||||
static unsigned long MS_CALLBACK hash(FUNCTION *a)
 | 
			
		||||
	{
 | 
			
		||||
	return(lh_strhash(((FUNCTION *)a_void)->name));
 | 
			
		||||
	return(lh_strhash(a->name));
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
@@ -38,31 +38,18 @@ dir		= ./demoCA		# Where everything is kept
 | 
			
		||||
certs		= $dir/certs		# Where the issued certs are kept
 | 
			
		||||
crl_dir		= $dir/crl		# Where the issued crl are kept
 | 
			
		||||
database	= $dir/index.txt	# database index file.
 | 
			
		||||
#unique_subject	= no			# Set to 'no' to allow creation of
 | 
			
		||||
					# several ctificates with same subject.
 | 
			
		||||
new_certs_dir	= $dir/newcerts		# default place for new certs.
 | 
			
		||||
 | 
			
		||||
certificate	= $dir/cacert.pem 	# The CA certificate
 | 
			
		||||
serial		= $dir/serial 		# The current serial number
 | 
			
		||||
#crlnumber	= $dir/crlnumber	# the current crl number must be
 | 
			
		||||
					# commented out to leave a V1 CRL
 | 
			
		||||
crl		= $dir/crl.pem 		# The current CRL
 | 
			
		||||
private_key	= $dir/private/cakey.pem# The private key
 | 
			
		||||
RANDFILE	= $dir/private/.rand	# private random number file
 | 
			
		||||
 | 
			
		||||
x509_extensions	= usr_cert		# The extentions to add to the cert
 | 
			
		||||
 | 
			
		||||
# Comment out the following two lines for the "traditional"
 | 
			
		||||
# (and highly broken) format.
 | 
			
		||||
name_opt 	= ca_default		# Subject Name options
 | 
			
		||||
cert_opt 	= ca_default		# Certificate field options
 | 
			
		||||
 | 
			
		||||
# Extension copying option: use with caution.
 | 
			
		||||
# copy_extensions = copy
 | 
			
		||||
 | 
			
		||||
# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs
 | 
			
		||||
# so this is commented out by default to leave a V1 CRL.
 | 
			
		||||
# crlnumber must also be commented out to leave a V1 CRL.
 | 
			
		||||
# crl_extensions	= crl_ext
 | 
			
		||||
 | 
			
		||||
default_days	= 365			# how long to certify for
 | 
			
		||||
@@ -145,7 +132,7 @@ commonName			= Common Name (eg, YOUR name)
 | 
			
		||||
commonName_max			= 64
 | 
			
		||||
 | 
			
		||||
emailAddress			= Email Address
 | 
			
		||||
emailAddress_max		= 64
 | 
			
		||||
emailAddress_max		= 40
 | 
			
		||||
 | 
			
		||||
# SET-ex3			= SET extension number 3
 | 
			
		||||
 | 
			
		||||
@@ -193,9 +180,6 @@ authorityKeyIdentifier=keyid,issuer:always
 | 
			
		||||
# This stuff is for subjectAltName and issuerAltname.
 | 
			
		||||
# Import the email address.
 | 
			
		||||
# subjectAltName=email:copy
 | 
			
		||||
# An alternative to produce certificates that aren't
 | 
			
		||||
# deprecated according to PKIX.
 | 
			
		||||
# subjectAltName=email:move
 | 
			
		||||
 | 
			
		||||
# Copy subject details
 | 
			
		||||
# issuerAltName=issuer:copy
 | 
			
		||||
@@ -258,56 +242,3 @@ basicConstraints = CA:true
 | 
			
		||||
 | 
			
		||||
# issuerAltName=issuer:copy
 | 
			
		||||
authorityKeyIdentifier=keyid:always,issuer:always
 | 
			
		||||
 | 
			
		||||
[ proxy_cert_ext ]
 | 
			
		||||
# These extensions should be added when creating a proxy certificate
 | 
			
		||||
 | 
			
		||||
# This goes against PKIX guidelines but some CAs do it and some software
 | 
			
		||||
# requires this to avoid interpreting an end user certificate as a CA.
 | 
			
		||||
 | 
			
		||||
basicConstraints=CA:FALSE
 | 
			
		||||
 | 
			
		||||
# Here are some examples of the usage of nsCertType. If it is omitted
 | 
			
		||||
# the certificate can be used for anything *except* object signing.
 | 
			
		||||
 | 
			
		||||
# This is OK for an SSL server.
 | 
			
		||||
# nsCertType			= server
 | 
			
		||||
 | 
			
		||||
# For an object signing certificate this would be used.
 | 
			
		||||
# nsCertType = objsign
 | 
			
		||||
 | 
			
		||||
# For normal client use this is typical
 | 
			
		||||
# nsCertType = client, email
 | 
			
		||||
 | 
			
		||||
# and for everything including object signing:
 | 
			
		||||
# nsCertType = client, email, objsign
 | 
			
		||||
 | 
			
		||||
# This is typical in keyUsage for a client certificate.
 | 
			
		||||
# keyUsage = nonRepudiation, digitalSignature, keyEncipherment
 | 
			
		||||
 | 
			
		||||
# This will be displayed in Netscape's comment listbox.
 | 
			
		||||
nsComment			= "OpenSSL Generated Certificate"
 | 
			
		||||
 | 
			
		||||
# PKIX recommendations harmless if included in all certificates.
 | 
			
		||||
subjectKeyIdentifier=hash
 | 
			
		||||
authorityKeyIdentifier=keyid,issuer:always
 | 
			
		||||
 | 
			
		||||
# This stuff is for subjectAltName and issuerAltname.
 | 
			
		||||
# Import the email address.
 | 
			
		||||
# subjectAltName=email:copy
 | 
			
		||||
# An alternative to produce certificates that aren't
 | 
			
		||||
# deprecated according to PKIX.
 | 
			
		||||
# subjectAltName=email:move
 | 
			
		||||
 | 
			
		||||
# Copy subject details
 | 
			
		||||
# issuerAltName=issuer:copy
 | 
			
		||||
 | 
			
		||||
#nsCaRevocationUrl		= http://www.domain.dom/ca-crl.pem
 | 
			
		||||
#nsBaseUrl
 | 
			
		||||
#nsRevocationUrl
 | 
			
		||||
#nsRenewalUrl
 | 
			
		||||
#nsCaPolicyUrl
 | 
			
		||||
#nsSslServerName
 | 
			
		||||
 | 
			
		||||
# This really needs to be in place for it to be a proxy certificate.
 | 
			
		||||
proxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo
 | 
			
		||||
 
 | 
			
		||||
@@ -1,10 +1,10 @@
 | 
			
		||||
/* apps/passwd.c */
 | 
			
		||||
 | 
			
		||||
#if defined OPENSSL_NO_MD5 || defined CHARSET_EBCDIC
 | 
			
		||||
#if defined NO_MD5 || defined CHARSET_EBCDIC
 | 
			
		||||
# define NO_MD5CRYPT_1
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_DES) || !defined(NO_MD5CRYPT_1)
 | 
			
		||||
#if !defined(NO_DES) || !defined(NO_MD5CRYPT_1)
 | 
			
		||||
 | 
			
		||||
#include <assert.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
@@ -15,7 +15,8 @@
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#include <openssl/evp.h>
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
# include <openssl/des.h>
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef NO_MD5CRYPT_1
 | 
			
		||||
@@ -49,7 +50,6 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
 | 
			
		||||
 * -salt string  - salt
 | 
			
		||||
 * -in file      - read passwords from file
 | 
			
		||||
 * -stdin        - read passwords from stdin
 | 
			
		||||
 * -noverify     - never verify when reading password from terminal
 | 
			
		||||
 * -quiet        - no warnings
 | 
			
		||||
 * -table        - format output as table
 | 
			
		||||
 * -reverse      - switch table columns
 | 
			
		||||
@@ -62,7 +62,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	int ret = 1;
 | 
			
		||||
	char *infile = NULL;
 | 
			
		||||
	int in_stdin = 0;
 | 
			
		||||
	int in_noverify = 0;
 | 
			
		||||
	char *salt = NULL, *passwd = NULL, **passwds = NULL;
 | 
			
		||||
	char *salt_malloc = NULL, *passwd_malloc = NULL;
 | 
			
		||||
	size_t passwd_malloc_size = 0;
 | 
			
		||||
@@ -78,14 +77,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto err;
 | 
			
		||||
	out = BIO_new(BIO_s_file());
 | 
			
		||||
	if (out == NULL)
 | 
			
		||||
		goto err;
 | 
			
		||||
	BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
	{
 | 
			
		||||
	BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
	out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -132,8 +128,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			else
 | 
			
		||||
				badopt = 1;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(argv[i], "-noverify") == 0)
 | 
			
		||||
			in_noverify = 1;
 | 
			
		||||
		else if (strcmp(argv[i], "-quiet") == 0)
 | 
			
		||||
			quiet = 1;
 | 
			
		||||
		else if (strcmp(argv[i], "-table") == 0)
 | 
			
		||||
@@ -159,7 +153,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		badopt = 1;
 | 
			
		||||
 | 
			
		||||
	/* reject unsupported algorithms */
 | 
			
		||||
#ifdef OPENSSL_NO_DES
 | 
			
		||||
#ifdef NO_DES
 | 
			
		||||
	if (usecrypt) badopt = 1;
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef NO_MD5CRYPT_1
 | 
			
		||||
@@ -170,7 +164,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "Usage: passwd [options] [passwords]\n");
 | 
			
		||||
		BIO_printf(bio_err, "where options are\n");
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
		BIO_printf(bio_err, "-crypt             standard Unix password algorithm (default)\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef NO_MD5CRYPT_1
 | 
			
		||||
@@ -180,7 +174,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf(bio_err, "-salt string       use provided salt\n");
 | 
			
		||||
		BIO_printf(bio_err, "-in file           read passwords from file\n");
 | 
			
		||||
		BIO_printf(bio_err, "-stdin             read passwords from stdin\n");
 | 
			
		||||
		BIO_printf(bio_err, "-noverify          never verify when reading password from terminal\n");
 | 
			
		||||
		BIO_printf(bio_err, "-quiet             no warnings\n");
 | 
			
		||||
		BIO_printf(bio_err, "-table             format output as table\n");
 | 
			
		||||
		BIO_printf(bio_err, "-reverse           switch table columns\n");
 | 
			
		||||
@@ -229,7 +222,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		
 | 
			
		||||
		passwds = passwds_static;
 | 
			
		||||
		if (in == NULL)
 | 
			
		||||
			if (EVP_read_pw_string(passwd_malloc, passwd_malloc_size, "Password: ", !(passed_salt || in_noverify)) != 0)
 | 
			
		||||
			if (EVP_read_pw_string(passwd_malloc, passwd_malloc_size, "Password: ", 0) != 0)
 | 
			
		||||
				goto err;
 | 
			
		||||
		passwds[0] = passwd_malloc;
 | 
			
		||||
		}
 | 
			
		||||
@@ -291,8 +284,7 @@ err:
 | 
			
		||||
		BIO_free(in);
 | 
			
		||||
	if (out)
 | 
			
		||||
		BIO_free_all(out);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@@ -313,7 +305,7 @@ static char *md5crypt(const char *passwd, const char *magic, const char *salt)
 | 
			
		||||
	unsigned char buf[MD5_DIGEST_LENGTH];
 | 
			
		||||
	char *salt_out;
 | 
			
		||||
	int n, i;
 | 
			
		||||
	EVP_MD_CTX md,md2;
 | 
			
		||||
	MD5_CTX md;
 | 
			
		||||
	size_t passwd_len, salt_len;
 | 
			
		||||
 | 
			
		||||
	passwd_len = strlen(passwd);
 | 
			
		||||
@@ -328,47 +320,49 @@ static char *md5crypt(const char *passwd, const char *magic, const char *salt)
 | 
			
		||||
	salt_len = strlen(salt_out);
 | 
			
		||||
	assert(salt_len <= 8);
 | 
			
		||||
	
 | 
			
		||||
	EVP_MD_CTX_init(&md);
 | 
			
		||||
	EVP_DigestInit_ex(&md,EVP_md5(), NULL);
 | 
			
		||||
	EVP_DigestUpdate(&md, passwd, passwd_len);
 | 
			
		||||
	EVP_DigestUpdate(&md, "$", 1);
 | 
			
		||||
	EVP_DigestUpdate(&md, magic, strlen(magic));
 | 
			
		||||
	EVP_DigestUpdate(&md, "$", 1);
 | 
			
		||||
	EVP_DigestUpdate(&md, salt_out, salt_len);
 | 
			
		||||
	MD5_Init(&md);
 | 
			
		||||
	MD5_Update(&md, passwd, passwd_len);
 | 
			
		||||
	MD5_Update(&md, "$", 1);
 | 
			
		||||
	MD5_Update(&md, magic, strlen(magic));
 | 
			
		||||
	MD5_Update(&md, "$", 1);
 | 
			
		||||
	MD5_Update(&md, salt_out, salt_len);
 | 
			
		||||
	
 | 
			
		||||
	EVP_MD_CTX_init(&md2);
 | 
			
		||||
	EVP_DigestInit_ex(&md2,EVP_md5(), NULL);
 | 
			
		||||
	EVP_DigestUpdate(&md2, passwd, passwd_len);
 | 
			
		||||
	EVP_DigestUpdate(&md2, salt_out, salt_len);
 | 
			
		||||
	EVP_DigestUpdate(&md2, passwd, passwd_len);
 | 
			
		||||
	EVP_DigestFinal_ex(&md2, buf, NULL);
 | 
			
		||||
	 {
 | 
			
		||||
		MD5_CTX md2;
 | 
			
		||||
 | 
			
		||||
		MD5_Init(&md2);
 | 
			
		||||
		MD5_Update(&md2, passwd, passwd_len);
 | 
			
		||||
		MD5_Update(&md2, salt_out, salt_len);
 | 
			
		||||
		MD5_Update(&md2, passwd, passwd_len);
 | 
			
		||||
		MD5_Final(buf, &md2);
 | 
			
		||||
	 }
 | 
			
		||||
	for (i = passwd_len; i > sizeof buf; i -= sizeof buf)
 | 
			
		||||
		EVP_DigestUpdate(&md, buf, sizeof buf);
 | 
			
		||||
	EVP_DigestUpdate(&md, buf, i);
 | 
			
		||||
		MD5_Update(&md, buf, sizeof buf);
 | 
			
		||||
	MD5_Update(&md, buf, i);
 | 
			
		||||
	
 | 
			
		||||
	n = passwd_len;
 | 
			
		||||
	while (n)
 | 
			
		||||
		{
 | 
			
		||||
		EVP_DigestUpdate(&md, (n & 1) ? "\0" : passwd, 1);
 | 
			
		||||
		MD5_Update(&md, (n & 1) ? "\0" : passwd, 1);
 | 
			
		||||
		n >>= 1;
 | 
			
		||||
		}
 | 
			
		||||
	EVP_DigestFinal_ex(&md, buf, NULL);
 | 
			
		||||
	MD5_Final(buf, &md);
 | 
			
		||||
 | 
			
		||||
	for (i = 0; i < 1000; i++)
 | 
			
		||||
		{
 | 
			
		||||
		EVP_DigestInit_ex(&md2,EVP_md5(), NULL);
 | 
			
		||||
		EVP_DigestUpdate(&md2, (i & 1) ? (unsigned char *) passwd : buf,
 | 
			
		||||
		MD5_CTX md2;
 | 
			
		||||
 | 
			
		||||
		MD5_Init(&md2);
 | 
			
		||||
		MD5_Update(&md2, (i & 1) ? (unsigned char *) passwd : buf,
 | 
			
		||||
		                 (i & 1) ? passwd_len : sizeof buf);
 | 
			
		||||
		if (i % 3)
 | 
			
		||||
			EVP_DigestUpdate(&md2, salt_out, salt_len);
 | 
			
		||||
			MD5_Update(&md2, salt_out, salt_len);
 | 
			
		||||
		if (i % 7)
 | 
			
		||||
			EVP_DigestUpdate(&md2, passwd, passwd_len);
 | 
			
		||||
		EVP_DigestUpdate(&md2, (i & 1) ? buf : (unsigned char *) passwd,
 | 
			
		||||
			MD5_Update(&md2, passwd, passwd_len);
 | 
			
		||||
		MD5_Update(&md2, (i & 1) ? buf : (unsigned char *) passwd,
 | 
			
		||||
		                 (i & 1) ? sizeof buf : passwd_len);
 | 
			
		||||
		EVP_DigestFinal_ex(&md2, buf, NULL);
 | 
			
		||||
		MD5_Final(buf, &md2);
 | 
			
		||||
		}
 | 
			
		||||
	EVP_MD_CTX_cleanup(&md2);
 | 
			
		||||
	
 | 
			
		||||
	 {
 | 
			
		||||
		/* transform buf into output string */
 | 
			
		||||
@@ -406,7 +400,6 @@ static char *md5crypt(const char *passwd, const char *magic, const char *salt)
 | 
			
		||||
		*output = 0;
 | 
			
		||||
		assert(strlen(out_buf) < sizeof(out_buf));
 | 
			
		||||
	 }
 | 
			
		||||
	EVP_MD_CTX_cleanup(&md);
 | 
			
		||||
 | 
			
		||||
	return out_buf;
 | 
			
		||||
	}
 | 
			
		||||
@@ -425,7 +418,7 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
 | 
			
		||||
	/* first make sure we have a salt */
 | 
			
		||||
	if (!passed_salt)
 | 
			
		||||
		{
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
		if (usecrypt)
 | 
			
		||||
			{
 | 
			
		||||
			if (*salt_malloc_p == NULL)
 | 
			
		||||
@@ -444,7 +437,7 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
 | 
			
		||||
			                                    * back to ASCII */
 | 
			
		||||
#endif
 | 
			
		||||
			}
 | 
			
		||||
#endif /* !OPENSSL_NO_DES */
 | 
			
		||||
#endif /* !NO_DES */
 | 
			
		||||
 | 
			
		||||
#ifndef NO_MD5CRYPT_1
 | 
			
		||||
		if (use1 || useapr1)
 | 
			
		||||
@@ -479,9 +472,9 @@ static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
 | 
			
		||||
	assert(strlen(passwd) <= pw_maxlen);
 | 
			
		||||
	
 | 
			
		||||
	/* now compute password hash */
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	if (usecrypt)
 | 
			
		||||
		hash = DES_crypt(passwd, *salt_p);
 | 
			
		||||
		hash = des_crypt(passwd, *salt_p);
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef NO_MD5CRYPT_1
 | 
			
		||||
	if (use1 || useapr1)
 | 
			
		||||
@@ -505,6 +498,6 @@ err:
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	fputs("Program not available.\n", stderr)
 | 
			
		||||
	OPENSSL_EXIT(1);
 | 
			
		||||
	EXIT(1);
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										147
									
								
								apps/pkcs12.c
									
									
									
									
									
								
							
							
						
						
									
										147
									
								
								apps/pkcs12.c
									
									
									
									
									
								
							@@ -1,5 +1,5 @@
 | 
			
		||||
/* pkcs12.c */
 | 
			
		||||
#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)
 | 
			
		||||
#if !defined(NO_DES) && !defined(NO_SHA1)
 | 
			
		||||
 | 
			
		||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
			
		||||
 * project 1999.
 | 
			
		||||
@@ -69,7 +69,7 @@
 | 
			
		||||
 | 
			
		||||
#define PROG pkcs12_main
 | 
			
		||||
 | 
			
		||||
const EVP_CIPHER *enc;
 | 
			
		||||
EVP_CIPHER *enc;
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
#define NOKEYS		0x1
 | 
			
		||||
@@ -92,13 +92,11 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
    ENGINE *e = NULL;
 | 
			
		||||
    char *infile=NULL, *outfile=NULL, *keyname = NULL;	
 | 
			
		||||
    char *certfile=NULL;
 | 
			
		||||
    BIO *in=NULL, *out = NULL;
 | 
			
		||||
    BIO *in=NULL, *out = NULL, *inkey = NULL, *certsin = NULL;
 | 
			
		||||
    char **args;
 | 
			
		||||
    char *name = NULL;
 | 
			
		||||
    char *csp_name = NULL;
 | 
			
		||||
    PKCS12 *p12 = NULL;
 | 
			
		||||
    char pass[50], macpass[50];
 | 
			
		||||
    int export_cert = 0;
 | 
			
		||||
@@ -109,7 +107,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    int maciter = PKCS12_DEFAULT_ITER;
 | 
			
		||||
    int twopass = 0;
 | 
			
		||||
    int keytype = 0;
 | 
			
		||||
    int cert_pbe;
 | 
			
		||||
    int cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
 | 
			
		||||
    int key_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
			
		||||
    int ret = 1;
 | 
			
		||||
    int macver = 1;
 | 
			
		||||
@@ -120,25 +118,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    char *passin = NULL, *passout = NULL;
 | 
			
		||||
    char *inrand = NULL;
 | 
			
		||||
    char *CApath = NULL, *CAfile = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_FIPS
 | 
			
		||||
    if (FIPS_mode())
 | 
			
		||||
	cert_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
			
		||||
    else
 | 
			
		||||
#endif
 | 
			
		||||
    cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
 | 
			
		||||
 | 
			
		||||
    enc = EVP_des_ede3_cbc();
 | 
			
		||||
    if (bio_err == NULL ) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
    args = argv + 1;
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@@ -159,15 +144,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    			cert_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
			
		||||
		else if (!strcmp (*args, "-export")) export_cert = 1;
 | 
			
		||||
		else if (!strcmp (*args, "-des")) enc=EVP_des_cbc();
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
		else if (!strcmp (*args, "-idea")) enc=EVP_idea_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
		else if (!strcmp (*args, "-des3")) enc = EVP_des_ede3_cbc();
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
		else if (!strcmp(*args,"-aes128")) enc=EVP_aes_128_cbc();
 | 
			
		||||
		else if (!strcmp(*args,"-aes192")) enc=EVP_aes_192_cbc();
 | 
			
		||||
		else if (!strcmp(*args,"-aes256")) enc=EVP_aes_256_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
		else if (!strcmp (*args, "-noiter")) iter = 1;
 | 
			
		||||
		else if (!strcmp (*args, "-maciter"))
 | 
			
		||||
					 maciter = PKCS12_DEFAULT_ITER;
 | 
			
		||||
@@ -214,11 +194,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			args++;	
 | 
			
		||||
			name = *args;
 | 
			
		||||
		    } else badarg = 1;
 | 
			
		||||
		} else if (!strcmp (*args, "-CSP")) {
 | 
			
		||||
		    if (args[1]) {
 | 
			
		||||
			args++;	
 | 
			
		||||
			csp_name = *args;
 | 
			
		||||
		    } else badarg = 1;
 | 
			
		||||
		} else if (!strcmp (*args, "-caname")) {
 | 
			
		||||
		    if (args[1]) {
 | 
			
		||||
			args++;	
 | 
			
		||||
@@ -261,13 +236,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			args++;	
 | 
			
		||||
			CAfile = *args;
 | 
			
		||||
		    } else badarg = 1;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		} else if (!strcmp(*args,"-engine")) {
 | 
			
		||||
		    if (args[1]) {
 | 
			
		||||
			args++;	
 | 
			
		||||
			engine = *args;
 | 
			
		||||
		    } else badarg = 1;
 | 
			
		||||
#endif
 | 
			
		||||
		} else badarg = 1;
 | 
			
		||||
 | 
			
		||||
	} else badarg = 1;
 | 
			
		||||
@@ -296,12 +264,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	BIO_printf (bio_err, "-info         give info about PKCS#12 structure.\n");
 | 
			
		||||
	BIO_printf (bio_err, "-des          encrypt private keys with DES\n");
 | 
			
		||||
	BIO_printf (bio_err, "-des3         encrypt private keys with triple DES (default)\n");
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
	BIO_printf (bio_err, "-idea         encrypt private keys with idea\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
	BIO_printf (bio_err, "-aes128, -aes192, -aes256\n");
 | 
			
		||||
	BIO_printf (bio_err, "              encrypt PEM output with cbc aes\n");
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf (bio_err, "-nodes        don't encrypt private keys\n");
 | 
			
		||||
	BIO_printf (bio_err, "-noiter       don't use encryption iteration\n");
 | 
			
		||||
@@ -315,19 +279,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	BIO_printf (bio_err, "-password p   set import/export password source\n");
 | 
			
		||||
	BIO_printf (bio_err, "-passin p     input file pass phrase source\n");
 | 
			
		||||
	BIO_printf (bio_err, "-passout p    output file pass phrase source\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	BIO_printf (bio_err, "-engine e     use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err,  "-rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
			
		||||
	BIO_printf(bio_err,  "              load the file (or the files in the directory) into\n");
 | 
			
		||||
	BIO_printf(bio_err,  "              the random number generator\n");
 | 
			
		||||
    	goto end;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
    e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if(passarg) {
 | 
			
		||||
	if(export_cert) passargout = passarg;
 | 
			
		||||
	else passargin = passarg;
 | 
			
		||||
@@ -372,7 +329,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	    goto end;
 | 
			
		||||
   }
 | 
			
		||||
 | 
			
		||||
#if 0
 | 
			
		||||
   if (certfile) {
 | 
			
		||||
    	if(!(certsin = BIO_new_file(certfile, "r"))) {
 | 
			
		||||
	    BIO_printf(bio_err, "Can't open certificate file %s\n", certfile);
 | 
			
		||||
@@ -388,7 +344,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	    goto end;
 | 
			
		||||
	}
 | 
			
		||||
     }
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef CRYPTO_MDEBUG
 | 
			
		||||
    CRYPTO_pop_info();
 | 
			
		||||
@@ -397,7 +352,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
    if (!outfile) {
 | 
			
		||||
	out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
	{
 | 
			
		||||
	    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
	    out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -414,7 +369,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#ifdef CRYPTO_MDEBUG
 | 
			
		||||
    CRYPTO_push_info("read MAC password");
 | 
			
		||||
#endif
 | 
			
		||||
	if(EVP_read_pw_string (macpass, sizeof macpass, "Enter MAC Password:", export_cert))
 | 
			
		||||
	if(EVP_read_pw_string (macpass, 50, "Enter MAC Password:", export_cert))
 | 
			
		||||
	{
 | 
			
		||||
    	    BIO_printf (bio_err, "Can't read Password\n");
 | 
			
		||||
    	    goto end;
 | 
			
		||||
@@ -442,9 +397,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	CRYPTO_push_info("process -export_cert");
 | 
			
		||||
	CRYPTO_push_info("reading private key");
 | 
			
		||||
#endif
 | 
			
		||||
	key = load_key(bio_err, keyname ? keyname : infile, FORMAT_PEM, 1,
 | 
			
		||||
		passin, e, "private key");
 | 
			
		||||
	key = PEM_read_bio_PrivateKey(inkey ? inkey : in, NULL, NULL, passin);
 | 
			
		||||
	if (!inkey) (void) BIO_reset(in);
 | 
			
		||||
	else BIO_free(inkey);
 | 
			
		||||
	if (!key) {
 | 
			
		||||
		BIO_printf (bio_err, "Error loading private key\n");
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto export_end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
@@ -453,9 +411,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	CRYPTO_push_info("reading certs from input");
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	certs = sk_X509_new_null();
 | 
			
		||||
 | 
			
		||||
	/* Load in all certs in input file */
 | 
			
		||||
	if(!(certs = load_certs(bio_err, infile, FORMAT_PEM, NULL, e,
 | 
			
		||||
		"certificates"))) {
 | 
			
		||||
	if(!cert_load(in, certs)) {
 | 
			
		||||
		BIO_printf(bio_err, "Error loading certificates from input\n");
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto export_end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
@@ -485,17 +446,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	bags = sk_PKCS12_SAFEBAG_new_null ();
 | 
			
		||||
 | 
			
		||||
	/* Add any more certificates asked for */
 | 
			
		||||
	if (certfile) {
 | 
			
		||||
		STACK_OF(X509) *morecerts=NULL;
 | 
			
		||||
		if(!(morecerts = load_certs(bio_err, certfile, FORMAT_PEM,
 | 
			
		||||
					    NULL, e,
 | 
			
		||||
					    "certificates from certfile"))) {
 | 
			
		||||
	if (certsin) {
 | 
			
		||||
		if(!cert_load(certsin, certs)) {
 | 
			
		||||
			BIO_printf(bio_err, "Error loading certificates from certfile\n");
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto export_end;
 | 
			
		||||
		}
 | 
			
		||||
		while(sk_X509_num(morecerts) > 0) {
 | 
			
		||||
			sk_X509_push(certs, sk_X509_shift(morecerts));
 | 
			
		||||
		}
 | 
			
		||||
		sk_X509_free(morecerts);
 | 
			
		||||
	    	BIO_free(certsin);
 | 
			
		||||
 	}
 | 
			
		||||
 | 
			
		||||
#ifdef CRYPTO_MDEBUG
 | 
			
		||||
@@ -523,10 +480,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		    /* Exclude verified certificate */
 | 
			
		||||
		    for (i = 1; i < sk_X509_num (chain2) ; i++) 
 | 
			
		||||
			sk_X509_push(certs, sk_X509_value (chain2, i));
 | 
			
		||||
		    /* Free first certificate */
 | 
			
		||||
		    X509_free(sk_X509_value(chain2, 0));
 | 
			
		||||
		}
 | 
			
		||||
		sk_X509_free(chain2);
 | 
			
		||||
		} else {
 | 
			
		||||
		if (vret) {
 | 
			
		||||
			BIO_printf (bio_err, "Error %s getting chain.\n",
 | 
			
		||||
					X509_verify_cert_error_string(vret));
 | 
			
		||||
			goto export_end;
 | 
			
		||||
@@ -542,7 +498,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	for(i = 0; i < sk_X509_num(certs); i++) {
 | 
			
		||||
		X509 *cert = NULL;
 | 
			
		||||
		cert = sk_X509_value(certs, i);
 | 
			
		||||
		bag = PKCS12_x5092certbag(cert);
 | 
			
		||||
		bag = M_PKCS12_x5092certbag(cert);
 | 
			
		||||
		/* If it matches private key set id */
 | 
			
		||||
		if(cert == ucert) {
 | 
			
		||||
			if(name) PKCS12_add_friendlyname(bag, name, -1);
 | 
			
		||||
@@ -553,6 +509,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	}
 | 
			
		||||
	sk_X509_pop_free(certs, X509_free);
 | 
			
		||||
	certs = NULL;
 | 
			
		||||
	/* ucert is part of certs so it is already freed */
 | 
			
		||||
	ucert = NULL;
 | 
			
		||||
 | 
			
		||||
#ifdef CRYPTO_MDEBUG
 | 
			
		||||
	CRYPTO_pop_info();
 | 
			
		||||
@@ -560,11 +518,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if(!noprompt &&
 | 
			
		||||
		EVP_read_pw_string(pass, sizeof pass, "Enter Export Password:", 1)) {
 | 
			
		||||
		EVP_read_pw_string(pass, 50, "Enter Export Password:", 1)) {
 | 
			
		||||
	    BIO_printf (bio_err, "Can't read Password\n");
 | 
			
		||||
	    goto export_end;
 | 
			
		||||
        }
 | 
			
		||||
	if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass);
 | 
			
		||||
	if (!twopass) strcpy(macpass, pass);
 | 
			
		||||
	/* Turn certbags into encrypted authsafe */
 | 
			
		||||
	authsafe = PKCS12_pack_p7encdata(cert_pbe, cpass, -1, NULL, 0,
 | 
			
		||||
								 iter, bags);
 | 
			
		||||
@@ -591,7 +549,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	PKCS8_PRIV_KEY_INFO_free(p8);
 | 
			
		||||
	p8 = NULL;
 | 
			
		||||
        if (name) PKCS12_add_friendlyname (bag, name, -1);
 | 
			
		||||
	if(csp_name) PKCS12_add_CSPName_asc(bag, csp_name, -1);
 | 
			
		||||
	PKCS12_add_localkeyid (bag, keyid, keyidlen);
 | 
			
		||||
	bags = sk_PKCS12_SAFEBAG_new_null();
 | 
			
		||||
	sk_PKCS12_SAFEBAG_push (bags, bag);
 | 
			
		||||
@@ -614,7 +571,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
	p12 = PKCS12_init (NID_pkcs7_data);
 | 
			
		||||
 | 
			
		||||
	PKCS12_pack_authsafes(p12, safes);
 | 
			
		||||
	M_PKCS12_pack_authsafes (p12, safes);
 | 
			
		||||
 | 
			
		||||
	sk_PKCS7_pop_free(safes, PKCS7_free);
 | 
			
		||||
	safes = NULL;
 | 
			
		||||
@@ -641,6 +598,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	if (certs) sk_X509_pop_free(certs, X509_free);
 | 
			
		||||
	if (safes) sk_PKCS7_pop_free(safes, PKCS7_free);
 | 
			
		||||
	if (bags) sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
 | 
			
		||||
	if (ucert) X509_free(ucert);
 | 
			
		||||
 | 
			
		||||
#ifdef CRYPTO_MDEBUG
 | 
			
		||||
	CRYPTO_pop_info();
 | 
			
		||||
@@ -657,7 +615,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#ifdef CRYPTO_MDEBUG
 | 
			
		||||
    CRYPTO_push_info("read import password");
 | 
			
		||||
#endif
 | 
			
		||||
    if(!noprompt && EVP_read_pw_string(pass, sizeof pass, "Enter Import Password:", 0)) {
 | 
			
		||||
    if(!noprompt && EVP_read_pw_string(pass, 50, "Enter Import Password:", 0)) {
 | 
			
		||||
	BIO_printf (bio_err, "Can't read Password\n");
 | 
			
		||||
	goto end;
 | 
			
		||||
    }
 | 
			
		||||
@@ -665,7 +623,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    CRYPTO_pop_info();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
    if (!twopass) BUF_strlcpy(macpass, pass, sizeof macpass);
 | 
			
		||||
    if (!twopass) strcpy(macpass, pass);
 | 
			
		||||
 | 
			
		||||
    if (options & INFO) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN1_INTEGER_get (p12->mac->iter) : 1);
 | 
			
		||||
    if(macver) {
 | 
			
		||||
@@ -673,7 +631,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    CRYPTO_push_info("verify MAC");
 | 
			
		||||
#endif
 | 
			
		||||
	/* If we enter empty password try no password first */
 | 
			
		||||
	if(!mpass[0] && PKCS12_verify_mac(p12, NULL, 0)) {
 | 
			
		||||
	if(!macpass[0] && PKCS12_verify_mac(p12, NULL, 0)) {
 | 
			
		||||
		/* If mac and crypto pass the same set it to NULL too */
 | 
			
		||||
		if(!twopass) cpass = NULL;
 | 
			
		||||
	} else if (!PKCS12_verify_mac(p12, mpass, -1)) {
 | 
			
		||||
@@ -710,25 +668,23 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
    if (canames) sk_free(canames);
 | 
			
		||||
    if(passin) OPENSSL_free(passin);
 | 
			
		||||
    if(passout) OPENSSL_free(passout);
 | 
			
		||||
    apps_shutdown();
 | 
			
		||||
    OPENSSL_EXIT(ret);
 | 
			
		||||
    EXIT(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass,
 | 
			
		||||
	     int passlen, int options, char *pempass)
 | 
			
		||||
{
 | 
			
		||||
	STACK_OF(PKCS7) *asafes = NULL;
 | 
			
		||||
	STACK_OF(PKCS7) *asafes;
 | 
			
		||||
	STACK_OF(PKCS12_SAFEBAG) *bags;
 | 
			
		||||
	int i, bagnid;
 | 
			
		||||
	int ret = 0;
 | 
			
		||||
	PKCS7 *p7;
 | 
			
		||||
 | 
			
		||||
	if (!( asafes = PKCS12_unpack_authsafes(p12))) return 0;
 | 
			
		||||
	if (!( asafes = M_PKCS12_unpack_authsafes (p12))) return 0;
 | 
			
		||||
	for (i = 0; i < sk_PKCS7_num (asafes); i++) {
 | 
			
		||||
		p7 = sk_PKCS7_value (asafes, i);
 | 
			
		||||
		bagnid = OBJ_obj2nid (p7->type);
 | 
			
		||||
		if (bagnid == NID_pkcs7_data) {
 | 
			
		||||
			bags = PKCS12_unpack_p7data(p7);
 | 
			
		||||
			bags = M_PKCS12_unpack_p7data (p7);
 | 
			
		||||
			if (options & INFO) BIO_printf (bio_err, "PKCS7 Data\n");
 | 
			
		||||
		} else if (bagnid == NID_pkcs7_encrypted) {
 | 
			
		||||
			if (options & INFO) {
 | 
			
		||||
@@ -736,24 +692,18 @@ int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass,
 | 
			
		||||
				alg_print (bio_err, 
 | 
			
		||||
					p7->d.encrypted->enc_data->algorithm);
 | 
			
		||||
			}
 | 
			
		||||
			bags = PKCS12_unpack_p7encdata(p7, pass, passlen);
 | 
			
		||||
			bags = M_PKCS12_unpack_p7encdata (p7, pass, passlen);
 | 
			
		||||
		} else continue;
 | 
			
		||||
		if (!bags) goto err;
 | 
			
		||||
		if (!bags) return 0;
 | 
			
		||||
	    	if (!dump_certs_pkeys_bags (out, bags, pass, passlen, 
 | 
			
		||||
						 options, pempass)) {
 | 
			
		||||
			sk_PKCS12_SAFEBAG_pop_free (bags, PKCS12_SAFEBAG_free);
 | 
			
		||||
			goto err;
 | 
			
		||||
			return 0;
 | 
			
		||||
		}
 | 
			
		||||
		sk_PKCS12_SAFEBAG_pop_free (bags, PKCS12_SAFEBAG_free);
 | 
			
		||||
		bags = NULL;
 | 
			
		||||
	}
 | 
			
		||||
	ret = 1;
 | 
			
		||||
 | 
			
		||||
	err:
 | 
			
		||||
 | 
			
		||||
	if (asafes)
 | 
			
		||||
	sk_PKCS7_pop_free (asafes, PKCS7_free);
 | 
			
		||||
	return ret;
 | 
			
		||||
	return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
int dump_certs_pkeys_bags (BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags,
 | 
			
		||||
@@ -797,7 +747,7 @@ int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
 | 
			
		||||
		}
 | 
			
		||||
		if (options & NOKEYS) return 1;
 | 
			
		||||
		print_attribs (out, bag->attrib, "Bag Attributes");
 | 
			
		||||
		if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
 | 
			
		||||
		if (!(p8 = M_PKCS12_decrypt_skey (bag, pass, passlen)))
 | 
			
		||||
				return 0;
 | 
			
		||||
		if (!(pkey = EVP_PKCS82PKEY (p8))) {
 | 
			
		||||
			PKCS8_PRIV_KEY_INFO_free(p8);
 | 
			
		||||
@@ -818,7 +768,7 @@ int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
 | 
			
		||||
		print_attribs (out, bag->attrib, "Bag Attributes");
 | 
			
		||||
		if (M_PKCS12_cert_bag_type(bag) != NID_x509Certificate )
 | 
			
		||||
								 return 1;
 | 
			
		||||
		if (!(x509 = PKCS12_certbag2x509(bag))) return 0;
 | 
			
		||||
		if (!(x509 = M_PKCS12_certbag2x509(bag))) return 0;
 | 
			
		||||
		dump_cert_text (out, x509);
 | 
			
		||||
		PEM_write_bio_X509 (out, x509);
 | 
			
		||||
		X509_free(x509);
 | 
			
		||||
@@ -850,9 +800,6 @@ int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain)
 | 
			
		||||
	STACK_OF(X509) *chn;
 | 
			
		||||
	int i;
 | 
			
		||||
 | 
			
		||||
	/* FIXME: Should really check the return status of X509_STORE_CTX_init
 | 
			
		||||
	 * for an error, but how that fits into the return value of this
 | 
			
		||||
	 * function is less obvious. */
 | 
			
		||||
	X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
 | 
			
		||||
	if (X509_verify_cert(&store_ctx) <= 0) {
 | 
			
		||||
		i = X509_STORE_CTX_get_error (&store_ctx);
 | 
			
		||||
@@ -873,12 +820,10 @@ int alg_print (BIO *x, X509_ALGOR *alg)
 | 
			
		||||
	unsigned char *p;
 | 
			
		||||
	p = alg->parameter->value.sequence->data;
 | 
			
		||||
	pbe = d2i_PBEPARAM (NULL, &p, alg->parameter->value.sequence->length);
 | 
			
		||||
	if (!pbe)
 | 
			
		||||
		return 1;
 | 
			
		||||
	BIO_printf (bio_err, "%s, Iteration %d\n", 
 | 
			
		||||
	OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)), ASN1_INTEGER_get(pbe->iter));
 | 
			
		||||
	PBEPARAM_free (pbe);
 | 
			
		||||
	return 1;
 | 
			
		||||
	return 0;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
/* Load all certificates from a given file */
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										31
									
								
								apps/pkcs7.c
									
									
									
									
									
								
							
							
						
						
									
										31
									
								
								apps/pkcs7.c
									
									
									
									
									
								
							@@ -82,9 +82,6 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	PKCS7 *p7=NULL;
 | 
			
		||||
	int i,badops=0;
 | 
			
		||||
	BIO *in=NULL,*out=NULL;
 | 
			
		||||
@@ -92,9 +89,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char *infile,*outfile,*prog;
 | 
			
		||||
	int print_certs=0,text=0,noout=0;
 | 
			
		||||
	int ret=1;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -102,9 +96,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	infile=NULL;
 | 
			
		||||
	outfile=NULL;
 | 
			
		||||
	informat=FORMAT_PEM;
 | 
			
		||||
@@ -141,13 +132,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			text=1;
 | 
			
		||||
		else if (strcmp(*argv,"-print_certs") == 0)
 | 
			
		||||
			print_certs=1;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
			
		||||
@@ -170,19 +154,11 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err," -print_certs  print any certs or crl in the input\n");
 | 
			
		||||
		BIO_printf(bio_err," -text         print full details of certificates\n");
 | 
			
		||||
		BIO_printf(bio_err," -noout        don't output encoded data\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e     use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		ret = 1;
 | 
			
		||||
		goto end;
 | 
			
		||||
		EXIT(1);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	in=BIO_new(BIO_s_file());
 | 
			
		||||
	out=BIO_new(BIO_s_file());
 | 
			
		||||
	if ((in == NULL) || (out == NULL))
 | 
			
		||||
@@ -222,7 +198,7 @@ bad:
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -313,6 +289,5 @@ end:
 | 
			
		||||
	if (p7 != NULL) PKCS7_free(p7);
 | 
			
		||||
	if (in != NULL) BIO_free(in);
 | 
			
		||||
	if (out != NULL) BIO_free_all(out);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										290
									
								
								apps/pkcs8.c
									
									
									
									
									
								
							
							
						
						
									
										290
									
								
								apps/pkcs8.c
									
									
									
									
									
								
							@@ -1,6 +1,6 @@
 | 
			
		||||
/* pkcs8.c */
 | 
			
		||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
			
		||||
 * project 1999-2004.
 | 
			
		||||
 * project 1999.
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
@@ -63,13 +63,13 @@
 | 
			
		||||
#include <openssl/evp.h>
 | 
			
		||||
#include <openssl/pkcs12.h>
 | 
			
		||||
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#define PROG pkcs8_main
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
	char **args, *infile = NULL, *outfile = NULL;
 | 
			
		||||
	char *passargin = NULL, *passargout = NULL;
 | 
			
		||||
	BIO *in = NULL, *out = NULL;
 | 
			
		||||
@@ -82,88 +82,52 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	int nocrypt = 0;
 | 
			
		||||
	X509_SIG *p8;
 | 
			
		||||
	PKCS8_PRIV_KEY_INFO *p8inf;
 | 
			
		||||
	EVP_PKEY *pkey=NULL;
 | 
			
		||||
	EVP_PKEY *pkey;
 | 
			
		||||
	char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
 | 
			
		||||
	int badarg = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (bio_err == NULL) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	informat=FORMAT_PEM;
 | 
			
		||||
	outformat=FORMAT_PEM;
 | 
			
		||||
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
	OpenSSL_add_all_algorithms();
 | 
			
		||||
	args = argv + 1;
 | 
			
		||||
	while (!badarg && *args && *args[0] == '-')
 | 
			
		||||
		{
 | 
			
		||||
		if (!strcmp(*args,"-v2"))
 | 
			
		||||
			{
 | 
			
		||||
			if (args[1])
 | 
			
		||||
				{
 | 
			
		||||
	while (!badarg && *args && *args[0] == '-') {
 | 
			
		||||
		if (!strcmp(*args,"-v2")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
				cipher=EVP_get_cipherbyname(*args);
 | 
			
		||||
				if (!cipher)
 | 
			
		||||
					{
 | 
			
		||||
				if(!cipher) {
 | 
			
		||||
					BIO_printf(bio_err,
 | 
			
		||||
						 "Unknown cipher %s\n", *args);
 | 
			
		||||
					badarg = 1;
 | 
			
		||||
				}
 | 
			
		||||
				}
 | 
			
		||||
			else
 | 
			
		||||
				badarg = 1;
 | 
			
		||||
			}
 | 
			
		||||
		else if (!strcmp(*args,"-v1"))
 | 
			
		||||
			{
 | 
			
		||||
			if (args[1])
 | 
			
		||||
				{
 | 
			
		||||
			} else badarg = 1;
 | 
			
		||||
		} else if (!strcmp(*args,"-v1")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
				pbe_nid=OBJ_txt2nid(*args);
 | 
			
		||||
				if (pbe_nid == NID_undef)
 | 
			
		||||
					{
 | 
			
		||||
				if(pbe_nid == NID_undef) {
 | 
			
		||||
					BIO_printf(bio_err,
 | 
			
		||||
						 "Unknown PBE algorithm %s\n", *args);
 | 
			
		||||
					badarg = 1;
 | 
			
		||||
				}
 | 
			
		||||
				}
 | 
			
		||||
			else
 | 
			
		||||
				badarg = 1;
 | 
			
		||||
			}
 | 
			
		||||
		else if (!strcmp(*args,"-inform"))
 | 
			
		||||
			{
 | 
			
		||||
			if (args[1])
 | 
			
		||||
				{
 | 
			
		||||
			} else badarg = 1;
 | 
			
		||||
		} else if (!strcmp(*args,"-inform")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
				informat=str2fmt(*args);
 | 
			
		||||
				}
 | 
			
		||||
			else badarg = 1;
 | 
			
		||||
			}
 | 
			
		||||
		else if (!strcmp(*args,"-outform"))
 | 
			
		||||
			{
 | 
			
		||||
			if (args[1])
 | 
			
		||||
				{
 | 
			
		||||
			} else badarg = 1;
 | 
			
		||||
		} else if (!strcmp(*args,"-outform")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
				outformat=str2fmt(*args);
 | 
			
		||||
				}
 | 
			
		||||
			else badarg = 1;
 | 
			
		||||
			}
 | 
			
		||||
		else if (!strcmp (*args, "-topk8"))
 | 
			
		||||
			topk8 = 1;
 | 
			
		||||
		else if (!strcmp (*args, "-noiter"))
 | 
			
		||||
			iter = 1;
 | 
			
		||||
		else if (!strcmp (*args, "-nocrypt"))
 | 
			
		||||
			nocrypt = 1;
 | 
			
		||||
		else if (!strcmp (*args, "-nooct"))
 | 
			
		||||
			p8_broken = PKCS8_NO_OCTET;
 | 
			
		||||
		else if (!strcmp (*args, "-nsdb"))
 | 
			
		||||
			p8_broken = PKCS8_NS_DB;
 | 
			
		||||
		else if (!strcmp (*args, "-embed"))
 | 
			
		||||
			p8_broken = PKCS8_EMBEDDED_PARAM;
 | 
			
		||||
			} else badarg = 1;
 | 
			
		||||
		} else if (!strcmp (*args, "-topk8")) topk8 = 1;
 | 
			
		||||
		else if (!strcmp (*args, "-noiter")) iter = 1;
 | 
			
		||||
		else if (!strcmp (*args, "-nocrypt")) nocrypt = 1;
 | 
			
		||||
		else if (!strcmp (*args, "-nooct")) p8_broken = PKCS8_NO_OCTET;
 | 
			
		||||
		else if (!strcmp (*args, "-nsdb")) p8_broken = PKCS8_NS_DB;
 | 
			
		||||
		else if (!strcmp (*args, "-embed")) p8_broken = PKCS8_EMBEDDED_PARAM;
 | 
			
		||||
		else if (!strcmp(*args,"-passin"))
 | 
			
		||||
			{
 | 
			
		||||
			if (!args[1]) goto bad;
 | 
			
		||||
@@ -174,37 +138,21 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (!args[1]) goto bad;
 | 
			
		||||
			passargout= *(++args);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*args,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (!args[1]) goto bad;
 | 
			
		||||
			engine= *(++args);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (!strcmp (*args, "-in"))
 | 
			
		||||
			{
 | 
			
		||||
			if (args[1])
 | 
			
		||||
				{
 | 
			
		||||
		else if (!strcmp (*args, "-in")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
				infile = *args;
 | 
			
		||||
				}
 | 
			
		||||
			else badarg = 1;
 | 
			
		||||
			}
 | 
			
		||||
		else if (!strcmp (*args, "-out"))
 | 
			
		||||
			{
 | 
			
		||||
			if (args[1])
 | 
			
		||||
				{
 | 
			
		||||
			} else badarg = 1;
 | 
			
		||||
		} else if (!strcmp (*args, "-out")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
				outfile = *args;
 | 
			
		||||
				}
 | 
			
		||||
			else badarg = 1;
 | 
			
		||||
			}
 | 
			
		||||
		else badarg = 1;
 | 
			
		||||
			} else badarg = 1;
 | 
			
		||||
		} else badarg = 1;
 | 
			
		||||
		args++;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (badarg)
 | 
			
		||||
		{
 | 
			
		||||
	if (badarg) {
 | 
			
		||||
		bad:
 | 
			
		||||
		BIO_printf(bio_err, "Usage pkcs8 [options]\n");
 | 
			
		||||
		BIO_printf(bio_err, "where options are\n");
 | 
			
		||||
@@ -222,114 +170,81 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf(bio_err, "-nocrypt        use or expect unencrypted private key\n");
 | 
			
		||||
		BIO_printf(bio_err, "-v2 alg         use PKCS#5 v2.0 and cipher \"alg\"\n");
 | 
			
		||||
		BIO_printf(bio_err, "-v1 obj         use PKCS#5 v1.5 and cipher \"alg\"\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		return 1;
 | 
			
		||||
		return (1);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (!app_passwd(bio_err, passargin, passargout, &passin, &passout))
 | 
			
		||||
		{
 | 
			
		||||
	if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
			
		||||
		BIO_printf(bio_err, "Error getting passwords\n");
 | 
			
		||||
		return 1;
 | 
			
		||||
		return (1);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if ((pbe_nid == -1) && !cipher)
 | 
			
		||||
		pbe_nid = NID_pbeWithMD5AndDES_CBC;
 | 
			
		||||
	if ((pbe_nid == -1) && !cipher) pbe_nid = NID_pbeWithMD5AndDES_CBC;
 | 
			
		||||
 | 
			
		||||
	if (infile)
 | 
			
		||||
		{
 | 
			
		||||
		if (!(in = BIO_new_file(infile, "rb")))
 | 
			
		||||
			{
 | 
			
		||||
	if (infile) {
 | 
			
		||||
		if (!(in = BIO_new_file(infile, "rb"))) {
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				 "Can't open input file %s\n", infile);
 | 
			
		||||
			return (1);
 | 
			
		||||
		}
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		in = BIO_new_fp (stdin, BIO_NOCLOSE);
 | 
			
		||||
	} else in = BIO_new_fp (stdin, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
	if (outfile)
 | 
			
		||||
		{
 | 
			
		||||
		if (!(out = BIO_new_file (outfile, "wb")))
 | 
			
		||||
			{
 | 
			
		||||
	if (outfile) {
 | 
			
		||||
		if (!(out = BIO_new_file (outfile, "wb"))) {
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				 "Can't open output file %s\n", outfile);
 | 
			
		||||
			return (1);
 | 
			
		||||
		}
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
	} else {
 | 
			
		||||
		out = BIO_new_fp (stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
			BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
			out = BIO_push(tmpbio, out);
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
	}
 | 
			
		||||
	if (topk8)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_free(in); /* Not needed in this section */
 | 
			
		||||
		pkey = load_key(bio_err, infile, informat, 1,
 | 
			
		||||
			passin, e, "key");
 | 
			
		||||
		if (!pkey)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_free_all(out);
 | 
			
		||||
			return 1;
 | 
			
		||||
	if (topk8) {
 | 
			
		||||
		if(informat == FORMAT_PEM)
 | 
			
		||||
			pkey = PEM_read_bio_PrivateKey(in, NULL, NULL, passin);
 | 
			
		||||
		else if(informat == FORMAT_ASN1)
 | 
			
		||||
			pkey = d2i_PrivateKey_bio(in, NULL);
 | 
			
		||||
		else {
 | 
			
		||||
			BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
			return (1);
 | 
			
		||||
		}
 | 
			
		||||
		if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken)))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err, "Error converting key\n");
 | 
			
		||||
		if (!pkey) {
 | 
			
		||||
			BIO_printf(bio_err, "Error reading key\n", outfile);
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			EVP_PKEY_free(pkey);
 | 
			
		||||
			BIO_free_all(out);
 | 
			
		||||
			return 1;
 | 
			
		||||
			return (1);
 | 
			
		||||
		}
 | 
			
		||||
		if (nocrypt)
 | 
			
		||||
			{
 | 
			
		||||
		BIO_free(in);
 | 
			
		||||
		if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken))) {
 | 
			
		||||
			BIO_printf(bio_err, "Error converting key\n", outfile);
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			return (1);
 | 
			
		||||
		}
 | 
			
		||||
		if(nocrypt) {
 | 
			
		||||
			if(outformat == FORMAT_PEM) 
 | 
			
		||||
				PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf);
 | 
			
		||||
			else if(outformat == FORMAT_ASN1)
 | 
			
		||||
				i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8inf);
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
			else {
 | 
			
		||||
				BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
				PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
				EVP_PKEY_free(pkey);
 | 
			
		||||
				BIO_free_all(out);
 | 
			
		||||
				return (1);
 | 
			
		||||
			}
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			if (passout)
 | 
			
		||||
				p8pass = passout;
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
		} else {
 | 
			
		||||
			if(passout) p8pass = passout;
 | 
			
		||||
			else {
 | 
			
		||||
				p8pass = pass;
 | 
			
		||||
				if (EVP_read_pw_string(pass, sizeof pass, "Enter Encryption Password:", 1))
 | 
			
		||||
					{
 | 
			
		||||
					PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
					EVP_PKEY_free(pkey);
 | 
			
		||||
					BIO_free_all(out);
 | 
			
		||||
					return (1);
 | 
			
		||||
					}
 | 
			
		||||
				EVP_read_pw_string(pass, 50, "Enter Encryption Password:", 1);
 | 
			
		||||
			}
 | 
			
		||||
			app_RAND_load_file(NULL, bio_err, 0);
 | 
			
		||||
			if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
 | 
			
		||||
					p8pass, strlen(p8pass),
 | 
			
		||||
					NULL, 0, iter, p8inf)))
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err, "Error encrypting key\n");
 | 
			
		||||
					NULL, 0, iter, p8inf))) {
 | 
			
		||||
				BIO_printf(bio_err, "Error encrypting key\n",
 | 
			
		||||
								 outfile);
 | 
			
		||||
				ERR_print_errors(bio_err);
 | 
			
		||||
				PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
				EVP_PKEY_free(pkey);
 | 
			
		||||
				BIO_free_all(out);
 | 
			
		||||
				return (1);
 | 
			
		||||
			}
 | 
			
		||||
			app_RAND_write_file(NULL, bio_err);
 | 
			
		||||
@@ -337,87 +252,68 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
				PEM_write_bio_PKCS8(out, p8);
 | 
			
		||||
			else if(outformat == FORMAT_ASN1)
 | 
			
		||||
				i2d_PKCS8_bio(out, p8);
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
			else {
 | 
			
		||||
				BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
				PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
			
		||||
				EVP_PKEY_free(pkey);
 | 
			
		||||
				BIO_free_all(out);
 | 
			
		||||
				return (1);
 | 
			
		||||
			}
 | 
			
		||||
			X509_SIG_free(p8);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		PKCS8_PRIV_KEY_INFO_free (p8inf);
 | 
			
		||||
		EVP_PKEY_free(pkey);
 | 
			
		||||
		BIO_free_all(out);
 | 
			
		||||
		if (passin)
 | 
			
		||||
			OPENSSL_free(passin);
 | 
			
		||||
		if (passout)
 | 
			
		||||
			OPENSSL_free(passout);
 | 
			
		||||
		if(passin) OPENSSL_free(passin);
 | 
			
		||||
		if(passout) OPENSSL_free(passout);
 | 
			
		||||
		return (0);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (nocrypt)
 | 
			
		||||
		{
 | 
			
		||||
	if(nocrypt) {
 | 
			
		||||
		if(informat == FORMAT_PEM) 
 | 
			
		||||
			p8inf = PEM_read_bio_PKCS8_PRIV_KEY_INFO(in,NULL,NULL, NULL);
 | 
			
		||||
		else if(informat == FORMAT_ASN1)
 | 
			
		||||
			p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(in, NULL);
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
		else {
 | 
			
		||||
			BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
			return (1);
 | 
			
		||||
		}
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
	} else {
 | 
			
		||||
		if(informat == FORMAT_PEM) 
 | 
			
		||||
			p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL);
 | 
			
		||||
		else if(informat == FORMAT_ASN1)
 | 
			
		||||
			p8 = d2i_PKCS8_bio(in, NULL);
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
		else {
 | 
			
		||||
			BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
			return (1);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if (!p8)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf (bio_err, "Error reading key\n");
 | 
			
		||||
		if (!p8) {
 | 
			
		||||
			BIO_printf (bio_err, "Error reading key\n", outfile);
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			return (1);
 | 
			
		||||
		}
 | 
			
		||||
		if (passin)
 | 
			
		||||
			p8pass = passin;
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
		if(passin) p8pass = passin;
 | 
			
		||||
		else {
 | 
			
		||||
			p8pass = pass;
 | 
			
		||||
			EVP_read_pw_string(pass, sizeof pass, "Enter Password:", 0);
 | 
			
		||||
			EVP_read_pw_string(pass, 50, "Enter Password:", 0);
 | 
			
		||||
		}
 | 
			
		||||
		p8inf = PKCS8_decrypt(p8, p8pass, strlen(p8pass));
 | 
			
		||||
		p8inf = M_PKCS8_decrypt(p8, p8pass, strlen(p8pass));
 | 
			
		||||
		X509_SIG_free(p8);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (!p8inf)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "Error decrypting key\n");
 | 
			
		||||
	if (!p8inf) {
 | 
			
		||||
		BIO_printf(bio_err, "Error decrypting key\n", outfile);
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		return (1);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (!(pkey = EVP_PKCS82PKEY(p8inf)))
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err, "Error converting key\n");
 | 
			
		||||
	if (!(pkey = EVP_PKCS82PKEY(p8inf))) {
 | 
			
		||||
		BIO_printf(bio_err, "Error converting key\n", outfile);
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		return (1);
 | 
			
		||||
	}
 | 
			
		||||
	
 | 
			
		||||
	if (p8inf->broken)
 | 
			
		||||
		{
 | 
			
		||||
	if (p8inf->broken) {
 | 
			
		||||
		BIO_printf(bio_err, "Warning: broken key encoding: ");
 | 
			
		||||
		switch (p8inf->broken)
 | 
			
		||||
			{
 | 
			
		||||
		switch (p8inf->broken) {
 | 
			
		||||
			case PKCS8_NO_OCTET:
 | 
			
		||||
			BIO_printf(bio_err, "No Octet String in PrivateKey\n");
 | 
			
		||||
			break;
 | 
			
		||||
@@ -441,20 +337,16 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
 | 
			
		||||
	else if(outformat == FORMAT_ASN1)
 | 
			
		||||
		i2d_PrivateKey_bio(out, pkey);
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
	else {
 | 
			
		||||
		BIO_printf(bio_err, "Bad format specified for key\n");
 | 
			
		||||
			return (1);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	end:
 | 
			
		||||
	EVP_PKEY_free(pkey);
 | 
			
		||||
	BIO_free_all(out);
 | 
			
		||||
	BIO_free(in);
 | 
			
		||||
	if (passin)
 | 
			
		||||
		OPENSSL_free(passin);
 | 
			
		||||
	if (passout)
 | 
			
		||||
		OPENSSL_free(passout);
 | 
			
		||||
	if(passin) OPENSSL_free(passin);
 | 
			
		||||
	if(passout) OPENSSL_free(passout);
 | 
			
		||||
 | 
			
		||||
	return (0);
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										128
									
								
								apps/prime.c
									
									
									
									
									
								
							
							
						
						
									
										128
									
								
								apps/prime.c
									
									
									
									
									
								
							@@ -1,128 +0,0 @@
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 2004 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    openssl-core@openssl.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <string.h>
 | 
			
		||||
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/bn.h>
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG prime_main
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
    {
 | 
			
		||||
    int hex=0;
 | 
			
		||||
    int checks=20;
 | 
			
		||||
    BIGNUM *bn=NULL;
 | 
			
		||||
    BIO *bio_out;
 | 
			
		||||
 | 
			
		||||
    apps_startup();
 | 
			
		||||
 | 
			
		||||
    if (bio_err == NULL)
 | 
			
		||||
	if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
	    BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
    --argc;
 | 
			
		||||
    ++argv;
 | 
			
		||||
    while (argc >= 1 && **argv == '-')
 | 
			
		||||
	{
 | 
			
		||||
	if(!strcmp(*argv,"-hex"))
 | 
			
		||||
	    hex=1;
 | 
			
		||||
	else if(!strcmp(*argv,"-checks"))
 | 
			
		||||
	    if(--argc < 1)
 | 
			
		||||
		goto bad;
 | 
			
		||||
	    else
 | 
			
		||||
		checks=atoi(*++argv);
 | 
			
		||||
	else
 | 
			
		||||
	    {
 | 
			
		||||
	    BIO_printf(bio_err,"Unknown option '%s'\n",*argv);
 | 
			
		||||
	    goto bad;
 | 
			
		||||
	    }
 | 
			
		||||
	--argc;
 | 
			
		||||
	++argv;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
    if (argv[0] == NULL)
 | 
			
		||||
	{
 | 
			
		||||
	BIO_printf(bio_err,"No prime specified\n");
 | 
			
		||||
	goto bad;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
   if ((bio_out=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
	{
 | 
			
		||||
	BIO_set_fp(bio_out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
	    {
 | 
			
		||||
	    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
	    bio_out = BIO_push(tmpbio, bio_out);
 | 
			
		||||
	    }
 | 
			
		||||
#endif
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
    if(hex)
 | 
			
		||||
	BN_hex2bn(&bn,argv[0]);
 | 
			
		||||
    else
 | 
			
		||||
	BN_dec2bn(&bn,argv[0]);
 | 
			
		||||
 | 
			
		||||
    BN_print(bio_out,bn);
 | 
			
		||||
    BIO_printf(bio_out," is %sprime\n",
 | 
			
		||||
	       BN_is_prime(bn,checks,NULL,NULL,NULL) ? "" : "not ");
 | 
			
		||||
 | 
			
		||||
    BN_free(bn);
 | 
			
		||||
    BIO_free_all(bio_out);
 | 
			
		||||
 | 
			
		||||
    return 0;
 | 
			
		||||
 | 
			
		||||
    bad:
 | 
			
		||||
    BIO_printf(bio_err,"options are\n");
 | 
			
		||||
    BIO_printf(bio_err,"%-14s hex\n","-hex");
 | 
			
		||||
    BIO_printf(bio_err,"%-14s number of checks\n","-checks <n>");
 | 
			
		||||
    return 1;
 | 
			
		||||
    }
 | 
			
		||||
							
								
								
									
										162
									
								
								apps/progs.h
									
									
									
									
									
								
							
							
						
						
									
										162
									
								
								apps/progs.h
									
									
									
									
									
								
							@@ -35,11 +35,6 @@ extern int pkcs8_main(int argc,char *argv[]);
 | 
			
		||||
extern int spkac_main(int argc,char *argv[]);
 | 
			
		||||
extern int smime_main(int argc,char *argv[]);
 | 
			
		||||
extern int rand_main(int argc,char *argv[]);
 | 
			
		||||
extern int prime_main(int argc,char *argv[]);
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
extern int engine_main(int argc,char *argv[]);
 | 
			
		||||
#endif
 | 
			
		||||
extern int ocsp_main(int argc,char *argv[]);
 | 
			
		||||
 | 
			
		||||
#define FUNC_TYPE_GENERAL	1
 | 
			
		||||
#define FUNC_TYPE_MD		2
 | 
			
		||||
@@ -56,244 +51,205 @@ FUNCTION functions[] = {
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"asn1parse",asn1parse_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"req",req_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"dgst",dgst_main},
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"dh",dh_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"dhparam",dhparam_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"enc",enc_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"passwd",passwd_main},
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"gendh",gendh_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"errstr",errstr_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"ca",ca_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"crl",crl_main},
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#ifndef NO_RSA
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"rsa",rsa_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#ifndef NO_RSA
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"rsautl",rsautl_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"dsa",dsa_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"dsaparam",dsaparam_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"x509",x509_main},
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#ifndef NO_RSA
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"genrsa",genrsa_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"s_server",s_server_main},
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"s_client",s_client_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SPEED
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"speed",speed_main},
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"s_time",s_time_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"version",version_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"pkcs7",pkcs7_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"crl2pkcs7",crl2pkcs7_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"sess_id",sess_id_main},
 | 
			
		||||
#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))
 | 
			
		||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"ciphers",ciphers_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"nseq",nseq_main},
 | 
			
		||||
#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)
 | 
			
		||||
#if !defined(NO_DES) && !defined(NO_SHA1)
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"pkcs12",pkcs12_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"pkcs8",pkcs8_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"spkac",spkac_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"smime",smime_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"rand",rand_main},
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"prime",prime_main},
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"engine",engine_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_GENERAL,"ocsp",ocsp_main},
 | 
			
		||||
#ifndef OPENSSL_NO_MD2
 | 
			
		||||
	{FUNC_TYPE_MD,"md2",dgst_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_MD4
 | 
			
		||||
	{FUNC_TYPE_MD,"md4",dgst_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_MD5
 | 
			
		||||
	{FUNC_TYPE_MD,"md5",dgst_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SHA
 | 
			
		||||
	{FUNC_TYPE_MD,"sha",dgst_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SHA1
 | 
			
		||||
	{FUNC_TYPE_MD,"sha1",dgst_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_MDC2
 | 
			
		||||
	{FUNC_TYPE_MD,"mdc2",dgst_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RMD160
 | 
			
		||||
	{FUNC_TYPE_MD,"rmd160",dgst_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"aes-128-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"aes-128-ecb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"aes-192-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"aes-192-ecb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"aes-256-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"aes-256-ecb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"base64",enc_main},
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des3",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"desx",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"idea",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC4
 | 
			
		||||
#ifndef NO_RC4
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc4",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC4
 | 
			
		||||
#ifndef NO_RC4
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc4-40",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC2
 | 
			
		||||
#ifndef NO_RC2
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc2",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_BF
 | 
			
		||||
#ifndef NO_BF
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"bf",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_CAST
 | 
			
		||||
#ifndef NO_CAST
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"cast",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC5
 | 
			
		||||
#ifndef NO_RC5
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc5",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-ecb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-ede",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-ede3",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-ede-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-ede3-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-cfb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-ede-cfb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-ede3-cfb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-ofb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-ede-ofb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"des-ede3-ofb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"idea-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"idea-ecb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"idea-cfb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"idea-ofb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC2
 | 
			
		||||
#ifndef NO_RC2
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc2-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC2
 | 
			
		||||
#ifndef NO_RC2
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc2-ecb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC2
 | 
			
		||||
#ifndef NO_RC2
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc2-cfb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC2
 | 
			
		||||
#ifndef NO_RC2
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc2-ofb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC2
 | 
			
		||||
#ifndef NO_RC2
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc2-64-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC2
 | 
			
		||||
#ifndef NO_RC2
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc2-40-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_BF
 | 
			
		||||
#ifndef NO_BF
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"bf-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_BF
 | 
			
		||||
#ifndef NO_BF
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"bf-ecb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_BF
 | 
			
		||||
#ifndef NO_BF
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"bf-cfb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_BF
 | 
			
		||||
#ifndef NO_BF
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"bf-ofb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_CAST
 | 
			
		||||
#ifndef NO_CAST
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"cast5-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_CAST
 | 
			
		||||
#ifndef NO_CAST
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"cast5-ecb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_CAST
 | 
			
		||||
#ifndef NO_CAST
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"cast5-cfb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_CAST
 | 
			
		||||
#ifndef NO_CAST
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"cast5-ofb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_CAST
 | 
			
		||||
#ifndef NO_CAST
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"cast-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC5
 | 
			
		||||
#ifndef NO_RC5
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc5-cbc",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC5
 | 
			
		||||
#ifndef NO_RC5
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc5-ecb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC5
 | 
			
		||||
#ifndef NO_RC5
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc5-cfb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC5
 | 
			
		||||
#ifndef NO_RC5
 | 
			
		||||
	{FUNC_TYPE_CIPHER,"rc5-ofb",enc_main},
 | 
			
		||||
#endif
 | 
			
		||||
	{0,NULL,NULL}
 | 
			
		||||
 
 | 
			
		||||
@@ -28,15 +28,15 @@ foreach (@ARGV)
 | 
			
		||||
	push(@files,$_);
 | 
			
		||||
	$str="\t{FUNC_TYPE_GENERAL,\"$_\",${_}_main},\n";
 | 
			
		||||
	if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
 | 
			
		||||
		{ print "#if !defined(OPENSSL_NO_SOCK) && !(defined(OPENSSL_NO_SSL2) && defined(OPENSSL_NO_SSL3))\n${str}#endif\n"; } 
 | 
			
		||||
		{ print "#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))\n${str}#endif\n"; } 
 | 
			
		||||
	elsif ( ($_ =~ /^rsa$/) || ($_ =~ /^genrsa$/) || ($_ =~ /^rsautl$/)) 
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_RSA\n${str}#endif\n";  }
 | 
			
		||||
		{ print "#ifndef NO_RSA\n${str}#endif\n";  }
 | 
			
		||||
	elsif ( ($_ =~ /^dsa$/) || ($_ =~ /^gendsa$/) || ($_ =~ /^dsaparam$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_DSA\n${str}#endif\n"; }
 | 
			
		||||
		{ print "#ifndef NO_DSA\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^dh$/) || ($_ =~ /^gendh$/) || ($_ =~ /^dhparam$/))
 | 
			
		||||
		{ print "#ifndef OPENSSL_NO_DH\n${str}#endif\n"; }
 | 
			
		||||
		{ print "#ifndef NO_DH\n${str}#endif\n"; }
 | 
			
		||||
	elsif ( ($_ =~ /^pkcs12$/))
 | 
			
		||||
		{ print "#if !defined(OPENSSL_NO_DES) && !defined(OPENSSL_NO_SHA1)\n${str}#endif\n"; }
 | 
			
		||||
		{ print "#if !defined(NO_DES) && !defined(NO_SHA1)\n${str}#endif\n"; }
 | 
			
		||||
	else
 | 
			
		||||
		{ print $str; }
 | 
			
		||||
	}
 | 
			
		||||
@@ -44,13 +44,10 @@ foreach (@ARGV)
 | 
			
		||||
foreach ("md2","md4","md5","sha","sha1","mdc2","rmd160")
 | 
			
		||||
	{
 | 
			
		||||
	push(@files,$_);
 | 
			
		||||
	printf "#ifndef OPENSSL_NO_".uc($_)."\n\t{FUNC_TYPE_MD,\"".$_."\",dgst_main},\n#endif\n";
 | 
			
		||||
	printf "\t{FUNC_TYPE_MD,\"%s\",dgst_main},\n",$_;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
foreach (
 | 
			
		||||
	"aes-128-cbc", "aes-128-ecb",
 | 
			
		||||
	"aes-192-cbc", "aes-192-ecb",
 | 
			
		||||
	"aes-256-cbc", "aes-256-ecb",
 | 
			
		||||
	"base64",
 | 
			
		||||
	"des", "des3", "desx", "idea", "rc4", "rc4-40",
 | 
			
		||||
	"rc2", "bf", "cast", "rc5",
 | 
			
		||||
@@ -67,14 +64,13 @@ foreach (
 | 
			
		||||
	push(@files,$_);
 | 
			
		||||
 | 
			
		||||
	$t=sprintf("\t{FUNC_TYPE_CIPHER,\"%s\",enc_main},\n",$_);
 | 
			
		||||
	if    ($_ =~ /des/)  { $t="#ifndef OPENSSL_NO_DES\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /aes/)  { $t="#ifndef OPENSSL_NO_AES\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /idea/) { $t="#ifndef OPENSSL_NO_IDEA\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /rc4/)  { $t="#ifndef OPENSSL_NO_RC4\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /rc2/)  { $t="#ifndef OPENSSL_NO_RC2\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /bf/)   { $t="#ifndef OPENSSL_NO_BF\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /cast/) { $t="#ifndef OPENSSL_NO_CAST\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /rc5/)  { $t="#ifndef OPENSSL_NO_RC5\n${t}#endif\n"; }
 | 
			
		||||
	if    ($_ =~ /des/)  { $t="#ifndef NO_DES\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /idea/) { $t="#ifndef NO_IDEA\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /rc4/)  { $t="#ifndef NO_RC4\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /rc2/)  { $t="#ifndef NO_RC2\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /bf/)   { $t="#ifndef NO_BF\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /cast/) { $t="#ifndef NO_CAST\n${t}#endif\n"; }
 | 
			
		||||
	elsif ($_ =~ /rc5/)  { $t="#ifndef NO_RC5\n${t}#endif\n"; }
 | 
			
		||||
	print $t;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										83
									
								
								apps/rand.c
									
									
									
									
									
								
							
							
						
						
									
										83
									
								
								apps/rand.c
									
									
									
									
									
								
							@@ -1,57 +1,4 @@
 | 
			
		||||
/* apps/rand.c */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    openssl-core@openssl.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
 | 
			
		||||
@@ -76,9 +23,6 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	int i, r, ret = 1;
 | 
			
		||||
	int badopt;
 | 
			
		||||
	char *outfile = NULL;
 | 
			
		||||
@@ -86,9 +30,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	int base64 = 0;
 | 
			
		||||
	BIO *out = NULL;
 | 
			
		||||
	int num = -1;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -96,9 +37,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err = BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto err;
 | 
			
		||||
 | 
			
		||||
	badopt = 0;
 | 
			
		||||
	i = 0;
 | 
			
		||||
	while (!badopt && argv[++i] != NULL)
 | 
			
		||||
@@ -110,15 +48,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			else
 | 
			
		||||
				badopt = 1;
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(argv[i], "-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if ((argv[i+1] != NULL) && (engine == NULL))
 | 
			
		||||
				engine = argv[++i];
 | 
			
		||||
			else
 | 
			
		||||
				badopt = 1;
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(argv[i], "-rand") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if ((argv[i+1] != NULL) && (inrand == NULL))
 | 
			
		||||
@@ -156,18 +85,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf(bio_err, "Usage: rand [options] num\n");
 | 
			
		||||
		BIO_printf(bio_err, "where options are\n");
 | 
			
		||||
		BIO_printf(bio_err, "-out file            - write to file\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err, "-engine e             - use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err, "-rand file%cfile%c...  - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
			
		||||
		BIO_printf(bio_err, "-base64              - encode output\n");
 | 
			
		||||
		goto err;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
			
		||||
	if (inrand != NULL)
 | 
			
		||||
		BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
			
		||||
@@ -181,7 +103,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		r = BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -222,6 +144,5 @@ err:
 | 
			
		||||
	ERR_print_errors(bio_err);
 | 
			
		||||
	if (out)
 | 
			
		||||
		BIO_free_all(out);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										600
									
								
								apps/req.c
									
									
									
									
									
								
							
							
						
						
									
										600
									
								
								apps/req.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										130
									
								
								apps/rsa.c
									
									
									
									
									
								
							
							
						
						
									
										130
									
								
								apps/rsa.c
									
									
									
									
									
								
							@@ -56,7 +56,7 @@
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#ifndef NO_RSA
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
@@ -79,9 +79,6 @@
 | 
			
		||||
 * -des		- encrypt output if PEM format with DES in cbc mode
 | 
			
		||||
 * -des3	- encrypt output if PEM format
 | 
			
		||||
 * -idea	- encrypt output if PEM format
 | 
			
		||||
 * -aes128	- encrypt output if PEM format
 | 
			
		||||
 * -aes192	- encrypt output if PEM format
 | 
			
		||||
 * -aes256	- encrypt output if PEM format
 | 
			
		||||
 * -text	- print a text version
 | 
			
		||||
 * -modulus	- print the RSA key modulus
 | 
			
		||||
 * -check	- verify key consistency
 | 
			
		||||
@@ -93,20 +90,16 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
	int ret=1;
 | 
			
		||||
	RSA *rsa=NULL;
 | 
			
		||||
	int i,badops=0, sgckey=0;
 | 
			
		||||
	const EVP_CIPHER *enc=NULL;
 | 
			
		||||
	BIO *out=NULL;
 | 
			
		||||
	BIO *in=NULL,*out=NULL;
 | 
			
		||||
	int informat,outformat,text=0,check=0,noout=0;
 | 
			
		||||
	int pubin = 0, pubout = 0;
 | 
			
		||||
	char *infile,*outfile,*prog;
 | 
			
		||||
	char *passargin = NULL, *passargout = NULL;
 | 
			
		||||
	char *passin = NULL, *passout = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	int modulus=0;
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
@@ -115,9 +108,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	infile=NULL;
 | 
			
		||||
	outfile=NULL;
 | 
			
		||||
	informat=FORMAT_PEM;
 | 
			
		||||
@@ -158,13 +148,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			passargout= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-sgckey") == 0)
 | 
			
		||||
			sgckey=1;
 | 
			
		||||
		else if (strcmp(*argv,"-pubin") == 0)
 | 
			
		||||
@@ -203,12 +186,8 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err," -passout arg    output file pass phrase source\n");
 | 
			
		||||
		BIO_printf(bio_err," -des            encrypt PEM output with cbc des\n");
 | 
			
		||||
		BIO_printf(bio_err," -des3           encrypt PEM output with ede cbc des using 168 bit key\n");
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
		BIO_printf(bio_err," -idea           encrypt PEM output with cbc idea\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
		BIO_printf(bio_err," -aes128, -aes192, -aes256\n");
 | 
			
		||||
		BIO_printf(bio_err,"                 encrypt PEM output with cbc aes\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," -text           print the key in text\n");
 | 
			
		||||
		BIO_printf(bio_err," -noout          don't print key out\n");
 | 
			
		||||
@@ -216,18 +195,11 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err," -check          verify key consistency\n");
 | 
			
		||||
		BIO_printf(bio_err," -pubin          expect a public key in input file\n");
 | 
			
		||||
		BIO_printf(bio_err," -pubout         output a public key\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
			
		||||
		BIO_printf(bio_err, "Error getting passwords\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
@@ -238,29 +210,69 @@ bad:
 | 
			
		||||
		goto end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	in=BIO_new(BIO_s_file());
 | 
			
		||||
	out=BIO_new(BIO_s_file());
 | 
			
		||||
 | 
			
		||||
	if ((in == NULL) || (out == NULL))
 | 
			
		||||
		{
 | 
			
		||||
		EVP_PKEY	*pkey;
 | 
			
		||||
 | 
			
		||||
		if (pubin)
 | 
			
		||||
			pkey = load_pubkey(bio_err, infile,
 | 
			
		||||
				(informat == FORMAT_NETSCAPE && sgckey ?
 | 
			
		||||
					FORMAT_IISSGC : informat), 1,
 | 
			
		||||
				passin, e, "Public Key");
 | 
			
		||||
		else
 | 
			
		||||
			pkey = load_key(bio_err, infile,
 | 
			
		||||
				(informat == FORMAT_NETSCAPE && sgckey ?
 | 
			
		||||
					FORMAT_IISSGC : informat), 1,
 | 
			
		||||
				passin, e, "Private Key");
 | 
			
		||||
 | 
			
		||||
		if (pkey != NULL)
 | 
			
		||||
		rsa = pkey == NULL ? NULL : EVP_PKEY_get1_RSA(pkey);
 | 
			
		||||
		EVP_PKEY_free(pkey);
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (infile == NULL)
 | 
			
		||||
		BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		if (BIO_read_filename(in,infile) <= 0)
 | 
			
		||||
			{
 | 
			
		||||
			perror(infile);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	BIO_printf(bio_err,"read RSA key\n");
 | 
			
		||||
	if	(informat == FORMAT_ASN1) {
 | 
			
		||||
		if (pubin) rsa=d2i_RSA_PUBKEY_bio(in,NULL);
 | 
			
		||||
		else rsa=d2i_RSAPrivateKey_bio(in,NULL);
 | 
			
		||||
	}
 | 
			
		||||
#ifndef NO_RC4
 | 
			
		||||
	else if (informat == FORMAT_NETSCAPE)
 | 
			
		||||
		{
 | 
			
		||||
		BUF_MEM *buf=NULL;
 | 
			
		||||
		unsigned char *p;
 | 
			
		||||
		int size=0;
 | 
			
		||||
 | 
			
		||||
		buf=BUF_MEM_new();
 | 
			
		||||
		for (;;)
 | 
			
		||||
			{
 | 
			
		||||
			if ((buf == NULL) || (!BUF_MEM_grow(buf,size+1024*10)))
 | 
			
		||||
				goto end;
 | 
			
		||||
			i=BIO_read(in,&(buf->data[size]),1024*10);
 | 
			
		||||
			size+=i;
 | 
			
		||||
			if (i == 0) break;
 | 
			
		||||
			if (i < 0)
 | 
			
		||||
				{
 | 
			
		||||
				perror("reading private key");
 | 
			
		||||
				BUF_MEM_free(buf);
 | 
			
		||||
				goto end;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		p=(unsigned char *)buf->data;
 | 
			
		||||
		rsa=d2i_RSA_NET(NULL,&p,(long)size,NULL, sgckey);
 | 
			
		||||
		BUF_MEM_free(buf);
 | 
			
		||||
		}
 | 
			
		||||
#endif
 | 
			
		||||
	else if (informat == FORMAT_PEM) {
 | 
			
		||||
		if(pubin) rsa=PEM_read_bio_RSA_PUBKEY(in,NULL,NULL,NULL);
 | 
			
		||||
		else rsa=PEM_read_bio_RSAPrivateKey(in,NULL, NULL,passin);
 | 
			
		||||
	}
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"bad input format specified for key\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	if (rsa == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"unable to load key\n");
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
@@ -268,7 +280,7 @@ bad:
 | 
			
		||||
	if (outfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -307,14 +319,14 @@ bad:
 | 
			
		||||
			BIO_printf(out,"RSA key ok\n");
 | 
			
		||||
		else if (r == 0)
 | 
			
		||||
			{
 | 
			
		||||
			long err;
 | 
			
		||||
			long e;
 | 
			
		||||
 | 
			
		||||
			while ((err = ERR_peek_error()) != 0 &&
 | 
			
		||||
				ERR_GET_LIB(err) == ERR_LIB_RSA &&
 | 
			
		||||
				ERR_GET_FUNC(err) == RSA_F_RSA_CHECK_KEY &&
 | 
			
		||||
				ERR_GET_REASON(err) != ERR_R_MALLOC_FAILURE)
 | 
			
		||||
			while ((e = ERR_peek_error()) != 0 &&
 | 
			
		||||
				ERR_GET_LIB(e) == ERR_LIB_RSA &&
 | 
			
		||||
				ERR_GET_FUNC(e) == RSA_F_RSA_CHECK_KEY &&
 | 
			
		||||
				ERR_GET_REASON(e) != ERR_R_MALLOC_FAILURE)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(out, "RSA key error: %s\n", ERR_reason_error_string(err));
 | 
			
		||||
				BIO_printf(out, "RSA key error: %s\n", ERR_reason_error_string(e));
 | 
			
		||||
				ERR_get_error(); /* remove e from error stack */
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
@@ -336,7 +348,7 @@ bad:
 | 
			
		||||
		if(pubout || pubin) i=i2d_RSA_PUBKEY_bio(out,rsa);
 | 
			
		||||
		else i=i2d_RSAPrivateKey_bio(out,rsa);
 | 
			
		||||
	}
 | 
			
		||||
#ifndef OPENSSL_NO_RC4
 | 
			
		||||
#ifndef NO_RC4
 | 
			
		||||
	else if (outformat == FORMAT_NETSCAPE)
 | 
			
		||||
		{
 | 
			
		||||
		unsigned char *p,*pp;
 | 
			
		||||
@@ -372,14 +384,14 @@ bad:
 | 
			
		||||
	else
 | 
			
		||||
		ret=0;
 | 
			
		||||
end:
 | 
			
		||||
	if(in != NULL) BIO_free(in);
 | 
			
		||||
	if(out != NULL) BIO_free_all(out);
 | 
			
		||||
	if(rsa != NULL) RSA_free(rsa);
 | 
			
		||||
	if(passin) OPENSSL_free(passin);
 | 
			
		||||
	if(passout) OPENSSL_free(passout);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
#else /* !OPENSSL_NO_RSA */
 | 
			
		||||
#else /* !NO_RSA */
 | 
			
		||||
 | 
			
		||||
# if PEDANTIC
 | 
			
		||||
static void *dummy=&dummy;
 | 
			
		||||
 
 | 
			
		||||
@@ -3,7 +3,7 @@
 | 
			
		||||
 * project 2000.
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 2000-2005 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 * Copyright (c) 2000 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
@@ -56,7 +56,7 @@
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#ifndef NO_RSA
 | 
			
		||||
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <string.h>
 | 
			
		||||
@@ -82,12 +82,8 @@ int MAIN(int argc, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
	BIO *in = NULL, *out = NULL;
 | 
			
		||||
	char *infile = NULL, *outfile = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine = NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	char *keyfile = NULL;
 | 
			
		||||
	char rsa_mode = RSA_VERIFY, key_type = KEY_PRIVKEY;
 | 
			
		||||
	int keyform = FORMAT_PEM;
 | 
			
		||||
@@ -97,7 +93,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	EVP_PKEY *pkey = NULL;
 | 
			
		||||
	RSA *rsa = NULL;
 | 
			
		||||
	unsigned char *rsa_in = NULL, *rsa_out = NULL, pad;
 | 
			
		||||
	char *passargin = NULL, *passin = NULL;
 | 
			
		||||
	int rsa_inlen, rsa_outlen = 0;
 | 
			
		||||
	int keysize;
 | 
			
		||||
 | 
			
		||||
@@ -107,9 +102,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	argv++;
 | 
			
		||||
 | 
			
		||||
	if(!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
	ERR_load_crypto_strings();
 | 
			
		||||
	OpenSSL_add_all_algorithms();
 | 
			
		||||
	pad = RSA_PKCS1_PADDING;
 | 
			
		||||
@@ -125,17 +117,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		} else if(!strcmp(*argv, "-inkey")) {
 | 
			
		||||
			if (--argc < 1) badarg = 1;
 | 
			
		||||
			keyfile = *(++argv);
 | 
			
		||||
		} else if (!strcmp(*argv,"-passin")) {
 | 
			
		||||
			if (--argc < 1) badarg = 1;
 | 
			
		||||
			passargin= *(++argv);
 | 
			
		||||
		} else if (strcmp(*argv,"-keyform") == 0) {
 | 
			
		||||
			if (--argc < 1) badarg = 1;
 | 
			
		||||
			keyform=str2fmt(*(++argv));
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		} else if(!strcmp(*argv, "-engine")) {
 | 
			
		||||
			if (--argc < 1) badarg = 1;
 | 
			
		||||
			engine = *(++argv);
 | 
			
		||||
#endif
 | 
			
		||||
		} else if(!strcmp(*argv, "-pubin")) {
 | 
			
		||||
			key_type = KEY_PUBKEY;
 | 
			
		||||
		} else if(!strcmp(*argv, "-certin")) {
 | 
			
		||||
@@ -147,7 +128,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		else if(!strcmp(*argv, "-oaep")) pad = RSA_PKCS1_OAEP_PADDING;
 | 
			
		||||
		else if(!strcmp(*argv, "-ssl")) pad = RSA_SSLV23_PADDING;
 | 
			
		||||
		else if(!strcmp(*argv, "-pkcs")) pad = RSA_PKCS1_PADDING;
 | 
			
		||||
		else if(!strcmp(*argv, "-x931")) pad = RSA_X931_PADDING;
 | 
			
		||||
		else if(!strcmp(*argv, "-sign")) {
 | 
			
		||||
			rsa_mode = RSA_SIGN;
 | 
			
		||||
			need_priv = 1;
 | 
			
		||||
@@ -171,31 +151,20 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		goto end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
	if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
 | 
			
		||||
		BIO_printf(bio_err, "Error getting password\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
/* FIXME: seed PRNG only if needed */
 | 
			
		||||
	app_RAND_load_file(NULL, bio_err, 0);
 | 
			
		||||
	
 | 
			
		||||
	switch(key_type) {
 | 
			
		||||
		case KEY_PRIVKEY:
 | 
			
		||||
		pkey = load_key(bio_err, keyfile, keyform, 0,
 | 
			
		||||
			passin, e, "Private Key");
 | 
			
		||||
		pkey = load_key(bio_err, keyfile, keyform, NULL);
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case KEY_PUBKEY:
 | 
			
		||||
		pkey = load_pubkey(bio_err, keyfile, keyform, 0,
 | 
			
		||||
			NULL, e, "Public Key");
 | 
			
		||||
		pkey = load_pubkey(bio_err, keyfile, keyform);
 | 
			
		||||
		break;
 | 
			
		||||
 | 
			
		||||
		case KEY_CERT:
 | 
			
		||||
		x = load_cert(bio_err, keyfile, keyform,
 | 
			
		||||
			NULL, e, "Certificate");
 | 
			
		||||
		x = load_cert(bio_err, keyfile, keyform);
 | 
			
		||||
		if(x) {
 | 
			
		||||
			pkey = X509_get_pubkey(x);
 | 
			
		||||
			X509_free(x);
 | 
			
		||||
@@ -204,6 +173,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if(!pkey) {
 | 
			
		||||
		BIO_printf(bio_err, "Error loading key\n");
 | 
			
		||||
		return 1;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
@@ -233,7 +203,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		    out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -299,7 +269,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	BIO_free_all(out);
 | 
			
		||||
	if(rsa_in) OPENSSL_free(rsa_in);
 | 
			
		||||
	if(rsa_out) OPENSSL_free(rsa_out);
 | 
			
		||||
	if(passin) OPENSSL_free(passin);
 | 
			
		||||
	return ret;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
@@ -309,7 +278,6 @@ static void usage()
 | 
			
		||||
	BIO_printf(bio_err, "-in file        input file\n");
 | 
			
		||||
	BIO_printf(bio_err, "-out file       output file\n");
 | 
			
		||||
	BIO_printf(bio_err, "-inkey file     input key\n");
 | 
			
		||||
	BIO_printf(bio_err, "-keyform arg    private key format - default PEM\n");
 | 
			
		||||
	BIO_printf(bio_err, "-pubin          input is an RSA public\n");
 | 
			
		||||
	BIO_printf(bio_err, "-certin         input is a certificate carrying an RSA public key\n");
 | 
			
		||||
	BIO_printf(bio_err, "-ssl            use SSL v2 padding\n");
 | 
			
		||||
@@ -321,11 +289,6 @@ static void usage()
 | 
			
		||||
	BIO_printf(bio_err, "-encrypt        encrypt with public key\n");
 | 
			
		||||
	BIO_printf(bio_err, "-decrypt        decrypt with private key\n");
 | 
			
		||||
	BIO_printf(bio_err, "-hexdump        hex dump output\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	BIO_printf(bio_err, "-engine e       use engine e, possibly a hardware device.\n");
 | 
			
		||||
	BIO_printf (bio_err, "-passin arg    pass phrase source\n");
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
#endif
 | 
			
		||||
 
 | 
			
		||||
@@ -55,72 +55,9 @@
 | 
			
		||||
 * copied and put under another distribution licence
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    openssl-core@openssl.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <sys/types.h>
 | 
			
		||||
#include <openssl/opensslconf.h>
 | 
			
		||||
 | 
			
		||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
#include <conio.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_MSDOS
 | 
			
		||||
#define _kbhit kbhit
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if defined(OPENSSL_SYS_VMS) && !defined(FD_SET)
 | 
			
		||||
#if (defined(VMS) || defined(__VMS)) && !defined(FD_SET)
 | 
			
		||||
/* VAX C does not defined fd_set and friends, but it's actually quite simple */
 | 
			
		||||
/* These definitions are borrowed from SOCKETSHR.	/Richard Levitte */
 | 
			
		||||
#define MAX_NOFILE	32
 | 
			
		||||
@@ -150,9 +87,13 @@ typedef fd_mask fd_set;
 | 
			
		||||
int do_server(int port, int *ret, int (*cb) (), char *context);
 | 
			
		||||
#ifdef HEADER_X509_H
 | 
			
		||||
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
 | 
			
		||||
#else
 | 
			
		||||
int MS_CALLBACK verify_callback(int ok, char *ctx);
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef HEADER_SSL_H
 | 
			
		||||
int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
 | 
			
		||||
#else
 | 
			
		||||
int set_cert_stuff(char *ctx, char *cert_file, char *key_file);
 | 
			
		||||
#endif
 | 
			
		||||
int init_client(int *sock, char *server, int port);
 | 
			
		||||
int should_retry(int i);
 | 
			
		||||
@@ -163,6 +104,8 @@ long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp,
 | 
			
		||||
	int argi, long argl, long ret);
 | 
			
		||||
 | 
			
		||||
#ifdef HEADER_SSL_H
 | 
			
		||||
void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret);
 | 
			
		||||
void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg);
 | 
			
		||||
void MS_CALLBACK apps_ssl_info_callback(SSL *s, int where, int ret);
 | 
			
		||||
#else
 | 
			
		||||
void MS_CALLBACK apps_ssl_info_callback(char *s, int where, int ret);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										317
									
								
								apps/s_cb.c
									
									
									
									
									
								
							
							
						
						
									
										317
									
								
								apps/s_cb.c
									
									
									
									
									
								
							@@ -55,59 +55,6 @@
 | 
			
		||||
 * copied and put under another distribution licence
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    openssl-core@openssl.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
@@ -134,7 +81,7 @@ int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
 | 
			
		||||
	err=	X509_STORE_CTX_get_error(ctx);
 | 
			
		||||
	depth=	X509_STORE_CTX_get_error_depth(ctx);
 | 
			
		||||
 | 
			
		||||
	X509_NAME_oneline(X509_get_subject_name(err_cert),buf,sizeof buf);
 | 
			
		||||
	X509_NAME_oneline(X509_get_subject_name(err_cert),buf,256);
 | 
			
		||||
	BIO_printf(bio_err,"depth=%d %s\n",depth,buf);
 | 
			
		||||
	if (!ok)
 | 
			
		||||
		{
 | 
			
		||||
@@ -154,7 +101,7 @@ int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx)
 | 
			
		||||
	switch (ctx->error)
 | 
			
		||||
		{
 | 
			
		||||
	case X509_V_ERR_UNABLE_TO_GET_ISSUER_CERT:
 | 
			
		||||
		X509_NAME_oneline(X509_get_issuer_name(ctx->current_cert),buf,sizeof buf);
 | 
			
		||||
		X509_NAME_oneline(X509_get_issuer_name(ctx->current_cert),buf,256);
 | 
			
		||||
		BIO_printf(bio_err,"issuer= %s\n",buf);
 | 
			
		||||
		break;
 | 
			
		||||
	case X509_V_ERR_CERT_NOT_YET_VALID:
 | 
			
		||||
@@ -253,7 +200,7 @@ long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp, int argi,
 | 
			
		||||
	return(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret)
 | 
			
		||||
void MS_CALLBACK apps_ssl_info_callback(SSL *s, int where, int ret)
 | 
			
		||||
	{
 | 
			
		||||
	char *str;
 | 
			
		||||
	int w;
 | 
			
		||||
@@ -289,261 +236,3 @@ void MS_CALLBACK apps_ssl_info_callback(const SSL *s, int where, int ret)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
void MS_CALLBACK msg_cb(int write_p, int version, int content_type, const void *buf, size_t len, SSL *ssl, void *arg)
 | 
			
		||||
	{
 | 
			
		||||
	BIO *bio = arg;
 | 
			
		||||
	const char *str_write_p, *str_version, *str_content_type = "", *str_details1 = "", *str_details2= "";
 | 
			
		||||
	
 | 
			
		||||
	str_write_p = write_p ? ">>>" : "<<<";
 | 
			
		||||
 | 
			
		||||
	switch (version)
 | 
			
		||||
		{
 | 
			
		||||
	case SSL2_VERSION:
 | 
			
		||||
		str_version = "SSL 2.0";
 | 
			
		||||
		break;
 | 
			
		||||
	case SSL3_VERSION:
 | 
			
		||||
		str_version = "SSL 3.0 ";
 | 
			
		||||
		break;
 | 
			
		||||
	case TLS1_VERSION:
 | 
			
		||||
		str_version = "TLS 1.0 ";
 | 
			
		||||
		break;
 | 
			
		||||
	default:
 | 
			
		||||
		str_version = "???";
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (version == SSL2_VERSION)
 | 
			
		||||
		{
 | 
			
		||||
		str_details1 = "???";
 | 
			
		||||
 | 
			
		||||
		if (len > 0)
 | 
			
		||||
			{
 | 
			
		||||
			switch (((unsigned char*)buf)[0])
 | 
			
		||||
				{
 | 
			
		||||
				case 0:
 | 
			
		||||
					str_details1 = ", ERROR:";
 | 
			
		||||
					str_details2 = " ???";
 | 
			
		||||
					if (len >= 3)
 | 
			
		||||
						{
 | 
			
		||||
						unsigned err = (((unsigned char*)buf)[1]<<8) + ((unsigned char*)buf)[2];
 | 
			
		||||
						
 | 
			
		||||
						switch (err)
 | 
			
		||||
							{
 | 
			
		||||
						case 0x0001:
 | 
			
		||||
							str_details2 = " NO-CIPHER-ERROR";
 | 
			
		||||
							break;
 | 
			
		||||
						case 0x0002:
 | 
			
		||||
							str_details2 = " NO-CERTIFICATE-ERROR";
 | 
			
		||||
							break;
 | 
			
		||||
						case 0x0004:
 | 
			
		||||
							str_details2 = " BAD-CERTIFICATE-ERROR";
 | 
			
		||||
							break;
 | 
			
		||||
						case 0x0006:
 | 
			
		||||
							str_details2 = " UNSUPPORTED-CERTIFICATE-TYPE-ERROR";
 | 
			
		||||
							break;
 | 
			
		||||
							}
 | 
			
		||||
						}
 | 
			
		||||
 | 
			
		||||
					break;
 | 
			
		||||
				case 1:
 | 
			
		||||
					str_details1 = ", CLIENT-HELLO";
 | 
			
		||||
					break;
 | 
			
		||||
				case 2:
 | 
			
		||||
					str_details1 = ", CLIENT-MASTER-KEY";
 | 
			
		||||
					break;
 | 
			
		||||
				case 3:
 | 
			
		||||
					str_details1 = ", CLIENT-FINISHED";
 | 
			
		||||
					break;
 | 
			
		||||
				case 4:
 | 
			
		||||
					str_details1 = ", SERVER-HELLO";
 | 
			
		||||
					break;
 | 
			
		||||
				case 5:
 | 
			
		||||
					str_details1 = ", SERVER-VERIFY";
 | 
			
		||||
					break;
 | 
			
		||||
				case 6:
 | 
			
		||||
					str_details1 = ", SERVER-FINISHED";
 | 
			
		||||
					break;
 | 
			
		||||
				case 7:
 | 
			
		||||
					str_details1 = ", REQUEST-CERTIFICATE";
 | 
			
		||||
					break;
 | 
			
		||||
				case 8:
 | 
			
		||||
					str_details1 = ", CLIENT-CERTIFICATE";
 | 
			
		||||
					break;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (version == SSL3_VERSION || version == TLS1_VERSION)
 | 
			
		||||
		{
 | 
			
		||||
		switch (content_type)
 | 
			
		||||
			{
 | 
			
		||||
		case 20:
 | 
			
		||||
			str_content_type = "ChangeCipherSpec";
 | 
			
		||||
			break;
 | 
			
		||||
		case 21:
 | 
			
		||||
			str_content_type = "Alert";
 | 
			
		||||
			break;
 | 
			
		||||
		case 22:
 | 
			
		||||
			str_content_type = "Handshake";
 | 
			
		||||
			break;
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		if (content_type == 21) /* Alert */
 | 
			
		||||
			{
 | 
			
		||||
			str_details1 = ", ???";
 | 
			
		||||
			
 | 
			
		||||
			if (len == 2)
 | 
			
		||||
				{
 | 
			
		||||
				switch (((unsigned char*)buf)[0])
 | 
			
		||||
					{
 | 
			
		||||
				case 1:
 | 
			
		||||
					str_details1 = ", warning";
 | 
			
		||||
					break;
 | 
			
		||||
				case 2:
 | 
			
		||||
					str_details1 = ", fatal";
 | 
			
		||||
					break;
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
				str_details2 = " ???";
 | 
			
		||||
				switch (((unsigned char*)buf)[1])
 | 
			
		||||
					{
 | 
			
		||||
				case 0:
 | 
			
		||||
					str_details2 = " close_notify";
 | 
			
		||||
					break;
 | 
			
		||||
				case 10:
 | 
			
		||||
					str_details2 = " unexpected_message";
 | 
			
		||||
					break;
 | 
			
		||||
				case 20:
 | 
			
		||||
					str_details2 = " bad_record_mac";
 | 
			
		||||
					break;
 | 
			
		||||
				case 21:
 | 
			
		||||
					str_details2 = " decryption_failed";
 | 
			
		||||
					break;
 | 
			
		||||
				case 22:
 | 
			
		||||
					str_details2 = " record_overflow";
 | 
			
		||||
					break;
 | 
			
		||||
				case 30:
 | 
			
		||||
					str_details2 = " decompression_failure";
 | 
			
		||||
					break;
 | 
			
		||||
				case 40:
 | 
			
		||||
					str_details2 = " handshake_failure";
 | 
			
		||||
					break;
 | 
			
		||||
				case 42:
 | 
			
		||||
					str_details2 = " bad_certificate";
 | 
			
		||||
					break;
 | 
			
		||||
				case 43:
 | 
			
		||||
					str_details2 = " unsupported_certificate";
 | 
			
		||||
					break;
 | 
			
		||||
				case 44:
 | 
			
		||||
					str_details2 = " certificate_revoked";
 | 
			
		||||
					break;
 | 
			
		||||
				case 45:
 | 
			
		||||
					str_details2 = " certificate_expired";
 | 
			
		||||
					break;
 | 
			
		||||
				case 46:
 | 
			
		||||
					str_details2 = " certificate_unknown";
 | 
			
		||||
					break;
 | 
			
		||||
				case 47:
 | 
			
		||||
					str_details2 = " illegal_parameter";
 | 
			
		||||
					break;
 | 
			
		||||
				case 48:
 | 
			
		||||
					str_details2 = " unknown_ca";
 | 
			
		||||
					break;
 | 
			
		||||
				case 49:
 | 
			
		||||
					str_details2 = " access_denied";
 | 
			
		||||
					break;
 | 
			
		||||
				case 50:
 | 
			
		||||
					str_details2 = " decode_error";
 | 
			
		||||
					break;
 | 
			
		||||
				case 51:
 | 
			
		||||
					str_details2 = " decrypt_error";
 | 
			
		||||
					break;
 | 
			
		||||
				case 60:
 | 
			
		||||
					str_details2 = " export_restriction";
 | 
			
		||||
					break;
 | 
			
		||||
				case 70:
 | 
			
		||||
					str_details2 = " protocol_version";
 | 
			
		||||
					break;
 | 
			
		||||
				case 71:
 | 
			
		||||
					str_details2 = " insufficient_security";
 | 
			
		||||
					break;
 | 
			
		||||
				case 80:
 | 
			
		||||
					str_details2 = " internal_error";
 | 
			
		||||
					break;
 | 
			
		||||
				case 90:
 | 
			
		||||
					str_details2 = " user_canceled";
 | 
			
		||||
					break;
 | 
			
		||||
				case 100:
 | 
			
		||||
					str_details2 = " no_renegotiation";
 | 
			
		||||
					break;
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		
 | 
			
		||||
		if (content_type == 22) /* Handshake */
 | 
			
		||||
			{
 | 
			
		||||
			str_details1 = "???";
 | 
			
		||||
 | 
			
		||||
			if (len > 0)
 | 
			
		||||
				{
 | 
			
		||||
				switch (((unsigned char*)buf)[0])
 | 
			
		||||
					{
 | 
			
		||||
				case 0:
 | 
			
		||||
					str_details1 = ", HelloRequest";
 | 
			
		||||
					break;
 | 
			
		||||
				case 1:
 | 
			
		||||
					str_details1 = ", ClientHello";
 | 
			
		||||
					break;
 | 
			
		||||
				case 2:
 | 
			
		||||
					str_details1 = ", ServerHello";
 | 
			
		||||
					break;
 | 
			
		||||
				case 11:
 | 
			
		||||
					str_details1 = ", Certificate";
 | 
			
		||||
					break;
 | 
			
		||||
				case 12:
 | 
			
		||||
					str_details1 = ", ServerKeyExchange";
 | 
			
		||||
					break;
 | 
			
		||||
				case 13:
 | 
			
		||||
					str_details1 = ", CertificateRequest";
 | 
			
		||||
					break;
 | 
			
		||||
				case 14:
 | 
			
		||||
					str_details1 = ", ServerHelloDone";
 | 
			
		||||
					break;
 | 
			
		||||
				case 15:
 | 
			
		||||
					str_details1 = ", CertificateVerify";
 | 
			
		||||
					break;
 | 
			
		||||
				case 16:
 | 
			
		||||
					str_details1 = ", ClientKeyExchange";
 | 
			
		||||
					break;
 | 
			
		||||
				case 20:
 | 
			
		||||
					str_details1 = ", Finished";
 | 
			
		||||
					break;
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	BIO_printf(bio, "%s %s%s [length %04lx]%s%s\n", str_write_p, str_version, str_content_type, (unsigned long)len, str_details1, str_details2);
 | 
			
		||||
 | 
			
		||||
	if (len > 0)
 | 
			
		||||
		{
 | 
			
		||||
		size_t num, i;
 | 
			
		||||
		
 | 
			
		||||
		BIO_printf(bio, "   ");
 | 
			
		||||
		num = len;
 | 
			
		||||
#if 0
 | 
			
		||||
		if (num > 16)
 | 
			
		||||
			num = 16;
 | 
			
		||||
#endif
 | 
			
		||||
		for (i = 0; i < num; i++)
 | 
			
		||||
			{
 | 
			
		||||
			if (i % 16 == 0 && i > 0)
 | 
			
		||||
				BIO_printf(bio, "\n   ");
 | 
			
		||||
			BIO_printf(bio, " %02x", ((unsigned char*)buf)[i]);
 | 
			
		||||
			}
 | 
			
		||||
		if (i < len)
 | 
			
		||||
			BIO_printf(bio, " ...");
 | 
			
		||||
		BIO_printf(bio, "\n");
 | 
			
		||||
		}
 | 
			
		||||
	BIO_flush(bio);
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										227
									
								
								apps/s_client.c
									
									
									
									
									
								
							
							
						
						
									
										227
									
								
								apps/s_client.c
									
									
									
									
									
								
							@@ -55,66 +55,12 @@
 | 
			
		||||
 * copied and put under another distribution licence
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    openssl-core@openssl.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <assert.h>
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <openssl/e_os2.h>
 | 
			
		||||
#ifdef OPENSSL_NO_STDIO
 | 
			
		||||
#ifdef NO_STDIO
 | 
			
		||||
#define APPS_WIN16
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -122,7 +68,7 @@
 | 
			
		||||
   recursive header file inclusion, resulting in the compiler complaining
 | 
			
		||||
   that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
 | 
			
		||||
   is needed to have fileno() declared correctly...  So let's define u_int */
 | 
			
		||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__U_INT)
 | 
			
		||||
#if defined(VMS) && defined(__DECC) && !defined(__U_INT)
 | 
			
		||||
#define __U_INT
 | 
			
		||||
typedef unsigned int u_int;
 | 
			
		||||
#endif
 | 
			
		||||
@@ -136,16 +82,12 @@ typedef unsigned int u_int;
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_WINCE
 | 
			
		||||
/* Windows CE incorrectly defines fileno as returning void*, so to avoid problems below... */
 | 
			
		||||
#ifdef fileno
 | 
			
		||||
#undef fileno
 | 
			
		||||
#endif
 | 
			
		||||
#define fileno(a) (int)_fileno(a)
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
#include <conio.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
 | 
			
		||||
#if (defined(VMS) && __VMS_VER < 70000000)
 | 
			
		||||
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
 | 
			
		||||
#undef FIONBIO
 | 
			
		||||
#endif
 | 
			
		||||
@@ -170,7 +112,6 @@ static int c_nbio=0;
 | 
			
		||||
#endif
 | 
			
		||||
static int c_Pause=0;
 | 
			
		||||
static int c_debug=0;
 | 
			
		||||
static int c_msg=0;
 | 
			
		||||
static int c_showcerts=0;
 | 
			
		||||
 | 
			
		||||
static void sc_usage(void);
 | 
			
		||||
@@ -197,10 +138,6 @@ static void sc_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -pause        - sleep(1) after each read(2) and write(2) system call\n");
 | 
			
		||||
	BIO_printf(bio_err," -showcerts    - show all certificates in the chain\n");
 | 
			
		||||
	BIO_printf(bio_err," -debug        - extra output\n");
 | 
			
		||||
#ifdef WATT32
 | 
			
		||||
	BIO_printf(bio_err," -wdebug       - WATT-32 tcp debugging\n");
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -msg          - Show protocol messages\n");
 | 
			
		||||
	BIO_printf(bio_err," -nbio_test    - more ssl protocol testing\n");
 | 
			
		||||
	BIO_printf(bio_err," -state        - print the 'ssl' states\n");
 | 
			
		||||
#ifdef FIONBIO
 | 
			
		||||
@@ -214,16 +151,8 @@ static void sc_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -tls1         - just use TLSv1\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
 | 
			
		||||
	BIO_printf(bio_err," -bugs         - Switch on all SSL implementation bug workarounds\n");
 | 
			
		||||
	BIO_printf(bio_err," -serverpref   - Use server's cipher preferences (only SSLv2)\n");
 | 
			
		||||
	BIO_printf(bio_err," -cipher       - preferred cipher to use, use the 'openssl ciphers'\n");
 | 
			
		||||
	BIO_printf(bio_err,"                 command to see what is available\n");
 | 
			
		||||
	BIO_printf(bio_err," -starttls prot - use the STARTTLS command before starting TLS\n");
 | 
			
		||||
	BIO_printf(bio_err,"                 for those protocols that support it, where\n");
 | 
			
		||||
	BIO_printf(bio_err,"                 'prot' defines which one to assume.  Currently,\n");
 | 
			
		||||
	BIO_printf(bio_err,"                 only \"smtp\" and \"pop3\" are supported.\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	BIO_printf(bio_err," -engine id    - Initialise and use the specified engine\n");
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
			
		||||
 | 
			
		||||
	}
 | 
			
		||||
@@ -234,9 +163,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	int off=0;
 | 
			
		||||
	SSL *con=NULL,*con2=NULL;
 | 
			
		||||
	X509_STORE *store = NULL;
 | 
			
		||||
	int s,k,width,state=0;
 | 
			
		||||
	char *cbuf=NULL,*sbuf=NULL,*mbuf=NULL;
 | 
			
		||||
	char *cbuf=NULL,*sbuf=NULL;
 | 
			
		||||
	int cbuf_len,cbuf_off;
 | 
			
		||||
	int sbuf_len,sbuf_off;
 | 
			
		||||
	fd_set readfds,writefds;
 | 
			
		||||
@@ -250,24 +178,19 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	int write_tty,read_tty,write_ssl,read_ssl,tty_on,ssl_pending;
 | 
			
		||||
	SSL_CTX *ctx=NULL;
 | 
			
		||||
	int ret=1,in_init=1,i,nbio_test=0;
 | 
			
		||||
	int starttls_proto = 0;
 | 
			
		||||
	int prexit = 0, vflags = 0;
 | 
			
		||||
	int prexit = 0;
 | 
			
		||||
	SSL_METHOD *meth=NULL;
 | 
			
		||||
	BIO *sbio;
 | 
			
		||||
	char *inrand=NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine_id=NULL;
 | 
			
		||||
	ENGINE *e=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
	struct timeval tv;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
#if !defined(NO_SSL2) && !defined(NO_SSL3)
 | 
			
		||||
	meth=SSLv23_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
#elif !defined(NO_SSL3)
 | 
			
		||||
	meth=SSLv3_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
#elif !defined(NO_SSL2)
 | 
			
		||||
	meth=SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -276,18 +199,13 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	c_quiet=0;
 | 
			
		||||
	c_ign_eof=0;
 | 
			
		||||
	c_debug=0;
 | 
			
		||||
	c_msg=0;
 | 
			
		||||
	c_showcerts=0;
 | 
			
		||||
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	if (	((cbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
 | 
			
		||||
		((sbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
 | 
			
		||||
		((mbuf=OPENSSL_malloc(BUFSIZZ)) == NULL))
 | 
			
		||||
		((sbuf=OPENSSL_malloc(BUFSIZZ)) == NULL))
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"out of memory\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
@@ -332,10 +250,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			cert_file= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if	(strcmp(*argv,"-crl_check") == 0)
 | 
			
		||||
			vflags |= X509_V_FLAG_CRL_CHECK;
 | 
			
		||||
		else if	(strcmp(*argv,"-crl_check_all") == 0)
 | 
			
		||||
			vflags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
 | 
			
		||||
		else if	(strcmp(*argv,"-prexit") == 0)
 | 
			
		||||
			prexit=1;
 | 
			
		||||
		else if	(strcmp(*argv,"-crlf") == 0)
 | 
			
		||||
@@ -351,27 +265,21 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			c_Pause=1;
 | 
			
		||||
		else if	(strcmp(*argv,"-debug") == 0)
 | 
			
		||||
			c_debug=1;
 | 
			
		||||
#ifdef WATT32
 | 
			
		||||
		else if	(strcmp(*argv,"-wdebug") == 0)
 | 
			
		||||
			dbug_init();
 | 
			
		||||
#endif
 | 
			
		||||
		else if	(strcmp(*argv,"-msg") == 0)
 | 
			
		||||
			c_msg=1;
 | 
			
		||||
		else if	(strcmp(*argv,"-showcerts") == 0)
 | 
			
		||||
			c_showcerts=1;
 | 
			
		||||
		else if	(strcmp(*argv,"-nbio_test") == 0)
 | 
			
		||||
			nbio_test=1;
 | 
			
		||||
		else if	(strcmp(*argv,"-state") == 0)
 | 
			
		||||
			state=1;
 | 
			
		||||
#ifndef OPENSSL_NO_SSL2
 | 
			
		||||
#ifndef NO_SSL2
 | 
			
		||||
		else if	(strcmp(*argv,"-ssl2") == 0)
 | 
			
		||||
			meth=SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3
 | 
			
		||||
#ifndef NO_SSL3
 | 
			
		||||
		else if	(strcmp(*argv,"-ssl3") == 0)
 | 
			
		||||
			meth=SSLv3_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_TLS1
 | 
			
		||||
#ifndef NO_TLS1
 | 
			
		||||
		else if	(strcmp(*argv,"-tls1") == 0)
 | 
			
		||||
			meth=TLSv1_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
@@ -402,8 +310,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			off|=SSL_OP_NO_SSLv3;
 | 
			
		||||
		else if (strcmp(*argv,"-no_ssl2") == 0)
 | 
			
		||||
			off|=SSL_OP_NO_SSLv2;
 | 
			
		||||
		else if (strcmp(*argv,"-serverpref") == 0)
 | 
			
		||||
			off|=SSL_OP_CIPHER_SERVER_PREFERENCE;
 | 
			
		||||
		else if	(strcmp(*argv,"-cipher") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
@@ -412,24 +318,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
#ifdef FIONBIO
 | 
			
		||||
		else if (strcmp(*argv,"-nbio") == 0)
 | 
			
		||||
			{ c_nbio=1; }
 | 
			
		||||
#endif
 | 
			
		||||
		else if	(strcmp(*argv,"-starttls") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			++argv;
 | 
			
		||||
			if (strcmp(*argv,"smtp") == 0)
 | 
			
		||||
				starttls_proto = 1;
 | 
			
		||||
			else if (strcmp(*argv,"pop3") == 0)
 | 
			
		||||
				starttls_proto = 2;
 | 
			
		||||
			else
 | 
			
		||||
				goto bad;
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if	(strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine_id = *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-rand") == 0)
 | 
			
		||||
			{
 | 
			
		||||
@@ -452,13 +340,6 @@ bad:
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	OpenSSL_add_ssl_algorithms();
 | 
			
		||||
	SSL_load_error_strings();
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine_id, 1);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
 | 
			
		||||
		&& !RAND_status())
 | 
			
		||||
		{
 | 
			
		||||
@@ -470,7 +351,7 @@ bad:
 | 
			
		||||
 | 
			
		||||
	if (bio_c_out == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		if (c_quiet && !c_debug && !c_msg)
 | 
			
		||||
		if (c_quiet)
 | 
			
		||||
			{
 | 
			
		||||
			bio_c_out=BIO_new(BIO_s_null());
 | 
			
		||||
			}
 | 
			
		||||
@@ -481,6 +362,8 @@ bad:
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	OpenSSL_add_ssl_algorithms();
 | 
			
		||||
	SSL_load_error_strings();
 | 
			
		||||
	ctx=SSL_CTX_new(meth);
 | 
			
		||||
	if (ctx == NULL)
 | 
			
		||||
		{
 | 
			
		||||
@@ -517,16 +400,8 @@ bad:
 | 
			
		||||
		/* goto end; */
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	store = SSL_CTX_get_cert_store(ctx);
 | 
			
		||||
	X509_STORE_set_flags(store, vflags);
 | 
			
		||||
 | 
			
		||||
	con=SSL_new(ctx);
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	if (con  &&  (con->kssl_ctx = kssl_ctx_new()) != NULL)
 | 
			
		||||
                {
 | 
			
		||||
                kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVER, host);
 | 
			
		||||
		}
 | 
			
		||||
#endif	/* OPENSSL_NO_KRB5  */
 | 
			
		||||
/*	SSL_set_cipher_list(con,"RC4-MD5"); */
 | 
			
		||||
 | 
			
		||||
re_start:
 | 
			
		||||
@@ -568,11 +443,6 @@ re_start:
 | 
			
		||||
		BIO_set_callback(sbio,bio_dump_cb);
 | 
			
		||||
		BIO_set_callback_arg(sbio,bio_c_out);
 | 
			
		||||
		}
 | 
			
		||||
	if (c_msg)
 | 
			
		||||
		{
 | 
			
		||||
		SSL_set_msg_callback(con, msg_cb);
 | 
			
		||||
		SSL_set_msg_callback_arg(con, bio_c_out);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	SSL_set_bio(con,sbio,sbio);
 | 
			
		||||
	SSL_set_connect_state(con);
 | 
			
		||||
@@ -591,22 +461,6 @@ re_start:
 | 
			
		||||
	sbuf_len=0;
 | 
			
		||||
	sbuf_off=0;
 | 
			
		||||
 | 
			
		||||
	/* This is an ugly hack that does a lot of assumptions */
 | 
			
		||||
	if (starttls_proto == 1)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_read(sbio,mbuf,BUFSIZZ);
 | 
			
		||||
		BIO_printf(sbio,"EHLO some.host.name\r\n");
 | 
			
		||||
		BIO_read(sbio,mbuf,BUFSIZZ);
 | 
			
		||||
		BIO_printf(sbio,"STARTTLS\r\n");
 | 
			
		||||
		BIO_read(sbio,sbuf,BUFSIZZ);
 | 
			
		||||
		}
 | 
			
		||||
	if (starttls_proto == 2)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_read(sbio,mbuf,BUFSIZZ);
 | 
			
		||||
		BIO_printf(sbio,"STLS\r\n");
 | 
			
		||||
		BIO_read(sbio,sbuf,BUFSIZZ);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	for (;;)
 | 
			
		||||
		{
 | 
			
		||||
		FD_ZERO(&readfds);
 | 
			
		||||
@@ -626,13 +480,6 @@ re_start:
 | 
			
		||||
				print_stuff(bio_c_out,con,full_log);
 | 
			
		||||
				if (full_log > 0) full_log--;
 | 
			
		||||
 | 
			
		||||
				if (starttls_proto)
 | 
			
		||||
					{
 | 
			
		||||
					BIO_printf(bio_err,"%s",mbuf);
 | 
			
		||||
					/* We don't need to know any more */
 | 
			
		||||
					starttls_proto = 0;
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
				if (reconnect)
 | 
			
		||||
					{
 | 
			
		||||
					reconnect--;
 | 
			
		||||
@@ -649,7 +496,7 @@ re_start:
 | 
			
		||||
 | 
			
		||||
		if (!ssl_pending)
 | 
			
		||||
			{
 | 
			
		||||
#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
#ifndef WINDOWS
 | 
			
		||||
			if (tty_on)
 | 
			
		||||
				{
 | 
			
		||||
				if (read_tty)  FD_SET(fileno(stdin),&readfds);
 | 
			
		||||
@@ -676,8 +523,8 @@ re_start:
 | 
			
		||||
			 * will choke the compiler: if you do have a cast then
 | 
			
		||||
			 * you can either go for (int *) or (void *).
 | 
			
		||||
			 */
 | 
			
		||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
                        /* Under Windows/DOS we make the assumption that we can
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
			/* Under Windows we make the assumption that we can
 | 
			
		||||
			 * always write to the tty: therefore if we need to
 | 
			
		||||
			 * write to the tty we just fall through. Otherwise
 | 
			
		||||
			 * we timeout the select every second and see if there
 | 
			
		||||
@@ -691,11 +538,7 @@ re_start:
 | 
			
		||||
					tv.tv_usec = 0;
 | 
			
		||||
					i=select(width,(void *)&readfds,(void *)&writefds,
 | 
			
		||||
						 NULL,&tv);
 | 
			
		||||
#if defined(OPENSSL_SYS_WINCE) || defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
					if(!i && (!_kbhit() || !read_tty) ) continue;
 | 
			
		||||
#else
 | 
			
		||||
					if(!i && (!((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0))) || !read_tty) ) continue;
 | 
			
		||||
#endif
 | 
			
		||||
				} else 	i=select(width,(void *)&readfds,(void *)&writefds,
 | 
			
		||||
					 NULL,NULL);
 | 
			
		||||
			}
 | 
			
		||||
@@ -779,8 +622,8 @@ re_start:
 | 
			
		||||
				goto shut;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
		/* Assume Windows/DOS can always write */
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
		/* Assume Windows can always write */
 | 
			
		||||
		else if (!ssl_pending && write_tty)
 | 
			
		||||
#else
 | 
			
		||||
		else if (!ssl_pending && FD_ISSET(fileno(stdout),&writefds))
 | 
			
		||||
@@ -860,12 +703,8 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
#if defined(OPENSSL_SYS_WINCE) || defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
		else if (_kbhit())
 | 
			
		||||
#else
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
		else if ((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0)))
 | 
			
		||||
#endif
 | 
			
		||||
#else
 | 
			
		||||
		else if (FD_ISSET(fileno(stdin),&readfds))
 | 
			
		||||
#endif
 | 
			
		||||
@@ -929,16 +768,14 @@ end:
 | 
			
		||||
	if (con != NULL) SSL_free(con);
 | 
			
		||||
	if (con2 != NULL) SSL_free(con2);
 | 
			
		||||
	if (ctx != NULL) SSL_CTX_free(ctx);
 | 
			
		||||
	if (cbuf != NULL) { OPENSSL_cleanse(cbuf,BUFSIZZ); OPENSSL_free(cbuf); }
 | 
			
		||||
	if (sbuf != NULL) { OPENSSL_cleanse(sbuf,BUFSIZZ); OPENSSL_free(sbuf); }
 | 
			
		||||
	if (mbuf != NULL) { OPENSSL_cleanse(mbuf,BUFSIZZ); OPENSSL_free(mbuf); }
 | 
			
		||||
	if (cbuf != NULL) { memset(cbuf,0,BUFSIZZ); OPENSSL_free(cbuf); }
 | 
			
		||||
	if (sbuf != NULL) { memset(sbuf,0,BUFSIZZ); OPENSSL_free(sbuf); }
 | 
			
		||||
	if (bio_c_out != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_free(bio_c_out);
 | 
			
		||||
		bio_c_out=NULL;
 | 
			
		||||
		}
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
@@ -967,10 +804,10 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
			
		||||
			for (i=0; i<sk_X509_num(sk); i++)
 | 
			
		||||
				{
 | 
			
		||||
				X509_NAME_oneline(X509_get_subject_name(
 | 
			
		||||
					sk_X509_value(sk,i)),buf,sizeof buf);
 | 
			
		||||
					sk_X509_value(sk,i)),buf,BUFSIZ);
 | 
			
		||||
				BIO_printf(bio,"%2d s:%s\n",i,buf);
 | 
			
		||||
				X509_NAME_oneline(X509_get_issuer_name(
 | 
			
		||||
					sk_X509_value(sk,i)),buf,sizeof buf);
 | 
			
		||||
					sk_X509_value(sk,i)),buf,BUFSIZ);
 | 
			
		||||
				BIO_printf(bio,"   i:%s\n",buf);
 | 
			
		||||
				if (c_showcerts)
 | 
			
		||||
					PEM_write_bio_X509(bio,sk_X509_value(sk,i));
 | 
			
		||||
@@ -985,10 +822,10 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
			
		||||
			if (!(c_showcerts && got_a_chain)) /* Redundant if we showed the whole chain */
 | 
			
		||||
				PEM_write_bio_X509(bio,peer);
 | 
			
		||||
			X509_NAME_oneline(X509_get_subject_name(peer),
 | 
			
		||||
				buf,sizeof buf);
 | 
			
		||||
				buf,BUFSIZ);
 | 
			
		||||
			BIO_printf(bio,"subject=%s\n",buf);
 | 
			
		||||
			X509_NAME_oneline(X509_get_issuer_name(peer),
 | 
			
		||||
				buf,sizeof buf);
 | 
			
		||||
				buf,BUFSIZ);
 | 
			
		||||
			BIO_printf(bio,"issuer=%s\n",buf);
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
@@ -1010,7 +847,7 @@ static void print_stuff(BIO *bio, SSL *s, int full)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio,"---\nNo client certificate CA names sent\n");
 | 
			
		||||
			}
 | 
			
		||||
		p=SSL_get_shared_ciphers(s,buf,sizeof buf);
 | 
			
		||||
		p=SSL_get_shared_ciphers(s,buf,BUFSIZ);
 | 
			
		||||
		if (p != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			/* This works only for SSL 2.  In later protocol
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										292
									
								
								apps/s_server.c
									
									
									
									
									
								
							
							
						
						
									
										292
									
								
								apps/s_server.c
									
									
									
									
									
								
							@@ -55,59 +55,6 @@
 | 
			
		||||
 * copied and put under another distribution licence
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    openssl-core@openssl.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <assert.h>
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
@@ -115,8 +62,7 @@
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#include <sys/types.h>
 | 
			
		||||
#include <sys/stat.h>
 | 
			
		||||
#include <openssl/e_os2.h>
 | 
			
		||||
#ifdef OPENSSL_NO_STDIO
 | 
			
		||||
#ifdef NO_STDIO
 | 
			
		||||
#define APPS_WIN16
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -124,7 +70,7 @@
 | 
			
		||||
   recursive header file inclusion, resulting in the compiler complaining
 | 
			
		||||
   that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
 | 
			
		||||
   is needed to have fileno() declared correctly...  So let's define u_int */
 | 
			
		||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__U_INT)
 | 
			
		||||
#if defined(VMS) && defined(__DECC) && !defined(__U_INT)
 | 
			
		||||
#define __U_INT
 | 
			
		||||
typedef unsigned int u_int;
 | 
			
		||||
#endif
 | 
			
		||||
@@ -140,20 +86,16 @@ typedef unsigned int u_int;
 | 
			
		||||
#include <openssl/rand.h>
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_WINCE
 | 
			
		||||
/* Windows CE incorrectly defines fileno as returning void*, so to avoid problems below... */
 | 
			
		||||
#ifdef fileno
 | 
			
		||||
#undef fileno
 | 
			
		||||
#endif
 | 
			
		||||
#define fileno(a) (int)_fileno(a)
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
#include <conio.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if (defined(OPENSSL_SYS_VMS) && __VMS_VER < 70000000)
 | 
			
		||||
#if (defined(VMS) && __VMS_VER < 70000000)
 | 
			
		||||
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
 | 
			
		||||
#undef FIONBIO
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#ifndef NO_RSA
 | 
			
		||||
static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength);
 | 
			
		||||
#endif
 | 
			
		||||
static int sv_body(char *hostname, int s, unsigned char *context);
 | 
			
		||||
@@ -162,9 +104,7 @@ static void close_accept_socket(void );
 | 
			
		||||
static void sv_usage(void);
 | 
			
		||||
static int init_ssl_connection(SSL *s);
 | 
			
		||||
static void print_stats(BIO *bp,SSL_CTX *ctx);
 | 
			
		||||
static int generate_session_id(const SSL *ssl, unsigned char *id,
 | 
			
		||||
				unsigned int *id_len);
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
static DH *load_dh_param(char *dhfile);
 | 
			
		||||
static DH *get_dh512(void);
 | 
			
		||||
#endif
 | 
			
		||||
@@ -180,7 +120,7 @@ static void s_server_init(void);
 | 
			
		||||
# endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
static unsigned char dh512_p[]={
 | 
			
		||||
	0xDA,0x58,0x3C,0x16,0xD9,0x85,0x22,0x89,0xD0,0xE4,0xAF,0x75,
 | 
			
		||||
	0x6F,0x4C,0xCA,0x92,0xDD,0x4B,0xE5,0x33,0xB8,0x04,0xFB,0x0F,
 | 
			
		||||
@@ -234,14 +174,9 @@ static int www=0;
 | 
			
		||||
 | 
			
		||||
static BIO *bio_s_out=NULL;
 | 
			
		||||
static int s_debug=0;
 | 
			
		||||
static int s_msg=0;
 | 
			
		||||
static int s_quiet=0;
 | 
			
		||||
 | 
			
		||||
static int hack=0;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
static char *engine_id=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
static const char *session_id_prefix=NULL;
 | 
			
		||||
 | 
			
		||||
#ifdef MONOLITH
 | 
			
		||||
static void s_server_init(void)
 | 
			
		||||
@@ -262,12 +197,8 @@ static void s_server_init(void)
 | 
			
		||||
 | 
			
		||||
	bio_s_out=NULL;
 | 
			
		||||
	s_debug=0;
 | 
			
		||||
	s_msg=0;
 | 
			
		||||
	s_quiet=0;
 | 
			
		||||
	hack=0;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	engine_id=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -293,13 +224,11 @@ static void sv_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -nbio_test    - test with the non-blocking test bio\n");
 | 
			
		||||
	BIO_printf(bio_err," -crlf         - convert LF from terminal into CRLF\n");
 | 
			
		||||
	BIO_printf(bio_err," -debug        - Print more output\n");
 | 
			
		||||
	BIO_printf(bio_err," -msg          - Show protocol messages\n");
 | 
			
		||||
	BIO_printf(bio_err," -state        - Print the SSL states\n");
 | 
			
		||||
	BIO_printf(bio_err," -CApath arg   - PEM format directory of CA's\n");
 | 
			
		||||
	BIO_printf(bio_err," -CAfile arg   - PEM format file of CA's\n");
 | 
			
		||||
	BIO_printf(bio_err," -nocert       - Don't use any certificates (Anon-DH)\n");
 | 
			
		||||
	BIO_printf(bio_err," -cipher arg   - play with 'openssl ciphers' to see what goes here\n");
 | 
			
		||||
	BIO_printf(bio_err," -serverpref   - Use server's cipher preferences\n");
 | 
			
		||||
	BIO_printf(bio_err," -quiet        - No server output\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_tmp_rsa   - Do not generate a tmp RSA key\n");
 | 
			
		||||
	BIO_printf(bio_err," -ssl2         - Just talk SSLv2\n");
 | 
			
		||||
@@ -308,18 +237,12 @@ static void sv_usage(void)
 | 
			
		||||
	BIO_printf(bio_err," -no_ssl2      - Just disable SSLv2\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_ssl3      - Just disable SSLv3\n");
 | 
			
		||||
	BIO_printf(bio_err," -no_tls1      - Just disable TLSv1\n");
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
	BIO_printf(bio_err," -no_dhe       - Disable ephemeral DH\n");
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -bugs         - Turn on SSL bug compatibility\n");
 | 
			
		||||
	BIO_printf(bio_err," -www          - Respond to a 'GET /' with a status page\n");
 | 
			
		||||
	BIO_printf(bio_err," -WWW          - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
 | 
			
		||||
	BIO_printf(bio_err," -HTTP         - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
 | 
			
		||||
        BIO_printf(bio_err,"                 with the assumption it contains a complete HTTP response.\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	BIO_printf(bio_err," -engine id    - Initialise and use the specified engine\n");
 | 
			
		||||
#endif
 | 
			
		||||
	BIO_printf(bio_err," -id_prefix arg - Generate SSL/TLS session IDs prefixed by 'arg'\n");
 | 
			
		||||
	BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
@@ -330,10 +253,10 @@ static char **local_argv;
 | 
			
		||||
static int ebcdic_new(BIO *bi);
 | 
			
		||||
static int ebcdic_free(BIO *a);
 | 
			
		||||
static int ebcdic_read(BIO *b, char *out, int outl);
 | 
			
		||||
static int ebcdic_write(BIO *b, const char *in, int inl);
 | 
			
		||||
static long ebcdic_ctrl(BIO *b, int cmd, long num, void *ptr);
 | 
			
		||||
static int ebcdic_write(BIO *b, char *in, int inl);
 | 
			
		||||
static long ebcdic_ctrl(BIO *b, int cmd, long num, char *ptr);
 | 
			
		||||
static int ebcdic_gets(BIO *bp, char *buf, int size);
 | 
			
		||||
static int ebcdic_puts(BIO *bp, const char *str);
 | 
			
		||||
static int ebcdic_puts(BIO *bp, char *str);
 | 
			
		||||
 | 
			
		||||
#define BIO_TYPE_EBCDIC_FILTER	(18|0x0200)
 | 
			
		||||
static BIO_METHOD methods_ebcdic=
 | 
			
		||||
@@ -398,7 +321,7 @@ static int ebcdic_read(BIO *b, char *out, int outl)
 | 
			
		||||
	return(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int ebcdic_write(BIO *b, const char *in, int inl)
 | 
			
		||||
static int ebcdic_write(BIO *b, char *in, int inl)
 | 
			
		||||
{
 | 
			
		||||
	EBCDIC_OUTBUFF *wbuf;
 | 
			
		||||
	int ret=0;
 | 
			
		||||
@@ -431,7 +354,7 @@ static int ebcdic_write(BIO *b, const char *in, int inl)
 | 
			
		||||
	return(ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static long ebcdic_ctrl(BIO *b, int cmd, long num, void *ptr)
 | 
			
		||||
static long ebcdic_ctrl(BIO *b, int cmd, long num, char *ptr)
 | 
			
		||||
{
 | 
			
		||||
	long ret;
 | 
			
		||||
 | 
			
		||||
@@ -450,7 +373,7 @@ static long ebcdic_ctrl(BIO *b, int cmd, long num, void *ptr)
 | 
			
		||||
 | 
			
		||||
static int ebcdic_gets(BIO *bp, char *buf, int size)
 | 
			
		||||
{
 | 
			
		||||
	int i, ret=0;
 | 
			
		||||
	int i, ret;
 | 
			
		||||
	if (bp->next_bio == NULL) return(0);
 | 
			
		||||
/*	return(BIO_gets(bp->next_bio,buf,size));*/
 | 
			
		||||
	for (i=0; i<size-1; ++i)
 | 
			
		||||
@@ -469,7 +392,7 @@ static int ebcdic_gets(BIO *bp, char *buf, int size)
 | 
			
		||||
	return (ret < 0 && i == 0) ? ret : i;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int ebcdic_puts(BIO *bp, const char *str)
 | 
			
		||||
static int ebcdic_puts(BIO *bp, char *str)
 | 
			
		||||
{
 | 
			
		||||
	if (bp->next_bio == NULL) return(0);
 | 
			
		||||
	return ebcdic_write(bp, str, strlen(str));
 | 
			
		||||
@@ -480,8 +403,6 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char *argv[])
 | 
			
		||||
	{
 | 
			
		||||
	X509_STORE *store = NULL;
 | 
			
		||||
	int vflags = 0;
 | 
			
		||||
	short port=PORT;
 | 
			
		||||
	char *CApath=NULL,*CAfile=NULL;
 | 
			
		||||
	char *context = NULL;
 | 
			
		||||
@@ -492,16 +413,16 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
	int no_tmp_rsa=0,no_dhe=0,nocert=0;
 | 
			
		||||
	int state=0;
 | 
			
		||||
	SSL_METHOD *meth=NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	ENGINE *e=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	char *inrand=NULL;
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
	DH *dh=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
#if !defined(NO_SSL2) && !defined(NO_SSL3)
 | 
			
		||||
	meth=SSLv23_server_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
#elif !defined(NO_SSL3)
 | 
			
		||||
	meth=SSLv3_server_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
#elif !defined(NO_SSL2)
 | 
			
		||||
	meth=SSLv2_server_method();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -516,9 +437,6 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	verify_depth=0;
 | 
			
		||||
#ifdef FIONBIO
 | 
			
		||||
	s_nbio=0;
 | 
			
		||||
@@ -591,16 +509,6 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			CApath= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-crl_check") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			vflags |= X509_V_FLAG_CRL_CHECK;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-crl_check") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			vflags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
 | 
			
		||||
			}
 | 
			
		||||
		else if	(strcmp(*argv,"-serverpref") == 0)
 | 
			
		||||
			{ off|=SSL_OP_CIPHER_SERVER_PREFERENCE; }
 | 
			
		||||
		else if	(strcmp(*argv,"-cipher") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
@@ -624,8 +532,6 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
			}
 | 
			
		||||
		else if	(strcmp(*argv,"-debug") == 0)
 | 
			
		||||
			{ s_debug=1; }
 | 
			
		||||
		else if	(strcmp(*argv,"-msg") == 0)
 | 
			
		||||
			{ s_msg=1; }
 | 
			
		||||
		else if	(strcmp(*argv,"-hack") == 0)
 | 
			
		||||
			{ hack=1; }
 | 
			
		||||
		else if	(strcmp(*argv,"-state") == 0)
 | 
			
		||||
@@ -644,37 +550,23 @@ int MAIN(int argc, char *argv[])
 | 
			
		||||
			{ www=1; }
 | 
			
		||||
		else if	(strcmp(*argv,"-WWW") == 0)
 | 
			
		||||
			{ www=2; }
 | 
			
		||||
		else if	(strcmp(*argv,"-HTTP") == 0)
 | 
			
		||||
			{ www=3; }
 | 
			
		||||
		else if	(strcmp(*argv,"-no_ssl2") == 0)
 | 
			
		||||
			{ off|=SSL_OP_NO_SSLv2; }
 | 
			
		||||
		else if	(strcmp(*argv,"-no_ssl3") == 0)
 | 
			
		||||
			{ off|=SSL_OP_NO_SSLv3; }
 | 
			
		||||
		else if	(strcmp(*argv,"-no_tls1") == 0)
 | 
			
		||||
			{ off|=SSL_OP_NO_TLSv1; }
 | 
			
		||||
#ifndef OPENSSL_NO_SSL2
 | 
			
		||||
#ifndef NO_SSL2
 | 
			
		||||
		else if	(strcmp(*argv,"-ssl2") == 0)
 | 
			
		||||
			{ meth=SSLv2_server_method(); }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3
 | 
			
		||||
#ifndef NO_SSL3
 | 
			
		||||
		else if	(strcmp(*argv,"-ssl3") == 0)
 | 
			
		||||
			{ meth=SSLv3_server_method(); }
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_TLS1
 | 
			
		||||
#ifndef NO_TLS1
 | 
			
		||||
		else if	(strcmp(*argv,"-tls1") == 0)
 | 
			
		||||
			{ meth=TLSv1_server_method(); }
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv, "-id_prefix") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			session_id_prefix = *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine_id= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-rand") == 0)
 | 
			
		||||
			{
 | 
			
		||||
@@ -697,13 +589,6 @@ bad:
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	SSL_load_error_strings();
 | 
			
		||||
	OpenSSL_add_ssl_algorithms();
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine_id, 1);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
 | 
			
		||||
		&& !RAND_status())
 | 
			
		||||
		{
 | 
			
		||||
@@ -715,7 +600,7 @@ bad:
 | 
			
		||||
 | 
			
		||||
	if (bio_s_out == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		if (s_quiet && !s_debug && !s_msg)
 | 
			
		||||
		if (s_quiet && !s_debug)
 | 
			
		||||
			{
 | 
			
		||||
			bio_s_out=BIO_new(BIO_s_null());
 | 
			
		||||
			}
 | 
			
		||||
@@ -726,7 +611,7 @@ bad:
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_RSA) || !defined(OPENSSL_NO_DSA)
 | 
			
		||||
#if !defined(NO_RSA) || !defined(NO_DSA)
 | 
			
		||||
	if (nocert)
 | 
			
		||||
#endif
 | 
			
		||||
		{
 | 
			
		||||
@@ -736,32 +621,21 @@ bad:
 | 
			
		||||
		s_dkey_file=NULL;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	SSL_load_error_strings();
 | 
			
		||||
	OpenSSL_add_ssl_algorithms();
 | 
			
		||||
 | 
			
		||||
	ctx=SSL_CTX_new(meth);
 | 
			
		||||
	if (ctx == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	if (session_id_prefix)
 | 
			
		||||
		{
 | 
			
		||||
		if(strlen(session_id_prefix) >= 32)
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
"warning: id_prefix is too long, only one new session will be possible\n");
 | 
			
		||||
		else if(strlen(session_id_prefix) >= 16)
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
"warning: id_prefix is too long if you use SSLv2\n");
 | 
			
		||||
		if(!SSL_CTX_set_generate_session_id(ctx, generate_session_id))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"error setting 'id_prefix'\n");
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		BIO_printf(bio_err,"id_prefix '%s' set.\n", session_id_prefix);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	SSL_CTX_set_quiet_shutdown(ctx,1);
 | 
			
		||||
	if (bugs) SSL_CTX_set_options(ctx,SSL_OP_ALL);
 | 
			
		||||
	if (hack) SSL_CTX_set_options(ctx,SSL_OP_NETSCAPE_DEMO_CIPHER_CHANGE_BUG);
 | 
			
		||||
	SSL_CTX_set_options(ctx,off);
 | 
			
		||||
	if (hack) SSL_CTX_set_options(ctx,SSL_OP_NON_EXPORT_FIRST);
 | 
			
		||||
 | 
			
		||||
	if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
 | 
			
		||||
 | 
			
		||||
@@ -786,19 +660,11 @@ bad:
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		/* goto end; */
 | 
			
		||||
		}
 | 
			
		||||
	store = SSL_CTX_get_cert_store(ctx);
 | 
			
		||||
	X509_STORE_set_flags(store, vflags);
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
	if (!no_dhe)
 | 
			
		||||
		{
 | 
			
		||||
		DH *dh=NULL;
 | 
			
		||||
 | 
			
		||||
		if (dhfile)
 | 
			
		||||
			dh = load_dh_param(dhfile);
 | 
			
		||||
		else if (s_cert_file)
 | 
			
		||||
			dh = load_dh_param(s_cert_file);
 | 
			
		||||
 | 
			
		||||
		dh=load_dh_param(dhfile ? dhfile : s_cert_file);
 | 
			
		||||
		if (dh != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_s_out,"Setting temp DH parameters\n");
 | 
			
		||||
@@ -823,7 +689,7 @@ bad:
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#ifndef NO_RSA
 | 
			
		||||
#if 1
 | 
			
		||||
	if (!no_tmp_rsa)
 | 
			
		||||
		SSL_CTX_set_tmp_rsa_callback(ctx,tmp_rsa_cb);
 | 
			
		||||
@@ -875,8 +741,7 @@ end:
 | 
			
		||||
		BIO_free(bio_s_out);
 | 
			
		||||
		bio_s_out=NULL;
 | 
			
		||||
		}
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static void print_stats(BIO *bio, SSL_CTX *ssl_ctx)
 | 
			
		||||
@@ -913,7 +778,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
	unsigned long l;
 | 
			
		||||
	SSL *con=NULL;
 | 
			
		||||
	BIO *sbio;
 | 
			
		||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
	struct timeval tv;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -936,15 +801,6 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
 | 
			
		||||
	if (con == NULL) {
 | 
			
		||||
		con=SSL_new(ctx);
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
		if ((con->kssl_ctx = kssl_ctx_new()) != NULL)
 | 
			
		||||
                        {
 | 
			
		||||
                        kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE,
 | 
			
		||||
								KRB5SVC);
 | 
			
		||||
                        kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB,
 | 
			
		||||
								KRB5KEYTAB);
 | 
			
		||||
                        }
 | 
			
		||||
#endif	/* OPENSSL_NO_KRB5 */
 | 
			
		||||
		if(context)
 | 
			
		||||
		      SSL_set_session_id_context(con, context,
 | 
			
		||||
						 strlen((char *)context));
 | 
			
		||||
@@ -969,11 +825,6 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
		BIO_set_callback(SSL_get_rbio(con),bio_dump_cb);
 | 
			
		||||
		BIO_set_callback_arg(SSL_get_rbio(con),bio_s_out);
 | 
			
		||||
		}
 | 
			
		||||
	if (s_msg)
 | 
			
		||||
		{
 | 
			
		||||
		SSL_set_msg_callback(con, msg_cb);
 | 
			
		||||
		SSL_set_msg_callback_arg(con, bio_s_out);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	width=s+1;
 | 
			
		||||
	for (;;)
 | 
			
		||||
@@ -987,7 +838,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
		if (!read_from_sslcon)
 | 
			
		||||
			{
 | 
			
		||||
			FD_ZERO(&readfds);
 | 
			
		||||
#if !defined(OPENSSL_SYS_WINDOWS) && !defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
#ifndef WINDOWS
 | 
			
		||||
			FD_SET(fileno(stdin),&readfds);
 | 
			
		||||
#endif
 | 
			
		||||
			FD_SET(s,&readfds);
 | 
			
		||||
@@ -997,8 +848,8 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
			 * the compiler: if you do have a cast then you can either
 | 
			
		||||
			 * go for (int *) or (void *).
 | 
			
		||||
			 */
 | 
			
		||||
#if defined(OPENSSL_SYS_WINDOWS) || defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
                        /* Under DOS (non-djgpp) and Windows we can't select on stdin: only
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
			/* Under Windows we can't select on stdin: only
 | 
			
		||||
			 * on sockets. As a workaround we timeout the select every
 | 
			
		||||
			 * second and check for any keypress. In a proper Windows
 | 
			
		||||
			 * application we wouldn't do this because it is inefficient.
 | 
			
		||||
@@ -1192,7 +1043,7 @@ err:
 | 
			
		||||
	BIO_printf(bio_s_out,"CONNECTION CLOSED\n");
 | 
			
		||||
	if (buf != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		OPENSSL_cleanse(buf,bufsize);
 | 
			
		||||
		memset(buf,0,bufsize);
 | 
			
		||||
		OPENSSL_free(buf);
 | 
			
		||||
		}
 | 
			
		||||
	if (ret >= 0)
 | 
			
		||||
@@ -1244,14 +1095,14 @@ static int init_ssl_connection(SSL *con)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_s_out,"Client certificate\n");
 | 
			
		||||
		PEM_write_bio_X509(bio_s_out,peer);
 | 
			
		||||
		X509_NAME_oneline(X509_get_subject_name(peer),buf,sizeof buf);
 | 
			
		||||
		X509_NAME_oneline(X509_get_subject_name(peer),buf,BUFSIZ);
 | 
			
		||||
		BIO_printf(bio_s_out,"subject=%s\n",buf);
 | 
			
		||||
		X509_NAME_oneline(X509_get_issuer_name(peer),buf,sizeof buf);
 | 
			
		||||
		X509_NAME_oneline(X509_get_issuer_name(peer),buf,BUFSIZ);
 | 
			
		||||
		BIO_printf(bio_s_out,"issuer=%s\n",buf);
 | 
			
		||||
		X509_free(peer);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (SSL_get_shared_ciphers(con,buf,sizeof buf) != NULL)
 | 
			
		||||
	if (SSL_get_shared_ciphers(con,buf,BUFSIZ) != NULL)
 | 
			
		||||
		BIO_printf(bio_s_out,"Shared ciphers:%s\n",buf);
 | 
			
		||||
	str=SSL_CIPHER_get_name(SSL_get_current_cipher(con));
 | 
			
		||||
	BIO_printf(bio_s_out,"CIPHER is %s\n",(str != NULL)?str:"(NONE)");
 | 
			
		||||
@@ -1259,17 +1110,11 @@ static int init_ssl_connection(SSL *con)
 | 
			
		||||
	if (SSL_ctrl(con,SSL_CTRL_GET_FLAGS,0,NULL) &
 | 
			
		||||
		TLS1_FLAGS_TLS_PADDING_BUG)
 | 
			
		||||
		BIO_printf(bio_s_out,"Peer has incorrect TLSv1 block padding\n");
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	if (con->kssl_ctx->client_princ != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_s_out,"Kerberos peer principal is %s\n",
 | 
			
		||||
			con->kssl_ctx->client_princ);
 | 
			
		||||
		}
 | 
			
		||||
#endif /* OPENSSL_NO_KRB5 */
 | 
			
		||||
 | 
			
		||||
	return(1);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DH
 | 
			
		||||
#ifndef NO_DH
 | 
			
		||||
static DH *load_dh_param(char *dhfile)
 | 
			
		||||
	{
 | 
			
		||||
	DH *ret=NULL;
 | 
			
		||||
@@ -1338,13 +1183,6 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
	if (!BIO_set_write_buffer_size(io,bufsize)) goto err;
 | 
			
		||||
 | 
			
		||||
	if ((con=SSL_new(ctx)) == NULL) goto err;
 | 
			
		||||
#ifndef OPENSSL_NO_KRB5
 | 
			
		||||
	if ((con->kssl_ctx = kssl_ctx_new()) != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		kssl_ctx_setstring(con->kssl_ctx, KSSL_SERVICE, KRB5SVC);
 | 
			
		||||
		kssl_ctx_setstring(con->kssl_ctx, KSSL_KEYTAB, KRB5KEYTAB);
 | 
			
		||||
		}
 | 
			
		||||
#endif	/* OPENSSL_NO_KRB5 */
 | 
			
		||||
	if(context) SSL_set_session_id_context(con, context,
 | 
			
		||||
					       strlen((char *)context));
 | 
			
		||||
 | 
			
		||||
@@ -1372,11 +1210,6 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
		BIO_set_callback(SSL_get_rbio(con),bio_dump_cb);
 | 
			
		||||
		BIO_set_callback_arg(SSL_get_rbio(con),bio_s_out);
 | 
			
		||||
		}
 | 
			
		||||
	if (s_msg)
 | 
			
		||||
		{
 | 
			
		||||
		SSL_set_msg_callback(con, msg_cb);
 | 
			
		||||
		SSL_set_msg_callback_arg(con, bio_s_out);
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	blank=0;
 | 
			
		||||
	for (;;)
 | 
			
		||||
@@ -1417,7 +1250,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
			else
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_s_out,"read R BLOCK\n");
 | 
			
		||||
#if !defined(OPENSSL_SYS_MSDOS) && !defined(__DJGPP__)
 | 
			
		||||
#ifndef MSDOS
 | 
			
		||||
				sleep(1);
 | 
			
		||||
#endif
 | 
			
		||||
				continue;
 | 
			
		||||
@@ -1511,8 +1344,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
			BIO_puts(io,"</BODY></HTML>\r\n\r\n");
 | 
			
		||||
			break;
 | 
			
		||||
			}
 | 
			
		||||
		else if ((www == 2 || www == 3)
 | 
			
		||||
                         && (strncmp("GET /",buf,5) == 0))
 | 
			
		||||
		else if ((www == 2) && (strncmp("GET /",buf,5) == 0))
 | 
			
		||||
			{
 | 
			
		||||
			BIO *file;
 | 
			
		||||
			char *p,*e;
 | 
			
		||||
@@ -1602,8 +1434,6 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
			if (!s_quiet)
 | 
			
		||||
				BIO_printf(bio_err,"FILE:%s\n",p);
 | 
			
		||||
 | 
			
		||||
                        if (www == 2)
 | 
			
		||||
                                {
 | 
			
		||||
			i=strlen(p);
 | 
			
		||||
			if (	((i > 5) && (strcmp(&(p[i-5]),".html") == 0)) ||
 | 
			
		||||
				((i > 4) && (strcmp(&(p[i-4]),".php") == 0)) ||
 | 
			
		||||
@@ -1611,7 +1441,6 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
			
		||||
				BIO_puts(io,"HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n");
 | 
			
		||||
			else
 | 
			
		||||
				BIO_puts(io,"HTTP/1.0 200 ok\r\nContent-type: text/plain\r\n\r\n");
 | 
			
		||||
                                }
 | 
			
		||||
			/* send the file */
 | 
			
		||||
			total_bytes=0;
 | 
			
		||||
			for (;;)
 | 
			
		||||
@@ -1689,7 +1518,7 @@ err:
 | 
			
		||||
	return(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#ifndef NO_RSA
 | 
			
		||||
static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength)
 | 
			
		||||
	{
 | 
			
		||||
	static RSA *rsa_tmp=NULL;
 | 
			
		||||
@@ -1711,26 +1540,3 @@ static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength)
 | 
			
		||||
	return(rsa_tmp);
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#define MAX_SESSION_ID_ATTEMPTS 10
 | 
			
		||||
static int generate_session_id(const SSL *ssl, unsigned char *id,
 | 
			
		||||
				unsigned int *id_len)
 | 
			
		||||
	{
 | 
			
		||||
	unsigned int count = 0;
 | 
			
		||||
	do	{
 | 
			
		||||
		RAND_pseudo_bytes(id, *id_len);
 | 
			
		||||
		/* Prefix the session_id with the required prefix. NB: If our
 | 
			
		||||
		 * prefix is too long, clip it - but there will be worse effects
 | 
			
		||||
		 * anyway, eg. the server could only possibly create 1 session
 | 
			
		||||
		 * ID (ie. the prefix!) so all future session negotiations will
 | 
			
		||||
		 * fail due to conflicts. */
 | 
			
		||||
		memcpy(id, session_id_prefix,
 | 
			
		||||
			(strlen(session_id_prefix) < *id_len) ?
 | 
			
		||||
			strlen(session_id_prefix) : *id_len);
 | 
			
		||||
		}
 | 
			
		||||
	while(SSL_has_matching_session_id(ssl, id, *id_len) &&
 | 
			
		||||
		(++count < MAX_SESSION_ID_ATTEMPTS));
 | 
			
		||||
	if(count >= MAX_SESSION_ID_ATTEMPTS)
 | 
			
		||||
		return 0;
 | 
			
		||||
	return 1;
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
@@ -62,13 +62,11 @@
 | 
			
		||||
#include <errno.h>
 | 
			
		||||
#include <signal.h>
 | 
			
		||||
 | 
			
		||||
#include <openssl/e_os2.h>
 | 
			
		||||
 | 
			
		||||
/* With IPv6, it looks like Digital has mixed up the proper order of
 | 
			
		||||
   recursive header file inclusion, resulting in the compiler complaining
 | 
			
		||||
   that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
 | 
			
		||||
   is needed to have fileno() declared correctly...  So let's define u_int */
 | 
			
		||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__U_INT)
 | 
			
		||||
#if defined(VMS) && defined(__DECC) && !defined(__U_INT)
 | 
			
		||||
#define __U_INT
 | 
			
		||||
typedef unsigned int u_int;
 | 
			
		||||
#endif
 | 
			
		||||
@@ -82,27 +80,27 @@ typedef unsigned int u_int;
 | 
			
		||||
#include <openssl/ssl.h>
 | 
			
		||||
 | 
			
		||||
static struct hostent *GetHostByName(char *name);
 | 
			
		||||
#ifdef OPENSSL_SYS_WINDOWS
 | 
			
		||||
static void ssl_sock_cleanup(void);
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
static void sock_cleanup(void);
 | 
			
		||||
#endif
 | 
			
		||||
static int ssl_sock_init(void);
 | 
			
		||||
static int sock_init(void);
 | 
			
		||||
static int init_client_ip(int *sock,unsigned char ip[4], int port);
 | 
			
		||||
static int init_server(int *sock, int port);
 | 
			
		||||
static int init_server_long(int *sock, int port,char *ip);
 | 
			
		||||
static int do_accept(int acc_sock, int *sock, char **host);
 | 
			
		||||
static int host_ip(char *str, unsigned char ip[4]);
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_WIN16
 | 
			
		||||
#ifdef WIN16
 | 
			
		||||
#define SOCKET_PROTOCOL	0 /* more microsoft stupidity */
 | 
			
		||||
#else
 | 
			
		||||
#define SOCKET_PROTOCOL	IPPROTO_TCP
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_WINDOWS
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
static struct WSAData wsa_state;
 | 
			
		||||
static int wsa_init_done=0;
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_WIN16
 | 
			
		||||
#ifdef WIN16
 | 
			
		||||
static HWND topWnd=0;
 | 
			
		||||
static FARPROC lpTopWndProc=NULL;
 | 
			
		||||
static FARPROC lpTopHookProc=NULL;
 | 
			
		||||
@@ -118,7 +116,7 @@ static LONG FAR PASCAL topHookProc(HWND hwnd, UINT message, WPARAM wParam,
 | 
			
		||||
		case WM_DESTROY:
 | 
			
		||||
		case WM_CLOSE:
 | 
			
		||||
			SetWindowLong(topWnd,GWL_WNDPROC,(LONG)lpTopWndProc);
 | 
			
		||||
			ssl_sock_cleanup();
 | 
			
		||||
			sock_cleanup();
 | 
			
		||||
			break;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
@@ -131,37 +129,30 @@ static BOOL CALLBACK enumproc(HWND hwnd,LPARAM lParam)
 | 
			
		||||
	return(FALSE);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#endif /* OPENSSL_SYS_WIN32 */
 | 
			
		||||
#endif /* OPENSSL_SYS_WINDOWS */
 | 
			
		||||
#endif /* WIN32 */
 | 
			
		||||
#endif /* WINDOWS */
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_WINDOWS
 | 
			
		||||
static void ssl_sock_cleanup(void)
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
static void sock_cleanup(void)
 | 
			
		||||
	{
 | 
			
		||||
	if (wsa_init_done)
 | 
			
		||||
		{
 | 
			
		||||
		wsa_init_done=0;
 | 
			
		||||
#ifndef OPENSSL_SYS_WINCE
 | 
			
		||||
		WSACancelBlockingCall();
 | 
			
		||||
#endif
 | 
			
		||||
		WSACleanup();
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
static int ssl_sock_init(void)
 | 
			
		||||
static int sock_init(void)
 | 
			
		||||
	{
 | 
			
		||||
#ifdef WATT32
 | 
			
		||||
	extern int _watt_do_exit;
 | 
			
		||||
	_watt_do_exit = 0;
 | 
			
		||||
	if (sock_init())
 | 
			
		||||
		return (0);
 | 
			
		||||
#elif defined(OPENSSL_SYS_WINDOWS)
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
	if (!wsa_init_done)
 | 
			
		||||
		{
 | 
			
		||||
		int err;
 | 
			
		||||
	  
 | 
			
		||||
#ifdef SIGINT
 | 
			
		||||
		signal(SIGINT,(void (*)(int))ssl_sock_cleanup);
 | 
			
		||||
		signal(SIGINT,(void (*)(int))sock_cleanup);
 | 
			
		||||
#endif
 | 
			
		||||
		wsa_init_done=1;
 | 
			
		||||
		memset(&wsa_state,0,sizeof(wsa_state));
 | 
			
		||||
@@ -172,15 +163,15 @@ static int ssl_sock_init(void)
 | 
			
		||||
			return(0);
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
#ifdef OPENSSL_SYS_WIN16
 | 
			
		||||
#ifdef WIN16
 | 
			
		||||
		EnumTaskWindows(GetCurrentTask(),enumproc,0L);
 | 
			
		||||
		lpTopWndProc=(FARPROC)GetWindowLong(topWnd,GWL_WNDPROC);
 | 
			
		||||
		lpTopHookProc=MakeProcInstance((FARPROC)topHookProc,_hInstance);
 | 
			
		||||
 | 
			
		||||
		SetWindowLong(topWnd,GWL_WNDPROC,(LONG)lpTopHookProc);
 | 
			
		||||
#endif /* OPENSSL_SYS_WIN16 */
 | 
			
		||||
#endif /* WIN16 */
 | 
			
		||||
		}
 | 
			
		||||
#endif /* OPENSSL_SYS_WINDOWS */
 | 
			
		||||
#endif /* WINDOWS */
 | 
			
		||||
	return(1);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
@@ -203,7 +194,7 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port)
 | 
			
		||||
	struct sockaddr_in them;
 | 
			
		||||
	int s,i;
 | 
			
		||||
 | 
			
		||||
	if (!ssl_sock_init()) return(0);
 | 
			
		||||
	if (!sock_init()) return(0);
 | 
			
		||||
 | 
			
		||||
	memset((char *)&them,0,sizeof(them));
 | 
			
		||||
	them.sin_family=AF_INET;
 | 
			
		||||
@@ -218,7 +209,7 @@ static int init_client_ip(int *sock, unsigned char ip[4], int port)
 | 
			
		||||
	s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
 | 
			
		||||
	if (s == INVALID_SOCKET) { perror("socket"); return(0); }
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_SYS_MPE
 | 
			
		||||
#ifndef MPE
 | 
			
		||||
	i=0;
 | 
			
		||||
	i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
 | 
			
		||||
	if (i < 0) { perror("keepalive"); return(0); }
 | 
			
		||||
@@ -268,7 +259,7 @@ static int init_server_long(int *sock, int port, char *ip)
 | 
			
		||||
	struct sockaddr_in server;
 | 
			
		||||
	int s= -1,i;
 | 
			
		||||
 | 
			
		||||
	if (!ssl_sock_init()) return(0);
 | 
			
		||||
	if (!sock_init()) return(0);
 | 
			
		||||
 | 
			
		||||
	memset((char *)&server,0,sizeof(server));
 | 
			
		||||
	server.sin_family=AF_INET;
 | 
			
		||||
@@ -294,7 +285,7 @@ static int init_server_long(int *sock, int port, char *ip)
 | 
			
		||||
#endif
 | 
			
		||||
	if (bind(s,(struct sockaddr *)&server,sizeof(server)) == -1)
 | 
			
		||||
		{
 | 
			
		||||
#ifndef OPENSSL_SYS_WINDOWS
 | 
			
		||||
#ifndef WINDOWS
 | 
			
		||||
		perror("bind");
 | 
			
		||||
#endif
 | 
			
		||||
		goto err;
 | 
			
		||||
@@ -325,9 +316,9 @@ static int do_accept(int acc_sock, int *sock, char **host)
 | 
			
		||||
	int len;
 | 
			
		||||
/*	struct linger ling; */
 | 
			
		||||
 | 
			
		||||
	if (!ssl_sock_init()) return(0);
 | 
			
		||||
	if (!sock_init()) return(0);
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_SYS_WINDOWS
 | 
			
		||||
#ifndef WINDOWS
 | 
			
		||||
redoit:
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -341,7 +332,7 @@ redoit:
 | 
			
		||||
	ret=accept(acc_sock,(struct sockaddr *)&from,(void *)&len);
 | 
			
		||||
	if (ret == INVALID_SOCKET)
 | 
			
		||||
		{
 | 
			
		||||
#ifdef OPENSSL_SYS_WINDOWS
 | 
			
		||||
#ifdef WINDOWS
 | 
			
		||||
		i=WSAGetLastError();
 | 
			
		||||
		BIO_printf(bio_err,"accept error %d\n",i);
 | 
			
		||||
#else
 | 
			
		||||
@@ -388,7 +379,7 @@ redoit:
 | 
			
		||||
			perror("OPENSSL_malloc");
 | 
			
		||||
			return(0);
 | 
			
		||||
			}
 | 
			
		||||
		BUF_strlcpy(*host,h1->h_name,strlen(h1->h_name)+1);
 | 
			
		||||
		strcpy(*host,h1->h_name);
 | 
			
		||||
 | 
			
		||||
		h2=GetHostByName(*host);
 | 
			
		||||
		if (h2 == NULL)
 | 
			
		||||
@@ -455,7 +446,7 @@ static int host_ip(char *str, unsigned char ip[4])
 | 
			
		||||
		{ /* do a gethostbyname */
 | 
			
		||||
		struct hostent *he;
 | 
			
		||||
 | 
			
		||||
		if (!ssl_sock_init()) return(0);
 | 
			
		||||
		if (!sock_init()) return(0);
 | 
			
		||||
 | 
			
		||||
		he=GetHostByName(str);
 | 
			
		||||
		if (he == NULL)
 | 
			
		||||
@@ -536,12 +527,9 @@ static struct hostent *GetHostByName(char *name)
 | 
			
		||||
		ret=gethostbyname(name);
 | 
			
		||||
		if (ret == NULL) return(NULL);
 | 
			
		||||
		/* else add to cache */
 | 
			
		||||
		if(strlen(name) < sizeof ghbn_cache[0].name)
 | 
			
		||||
			{
 | 
			
		||||
			strcpy(ghbn_cache[lowi].name,name);
 | 
			
		||||
		strncpy(ghbn_cache[lowi].name,name,128);
 | 
			
		||||
		memcpy((char *)&(ghbn_cache[lowi].ent),ret,sizeof(struct hostent));
 | 
			
		||||
		ghbn_cache[lowi].order=ghbn_miss+ghbn_hits;
 | 
			
		||||
			}
 | 
			
		||||
		return(ret);
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
 
 | 
			
		||||
@@ -67,25 +67,22 @@
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
 | 
			
		||||
#define USE_SOCKETS
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#ifdef OPENSSL_NO_STDIO
 | 
			
		||||
#ifdef NO_STDIO
 | 
			
		||||
#define APPS_WIN16
 | 
			
		||||
#endif
 | 
			
		||||
#define USE_SOCKETS
 | 
			
		||||
#include <openssl/x509.h>
 | 
			
		||||
#include <openssl/ssl.h>
 | 
			
		||||
#include <openssl/pem.h>
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include "s_apps.h"
 | 
			
		||||
#include <openssl/err.h>
 | 
			
		||||
#ifdef WIN32_STUFF
 | 
			
		||||
#include "winmain.h"
 | 
			
		||||
#include "wintext.h"
 | 
			
		||||
#endif
 | 
			
		||||
#if !defined(OPENSSL_SYS_MSDOS)
 | 
			
		||||
#include OPENSSL_UNISTD
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_SYS_MSDOS) && !defined(OPENSSL_SYS_VXWORKS) && (!defined(OPENSSL_SYS_VMS) || defined(__DECC))
 | 
			
		||||
#if !defined(MSDOS) && !defined(VXWORKS) && (!defined(VMS) || defined(__DECC)) || defined (_DARWIN)
 | 
			
		||||
#define TIMES
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -101,14 +98,18 @@
 | 
			
		||||
   The __TMS macro will show if it was.  If it wasn't defined, we should
 | 
			
		||||
   undefine TIMES, since that tells the rest of the program how things
 | 
			
		||||
   should be handled.				-- Richard Levitte */
 | 
			
		||||
#if defined(OPENSSL_SYS_VMS_DECC) && !defined(__TMS)
 | 
			
		||||
#if defined(VMS) && defined(__DECC) && !defined(__TMS)
 | 
			
		||||
#undef TIMES
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if !defined(TIMES) && !defined(OPENSSL_SYS_VXWORKS)
 | 
			
		||||
#if !defined(TIMES) && !defined(VXWORKS)
 | 
			
		||||
#include <sys/timeb.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#ifdef _AIX
 | 
			
		||||
#include <sys/select.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#if defined(sun) || defined(__ultrix)
 | 
			
		||||
#define _POSIX_SOURCE
 | 
			
		||||
#include <limits.h>
 | 
			
		||||
@@ -118,20 +119,12 @@
 | 
			
		||||
/* The following if from times(3) man page.  It may need to be changed
 | 
			
		||||
*/
 | 
			
		||||
#ifndef HZ
 | 
			
		||||
# ifdef _SC_CLK_TCK
 | 
			
		||||
#  define HZ ((double)sysconf(_SC_CLK_TCK))
 | 
			
		||||
# else
 | 
			
		||||
#ifndef CLK_TCK
 | 
			
		||||
#   ifndef _BSD_CLK_TCK_ /* FreeBSD hack */
 | 
			
		||||
#define HZ      100.0
 | 
			
		||||
#   else /* _BSD_CLK_TCK_ */
 | 
			
		||||
#    define HZ ((double)_BSD_CLK_TCK_)
 | 
			
		||||
#   endif
 | 
			
		||||
#else /* CLK_TCK */
 | 
			
		||||
#define HZ ((double)CLK_TCK)
 | 
			
		||||
#endif
 | 
			
		||||
#endif
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG s_time_main
 | 
			
		||||
@@ -146,8 +139,6 @@
 | 
			
		||||
#undef BUFSIZZ
 | 
			
		||||
#define BUFSIZZ 1024*10
 | 
			
		||||
 | 
			
		||||
#define MYBUFSIZ 1024*8
 | 
			
		||||
 | 
			
		||||
#undef min
 | 
			
		||||
#undef max
 | 
			
		||||
#define min(a,b) (((a) < (b)) ? (a) : (b))
 | 
			
		||||
@@ -185,7 +176,7 @@ static int perform=0;
 | 
			
		||||
#ifdef FIONBIO
 | 
			
		||||
static int t_nbio=0;
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef OPENSSL_SYS_WIN32
 | 
			
		||||
#ifdef WIN32
 | 
			
		||||
static int exitNow = 0;		/* Set when it's time to exit main */
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -209,7 +200,7 @@ static void s_time_init(void)
 | 
			
		||||
#ifdef FIONBIO
 | 
			
		||||
	t_nbio=0;
 | 
			
		||||
#endif
 | 
			
		||||
#ifdef OPENSSL_SYS_WIN32
 | 
			
		||||
#ifdef WIN32
 | 
			
		||||
	exitNow = 0;		/* Set when it's time to exit main */
 | 
			
		||||
#endif
 | 
			
		||||
	}
 | 
			
		||||
@@ -322,19 +313,14 @@ static int parseArgs(int argc, char **argv)
 | 
			
		||||
		{
 | 
			
		||||
		if (--argc < 1) goto bad;
 | 
			
		||||
		s_www_path= *(++argv);
 | 
			
		||||
		if(strlen(s_www_path) > MYBUFSIZ-100)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"-www option too long\n");
 | 
			
		||||
			badop=1;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	else if(strcmp(*argv,"-bugs") == 0)
 | 
			
		||||
	    st_bugs=1;
 | 
			
		||||
#ifndef OPENSSL_NO_SSL2
 | 
			
		||||
#ifndef NO_SSL2
 | 
			
		||||
	else if(strcmp(*argv,"-ssl2") == 0)
 | 
			
		||||
	    s_time_meth=SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_SSL3
 | 
			
		||||
#ifndef NO_SSL3
 | 
			
		||||
	else if(strcmp(*argv,"-ssl3") == 0)
 | 
			
		||||
	    s_time_meth=SSLv3_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
@@ -384,7 +370,7 @@ static double tm_Time_F(int s)
 | 
			
		||||
		ret=((double)(tend.tms_utime-tstart.tms_utime))/HZ;
 | 
			
		||||
		return((ret == 0.0)?1e-6:ret);
 | 
			
		||||
	}
 | 
			
		||||
#elif defined(OPENSSL_SYS_VXWORKS)
 | 
			
		||||
#elif defined(VXWORKS)
 | 
			
		||||
        {
 | 
			
		||||
	static unsigned long tick_start, tick_end;
 | 
			
		||||
 | 
			
		||||
@@ -438,11 +424,11 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
#if !defined(OPENSSL_NO_SSL2) && !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
#if !defined(NO_SSL2) && !defined(NO_SSL3)
 | 
			
		||||
	s_time_meth=SSLv23_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL3)
 | 
			
		||||
#elif !defined(NO_SSL3)
 | 
			
		||||
	s_time_meth=SSLv3_client_method();
 | 
			
		||||
#elif !defined(OPENSSL_NO_SSL2)
 | 
			
		||||
#elif !defined(NO_SSL2)
 | 
			
		||||
	s_time_meth=SSLv2_client_method();
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
@@ -475,6 +461,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
	if (tm_cipher == NULL ) {
 | 
			
		||||
		fprintf( stderr, "No CIPHER specified\n" );
 | 
			
		||||
/*		EXIT(1); */
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (!(perform & 1)) goto next;
 | 
			
		||||
@@ -487,7 +474,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	tm_Time_F(START);
 | 
			
		||||
	for (;;)
 | 
			
		||||
		{
 | 
			
		||||
		if (finishtime < (long)time(NULL)) break;
 | 
			
		||||
		if (finishtime < time(NULL)) break;
 | 
			
		||||
#ifdef WIN32_STUFF
 | 
			
		||||
 | 
			
		||||
		if( flushWinMsgs(0) == -1 )
 | 
			
		||||
@@ -502,7 +489,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
		if (s_www_path != NULL)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_snprintf(buf,sizeof buf,"GET %s HTTP/1.0\r\n\r\n",s_www_path);
 | 
			
		||||
			sprintf(buf,"GET %s HTTP/1.0\r\n\r\n",s_www_path);
 | 
			
		||||
			SSL_write(scon,buf,strlen(buf));
 | 
			
		||||
			while ((i=SSL_read(scon,buf,sizeof(buf))) > 0)
 | 
			
		||||
				bytes_read+=i;
 | 
			
		||||
@@ -538,9 +525,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		}
 | 
			
		||||
	totalTime += tm_Time_F(STOP); /* Add the time for this iteration */
 | 
			
		||||
 | 
			
		||||
	i=(int)((long)time(NULL)-finishtime+maxTime);
 | 
			
		||||
	i=(int)(time(NULL)-finishtime+maxTime);
 | 
			
		||||
	printf( "\n\n%d connections in %.2fs; %.2f connections/user sec, bytes read %ld\n", nConn, totalTime, ((double)nConn/totalTime),bytes_read);
 | 
			
		||||
	printf( "%d connections in %ld real seconds, %ld bytes read per connection\n",nConn,(long)time(NULL)-finishtime+maxTime,bytes_read/nConn);
 | 
			
		||||
	printf( "%d connections in %ld real seconds, %ld bytes read per connection\n",nConn,time(NULL)-finishtime+maxTime,bytes_read/nConn);
 | 
			
		||||
 | 
			
		||||
	/* Now loop and time connections using the same session id over and over */
 | 
			
		||||
 | 
			
		||||
@@ -557,7 +544,7 @@ next:
 | 
			
		||||
 | 
			
		||||
	if (s_www_path != NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_snprintf(buf,sizeof buf,"GET %s HTTP/1.0\r\n\r\n",s_www_path);
 | 
			
		||||
		sprintf(buf,"GET %s HTTP/1.0\r\n\r\n",s_www_path);
 | 
			
		||||
		SSL_write(scon,buf,strlen(buf));
 | 
			
		||||
		while (SSL_read(scon,buf,sizeof(buf)) > 0)
 | 
			
		||||
			;
 | 
			
		||||
@@ -572,7 +559,7 @@ next:
 | 
			
		||||
	nConn = 0;
 | 
			
		||||
	totalTime = 0.0;
 | 
			
		||||
 | 
			
		||||
	finishtime=(long)time(NULL)+maxTime;
 | 
			
		||||
	finishtime=time(NULL)+maxTime;
 | 
			
		||||
 | 
			
		||||
	printf( "starting\n" );
 | 
			
		||||
	bytes_read=0;
 | 
			
		||||
@@ -580,7 +567,7 @@ next:
 | 
			
		||||
		
 | 
			
		||||
	for (;;)
 | 
			
		||||
		{
 | 
			
		||||
		if (finishtime < (long)time(NULL)) break;
 | 
			
		||||
		if (finishtime < time(NULL)) break;
 | 
			
		||||
 | 
			
		||||
#ifdef WIN32_STUFF
 | 
			
		||||
		if( flushWinMsgs(0) == -1 )
 | 
			
		||||
@@ -595,7 +582,7 @@ next:
 | 
			
		||||
 | 
			
		||||
		if (s_www_path)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_snprintf(buf,sizeof buf,"GET %s HTTP/1.0\r\n\r\n",s_www_path);
 | 
			
		||||
			sprintf(buf,"GET %s HTTP/1.0\r\n\r\n",s_www_path);
 | 
			
		||||
			SSL_write(scon,buf,strlen(buf));
 | 
			
		||||
			while ((i=SSL_read(scon,buf,sizeof(buf))) > 0)
 | 
			
		||||
				bytes_read+=i;
 | 
			
		||||
@@ -630,7 +617,7 @@ next:
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
	printf( "\n\n%d connections in %.2fs; %.2f connections/user sec, bytes read %ld\n", nConn, totalTime, ((double)nConn/totalTime),bytes_read);
 | 
			
		||||
	printf( "%d connections in %ld real seconds, %ld bytes read per connection\n",nConn,(long)time(NULL)-finishtime+maxTime,bytes_read/nConn);
 | 
			
		||||
	printf( "%d connections in %ld real seconds, %ld bytes read per connection\n",nConn,time(NULL)-finishtime+maxTime,bytes_read/nConn);
 | 
			
		||||
 | 
			
		||||
	ret=0;
 | 
			
		||||
end:
 | 
			
		||||
@@ -641,8 +628,7 @@ end:
 | 
			
		||||
		SSL_CTX_free(tm_ctx);
 | 
			
		||||
		tm_ctx=NULL;
 | 
			
		||||
		}
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
/***********************************************************************
 | 
			
		||||
 
 | 
			
		||||
@@ -156,7 +156,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		{
 | 
			
		||||
bad:
 | 
			
		||||
		for (pp=sess_id_usage; (*pp != NULL); pp++)
 | 
			
		||||
			BIO_printf(bio_err,"%s",*pp);
 | 
			
		||||
			BIO_printf(bio_err,*pp);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
@@ -208,7 +208,7 @@ bad:
 | 
			
		||||
		if (outfile == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
			{
 | 
			
		||||
			BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
			out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -272,8 +272,7 @@ bad:
 | 
			
		||||
end:
 | 
			
		||||
	if (out != NULL) BIO_free_all(out);
 | 
			
		||||
	if (x != NULL) SSL_SESSION_free(x);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static SSL_SESSION *load_sess_id(char *infile, int format)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										138
									
								
								apps/smime.c
									
									
									
									
									
								
							
							
						
						
									
										138
									
								
								apps/smime.c
									
									
									
									
									
								
							@@ -67,6 +67,7 @@
 | 
			
		||||
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG smime_main
 | 
			
		||||
static X509_STORE *setup_verify(char *CAfile, char *CApath);
 | 
			
		||||
static int save_certs(char *signerfile, STACK_OF(X509) *signers);
 | 
			
		||||
 | 
			
		||||
#define SMIME_OP	0x10
 | 
			
		||||
@@ -80,7 +81,6 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
{
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
	int operation = 0;
 | 
			
		||||
	int ret = 0;
 | 
			
		||||
	char **args;
 | 
			
		||||
@@ -88,7 +88,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char *infile = NULL, *outfile = NULL;
 | 
			
		||||
	char *signerfile = NULL, *recipfile = NULL;
 | 
			
		||||
	char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
 | 
			
		||||
	const EVP_CIPHER *cipher = NULL;
 | 
			
		||||
	EVP_CIPHER *cipher = NULL;
 | 
			
		||||
	PKCS7 *p7 = NULL;
 | 
			
		||||
	X509_STORE *store = NULL;
 | 
			
		||||
	X509 *cert = NULL, *recip = NULL, *signer = NULL;
 | 
			
		||||
@@ -96,57 +96,36 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	STACK_OF(X509) *encerts = NULL, *other = NULL;
 | 
			
		||||
	BIO *in = NULL, *out = NULL, *indata = NULL;
 | 
			
		||||
	int badarg = 0;
 | 
			
		||||
	int flags = PKCS7_DETACHED, store_flags = 0;
 | 
			
		||||
	int flags = PKCS7_DETACHED;
 | 
			
		||||
	char *to = NULL, *from = NULL, *subject = NULL;
 | 
			
		||||
	char *CAfile = NULL, *CApath = NULL;
 | 
			
		||||
	char *passargin = NULL, *passin = NULL;
 | 
			
		||||
	char *inrand = NULL;
 | 
			
		||||
	int need_rand = 0;
 | 
			
		||||
	int informat = FORMAT_SMIME, outformat = FORMAT_SMIME;
 | 
			
		||||
        int keyform = FORMAT_PEM;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	args = argv + 1;
 | 
			
		||||
 | 
			
		||||
	ret = 1;
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		if ((bio_err = BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	while (!badarg && *args && *args[0] == '-') {
 | 
			
		||||
		if (!strcmp (*args, "-encrypt")) operation = SMIME_ENCRYPT;
 | 
			
		||||
		else if (!strcmp (*args, "-decrypt")) operation = SMIME_DECRYPT;
 | 
			
		||||
		else if (!strcmp (*args, "-sign")) operation = SMIME_SIGN;
 | 
			
		||||
		else if (!strcmp (*args, "-verify")) operation = SMIME_VERIFY;
 | 
			
		||||
		else if (!strcmp (*args, "-pk7out")) operation = SMIME_PK7OUT;
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
		else if (!strcmp (*args, "-des3")) 
 | 
			
		||||
				cipher = EVP_des_ede3_cbc();
 | 
			
		||||
		else if (!strcmp (*args, "-des")) 
 | 
			
		||||
				cipher = EVP_des_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC2
 | 
			
		||||
#ifndef NO_RC2
 | 
			
		||||
		else if (!strcmp (*args, "-rc2-40")) 
 | 
			
		||||
				cipher = EVP_rc2_40_cbc();
 | 
			
		||||
		else if (!strcmp (*args, "-rc2-128")) 
 | 
			
		||||
				cipher = EVP_rc2_cbc();
 | 
			
		||||
		else if (!strcmp (*args, "-rc2-64")) 
 | 
			
		||||
				cipher = EVP_rc2_64_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
		else if (!strcmp(*args,"-aes128"))
 | 
			
		||||
				cipher = EVP_aes_128_cbc();
 | 
			
		||||
		else if (!strcmp(*args,"-aes192"))
 | 
			
		||||
				cipher = EVP_aes_192_cbc();
 | 
			
		||||
		else if (!strcmp(*args,"-aes256"))
 | 
			
		||||
				cipher = EVP_aes_256_cbc();
 | 
			
		||||
#endif
 | 
			
		||||
		else if (!strcmp (*args, "-text")) 
 | 
			
		||||
				flags |= PKCS7_TEXT;
 | 
			
		||||
@@ -168,27 +147,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
				flags |= PKCS7_BINARY;
 | 
			
		||||
		else if (!strcmp (*args, "-nosigs"))
 | 
			
		||||
				flags |= PKCS7_NOSIGS;
 | 
			
		||||
		else if (!strcmp (*args, "-nooldmime"))
 | 
			
		||||
				flags |= PKCS7_NOOLDMIMETYPE;
 | 
			
		||||
		else if (!strcmp (*args, "-crlfeol"))
 | 
			
		||||
				flags |= PKCS7_CRLFEOL;
 | 
			
		||||
		else if (!strcmp (*args, "-crl_check"))
 | 
			
		||||
				store_flags |= X509_V_FLAG_CRL_CHECK;
 | 
			
		||||
		else if (!strcmp (*args, "-crl_check_all"))
 | 
			
		||||
				store_flags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
 | 
			
		||||
		else if (!strcmp(*args,"-rand")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
				inrand = *args;
 | 
			
		||||
			} else badarg = 1;
 | 
			
		||||
			need_rand = 1;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		} else if (!strcmp(*args,"-engine")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
				engine = *args;
 | 
			
		||||
			} else badarg = 1;
 | 
			
		||||
#endif
 | 
			
		||||
		} else if (!strcmp(*args,"-passin")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
@@ -224,11 +188,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
				args++;
 | 
			
		||||
				keyfile = *args;
 | 
			
		||||
			} else badarg = 1;
 | 
			
		||||
		} else if (!strcmp (*args, "-keyform")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
				keyform = str2fmt(*args);
 | 
			
		||||
			} else badarg = 1;
 | 
			
		||||
		} else if (!strcmp (*args, "-certfile")) {
 | 
			
		||||
			if (args[1]) {
 | 
			
		||||
				args++;
 | 
			
		||||
@@ -300,18 +259,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf (bio_err, "-sign          sign message\n");
 | 
			
		||||
		BIO_printf (bio_err, "-verify        verify signed message\n");
 | 
			
		||||
		BIO_printf (bio_err, "-pk7out        output PKCS#7 structure\n");
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
		BIO_printf (bio_err, "-des3          encrypt with triple DES\n");
 | 
			
		||||
		BIO_printf (bio_err, "-des           encrypt with DES\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC2
 | 
			
		||||
#ifndef NO_RC2
 | 
			
		||||
		BIO_printf (bio_err, "-rc2-40        encrypt with RC2-40 (default)\n");
 | 
			
		||||
		BIO_printf (bio_err, "-rc2-64        encrypt with RC2-64\n");
 | 
			
		||||
		BIO_printf (bio_err, "-rc2-128       encrypt with RC2-128\n");
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_AES
 | 
			
		||||
		BIO_printf (bio_err, "-aes128, -aes192, -aes256\n");
 | 
			
		||||
		BIO_printf (bio_err, "               encrypt PEM output with cbc aes\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf (bio_err, "-nointern      don't search certificates in message for signer\n");
 | 
			
		||||
		BIO_printf (bio_err, "-nosigs        don't verify message signature\n");
 | 
			
		||||
@@ -326,7 +281,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf (bio_err, "-in file       input file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-inform arg    input format SMIME (default), PEM or DER\n");
 | 
			
		||||
		BIO_printf (bio_err, "-inkey file    input private key (if not signer or recipient)\n");
 | 
			
		||||
		BIO_printf (bio_err, "-keyform arg   input private key format (PEM or ENGINE)\n");
 | 
			
		||||
		BIO_printf (bio_err, "-out file      output file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-outform arg   output format SMIME (default), PEM or DER\n");
 | 
			
		||||
		BIO_printf (bio_err, "-content file  supply or override content for detached signature\n");
 | 
			
		||||
@@ -336,11 +290,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		BIO_printf (bio_err, "-text          include or delete text MIME headers\n");
 | 
			
		||||
		BIO_printf (bio_err, "-CApath dir    trusted certificates directory\n");
 | 
			
		||||
		BIO_printf (bio_err, "-CAfile file   trusted certificates file\n");
 | 
			
		||||
		BIO_printf (bio_err, "-crl_check     check revocation status of signer's certificate using CRLs\n");
 | 
			
		||||
		BIO_printf (bio_err, "-crl_check_all check revocation status of signer's certificate chain using CRLs\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf (bio_err, "-engine e      use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf (bio_err, "-passin arg    input file pass phrase source\n");
 | 
			
		||||
		BIO_printf(bio_err,  "-rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
			
		||||
		BIO_printf(bio_err,  "               load the file (or the files in the directory) into\n");
 | 
			
		||||
@@ -349,10 +298,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		goto end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
 | 
			
		||||
		BIO_printf(bio_err, "Error getting password\n");
 | 
			
		||||
		goto end;
 | 
			
		||||
@@ -379,7 +324,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
	if(operation == SMIME_ENCRYPT) {
 | 
			
		||||
		if (!cipher) {
 | 
			
		||||
#ifndef OPENSSL_NO_RC2			
 | 
			
		||||
#ifndef NO_RC2			
 | 
			
		||||
			cipher = EVP_rc2_40_cbc();
 | 
			
		||||
#else
 | 
			
		||||
			BIO_printf(bio_err, "No cipher selected\n");
 | 
			
		||||
@@ -388,11 +333,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		}
 | 
			
		||||
		encerts = sk_X509_new_null();
 | 
			
		||||
		while (*args) {
 | 
			
		||||
			if(!(cert = load_cert(bio_err,*args,FORMAT_PEM,
 | 
			
		||||
				NULL, e, "recipient certificate file"))) {
 | 
			
		||||
#if 0				/* An appropriate message is already printed */
 | 
			
		||||
			if(!(cert = load_cert(bio_err,*args,FORMAT_PEM))) {
 | 
			
		||||
				BIO_printf(bio_err, "Can't read recipient certificate file %s\n", *args);
 | 
			
		||||
#endif
 | 
			
		||||
				goto end;
 | 
			
		||||
			}
 | 
			
		||||
			sk_X509_push(encerts, cert);
 | 
			
		||||
@@ -402,32 +344,23 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if(signerfile && (operation == SMIME_SIGN)) {
 | 
			
		||||
		if(!(signer = load_cert(bio_err,signerfile,FORMAT_PEM, NULL,
 | 
			
		||||
			e, "signer certificate"))) {
 | 
			
		||||
#if 0			/* An appropri message has already been printed */
 | 
			
		||||
		if(!(signer = load_cert(bio_err,signerfile,FORMAT_PEM))) {
 | 
			
		||||
			BIO_printf(bio_err, "Can't read signer certificate file %s\n", signerfile);
 | 
			
		||||
#endif
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if(certfile) {
 | 
			
		||||
		if(!(other = load_certs(bio_err,certfile,FORMAT_PEM, NULL,
 | 
			
		||||
			e, "certificate file"))) {
 | 
			
		||||
#if 0			/* An appropriate message has already been printed */
 | 
			
		||||
		if(!(other = load_certs(bio_err,certfile,FORMAT_PEM))) {
 | 
			
		||||
			BIO_printf(bio_err, "Can't read certificate file %s\n", certfile);
 | 
			
		||||
#endif
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if(recipfile && (operation == SMIME_DECRYPT)) {
 | 
			
		||||
		if(!(recip = load_cert(bio_err,recipfile,FORMAT_PEM,NULL,
 | 
			
		||||
			e, "recipient certificate file"))) {
 | 
			
		||||
#if 0			/* An appropriate message has alrady been printed */
 | 
			
		||||
		if(!(recip = load_cert(bio_err,recipfile,FORMAT_PEM))) {
 | 
			
		||||
			BIO_printf(bio_err, "Can't read recipient certificate file %s\n", recipfile);
 | 
			
		||||
#endif
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
@@ -440,9 +373,9 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	} else keyfile = NULL;
 | 
			
		||||
 | 
			
		||||
	if(keyfile) {
 | 
			
		||||
		key = load_key(bio_err, keyfile, keyform, 0, passin, e,
 | 
			
		||||
			       "signing key file");
 | 
			
		||||
		if (!key) {
 | 
			
		||||
		if(!(key = load_key(bio_err,keyfile, FORMAT_PEM, passin))) {
 | 
			
		||||
			BIO_printf(bio_err, "Can't read recipient certificate file %s\n", keyfile);
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
@@ -463,7 +396,7 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		    out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -472,19 +405,16 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if(operation == SMIME_VERIFY) {
 | 
			
		||||
		if(!(store = setup_verify(bio_err, CAfile, CApath))) goto end;
 | 
			
		||||
		X509_STORE_set_flags(store, store_flags);
 | 
			
		||||
		if(!(store = setup_verify(CAfile, CApath))) goto end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
	ret = 3;
 | 
			
		||||
 | 
			
		||||
	if(operation == SMIME_ENCRYPT) {
 | 
			
		||||
		p7 = PKCS7_encrypt(encerts, in, cipher, flags);
 | 
			
		||||
	} else if(operation == SMIME_SIGN) {
 | 
			
		||||
		p7 = PKCS7_sign(signer, key, other, in, flags);
 | 
			
		||||
		if ((flags & PKCS7_DETACHED) && (outformat == FORMAT_SMIME)
 | 
			
		||||
			&& (BIO_reset(in) != 0)) {
 | 
			
		||||
		if (BIO_reset(in) != 0 && (flags & PKCS7_DETACHED)) {
 | 
			
		||||
		  BIO_printf(bio_err, "Can't rewind input file\n");
 | 
			
		||||
		  goto end;
 | 
			
		||||
		}
 | 
			
		||||
@@ -577,6 +507,36 @@ end:
 | 
			
		||||
	return (ret);
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static X509_STORE *setup_verify(char *CAfile, char *CApath)
 | 
			
		||||
{
 | 
			
		||||
	X509_STORE *store;
 | 
			
		||||
	X509_LOOKUP *lookup;
 | 
			
		||||
	if(!(store = X509_STORE_new())) goto end;
 | 
			
		||||
	lookup=X509_STORE_add_lookup(store,X509_LOOKUP_file());
 | 
			
		||||
	if (lookup == NULL) goto end;
 | 
			
		||||
	if (CAfile) {
 | 
			
		||||
		if(!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM)) {
 | 
			
		||||
			BIO_printf(bio_err, "Error loading file %s\n", CAfile);
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
	} else X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
			
		||||
		
 | 
			
		||||
	lookup=X509_STORE_add_lookup(store,X509_LOOKUP_hash_dir());
 | 
			
		||||
	if (lookup == NULL) goto end;
 | 
			
		||||
	if (CApath) {
 | 
			
		||||
		if(!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM)) {
 | 
			
		||||
			BIO_printf(bio_err, "Error loading directory %s\n", CApath);
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
	} else X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
			
		||||
 | 
			
		||||
	ERR_clear_error();
 | 
			
		||||
	return store;
 | 
			
		||||
	end:
 | 
			
		||||
	X509_STORE_free(store);
 | 
			
		||||
	return NULL;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
static int save_certs(char *signerfile, STACK_OF(X509) *signers)
 | 
			
		||||
{
 | 
			
		||||
	int i;
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										1081
									
								
								apps/speed.c
									
									
									
									
									
								
							
							
						
						
									
										1081
									
								
								apps/speed.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										55
									
								
								apps/spkac.c
									
									
									
									
									
								
							
							
						
						
									
										55
									
								
								apps/spkac.c
									
									
									
									
									
								
							@@ -81,28 +81,21 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
	int i,badops=0, ret = 1;
 | 
			
		||||
	BIO *in = NULL,*out = NULL;
 | 
			
		||||
	BIO *in = NULL,*out = NULL, *key = NULL;
 | 
			
		||||
	int verify=0,noout=0,pubkey=0;
 | 
			
		||||
	char *infile = NULL,*outfile = NULL,*prog;
 | 
			
		||||
	char *passargin = NULL, *passin = NULL;
 | 
			
		||||
	char *spkac = "SPKAC", *spksect = "default", *spkstr = NULL;
 | 
			
		||||
	char *challenge = NULL, *keyfile = NULL;
 | 
			
		||||
	CONF *conf = NULL;
 | 
			
		||||
	LHASH *conf = NULL;
 | 
			
		||||
	NETSCAPE_SPKI *spki = NULL;
 | 
			
		||||
	EVP_PKEY *pkey = NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
	if (!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	prog=argv[0];
 | 
			
		||||
	argc--;
 | 
			
		||||
	argv++;
 | 
			
		||||
@@ -143,13 +136,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			spksect= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-noout") == 0)
 | 
			
		||||
			noout=1;
 | 
			
		||||
		else if (strcmp(*argv,"-pubkey") == 0)
 | 
			
		||||
@@ -175,9 +161,6 @@ bad:
 | 
			
		||||
		BIO_printf(bio_err," -noout         don't print SPKAC\n");
 | 
			
		||||
		BIO_printf(bio_err," -pubkey        output public key\n");
 | 
			
		||||
		BIO_printf(bio_err," -verify        verify SPKAC signature\n");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," -engine e      use engine e, possibly a hardware device.\n");
 | 
			
		||||
#endif
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
@@ -187,15 +170,18 @@ bad:
 | 
			
		||||
		goto end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if(keyfile) {
 | 
			
		||||
		pkey = load_key(bio_err,
 | 
			
		||||
				strcmp(keyfile, "-") ? keyfile : NULL,
 | 
			
		||||
				FORMAT_PEM, 1, passin, e, "private key");
 | 
			
		||||
		if(strcmp(keyfile, "-")) key = BIO_new_file(keyfile, "r");
 | 
			
		||||
		else key = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
			
		||||
		if(!key) {
 | 
			
		||||
			BIO_printf(bio_err, "Error opening key file\n");
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
		pkey = PEM_read_bio_PrivateKey(key, NULL, NULL, passin);
 | 
			
		||||
		if(!pkey) {
 | 
			
		||||
			BIO_printf(bio_err, "Error reading private key\n");
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
		}
 | 
			
		||||
		spki = NETSCAPE_SPKI_new();
 | 
			
		||||
@@ -208,7 +194,7 @@ bad:
 | 
			
		||||
		if (outfile) out = BIO_new_file(outfile, "w");
 | 
			
		||||
		else {
 | 
			
		||||
			out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
			{
 | 
			
		||||
			    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
			    out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -238,16 +224,15 @@ bad:
 | 
			
		||||
		goto end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	conf = NCONF_new(NULL);
 | 
			
		||||
	i = NCONF_load_bio(conf, in, NULL);
 | 
			
		||||
	conf = CONF_load_bio(NULL, in, NULL);
 | 
			
		||||
 | 
			
		||||
	if(!i) {
 | 
			
		||||
	if(!conf) {
 | 
			
		||||
		BIO_printf(bio_err, "Error parsing config file\n");
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	spkstr = NCONF_get_string(conf, spksect, spkac);
 | 
			
		||||
	spkstr = CONF_get_string(conf, spksect, spkac);
 | 
			
		||||
		
 | 
			
		||||
	if(!spkstr) {
 | 
			
		||||
		BIO_printf(bio_err, "Can't find SPKAC called \"%s\"\n", spkac);
 | 
			
		||||
@@ -266,7 +251,7 @@ bad:
 | 
			
		||||
	if (outfile) out = BIO_new_file(outfile, "w");
 | 
			
		||||
	else {
 | 
			
		||||
		out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
		{
 | 
			
		||||
		    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
		    out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -296,12 +281,12 @@ bad:
 | 
			
		||||
	ret = 0;
 | 
			
		||||
 | 
			
		||||
end:
 | 
			
		||||
	NCONF_free(conf);
 | 
			
		||||
	CONF_free(conf);
 | 
			
		||||
	NETSCAPE_SPKI_free(spki);
 | 
			
		||||
	BIO_free(in);
 | 
			
		||||
	BIO_free_all(out);
 | 
			
		||||
	BIO_free(key);
 | 
			
		||||
	EVP_PKEY_free(pkey);
 | 
			
		||||
	if(passin) OPENSSL_free(passin);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
@@ -3,18 +3,6 @@
 | 
			
		||||
DSA *get_dsa512(void );
 | 
			
		||||
DSA *get_dsa1024(void );
 | 
			
		||||
DSA *get_dsa2048(void );
 | 
			
		||||
static unsigned char dsa512_priv[] = {
 | 
			
		||||
	0x65,0xe5,0xc7,0x38,0x60,0x24,0xb5,0x89,0xd4,0x9c,0xeb,0x4c,
 | 
			
		||||
	0x9c,0x1d,0x7a,0x22,0xbd,0xd1,0xc2,0xd2,
 | 
			
		||||
	};
 | 
			
		||||
static unsigned char dsa512_pub[] = {
 | 
			
		||||
	0x00,0x95,0xa7,0x0d,0xec,0x93,0x68,0xba,0x5f,0xf7,0x5f,0x07,
 | 
			
		||||
	0xf2,0x3b,0xad,0x6b,0x01,0xdc,0xbe,0xec,0xde,0x04,0x7a,0x3a,
 | 
			
		||||
	0x27,0xb3,0xec,0x49,0xfd,0x08,0x43,0x3d,0x7e,0xa8,0x2c,0x5e,
 | 
			
		||||
	0x7b,0xbb,0xfc,0xf4,0x6e,0xeb,0x6c,0xb0,0x6e,0xf8,0x02,0x12,
 | 
			
		||||
	0x8c,0x38,0x5d,0x83,0x56,0x7d,0xee,0x53,0x05,0x3e,0x24,0x84,
 | 
			
		||||
	0xbe,0xba,0x0a,0x6b,0xc8,
 | 
			
		||||
	};
 | 
			
		||||
static unsigned char dsa512_p[]={
 | 
			
		||||
	0x9D,0x1B,0x69,0x8E,0x26,0xDB,0xF2,0x2B,0x11,0x70,0x19,0x86,
 | 
			
		||||
	0xF6,0x19,0xC8,0xF8,0x19,0xF2,0x18,0x53,0x94,0x46,0x06,0xD0,
 | 
			
		||||
@@ -41,34 +29,14 @@ DSA *get_dsa512()
 | 
			
		||||
	DSA *dsa;
 | 
			
		||||
 | 
			
		||||
	if ((dsa=DSA_new()) == NULL) return(NULL);
 | 
			
		||||
	dsa->priv_key=BN_bin2bn(dsa512_priv,sizeof(dsa512_priv),NULL);
 | 
			
		||||
	dsa->pub_key=BN_bin2bn(dsa512_pub,sizeof(dsa512_pub),NULL);
 | 
			
		||||
	dsa->p=BN_bin2bn(dsa512_p,sizeof(dsa512_p),NULL);
 | 
			
		||||
	dsa->q=BN_bin2bn(dsa512_q,sizeof(dsa512_q),NULL);
 | 
			
		||||
	dsa->g=BN_bin2bn(dsa512_g,sizeof(dsa512_g),NULL);
 | 
			
		||||
	if ((dsa->priv_key == NULL) || (dsa->pub_key == NULL) || (dsa->p == NULL) ||
 | 
			
		||||
				(dsa->q == NULL) || (dsa->g == NULL))
 | 
			
		||||
	if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))
 | 
			
		||||
		return(NULL);
 | 
			
		||||
	return(dsa);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static unsigned char dsa1024_priv[]={
 | 
			
		||||
	0x7d,0x21,0xda,0xbb,0x62,0x15,0x47,0x36,0x07,0x67,0x12,0xe8,
 | 
			
		||||
	0x8c,0xaa,0x1c,0xcd,0x38,0x12,0x61,0x18,
 | 
			
		||||
	};
 | 
			
		||||
static unsigned char dsa1024_pub[]={
 | 
			
		||||
	0x3c,0x4e,0x9c,0x2a,0x7f,0x16,0xc1,0x25,0xeb,0xac,0x78,0x63,
 | 
			
		||||
	0x90,0x14,0x8c,0x8b,0xf4,0x68,0x43,0x3c,0x2d,0xee,0x65,0x50,
 | 
			
		||||
	0x7d,0x9c,0x8f,0x8c,0x8a,0x51,0xd6,0x11,0x2b,0x99,0xaf,0x1e,
 | 
			
		||||
	0x90,0x97,0xb5,0xd3,0xa6,0x20,0x25,0xd6,0xfe,0x43,0x02,0xd5,
 | 
			
		||||
	0x91,0x7d,0xa7,0x8c,0xdb,0xc9,0x85,0xa3,0x36,0x48,0xf7,0x68,
 | 
			
		||||
	0xaa,0x60,0xb1,0xf7,0x05,0x68,0x3a,0xa3,0x3f,0xd3,0x19,0x82,
 | 
			
		||||
	0xd8,0x82,0x7a,0x77,0xfb,0xef,0xf4,0x15,0x0a,0xeb,0x06,0x04,
 | 
			
		||||
	0x7f,0x53,0x07,0x0c,0xbc,0xcb,0x2d,0x83,0xdb,0x3e,0xd1,0x28,
 | 
			
		||||
	0xa5,0xa1,0x31,0xe0,0x67,0xfa,0x50,0xde,0x9b,0x07,0x83,0x7e,
 | 
			
		||||
	0x2c,0x0b,0xc3,0x13,0x50,0x61,0xe5,0xad,0xbd,0x36,0xb8,0x97,
 | 
			
		||||
	0x4e,0x40,0x7d,0xe8,0x83,0x0d,0xbc,0x4b
 | 
			
		||||
	};
 | 
			
		||||
static unsigned char dsa1024_p[]={
 | 
			
		||||
	0xA7,0x3F,0x6E,0x85,0xBF,0x41,0x6A,0x29,0x7D,0xF0,0x9F,0x47,
 | 
			
		||||
	0x19,0x30,0x90,0x9A,0x09,0x1D,0xDA,0x6A,0x33,0x1E,0xC5,0x3D,
 | 
			
		||||
@@ -105,45 +73,14 @@ DSA *get_dsa1024()
 | 
			
		||||
	DSA *dsa;
 | 
			
		||||
 | 
			
		||||
	if ((dsa=DSA_new()) == NULL) return(NULL);
 | 
			
		||||
	dsa->priv_key=BN_bin2bn(dsa1024_priv,sizeof(dsa1024_priv),NULL);
 | 
			
		||||
	dsa->pub_key=BN_bin2bn(dsa1024_pub,sizeof(dsa1024_pub),NULL);
 | 
			
		||||
	dsa->p=BN_bin2bn(dsa1024_p,sizeof(dsa1024_p),NULL);
 | 
			
		||||
	dsa->q=BN_bin2bn(dsa1024_q,sizeof(dsa1024_q),NULL);
 | 
			
		||||
	dsa->g=BN_bin2bn(dsa1024_g,sizeof(dsa1024_g),NULL);
 | 
			
		||||
	if ((dsa->priv_key == NULL) || (dsa->pub_key == NULL) || (dsa->p == NULL) ||
 | 
			
		||||
				(dsa->q == NULL) || (dsa->g == NULL))
 | 
			
		||||
	if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))
 | 
			
		||||
		return(NULL);
 | 
			
		||||
	return(dsa);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static unsigned char dsa2048_priv[]={
 | 
			
		||||
	0x32,0x67,0x92,0xf6,0xc4,0xe2,0xe2,0xe8,0xa0,0x8b,0x6b,0x45,
 | 
			
		||||
	0x0c,0x8a,0x76,0xb0,0xee,0xcf,0x91,0xa7,
 | 
			
		||||
	};
 | 
			
		||||
static unsigned char dsa2048_pub[]={
 | 
			
		||||
	0x17,0x8f,0xa8,0x11,0x84,0x92,0xec,0x83,0x47,0xc7,0x6a,0xb0,
 | 
			
		||||
	0x92,0xaf,0x5a,0x20,0x37,0xa3,0x64,0x79,0xd2,0xd0,0x3d,0xcd,
 | 
			
		||||
	0xe0,0x61,0x88,0x88,0x21,0xcc,0x74,0x5d,0xce,0x4c,0x51,0x47,
 | 
			
		||||
	0xf0,0xc5,0x5c,0x4c,0x82,0x7a,0xaf,0x72,0xad,0xb9,0xe0,0x53,
 | 
			
		||||
	0xf2,0x78,0xb7,0xf0,0xb5,0x48,0x7f,0x8a,0x3a,0x18,0xd1,0x9f,
 | 
			
		||||
	0x8b,0x7d,0xa5,0x47,0xb7,0x95,0xab,0x98,0xf8,0x7b,0x74,0x50,
 | 
			
		||||
	0x56,0x8e,0x57,0xf0,0xee,0xf5,0xb7,0xba,0xab,0x85,0x86,0xf9,
 | 
			
		||||
	0x2b,0xef,0x41,0x56,0xa0,0xa4,0x9f,0xb7,0x38,0x00,0x46,0x0a,
 | 
			
		||||
	0xa6,0xf1,0xfc,0x1f,0xd8,0x4e,0x85,0x44,0x92,0x43,0x21,0x5d,
 | 
			
		||||
	0x6e,0xcc,0xc2,0xcb,0x26,0x31,0x0d,0x21,0xc4,0xbd,0x8d,0x24,
 | 
			
		||||
	0xbc,0xd9,0x18,0x19,0xd7,0xdc,0xf1,0xe7,0x93,0x50,0x48,0x03,
 | 
			
		||||
	0x2c,0xae,0x2e,0xe7,0x49,0x88,0x5f,0x93,0x57,0x27,0x99,0x36,
 | 
			
		||||
	0xb4,0x20,0xab,0xfc,0xa7,0x2b,0xf2,0xd9,0x98,0xd7,0xd4,0x34,
 | 
			
		||||
	0x9d,0x96,0x50,0x58,0x9a,0xea,0x54,0xf3,0xee,0xf5,0x63,0x14,
 | 
			
		||||
	0xee,0x85,0x83,0x74,0x76,0xe1,0x52,0x95,0xc3,0xf7,0xeb,0x04,
 | 
			
		||||
	0x04,0x7b,0xa7,0x28,0x1b,0xcc,0xea,0x4a,0x4e,0x84,0xda,0xd8,
 | 
			
		||||
	0x9c,0x79,0xd8,0x9b,0x66,0x89,0x2f,0xcf,0xac,0xd7,0x79,0xf9,
 | 
			
		||||
	0xa9,0xd8,0x45,0x13,0x78,0xb9,0x00,0x14,0xc9,0x7e,0x22,0x51,
 | 
			
		||||
	0x86,0x67,0xb0,0x9f,0x26,0x11,0x23,0xc8,0x38,0xd7,0x70,0x1d,
 | 
			
		||||
	0x15,0x8e,0x4d,0x4f,0x95,0x97,0x40,0xa1,0xc2,0x7e,0x01,0x18,
 | 
			
		||||
	0x72,0xf4,0x10,0xe6,0x8d,0x52,0x16,0x7f,0xf2,0xc9,0xf8,0x33,
 | 
			
		||||
	0x8b,0x33,0xb7,0xce,
 | 
			
		||||
	};
 | 
			
		||||
static unsigned char dsa2048_p[]={
 | 
			
		||||
	0xA0,0x25,0xFA,0xAD,0xF4,0x8E,0xB9,0xE5,0x99,0xF3,0x5D,0x6F,
 | 
			
		||||
	0x4F,0x83,0x34,0xE2,0x7E,0xCF,0x6F,0xBF,0x30,0xAF,0x6F,0x81,
 | 
			
		||||
@@ -202,13 +139,10 @@ DSA *get_dsa2048()
 | 
			
		||||
	DSA *dsa;
 | 
			
		||||
 
 | 
			
		||||
	if ((dsa=DSA_new()) == NULL) return(NULL);
 | 
			
		||||
	dsa->priv_key=BN_bin2bn(dsa2048_priv,sizeof(dsa2048_priv),NULL);
 | 
			
		||||
	dsa->pub_key=BN_bin2bn(dsa2048_pub,sizeof(dsa2048_pub),NULL);
 | 
			
		||||
	dsa->p=BN_bin2bn(dsa2048_p,sizeof(dsa2048_p),NULL);
 | 
			
		||||
	dsa->q=BN_bin2bn(dsa2048_q,sizeof(dsa2048_q),NULL);
 | 
			
		||||
	dsa->g=BN_bin2bn(dsa2048_g,sizeof(dsa2048_g),NULL);
 | 
			
		||||
	if ((dsa->priv_key == NULL) || (dsa->pub_key == NULL) || (dsa->p == NULL) ||
 | 
			
		||||
				(dsa->q == NULL) || (dsa->g == NULL))
 | 
			
		||||
	if ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))
 | 
			
		||||
		return(NULL);
 | 
			
		||||
	return(dsa);
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
@@ -70,15 +70,14 @@
 | 
			
		||||
#define PROG	verify_main
 | 
			
		||||
 | 
			
		||||
static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx);
 | 
			
		||||
static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, int purpose, ENGINE *e);
 | 
			
		||||
static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, int purpose);
 | 
			
		||||
static STACK_OF(X509) *load_untrusted(char *file);
 | 
			
		||||
static int v_verbose=0, vflags = 0;
 | 
			
		||||
static int v_verbose=0, issuer_checks = 0;
 | 
			
		||||
 | 
			
		||||
int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
	int i,ret=1;
 | 
			
		||||
	int purpose = -1;
 | 
			
		||||
	char *CApath=NULL,*CAfile=NULL;
 | 
			
		||||
@@ -86,9 +85,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	STACK_OF(X509) *untrusted = NULL, *trusted = NULL;
 | 
			
		||||
	X509_STORE *cert_ctx=NULL;
 | 
			
		||||
	X509_LOOKUP *lookup=NULL;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	cert_ctx=X509_STORE_new();
 | 
			
		||||
	if (cert_ctx == NULL) goto end;
 | 
			
		||||
@@ -102,9 +98,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
			
		||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
	argc--;
 | 
			
		||||
	argv++;
 | 
			
		||||
	for (;;)
 | 
			
		||||
@@ -144,23 +137,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
				if (argc-- < 1) goto end;
 | 
			
		||||
				trustfile= *(++argv);
 | 
			
		||||
				}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
			else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
				{
 | 
			
		||||
				if (--argc < 1) goto end;
 | 
			
		||||
				engine= *(++argv);
 | 
			
		||||
				}
 | 
			
		||||
#endif
 | 
			
		||||
			else if (strcmp(*argv,"-help") == 0)
 | 
			
		||||
				goto end;
 | 
			
		||||
			else if (strcmp(*argv,"-ignore_critical") == 0)
 | 
			
		||||
				vflags |= X509_V_FLAG_IGNORE_CRITICAL;
 | 
			
		||||
			else if (strcmp(*argv,"-issuer_checks") == 0)
 | 
			
		||||
				vflags |= X509_V_FLAG_CB_ISSUER_CHECK;
 | 
			
		||||
			else if (strcmp(*argv,"-crl_check") == 0)
 | 
			
		||||
				vflags |= X509_V_FLAG_CRL_CHECK;
 | 
			
		||||
			else if (strcmp(*argv,"-crl_check_all") == 0)
 | 
			
		||||
				vflags |= X509_V_FLAG_CRL_CHECK|X509_V_FLAG_CRL_CHECK_ALL;
 | 
			
		||||
				issuer_checks=1;
 | 
			
		||||
			else if (strcmp(*argv,"-verbose") == 0)
 | 
			
		||||
				v_verbose=1;
 | 
			
		||||
			else if (argv[0][0] == '-')
 | 
			
		||||
@@ -174,10 +154,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			break;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	lookup=X509_STORE_add_lookup(cert_ctx,X509_LOOKUP_file());
 | 
			
		||||
	if (lookup == NULL) abort();
 | 
			
		||||
	if (CAfile) {
 | 
			
		||||
@@ -218,18 +194,14 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if (argc < 1) check(cert_ctx, NULL, untrusted, trusted, purpose, e);
 | 
			
		||||
	if (argc < 1) check(cert_ctx, NULL, untrusted, trusted, purpose);
 | 
			
		||||
	else
 | 
			
		||||
		for (i=0; i<argc; i++)
 | 
			
		||||
			check(cert_ctx,argv[i], untrusted, trusted, purpose, e);
 | 
			
		||||
			check(cert_ctx,argv[i], untrusted, trusted, purpose);
 | 
			
		||||
	ret=0;
 | 
			
		||||
end:
 | 
			
		||||
	if (ret == 1) {
 | 
			
		||||
		BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-crl_check]");
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		BIO_printf(bio_err," [-engine e]");
 | 
			
		||||
#endif
 | 
			
		||||
		BIO_printf(bio_err," cert1 cert2 ...\n");
 | 
			
		||||
		BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] cert1 cert2 ...\n");
 | 
			
		||||
		BIO_printf(bio_err,"recognized usages:\n");
 | 
			
		||||
		for(i = 0; i < X509_PURPOSE_get_count(); i++) {
 | 
			
		||||
			X509_PURPOSE *ptmp;
 | 
			
		||||
@@ -241,19 +213,42 @@ end:
 | 
			
		||||
	if (cert_ctx != NULL) X509_STORE_free(cert_ctx);
 | 
			
		||||
	sk_X509_pop_free(untrusted, X509_free);
 | 
			
		||||
	sk_X509_pop_free(trusted, X509_free);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, int purpose, ENGINE *e)
 | 
			
		||||
static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, int purpose)
 | 
			
		||||
	{
 | 
			
		||||
	X509 *x=NULL;
 | 
			
		||||
	BIO *in=NULL;
 | 
			
		||||
	int i=0,ret=0;
 | 
			
		||||
	X509_STORE_CTX *csc;
 | 
			
		||||
 | 
			
		||||
	x = load_cert(bio_err, file, FORMAT_PEM, NULL, e, "certificate file");
 | 
			
		||||
	if (x == NULL)
 | 
			
		||||
	in=BIO_new(BIO_s_file());
 | 
			
		||||
	if (in == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (file == NULL)
 | 
			
		||||
		BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
			
		||||
	else
 | 
			
		||||
		{
 | 
			
		||||
		if (BIO_read_filename(in,file) <= 0)
 | 
			
		||||
			{
 | 
			
		||||
			perror(file);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	x=PEM_read_bio_X509(in,NULL,NULL,NULL);
 | 
			
		||||
	if (x == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		fprintf(stdout,"%s: unable to load certificate file\n",
 | 
			
		||||
			(file == NULL)?"stdin":file);
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	fprintf(stdout,"%s: ",(file == NULL)?"stdin":file);
 | 
			
		||||
 | 
			
		||||
	csc = X509_STORE_CTX_new();
 | 
			
		||||
@@ -262,14 +257,11 @@ static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	X509_STORE_set_flags(ctx, vflags);
 | 
			
		||||
	if(!X509_STORE_CTX_init(csc,ctx,x,uchain))
 | 
			
		||||
		{
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	X509_STORE_CTX_init(csc,ctx,x,uchain);
 | 
			
		||||
	if(tchain) X509_STORE_CTX_trusted_stack(csc, tchain);
 | 
			
		||||
	if(purpose >= 0) X509_STORE_CTX_set_purpose(csc, purpose);
 | 
			
		||||
	if(issuer_checks)
 | 
			
		||||
		X509_STORE_CTX_set_flags(csc, X509_V_FLAG_CB_ISSUER_CHECK);
 | 
			
		||||
	i=X509_verify_cert(csc);
 | 
			
		||||
	X509_STORE_CTX_free(csc);
 | 
			
		||||
 | 
			
		||||
@@ -283,6 +275,7 @@ end:
 | 
			
		||||
	else
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
	if (x != NULL) X509_free(x);
 | 
			
		||||
	if (in != NULL) BIO_free(in);
 | 
			
		||||
 | 
			
		||||
	return(ret);
 | 
			
		||||
	}
 | 
			
		||||
@@ -340,8 +333,7 @@ static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
 | 
			
		||||
	if (!ok)
 | 
			
		||||
		{
 | 
			
		||||
		X509_NAME_oneline(
 | 
			
		||||
				X509_get_subject_name(ctx->current_cert),buf,
 | 
			
		||||
				sizeof buf);
 | 
			
		||||
				X509_get_subject_name(ctx->current_cert),buf,256);
 | 
			
		||||
		printf("%s\n",buf);
 | 
			
		||||
		printf("error %d at %d depth lookup:%s\n",ctx->error,
 | 
			
		||||
			ctx->error_depth,
 | 
			
		||||
@@ -354,13 +346,9 @@ static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
 | 
			
		||||
		if (ctx->error == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT) ok=1;
 | 
			
		||||
		/* Continue after extension errors too */
 | 
			
		||||
		if (ctx->error == X509_V_ERR_INVALID_CA) ok=1;
 | 
			
		||||
		if (ctx->error == X509_V_ERR_INVALID_NON_CA) ok=1;
 | 
			
		||||
		if (ctx->error == X509_V_ERR_PATH_LENGTH_EXCEEDED) ok=1;
 | 
			
		||||
		if (ctx->error == X509_V_ERR_INVALID_PURPOSE) ok=1;
 | 
			
		||||
		if (ctx->error == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT) ok=1;
 | 
			
		||||
		if (ctx->error == X509_V_ERR_CRL_HAS_EXPIRED) ok=1;
 | 
			
		||||
		if (ctx->error == X509_V_ERR_CRL_NOT_YET_VALID) ok=1;
 | 
			
		||||
		if (ctx->error == X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION) ok=1;
 | 
			
		||||
		}
 | 
			
		||||
	if (!v_verbose)
 | 
			
		||||
		ERR_clear_error();
 | 
			
		||||
 
 | 
			
		||||
@@ -55,59 +55,6 @@
 | 
			
		||||
 * copied and put under another distribution licence
 | 
			
		||||
 * [including the GNU Public Licence.]
 | 
			
		||||
 */
 | 
			
		||||
/* ====================================================================
 | 
			
		||||
 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
 | 
			
		||||
 *
 | 
			
		||||
 * Redistribution and use in source and binary forms, with or without
 | 
			
		||||
 * modification, are permitted provided that the following conditions
 | 
			
		||||
 * are met:
 | 
			
		||||
 *
 | 
			
		||||
 * 1. Redistributions of source code must retain the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer. 
 | 
			
		||||
 *
 | 
			
		||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
			
		||||
 *    notice, this list of conditions and the following disclaimer in
 | 
			
		||||
 *    the documentation and/or other materials provided with the
 | 
			
		||||
 *    distribution.
 | 
			
		||||
 *
 | 
			
		||||
 * 3. All advertising materials mentioning features or use of this
 | 
			
		||||
 *    software must display the following acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
			
		||||
 *    endorse or promote products derived from this software without
 | 
			
		||||
 *    prior written permission. For written permission, please contact
 | 
			
		||||
 *    openssl-core@openssl.org.
 | 
			
		||||
 *
 | 
			
		||||
 * 5. Products derived from this software may not be called "OpenSSL"
 | 
			
		||||
 *    nor may "OpenSSL" appear in their names without prior written
 | 
			
		||||
 *    permission of the OpenSSL Project.
 | 
			
		||||
 *
 | 
			
		||||
 * 6. Redistributions of any form whatsoever must retain the following
 | 
			
		||||
 *    acknowledgment:
 | 
			
		||||
 *    "This product includes software developed by the OpenSSL Project
 | 
			
		||||
 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
			
		||||
 *
 | 
			
		||||
 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
			
		||||
 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
			
		||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
			
		||||
 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
			
		||||
 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
			
		||||
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
			
		||||
 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
			
		||||
 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
			
		||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
			
		||||
 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
			
		||||
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
			
		||||
 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
			
		||||
 * ====================================================================
 | 
			
		||||
 *
 | 
			
		||||
 * This product includes cryptographic software written by Eric Young
 | 
			
		||||
 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
			
		||||
 * Hudson (tjh@cryptsoft.com).
 | 
			
		||||
 *
 | 
			
		||||
 */
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
@@ -115,21 +62,6 @@
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
#include <openssl/evp.h>
 | 
			
		||||
#include <openssl/crypto.h>
 | 
			
		||||
#ifndef OPENSSL_NO_MD2
 | 
			
		||||
# include <openssl/md2.h>
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC4
 | 
			
		||||
# include <openssl/rc4.h>
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
# include <openssl/des.h>
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
# include <openssl/idea.h>
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_BF
 | 
			
		||||
# include <openssl/blowfish.h>
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
#undef PROG
 | 
			
		||||
#define PROG	version_main
 | 
			
		||||
@@ -139,7 +71,7 @@ int MAIN(int, char **);
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	int i,ret=0;
 | 
			
		||||
	int cflags=0,version=0,date=0,options=0,platform=0,dir=0;
 | 
			
		||||
	int cflags=0,version=0,date=0,options=0,platform=0;
 | 
			
		||||
 | 
			
		||||
	apps_startup();
 | 
			
		||||
 | 
			
		||||
@@ -160,10 +92,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			options=1;
 | 
			
		||||
		else if (strcmp(argv[i],"-p") == 0)
 | 
			
		||||
			platform=1;
 | 
			
		||||
		else if (strcmp(argv[i],"-d") == 0)
 | 
			
		||||
			dir=1;
 | 
			
		||||
		else if (strcmp(argv[i],"-a") == 0)
 | 
			
		||||
			date=version=cflags=options=platform=dir=1;
 | 
			
		||||
			date=version=cflags=options=platform=1;
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"usage:version -[avbofp]\n");
 | 
			
		||||
@@ -179,26 +109,24 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		{
 | 
			
		||||
		printf("options:  ");
 | 
			
		||||
		printf("%s ",BN_options());
 | 
			
		||||
#ifndef OPENSSL_NO_MD2
 | 
			
		||||
#ifndef NO_MD2
 | 
			
		||||
		printf("%s ",MD2_options());
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_RC4
 | 
			
		||||
#ifndef NO_RC4
 | 
			
		||||
		printf("%s ",RC4_options());
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DES
 | 
			
		||||
		printf("%s ",DES_options());
 | 
			
		||||
#ifndef NO_DES
 | 
			
		||||
		printf("%s ",des_options());
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_IDEA
 | 
			
		||||
#ifndef NO_IDEA
 | 
			
		||||
		printf("%s ",idea_options());
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_BF
 | 
			
		||||
#ifndef NO_BF
 | 
			
		||||
		printf("%s ",BF_options());
 | 
			
		||||
#endif
 | 
			
		||||
		printf("\n");
 | 
			
		||||
		}
 | 
			
		||||
	if (cflags)  printf("%s\n",SSLeay_version(SSLEAY_CFLAGS));
 | 
			
		||||
	if (dir)  printf("%s\n",SSLeay_version(SSLEAY_DIR));
 | 
			
		||||
end:
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
@@ -118,6 +118,7 @@ LRESULT CALLBACK WndProc(HWND hwnd, UINT iMsg, WPARAM wParam, LPARAM lParam)
 | 
			
		||||
        HDC hdc;
 | 
			
		||||
	PAINTSTRUCT ps;
 | 
			
		||||
        RECT rect;
 | 
			
		||||
        char buffer[200];
 | 
			
		||||
        static int seeded = 0;
 | 
			
		||||
 | 
			
		||||
	switch (iMsg)
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										321
									
								
								apps/x509.c
									
									
									
									
									
								
							
							
						
						
									
										321
									
								
								apps/x509.c
									
									
									
									
									
								
							@@ -60,7 +60,7 @@
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <stdlib.h>
 | 
			
		||||
#include <string.h>
 | 
			
		||||
#ifdef OPENSSL_NO_STDIO
 | 
			
		||||
#ifdef NO_STDIO
 | 
			
		||||
#define APPS_WIN16
 | 
			
		||||
#endif
 | 
			
		||||
#include "apps.h"
 | 
			
		||||
@@ -105,7 +105,6 @@ static char *x509_usage[]={
 | 
			
		||||
" -fingerprint    - print the certificate fingerprint\n",
 | 
			
		||||
" -alias          - output certificate alias\n",
 | 
			
		||||
" -noout          - no certificate output\n",
 | 
			
		||||
" -ocspid         - print OCSP hash values for the subject name and public key\n",
 | 
			
		||||
" -trustout       - output a \"trusted\" certificate\n",
 | 
			
		||||
" -clrtrust       - clear all trusted purposes\n",
 | 
			
		||||
" -clrreject      - clear all rejected purposes\n",
 | 
			
		||||
@@ -122,8 +121,7 @@ static char *x509_usage[]={
 | 
			
		||||
" -CAkey arg      - set the CA key, must be PEM format\n",
 | 
			
		||||
"                   missing, it is assumed to be in the CA file.\n",
 | 
			
		||||
" -CAcreateserial - create serial number file if it does not exist\n",
 | 
			
		||||
" -CAserial arg   - serial file\n",
 | 
			
		||||
" -set_serial     - serial number to use\n",
 | 
			
		||||
" -CAserial       - serial file\n",
 | 
			
		||||
" -text           - print the certificate in text form\n",
 | 
			
		||||
" -C              - print out C code forms\n",
 | 
			
		||||
" -md2/-md5/-sha1/-mdc2 - digest to use\n",
 | 
			
		||||
@@ -131,20 +129,15 @@ static char *x509_usage[]={
 | 
			
		||||
" -extensions     - section from config file with X509V3 extensions to add\n",
 | 
			
		||||
" -clrext         - delete extensions before signing and input certificate\n",
 | 
			
		||||
" -nameopt arg    - various certificate name options\n",
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
" -engine e       - use engine e, possibly a hardware device.\n",
 | 
			
		||||
#endif
 | 
			
		||||
" -certopt arg    - various certificate text options\n",
 | 
			
		||||
NULL
 | 
			
		||||
};
 | 
			
		||||
 | 
			
		||||
static int MS_CALLBACK callb(int ok, X509_STORE_CTX *ctx);
 | 
			
		||||
static int sign (X509 *x, EVP_PKEY *pkey,int days,int clrext, const EVP_MD *digest,
 | 
			
		||||
						CONF *conf, char *section);
 | 
			
		||||
						LHASH *conf, char *section);
 | 
			
		||||
static int x509_certify (X509_STORE *ctx,char *CAfile,const EVP_MD *digest,
 | 
			
		||||
			 X509 *x,X509 *xca,EVP_PKEY *pkey,char *serial,
 | 
			
		||||
			 int create,int days, int clrext, CONF *conf, char *section,
 | 
			
		||||
						ASN1_INTEGER *sno);
 | 
			
		||||
			 int create,int days, int clrext, LHASH *conf, char *section);
 | 
			
		||||
static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt);
 | 
			
		||||
static int reqfile=0;
 | 
			
		||||
 | 
			
		||||
@@ -152,13 +145,11 @@ int MAIN(int, char **);
 | 
			
		||||
 | 
			
		||||
int MAIN(int argc, char **argv)
 | 
			
		||||
	{
 | 
			
		||||
	ENGINE *e = NULL;
 | 
			
		||||
	int ret=1;
 | 
			
		||||
	X509_REQ *req=NULL;
 | 
			
		||||
	X509 *x=NULL,*xca=NULL;
 | 
			
		||||
	ASN1_OBJECT *objtmp;
 | 
			
		||||
	EVP_PKEY *Upkey=NULL,*CApkey=NULL;
 | 
			
		||||
	ASN1_INTEGER *sno = NULL;
 | 
			
		||||
	int i,num,badops=0;
 | 
			
		||||
	BIO *out=NULL;
 | 
			
		||||
	BIO *STDout=NULL;
 | 
			
		||||
@@ -168,7 +159,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	char *CAkeyfile=NULL,*CAserial=NULL;
 | 
			
		||||
	char *alias=NULL;
 | 
			
		||||
	int text=0,serial=0,hash=0,subject=0,issuer=0,startdate=0,enddate=0;
 | 
			
		||||
	int next_serial=0,ocspid=0;
 | 
			
		||||
	int noout=0,sign_flag=0,CA_flag=0,CA_createserial=0,email=0;
 | 
			
		||||
	int trustout=0,clrtrust=0,clrreject=0,aliasout=0,clrext=0;
 | 
			
		||||
	int C=0;
 | 
			
		||||
@@ -179,15 +169,12 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	X509_REQ *rq=NULL;
 | 
			
		||||
	int fingerprint=0;
 | 
			
		||||
	char buf[256];
 | 
			
		||||
	const EVP_MD *md_alg,*digest;
 | 
			
		||||
	CONF *extconf = NULL;
 | 
			
		||||
	const EVP_MD *md_alg,*digest=EVP_md5();
 | 
			
		||||
	LHASH *extconf = NULL;
 | 
			
		||||
	char *extsect = NULL, *extfile = NULL, *passin = NULL, *passargin = NULL;
 | 
			
		||||
	int need_rand = 0;
 | 
			
		||||
	int checkend=0,checkoffset=0;
 | 
			
		||||
	unsigned long nmflag = 0, certflag = 0;
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
	char *engine=NULL;
 | 
			
		||||
#endif
 | 
			
		||||
	unsigned long nmflag = 0;
 | 
			
		||||
 | 
			
		||||
	reqfile=0;
 | 
			
		||||
 | 
			
		||||
@@ -195,11 +182,8 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
 | 
			
		||||
	if (bio_err == NULL)
 | 
			
		||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
			
		||||
 | 
			
		||||
	if (!load_config(bio_err, NULL))
 | 
			
		||||
		goto end;
 | 
			
		||||
	STDout=BIO_new_fp(stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
	{
 | 
			
		||||
	BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
	STDout = BIO_push(tmpbio, STDout);
 | 
			
		||||
@@ -216,13 +200,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
	if (ctx == NULL) goto end;
 | 
			
		||||
	X509_STORE_set_verify_cb_func(ctx,callb);
 | 
			
		||||
 | 
			
		||||
#ifdef  OPENSSL_FIPS
 | 
			
		||||
	if (FIPS_mode())
 | 
			
		||||
		digest = EVP_sha1();
 | 
			
		||||
	else
 | 
			
		||||
#endif
 | 
			
		||||
		digest = EVP_md5();
 | 
			
		||||
 | 
			
		||||
	argc--;
 | 
			
		||||
	argv++;
 | 
			
		||||
	num=0;
 | 
			
		||||
@@ -317,12 +294,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			CAserial= *(++argv);
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-set_serial") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			if (!(sno = s2i_ASN1_INTEGER(NULL, *(++argv))))
 | 
			
		||||
				goto bad;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-addtrust") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
@@ -355,31 +326,23 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			alias= *(++argv);
 | 
			
		||||
			trustout = 1;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-certopt") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			if (!set_cert_ex(&certflag, *(++argv))) goto bad;
 | 
			
		||||
			}
 | 
			
		||||
		else if (strcmp(*argv,"-nameopt") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			if (!set_name_ex(&nmflag, *(++argv))) goto bad;
 | 
			
		||||
			}
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
		else if (strcmp(*argv,"-engine") == 0)
 | 
			
		||||
		else if (strcmp(*argv,"-setalias") == 0)
 | 
			
		||||
			{
 | 
			
		||||
			if (--argc < 1) goto bad;
 | 
			
		||||
			engine= *(++argv);
 | 
			
		||||
			alias= *(++argv);
 | 
			
		||||
			trustout = 1;
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-C") == 0)
 | 
			
		||||
			C= ++num;
 | 
			
		||||
		else if (strcmp(*argv,"-email") == 0)
 | 
			
		||||
			email= ++num;
 | 
			
		||||
		else if (strcmp(*argv,"-serial") == 0)
 | 
			
		||||
			serial= ++num;
 | 
			
		||||
		else if (strcmp(*argv,"-next_serial") == 0)
 | 
			
		||||
			next_serial= ++num;
 | 
			
		||||
		else if (strcmp(*argv,"-modulus") == 0)
 | 
			
		||||
			modulus= ++num;
 | 
			
		||||
		else if (strcmp(*argv,"-pubkey") == 0)
 | 
			
		||||
@@ -434,8 +397,6 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
			clrext = 1;
 | 
			
		||||
			}
 | 
			
		||||
#endif
 | 
			
		||||
		else if (strcmp(*argv,"-ocspid") == 0)
 | 
			
		||||
			ocspid= ++num;
 | 
			
		||||
		else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
 | 
			
		||||
			{
 | 
			
		||||
			/* ok */
 | 
			
		||||
@@ -455,14 +416,10 @@ int MAIN(int argc, char **argv)
 | 
			
		||||
		{
 | 
			
		||||
bad:
 | 
			
		||||
		for (pp=x509_usage; (*pp != NULL); pp++)
 | 
			
		||||
			BIO_printf(bio_err,"%s",*pp);
 | 
			
		||||
			BIO_printf(bio_err,*pp);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_ENGINE
 | 
			
		||||
        e = setup_engine(bio_err, engine, 0);
 | 
			
		||||
#endif
 | 
			
		||||
 | 
			
		||||
	if (need_rand)
 | 
			
		||||
		app_RAND_load_file(NULL, bio_err, 0);
 | 
			
		||||
 | 
			
		||||
@@ -490,10 +447,9 @@ bad:
 | 
			
		||||
 | 
			
		||||
	if (extfile)
 | 
			
		||||
		{
 | 
			
		||||
		long errorline = -1;
 | 
			
		||||
		long errorline;
 | 
			
		||||
		X509V3_CTX ctx2;
 | 
			
		||||
		extconf = NCONF_new(NULL);
 | 
			
		||||
		if (!NCONF_load(extconf, extfile,&errorline))
 | 
			
		||||
		if (!(extconf=CONF_load(NULL,extfile,&errorline)))
 | 
			
		||||
			{
 | 
			
		||||
			if (errorline <= 0)
 | 
			
		||||
				BIO_printf(bio_err,
 | 
			
		||||
@@ -505,18 +461,11 @@ bad:
 | 
			
		||||
							,errorline,extfile);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		if (!extsect)
 | 
			
		||||
			{
 | 
			
		||||
			extsect = NCONF_get_string(extconf, "default", "extensions");
 | 
			
		||||
			if (!extsect)
 | 
			
		||||
				{
 | 
			
		||||
				ERR_clear_error();
 | 
			
		||||
				extsect = "default";
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		if (!extsect && !(extsect = CONF_get_string(extconf, "default",
 | 
			
		||||
					 "extensions"))) extsect = "default";
 | 
			
		||||
		X509V3_set_ctx_test(&ctx2);
 | 
			
		||||
		X509V3_set_nconf(&ctx2, extconf);
 | 
			
		||||
		if (!X509V3_EXT_add_nconf(extconf, &ctx2, extsect, NULL))
 | 
			
		||||
		X509V3_set_conf_lhash(&ctx2, extconf);
 | 
			
		||||
		if (!X509V3_EXT_add_conf(extconf, &ctx2, extsect, NULL))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,
 | 
			
		||||
				"Error Loading extension section %s\n",
 | 
			
		||||
@@ -600,19 +549,7 @@ bad:
 | 
			
		||||
		if ((x=X509_new()) == NULL) goto end;
 | 
			
		||||
		ci=x->cert_info;
 | 
			
		||||
 | 
			
		||||
		if (sno == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			sno = ASN1_INTEGER_new();
 | 
			
		||||
			if (!sno || !rand_serial(NULL, sno))
 | 
			
		||||
				goto end;
 | 
			
		||||
			if (!X509_set_serialNumber(x, sno)) 
 | 
			
		||||
				goto end;
 | 
			
		||||
			ASN1_INTEGER_free(sno);
 | 
			
		||||
			sno = NULL;
 | 
			
		||||
			}
 | 
			
		||||
		else if (!X509_set_serialNumber(x, sno)) 
 | 
			
		||||
			goto end;
 | 
			
		||||
 | 
			
		||||
		if (!ASN1_INTEGER_set(X509_get_serialNumber(x),0)) goto end;
 | 
			
		||||
		if (!X509_set_issuer_name(x,req->req_info->subject)) goto end;
 | 
			
		||||
		if (!X509_set_subject_name(x,req->req_info->subject)) goto end;
 | 
			
		||||
 | 
			
		||||
@@ -624,16 +561,16 @@ bad:
 | 
			
		||||
		EVP_PKEY_free(pkey);
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		x=load_cert(bio_err,infile,informat,NULL,e,"Certificate");
 | 
			
		||||
		x=load_cert(bio_err,infile,informat);
 | 
			
		||||
 | 
			
		||||
	if (x == NULL) goto end;
 | 
			
		||||
	if (CA_flag)
 | 
			
		||||
		{
 | 
			
		||||
		xca=load_cert(bio_err,CAfile,CAformat,NULL,e,"CA Certificate");
 | 
			
		||||
		xca=load_cert(bio_err,CAfile,CAformat);
 | 
			
		||||
		if (xca == NULL) goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (!noout || text || next_serial)
 | 
			
		||||
	if (!noout || text)
 | 
			
		||||
		{
 | 
			
		||||
		OBJ_create("2.99999.3",
 | 
			
		||||
			"SET.ex3","SET x509v3 extension 3");
 | 
			
		||||
@@ -647,7 +584,7 @@ bad:
 | 
			
		||||
		if (outfile == NULL)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
			
		||||
#ifdef OPENSSL_SYS_VMS
 | 
			
		||||
#ifdef VMS
 | 
			
		||||
			{
 | 
			
		||||
			BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
			
		||||
			out = BIO_push(tmpbio, out);
 | 
			
		||||
@@ -707,24 +644,6 @@ bad:
 | 
			
		||||
				i2a_ASN1_INTEGER(STDout,x->cert_info->serialNumber);
 | 
			
		||||
				BIO_printf(STDout,"\n");
 | 
			
		||||
				}
 | 
			
		||||
			else if (next_serial == i)
 | 
			
		||||
				{
 | 
			
		||||
				BIGNUM *bnser;
 | 
			
		||||
				ASN1_INTEGER *ser;
 | 
			
		||||
				ser = X509_get_serialNumber(x);
 | 
			
		||||
				bnser = ASN1_INTEGER_to_BN(ser, NULL);
 | 
			
		||||
				if (!bnser)
 | 
			
		||||
					goto end;
 | 
			
		||||
				if (!BN_add_word(bnser, 1))
 | 
			
		||||
					goto end;
 | 
			
		||||
				ser = BN_to_ASN1_INTEGER(bnser, NULL);
 | 
			
		||||
				if (!ser)
 | 
			
		||||
					goto end;
 | 
			
		||||
				BN_free(bnser);
 | 
			
		||||
				i2a_ASN1_INTEGER(out, ser);
 | 
			
		||||
				ASN1_INTEGER_free(ser);
 | 
			
		||||
				BIO_puts(out, "\n");
 | 
			
		||||
				}
 | 
			
		||||
			else if (email == i) 
 | 
			
		||||
				{
 | 
			
		||||
				int j;
 | 
			
		||||
@@ -769,12 +688,12 @@ bad:
 | 
			
		||||
					goto end;
 | 
			
		||||
					}
 | 
			
		||||
				BIO_printf(STDout,"Modulus=");
 | 
			
		||||
#ifndef OPENSSL_NO_RSA
 | 
			
		||||
#ifndef NO_RSA
 | 
			
		||||
				if (pkey->type == EVP_PKEY_RSA)
 | 
			
		||||
					BN_print(STDout,pkey->pkey.rsa->n);
 | 
			
		||||
				else
 | 
			
		||||
#endif
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
				if (pkey->type == EVP_PKEY_DSA)
 | 
			
		||||
					BN_print(STDout,pkey->pkey.dsa->pub_key);
 | 
			
		||||
				else
 | 
			
		||||
@@ -806,11 +725,10 @@ bad:
 | 
			
		||||
				int y,z;
 | 
			
		||||
 | 
			
		||||
				X509_NAME_oneline(X509_get_subject_name(x),
 | 
			
		||||
					buf,sizeof buf);
 | 
			
		||||
					buf,256);
 | 
			
		||||
				BIO_printf(STDout,"/* subject:%s */\n",buf);
 | 
			
		||||
				m=X509_NAME_oneline(
 | 
			
		||||
					X509_get_issuer_name(x),buf,
 | 
			
		||||
					sizeof buf);
 | 
			
		||||
					X509_get_issuer_name(x),buf,256);
 | 
			
		||||
				BIO_printf(STDout,"/* issuer :%s */\n",buf);
 | 
			
		||||
 | 
			
		||||
				z=i2d_X509(x,NULL);
 | 
			
		||||
@@ -856,7 +774,7 @@ bad:
 | 
			
		||||
				}
 | 
			
		||||
			else if (text == i)
 | 
			
		||||
				{
 | 
			
		||||
				X509_print_ex(out,x,nmflag, certflag);
 | 
			
		||||
				X509_print(out,x);
 | 
			
		||||
				}
 | 
			
		||||
			else if (startdate == i)
 | 
			
		||||
				{
 | 
			
		||||
@@ -898,11 +816,10 @@ bad:
 | 
			
		||||
				if (Upkey == NULL)
 | 
			
		||||
					{
 | 
			
		||||
					Upkey=load_key(bio_err,
 | 
			
		||||
						keyfile, keyformat, 0,
 | 
			
		||||
						passin, e, "Private key");
 | 
			
		||||
						keyfile,keyformat, passin);
 | 
			
		||||
					if (Upkey == NULL) goto end;
 | 
			
		||||
					}
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
		                if (Upkey->type == EVP_PKEY_DSA)
 | 
			
		||||
		                        digest=EVP_dss1();
 | 
			
		||||
#endif
 | 
			
		||||
@@ -917,12 +834,10 @@ bad:
 | 
			
		||||
				if (CAkeyfile != NULL)
 | 
			
		||||
					{
 | 
			
		||||
					CApkey=load_key(bio_err,
 | 
			
		||||
						CAkeyfile, CAkeyformat,
 | 
			
		||||
						0, passin, e,
 | 
			
		||||
						"CA Private Key");
 | 
			
		||||
						CAkeyfile,CAkeyformat, passin);
 | 
			
		||||
					if (CApkey == NULL) goto end;
 | 
			
		||||
					}
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
		                if (CApkey->type == EVP_PKEY_DSA)
 | 
			
		||||
		                        digest=EVP_dss1();
 | 
			
		||||
#endif
 | 
			
		||||
@@ -930,7 +845,7 @@ bad:
 | 
			
		||||
				assert(need_rand);
 | 
			
		||||
				if (!x509_certify(ctx,CAfile,digest,x,xca,
 | 
			
		||||
					CApkey, CAserial,CA_createserial,days, clrext,
 | 
			
		||||
					extconf, extsect, sno))
 | 
			
		||||
					extconf, extsect))
 | 
			
		||||
					goto end;
 | 
			
		||||
				}
 | 
			
		||||
			else if (x509req == i)
 | 
			
		||||
@@ -946,14 +861,13 @@ bad:
 | 
			
		||||
				else
 | 
			
		||||
					{
 | 
			
		||||
					pk=load_key(bio_err,
 | 
			
		||||
						keyfile, FORMAT_PEM, 0,
 | 
			
		||||
						passin, e, "request key");
 | 
			
		||||
						keyfile,FORMAT_PEM, passin);
 | 
			
		||||
					if (pk == NULL) goto end;
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
				BIO_printf(bio_err,"Generating certificate request\n");
 | 
			
		||||
 | 
			
		||||
#ifndef OPENSSL_NO_DSA
 | 
			
		||||
#ifndef NO_DSA
 | 
			
		||||
		                if (pk->type == EVP_PKEY_DSA)
 | 
			
		||||
		                        digest=EVP_dss1();
 | 
			
		||||
#endif
 | 
			
		||||
@@ -972,18 +886,14 @@ bad:
 | 
			
		||||
					}
 | 
			
		||||
				noout=1;
 | 
			
		||||
				}
 | 
			
		||||
			else if (ocspid == i)
 | 
			
		||||
				{
 | 
			
		||||
				X509_ocspid_print(out, x);
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (checkend)
 | 
			
		||||
		{
 | 
			
		||||
		time_t tcheck=time(NULL) + checkoffset;
 | 
			
		||||
		time_t tnow=time(NULL);
 | 
			
		||||
 | 
			
		||||
		if (X509_cmp_time(X509_get_notAfter(x), &tcheck) < 0)
 | 
			
		||||
		if (ASN1_UTCTIME_cmp_time_t(X509_get_notAfter(x), tnow+checkoffset) == -1)
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(out,"Certificate will expire\n");
 | 
			
		||||
			ret=1;
 | 
			
		||||
@@ -1038,7 +948,7 @@ end:
 | 
			
		||||
	if (need_rand)
 | 
			
		||||
		app_RAND_write_file(NULL, bio_err);
 | 
			
		||||
	OBJ_cleanup();
 | 
			
		||||
	NCONF_free(extconf);
 | 
			
		||||
	CONF_free(extconf);
 | 
			
		||||
	BIO_free_all(out);
 | 
			
		||||
	BIO_free_all(STDout);
 | 
			
		||||
	X509_STORE_free(ctx);
 | 
			
		||||
@@ -1048,60 +958,22 @@ end:
 | 
			
		||||
	EVP_PKEY_free(Upkey);
 | 
			
		||||
	EVP_PKEY_free(CApkey);
 | 
			
		||||
	X509_REQ_free(rq);
 | 
			
		||||
	ASN1_INTEGER_free(sno);
 | 
			
		||||
	sk_ASN1_OBJECT_pop_free(trust, ASN1_OBJECT_free);
 | 
			
		||||
	sk_ASN1_OBJECT_pop_free(reject, ASN1_OBJECT_free);
 | 
			
		||||
	if (passin) OPENSSL_free(passin);
 | 
			
		||||
	apps_shutdown();
 | 
			
		||||
	OPENSSL_EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static ASN1_INTEGER *x509_load_serial(char *CAfile, char *serialfile, int create)
 | 
			
		||||
	{
 | 
			
		||||
	char *buf = NULL, *p;
 | 
			
		||||
	ASN1_INTEGER *bs = NULL;
 | 
			
		||||
	BIGNUM *serial = NULL;
 | 
			
		||||
	size_t len;
 | 
			
		||||
 | 
			
		||||
	len = ((serialfile == NULL)
 | 
			
		||||
		?(strlen(CAfile)+strlen(POSTFIX)+1)
 | 
			
		||||
		:(strlen(serialfile)))+1;
 | 
			
		||||
	buf=OPENSSL_malloc(len);
 | 
			
		||||
	if (buf == NULL) { BIO_printf(bio_err,"out of mem\n"); goto end; }
 | 
			
		||||
	if (serialfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BUF_strlcpy(buf,CAfile,len);
 | 
			
		||||
		for (p=buf; *p; p++)
 | 
			
		||||
			if (*p == '.')
 | 
			
		||||
				{
 | 
			
		||||
				*p='\0';
 | 
			
		||||
				break;
 | 
			
		||||
				}
 | 
			
		||||
		BUF_strlcat(buf,POSTFIX,len);
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		BUF_strlcpy(buf,serialfile,len);
 | 
			
		||||
 | 
			
		||||
	serial = load_serial(buf, create, NULL);
 | 
			
		||||
	if (serial == NULL) goto end;
 | 
			
		||||
 | 
			
		||||
	if (!BN_add_word(serial,1))
 | 
			
		||||
		{ BIO_printf(bio_err,"add_word failure\n"); goto end; }
 | 
			
		||||
 | 
			
		||||
	if (!save_serial(buf, NULL, serial, &bs)) goto end;
 | 
			
		||||
 | 
			
		||||
 end:
 | 
			
		||||
	if (buf) OPENSSL_free(buf);
 | 
			
		||||
	BN_free(serial);
 | 
			
		||||
	return bs;
 | 
			
		||||
	EXIT(ret);
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
	     X509 *x, X509 *xca, EVP_PKEY *pkey, char *serialfile, int create,
 | 
			
		||||
	     int days, int clrext, CONF *conf, char *section, ASN1_INTEGER *sno)
 | 
			
		||||
	     int days, int clrext, LHASH *conf, char *section)
 | 
			
		||||
	{
 | 
			
		||||
	int ret=0;
 | 
			
		||||
	ASN1_INTEGER *bs=NULL;
 | 
			
		||||
	BIO *io=NULL;
 | 
			
		||||
	MS_STATIC char buf2[1024];
 | 
			
		||||
	char *buf=NULL,*p;
 | 
			
		||||
	BIGNUM *serial=NULL;
 | 
			
		||||
	ASN1_INTEGER *bs=NULL,bs2;
 | 
			
		||||
	X509_STORE_CTX xsc;
 | 
			
		||||
	EVP_PKEY *upkey;
 | 
			
		||||
 | 
			
		||||
@@ -1109,16 +981,89 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
	EVP_PKEY_copy_parameters(upkey,pkey);
 | 
			
		||||
	EVP_PKEY_free(upkey);
 | 
			
		||||
 | 
			
		||||
	if(!X509_STORE_CTX_init(&xsc,ctx,x,NULL))
 | 
			
		||||
	X509_STORE_CTX_init(&xsc,ctx,x,NULL);
 | 
			
		||||
	buf=OPENSSL_malloc(EVP_PKEY_size(pkey)*2+
 | 
			
		||||
		((serialfile == NULL)
 | 
			
		||||
			?(strlen(CAfile)+strlen(POSTFIX)+1)
 | 
			
		||||
			:(strlen(serialfile)))+1);
 | 
			
		||||
	if (buf == NULL) { BIO_printf(bio_err,"out of mem\n"); goto end; }
 | 
			
		||||
	if (serialfile == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"Error initialising X509 store\n");
 | 
			
		||||
		strcpy(buf,CAfile);
 | 
			
		||||
		for (p=buf; *p; p++)
 | 
			
		||||
			if (*p == '.')
 | 
			
		||||
				{
 | 
			
		||||
				*p='\0';
 | 
			
		||||
				break;
 | 
			
		||||
				}
 | 
			
		||||
		strcat(buf,POSTFIX);
 | 
			
		||||
		}
 | 
			
		||||
	else
 | 
			
		||||
		strcpy(buf,serialfile);
 | 
			
		||||
	serial=BN_new();
 | 
			
		||||
	bs=ASN1_INTEGER_new();
 | 
			
		||||
	if ((serial == NULL) || (bs == NULL))
 | 
			
		||||
		{
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	if (sno) bs = sno;
 | 
			
		||||
	else if (!(bs = x509_load_serial(CAfile, serialfile, create)))
 | 
			
		||||
		goto end;
 | 
			
		||||
 | 
			
		||||
/*	if (!X509_STORE_add_cert(ctx,x)) goto end;*/
 | 
			
		||||
	io=BIO_new(BIO_s_file());
 | 
			
		||||
	if (io == NULL)
 | 
			
		||||
		{
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	
 | 
			
		||||
	if (BIO_read_filename(io,buf) <= 0)
 | 
			
		||||
		{
 | 
			
		||||
		if (!create)
 | 
			
		||||
			{
 | 
			
		||||
			perror(buf);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			ASN1_INTEGER_set(bs,1);
 | 
			
		||||
			BN_one(serial);
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	else 
 | 
			
		||||
		{
 | 
			
		||||
		if (!a2i_ASN1_INTEGER(io,bs,buf2,1024))
 | 
			
		||||
			{
 | 
			
		||||
			BIO_printf(bio_err,"unable to load serial number from %s\n",buf);
 | 
			
		||||
			ERR_print_errors(bio_err);
 | 
			
		||||
			goto end;
 | 
			
		||||
			}
 | 
			
		||||
		else
 | 
			
		||||
			{
 | 
			
		||||
			serial=BN_bin2bn(bs->data,bs->length,serial);
 | 
			
		||||
			if (serial == NULL)
 | 
			
		||||
				{
 | 
			
		||||
				BIO_printf(bio_err,"error converting bin 2 bn");
 | 
			
		||||
				goto end;
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (!BN_add_word(serial,1))
 | 
			
		||||
		{ BIO_printf(bio_err,"add_word failure\n"); goto end; }
 | 
			
		||||
	bs2.data=(unsigned char *)buf2;
 | 
			
		||||
	bs2.length=BN_bn2bin(serial,bs2.data);
 | 
			
		||||
 | 
			
		||||
	if (BIO_write_filename(io,buf) <= 0)
 | 
			
		||||
		{
 | 
			
		||||
		BIO_printf(bio_err,"error attempting to write serial number file\n");
 | 
			
		||||
		perror(buf);
 | 
			
		||||
		goto end;
 | 
			
		||||
		}
 | 
			
		||||
	i2a_ASN1_INTEGER(io,&bs2);
 | 
			
		||||
	BIO_puts(io,"\n");
 | 
			
		||||
	BIO_free(io);
 | 
			
		||||
	io=NULL;
 | 
			
		||||
	
 | 
			
		||||
	if (!X509_STORE_add_cert(ctx,x)) goto end;
 | 
			
		||||
 | 
			
		||||
	/* NOTE: this certificate can/should be self signed, unless it was
 | 
			
		||||
	 * a certificate request in which case it is not. */
 | 
			
		||||
@@ -1152,8 +1097,8 @@ static int x509_certify(X509_STORE *ctx, char *CAfile, const EVP_MD *digest,
 | 
			
		||||
		X509V3_CTX ctx2;
 | 
			
		||||
		X509_set_version(x,2); /* version 3 certificate */
 | 
			
		||||
                X509V3_set_ctx(&ctx2, xca, x, NULL, NULL, 0);
 | 
			
		||||
                X509V3_set_nconf(&ctx2, conf);
 | 
			
		||||
                if (!X509V3_EXT_add_nconf(conf, &ctx2, section, x)) goto end;
 | 
			
		||||
                X509V3_set_conf_lhash(&ctx2, conf);
 | 
			
		||||
                if (!X509V3_EXT_add_conf(conf, &ctx2, section, x)) goto end;
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
	if (!X509_sign(x,pkey,digest)) goto end;
 | 
			
		||||
@@ -1162,7 +1107,10 @@ end:
 | 
			
		||||
	X509_STORE_CTX_cleanup(&xsc);
 | 
			
		||||
	if (!ret)
 | 
			
		||||
		ERR_print_errors(bio_err);
 | 
			
		||||
	if (!sno) ASN1_INTEGER_free(bs);
 | 
			
		||||
	if (buf != NULL) OPENSSL_free(buf);
 | 
			
		||||
	if (bs != NULL) ASN1_INTEGER_free(bs);
 | 
			
		||||
	if (io != NULL)	BIO_free(io);
 | 
			
		||||
	if (serial != NULL) BN_free(serial);
 | 
			
		||||
	return ret;
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
@@ -1199,7 +1147,7 @@ static int MS_CALLBACK callb(int ok, X509_STORE_CTX *ctx)
 | 
			
		||||
 | 
			
		||||
/* self sign */
 | 
			
		||||
static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *digest, 
 | 
			
		||||
						CONF *conf, char *section)
 | 
			
		||||
						LHASH *conf, char *section)
 | 
			
		||||
	{
 | 
			
		||||
 | 
			
		||||
	EVP_PKEY *pktmp;
 | 
			
		||||
@@ -1229,8 +1177,8 @@ static int sign(X509 *x, EVP_PKEY *pkey, int days, int clrext, const EVP_MD *dig
 | 
			
		||||
		X509V3_CTX ctx;
 | 
			
		||||
		X509_set_version(x,2); /* version 3 certificate */
 | 
			
		||||
                X509V3_set_ctx(&ctx, x, x, NULL, NULL, 0);
 | 
			
		||||
                X509V3_set_nconf(&ctx, conf);
 | 
			
		||||
                if (!X509V3_EXT_add_nconf(conf, &ctx, section, x)) goto err;
 | 
			
		||||
                X509V3_set_conf_lhash(&ctx, conf);
 | 
			
		||||
                if (!X509V3_EXT_add_conf(conf, &ctx, section, x)) goto err;
 | 
			
		||||
		}
 | 
			
		||||
	if (!X509_sign(x,pkey,digest)) goto err;
 | 
			
		||||
	return 1;
 | 
			
		||||
@@ -1255,3 +1203,6 @@ static int purpose_print(BIO *bio, X509 *cert, X509_PURPOSE *pt)
 | 
			
		||||
		}
 | 
			
		||||
	return 1;
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 | 
			
		||||
 
 | 
			
		||||
@@ -29,7 +29,7 @@ RC4-MD5, but a re-connect tries to use DES-CBC-SHA.  So netscape, when
 | 
			
		||||
doing a re-connect, always takes the first cipher in the cipher list.
 | 
			
		||||
 | 
			
		||||
If we accept a netscape connection, demand a client cert, have a
 | 
			
		||||
non-self-signed CA which does not have it's CA in netscape, and the
 | 
			
		||||
non-self-sighed CA which does not have it's CA in netscape, and the
 | 
			
		||||
browser has a cert, it will crash/hang.  Works for 3.x and 4.xbeta
 | 
			
		||||
 | 
			
		||||
Netscape browsers do not really notice the server sending a
 | 
			
		||||
 
 | 
			
		||||
@@ -58,7 +58,7 @@
 | 
			
		||||
 | 
			
		||||
#include <stdio.h>
 | 
			
		||||
#include <openssl/rc4.h>
 | 
			
		||||
#ifdef OPENSSL_NO_DES
 | 
			
		||||
#ifdef NO_DES
 | 
			
		||||
#include <des.h>
 | 
			
		||||
#else
 | 
			
		||||
#include <openssl/des.h>
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										59
									
								
								certs/ICE-CA.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										59
									
								
								certs/ICE-CA.pem
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,59 @@
 | 
			
		||||
Certificate:
 | 
			
		||||
    Data:
 | 
			
		||||
        Version: 3 (0x2)
 | 
			
		||||
        Serial Number: 1 (0x1)
 | 
			
		||||
        Signature Algorithm: md5WithRSAEncryption
 | 
			
		||||
        Issuer: O=European ICE-TEL project, OU=V3-Certification Authority
 | 
			
		||||
        Validity
 | 
			
		||||
            Not Before: Apr  2 17:35:53 1997 GMT
 | 
			
		||||
            Not After : Apr  2 17:35:53 1998 GMT
 | 
			
		||||
        Subject: O=European ICE-TEL project, OU=V3-Certification Authority, L=Darmstadt
 | 
			
		||||
        Subject Public Key Info:
 | 
			
		||||
            Public Key Algorithm: rsa
 | 
			
		||||
            RSA Public Key: (512 bit)
 | 
			
		||||
                Modulus (512 bit):
 | 
			
		||||
                    00:82:75:ba:f6:d1:60:b5:f9:15:b3:6a:dd:29:8f:
 | 
			
		||||
                    8b:a4:6f:1a:88:e0:50:43:40:0b:79:41:d5:d3:16:
 | 
			
		||||
                    44:7d:74:65:17:42:06:52:0b:e9:50:c8:10:cd:24:
 | 
			
		||||
                    e2:ae:8d:22:30:73:e6:b4:b7:93:1f:e5:6e:a2:ae:
 | 
			
		||||
                    49:11:a5:c9:45
 | 
			
		||||
                Exponent: 65537 (0x10001)
 | 
			
		||||
        X509v3 extensions:
 | 
			
		||||
            X509v3 Authority Key Identifier: 
 | 
			
		||||
                0.........z.."p......e..
 | 
			
		||||
            X509v3 Subject Key Identifier: 
 | 
			
		||||
                ..~r..:..B.44fu......3
 | 
			
		||||
            X509v3 Key Usage: critical
 | 
			
		||||
                ....
 | 
			
		||||
            X509v3 Certificate Policies: critical
 | 
			
		||||
                0.0...*...
 | 
			
		||||
            X509v3 Subject Alternative Name: 
 | 
			
		||||
                0!..secude-support@darmstadt.gmd.de
 | 
			
		||||
            X509v3 Issuer Alternative Name: 
 | 
			
		||||
                0I..ice-tel-ca@darmstadt.gmd.de.*http://www.darmstadt.gmd.de/ice-tel/euroca
 | 
			
		||||
            X509v3 Basic Constraints: critical
 | 
			
		||||
                0....
 | 
			
		||||
            X509v3 CRL Distribution Points: 
 | 
			
		||||
                0200...,.*http://www.darmstadt.gmd.de/ice-tel/euroca
 | 
			
		||||
    Signature Algorithm: md5WithRSAEncryption
 | 
			
		||||
        17:a2:88:b7:99:5a:05:41:e4:13:34:67:e6:1f:3e:26:ec:4b:
 | 
			
		||||
        69:f9:3e:28:22:be:9d:1c:ab:41:6f:0c:00:85:fe:45:74:f6:
 | 
			
		||||
        98:f0:ce:9b:65:53:4a:50:42:c7:d4:92:bd:d7:a2:a8:3d:98:
 | 
			
		||||
        88:73:cd:60:28:79:a3:fc:48:7a
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICzDCCAnagAwIBAgIBATANBgkqhkiG9w0BAQQFADBIMSEwHwYDVQQKExhFdXJv
 | 
			
		||||
cGVhbiBJQ0UtVEVMIHByb2plY3QxIzAhBgNVBAsTGlYzLUNlcnRpZmljYXRpb24g
 | 
			
		||||
QXV0aG9yaXR5MB4XDTk3MDQwMjE3MzU1M1oXDTk4MDQwMjE3MzU1M1owXDEhMB8G
 | 
			
		||||
A1UEChMYRXVyb3BlYW4gSUNFLVRFTCBwcm9qZWN0MSMwIQYDVQQLExpWMy1DZXJ0
 | 
			
		||||
aWZpY2F0aW9uIEF1dGhvcml0eTESMBAGA1UEBxMJRGFybXN0YWR0MFkwCgYEVQgB
 | 
			
		||||
AQICAgADSwAwSAJBAIJ1uvbRYLX5FbNq3SmPi6RvGojgUENAC3lB1dMWRH10ZRdC
 | 
			
		||||
BlIL6VDIEM0k4q6NIjBz5rS3kx/lbqKuSRGlyUUCAwEAAaOCATgwggE0MB8GA1Ud
 | 
			
		||||
IwQYMBaAFIr3yNUOx3ro1yJw4AuJ1bbsZbzPMB0GA1UdDgQWBBR+cvL4OoacQog0
 | 
			
		||||
NGZ1w9T80aIRMzAOBgNVHQ8BAf8EBAMCAfYwFAYDVR0gAQH/BAowCDAGBgQqAwQF
 | 
			
		||||
MCoGA1UdEQQjMCGBH3NlY3VkZS1zdXBwb3J0QGRhcm1zdGFkdC5nbWQuZGUwUgYD
 | 
			
		||||
VR0SBEswSYEbaWNlLXRlbC1jYUBkYXJtc3RhZHQuZ21kLmRlhipodHRwOi8vd3d3
 | 
			
		||||
LmRhcm1zdGFkdC5nbWQuZGUvaWNlLXRlbC9ldXJvY2EwDwYDVR0TAQH/BAUwAwEB
 | 
			
		||||
/zA7BgNVHR8ENDAyMDCgLqAshipodHRwOi8vd3d3LmRhcm1zdGFkdC5nbWQuZGUv
 | 
			
		||||
aWNlLXRlbC9ldXJvY2EwDQYJKoZIhvcNAQEEBQADQQAXooi3mVoFQeQTNGfmHz4m
 | 
			
		||||
7Etp+T4oIr6dHKtBbwwAhf5FdPaY8M6bZVNKUELH1JK916KoPZiIc81gKHmj/Eh6
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
							
								
								
									
										48
									
								
								certs/ICE-root.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										48
									
								
								certs/ICE-root.pem
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,48 @@
 | 
			
		||||
Certificate:
 | 
			
		||||
    Data:
 | 
			
		||||
        Version: 3 (0x2)
 | 
			
		||||
        Serial Number: 0 (0x0)
 | 
			
		||||
        Signature Algorithm: md5WithRSAEncryption
 | 
			
		||||
        Issuer: O=European ICE-TEL project, OU=V3-Certification Authority
 | 
			
		||||
        Validity
 | 
			
		||||
            Not Before: Apr  2 17:33:36 1997 GMT
 | 
			
		||||
            Not After : Apr  2 17:33:36 1998 GMT
 | 
			
		||||
        Subject: O=European ICE-TEL project, OU=V3-Certification Authority
 | 
			
		||||
        Subject Public Key Info:
 | 
			
		||||
            Public Key Algorithm: rsa
 | 
			
		||||
            RSA Public Key: (512 bit)
 | 
			
		||||
                Modulus (512 bit):
 | 
			
		||||
                    00:80:3e:eb:ae:47:a9:fe:10:54:0b:81:8b:9c:2b:
 | 
			
		||||
                    82:ab:3a:61:36:65:8b:f3:73:9f:ac:ac:7a:15:a7:
 | 
			
		||||
                    13:8f:b4:c4:ba:a3:0f:bc:a5:58:8d:cc:b1:93:31:
 | 
			
		||||
                    9e:81:9e:8c:19:61:86:fa:52:73:54:d1:97:76:22:
 | 
			
		||||
                    e7:c7:9f:41:cd
 | 
			
		||||
                Exponent: 65537 (0x10001)
 | 
			
		||||
        X509v3 extensions:
 | 
			
		||||
            X509v3 Subject Key Identifier: 
 | 
			
		||||
                ........z.."p......e..
 | 
			
		||||
            X509v3 Key Usage: critical
 | 
			
		||||
                ....
 | 
			
		||||
            X509v3 Subject Alternative Name: 
 | 
			
		||||
                0I.*http://www.darmstadt.gmd.de/ice-tel/euroca..ice-tel-ca@darmstadt.gmd.de
 | 
			
		||||
            X509v3 Basic Constraints: critical
 | 
			
		||||
                0....
 | 
			
		||||
    Signature Algorithm: md5WithRSAEncryption
 | 
			
		||||
        76:69:61:db:b7:cf:8b:06:9e:d8:8c:96:53:d2:4d:a8:23:a6:
 | 
			
		||||
        03:44:e8:8f:24:a5:c0:84:a8:4b:77:d4:2d:2b:7d:37:91:67:
 | 
			
		||||
        f2:2c:ce:02:31:4c:6b:cc:ce:f2:68:a6:11:11:ab:7d:88:b8:
 | 
			
		||||
        7e:22:9f:25:06:60:bd:79:30:3d
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICFjCCAcCgAwIBAgIBADANBgkqhkiG9w0BAQQFADBIMSEwHwYDVQQKExhFdXJv
 | 
			
		||||
cGVhbiBJQ0UtVEVMIHByb2plY3QxIzAhBgNVBAsTGlYzLUNlcnRpZmljYXRpb24g
 | 
			
		||||
QXV0aG9yaXR5MB4XDTk3MDQwMjE3MzMzNloXDTk4MDQwMjE3MzMzNlowSDEhMB8G
 | 
			
		||||
A1UEChMYRXVyb3BlYW4gSUNFLVRFTCBwcm9qZWN0MSMwIQYDVQQLExpWMy1DZXJ0
 | 
			
		||||
aWZpY2F0aW9uIEF1dGhvcml0eTBZMAoGBFUIAQECAgIAA0sAMEgCQQCAPuuuR6n+
 | 
			
		||||
EFQLgYucK4KrOmE2ZYvzc5+srHoVpxOPtMS6ow+8pViNzLGTMZ6BnowZYYb6UnNU
 | 
			
		||||
0Zd2IufHn0HNAgMBAAGjgZcwgZQwHQYDVR0OBBYEFIr3yNUOx3ro1yJw4AuJ1bbs
 | 
			
		||||
ZbzPMA4GA1UdDwEB/wQEAwIB9jBSBgNVHREESzBJhipodHRwOi8vd3d3LmRhcm1z
 | 
			
		||||
dGFkdC5nbWQuZGUvaWNlLXRlbC9ldXJvY2GBG2ljZS10ZWwtY2FAZGFybXN0YWR0
 | 
			
		||||
LmdtZC5kZTAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBBAUAA0EAdmlh27fP
 | 
			
		||||
iwae2IyWU9JNqCOmA0TojySlwISoS3fULSt9N5Fn8izOAjFMa8zO8mimERGrfYi4
 | 
			
		||||
fiKfJQZgvXkwPQ==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
							
								
								
									
										63
									
								
								certs/ICE-user.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										63
									
								
								certs/ICE-user.pem
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,63 @@
 | 
			
		||||
Certificate:
 | 
			
		||||
    Data:
 | 
			
		||||
        Version: 3 (0x2)
 | 
			
		||||
        Serial Number: 1 (0x1)
 | 
			
		||||
        Signature Algorithm: md5WithRSAEncryption
 | 
			
		||||
        Issuer: O=European ICE-TEL project, OU=V3-Certification Authority, L=Darmstadt
 | 
			
		||||
        Validity
 | 
			
		||||
            Not Before: Apr  2 17:35:59 1997 GMT
 | 
			
		||||
            Not After : Apr  2 17:35:59 1998 GMT
 | 
			
		||||
        Subject: O=European ICE-TEL project, OU=V3-Certification Authority, L=Darmstadt, CN=USER
 | 
			
		||||
        Subject Public Key Info:
 | 
			
		||||
            Public Key Algorithm: rsa
 | 
			
		||||
            RSA Public Key: (512 bit)
 | 
			
		||||
                Modulus (512 bit):
 | 
			
		||||
                    00:a8:a8:53:63:49:1b:93:c3:c3:0b:6c:88:11:55:
 | 
			
		||||
                    de:7e:6a:e2:f9:52:a0:dc:69:25:c4:c8:bf:55:e1:
 | 
			
		||||
                    31:a8:ce:e4:a9:29:85:99:8a:15:9a:de:f6:2f:e1:
 | 
			
		||||
                    b4:50:5f:5e:04:75:a6:f4:76:dc:3c:0e:39:dc:3a:
 | 
			
		||||
                    be:3e:a4:61:8b
 | 
			
		||||
                Exponent: 65537 (0x10001)
 | 
			
		||||
        X509v3 extensions:
 | 
			
		||||
            X509v3 Authority Key Identifier: 
 | 
			
		||||
                0...~r..:..B.44fu......3
 | 
			
		||||
            X509v3 Subject Key Identifier: 
 | 
			
		||||
                ...... .*...1.*.......
 | 
			
		||||
            X509v3 Key Usage: critical
 | 
			
		||||
                ....
 | 
			
		||||
            X509v3 Certificate Policies: critical
 | 
			
		||||
                0.0...*...0.......
 | 
			
		||||
            X509v3 Subject Alternative Name: 
 | 
			
		||||
                0:..user@darmstadt.gmd.de.!http://www.darmstadt.gmd.de/~user
 | 
			
		||||
            X509v3 Issuer Alternative Name: 
 | 
			
		||||
                0....gmdca@gmd.de..http://www.gmd.de..saturn.darmstadt.gmd.de.\1!0...U.
 | 
			
		||||
..European ICE-TEL project1#0!..U....V3-Certification Authority1.0...U....Darmstadt..141.12.62.26
 | 
			
		||||
            X509v3 Basic Constraints: critical
 | 
			
		||||
                0.
 | 
			
		||||
            X509v3 CRL Distribution Points: 
 | 
			
		||||
                0.0.......gmdca@gmd.de
 | 
			
		||||
    Signature Algorithm: md5WithRSAEncryption
 | 
			
		||||
        69:0c:e1:b7:a7:f2:d8:fb:e8:69:c0:13:cd:37:ad:21:06:22:
 | 
			
		||||
        4d:e8:c6:db:f1:04:0b:b7:e0:b3:d6:0c:81:03:ce:c3:6a:3e:
 | 
			
		||||
        c7:e7:24:24:a4:92:64:c2:83:83:06:42:53:0e:6f:09:1e:84:
 | 
			
		||||
        9a:f7:6f:63:9b:94:99:83:d6:a4
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIDTzCCAvmgAwIBAgIBATANBgkqhkiG9w0BAQQFADBcMSEwHwYDVQQKExhFdXJv
 | 
			
		||||
cGVhbiBJQ0UtVEVMIHByb2plY3QxIzAhBgNVBAsTGlYzLUNlcnRpZmljYXRpb24g
 | 
			
		||||
QXV0aG9yaXR5MRIwEAYDVQQHEwlEYXJtc3RhZHQwHhcNOTcwNDAyMTczNTU5WhcN
 | 
			
		||||
OTgwNDAyMTczNTU5WjBrMSEwHwYDVQQKExhFdXJvcGVhbiBJQ0UtVEVMIHByb2pl
 | 
			
		||||
Y3QxIzAhBgNVBAsTGlYzLUNlcnRpZmljYXRpb24gQXV0aG9yaXR5MRIwEAYDVQQH
 | 
			
		||||
EwlEYXJtc3RhZHQxDTALBgNVBAMTBFVTRVIwWTAKBgRVCAEBAgICAANLADBIAkEA
 | 
			
		||||
qKhTY0kbk8PDC2yIEVXefmri+VKg3GklxMi/VeExqM7kqSmFmYoVmt72L+G0UF9e
 | 
			
		||||
BHWm9HbcPA453Dq+PqRhiwIDAQABo4IBmDCCAZQwHwYDVR0jBBgwFoAUfnLy+DqG
 | 
			
		||||
nEKINDRmdcPU/NGiETMwHQYDVR0OBBYEFJfc4B8gjSoRmLUx4Sq/ucIYiMrPMA4G
 | 
			
		||||
A1UdDwEB/wQEAwIB8DAcBgNVHSABAf8EEjAQMAYGBCoDBAUwBgYECQgHBjBDBgNV
 | 
			
		||||
HREEPDA6gRV1c2VyQGRhcm1zdGFkdC5nbWQuZGWGIWh0dHA6Ly93d3cuZGFybXN0
 | 
			
		||||
YWR0LmdtZC5kZS9+dXNlcjCBsQYDVR0SBIGpMIGmgQxnbWRjYUBnbWQuZGWGEWh0
 | 
			
		||||
dHA6Ly93d3cuZ21kLmRlghdzYXR1cm4uZGFybXN0YWR0LmdtZC5kZaRcMSEwHwYD
 | 
			
		||||
VQQKExhFdXJvcGVhbiBJQ0UtVEVMIHByb2plY3QxIzAhBgNVBAsTGlYzLUNlcnRp
 | 
			
		||||
ZmljYXRpb24gQXV0aG9yaXR5MRIwEAYDVQQHEwlEYXJtc3RhZHSHDDE0MS4xMi42
 | 
			
		||||
Mi4yNjAMBgNVHRMBAf8EAjAAMB0GA1UdHwQWMBQwEqAQoA6BDGdtZGNhQGdtZC5k
 | 
			
		||||
ZTANBgkqhkiG9w0BAQQFAANBAGkM4ben8tj76GnAE803rSEGIk3oxtvxBAu34LPW
 | 
			
		||||
DIEDzsNqPsfnJCSkkmTCg4MGQlMObwkehJr3b2OblJmD1qQ=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
							
								
								
									
										9
									
								
								certs/ICE.crl
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										9
									
								
								certs/ICE.crl
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,9 @@
 | 
			
		||||
-----BEGIN X509 CRL-----
 | 
			
		||||
MIIBNDCBnjANBgkqhkiG9w0BAQIFADBFMSEwHwYDVQQKExhFdXJvcGVhbiBJQ0Ut
 | 
			
		||||
VEVMIFByb2plY3QxIDAeBgNVBAsTF0NlcnRpZmljYXRpb24gQXV0aG9yaXR5Fw05
 | 
			
		||||
NzA2MDkxNDQyNDNaFw05NzA3MDkxNDQyNDNaMCgwEgIBChcNOTcwMzAzMTQ0MjU0
 | 
			
		||||
WjASAgEJFw05NjEwMDIxMjI5MjdaMA0GCSqGSIb3DQEBAgUAA4GBAH4vgWo2Tej/
 | 
			
		||||
i7kbiw4Imd30If91iosjClNpBFwvwUDBclPEeMuYimHbLOk4H8Nofc0fw11+U/IO
 | 
			
		||||
KSNouUDcqG7B64oY7c4SXKn+i1MWOb5OJiWeodX3TehHjBlyWzoNMWCnYA8XqFP1
 | 
			
		||||
mOKp8Jla1BibEZf14+/HqCi2hnZUiEXh
 | 
			
		||||
-----END X509 CRL-----
 | 
			
		||||
@@ -1,19 +0,0 @@
 | 
			
		||||
issuer= CN=5R-CA 1:PN+0.2.262.1.10.7.20=#130131,O=Regulierungsbeh\C3\88orde f\C3\88ur Telekommunikation und Post,C=DE
 | 
			
		||||
notBefore=Mar 22 08:55:51 2000 GMT
 | 
			
		||||
notAfter=Mar 22 08:55:51 2005 GMT
 | 
			
		||||
subject= CN=5R-CA 1:PN+0.2.262.1.10.7.20=#130131,O=Regulierungsbeh\C3\88orde f\C3\88ur Telekommunikation und Post,C=DE
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICaDCCAdSgAwIBAgIDDIOqMAoGBiskAwMBAgUAMG8xCzAJBgNVBAYTAkRFMT0w
 | 
			
		||||
OwYDVQQKFDRSZWd1bGllcnVuZ3NiZWjIb3JkZSBmyHVyIFRlbGVrb21tdW5pa2F0
 | 
			
		||||
aW9uIHVuZCBQb3N0MSEwDAYHAoIGAQoHFBMBMTARBgNVBAMUCjVSLUNBIDE6UE4w
 | 
			
		||||
IhgPMjAwMDAzMjIwODU1NTFaGA8yMDA1MDMyMjA4NTU1MVowbzELMAkGA1UEBhMC
 | 
			
		||||
REUxPTA7BgNVBAoUNFJlZ3VsaWVydW5nc2JlaMhvcmRlIGbIdXIgVGVsZWtvbW11
 | 
			
		||||
bmlrYXRpb24gdW5kIFBvc3QxITAMBgcCggYBCgcUEwExMBEGA1UEAxQKNVItQ0Eg
 | 
			
		||||
MTpQTjCBoTANBgkqhkiG9w0BAQEFAAOBjwAwgYsCgYEAih5BUycfBpqKhU8RDsaS
 | 
			
		||||
vV5AtzWeXQRColL9CH3t0DKnhjKAlJ8iccFtJNv+d3bh8bb9sh0maRSo647xP7hs
 | 
			
		||||
HTjKgTE4zM5BYNfXvST79OtcMgAzrnDiGjQIIWv8xbfV1MqxxdtZJygrwzRMb9jG
 | 
			
		||||
CAGoJEymoyzAMNG7tSdBWnUCBQDAAAABoxIwEDAOBgNVHQ8BAf8EBAMCAQYwCgYG
 | 
			
		||||
KyQDAwECBQADgYEAOaK8ihVSBUcL2IdVBxZYYUKwMz5m7H3zqhN8W9w+iafWudH6
 | 
			
		||||
b+aahkbENEwzg3C3v5g8nze7v7ssacQze657LHjP+e7ksUDIgcS4R1pU2eN16bjS
 | 
			
		||||
P/qGPF3rhrIEHoK5nJULkjkZYTtNiOvmQ/+G70TXDi3Os/TwLlWRvu+7YLM=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
@@ -1,19 +0,0 @@
 | 
			
		||||
issuer= CN=6R-Ca 1:PN+0.2.262.1.10.7.20=#130131,O=Regulierungsbeh\C3\88orde f\C3\88ur Telekommunikation und Post,C=DE
 | 
			
		||||
notBefore=Feb  1 09:52:17 2001 GMT
 | 
			
		||||
notAfter=Jun  1 09:52:17 2005 GMT
 | 
			
		||||
subject= CN=6R-Ca 1:PN+0.2.262.1.10.7.20=#130131,O=Regulierungsbeh\C3\88orde f\C3\88ur Telekommunikation und Post,C=DE
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIICaDCCAdSgAwIBAgIDMtGNMAoGBiskAwMBAgUAMG8xCzAJBgNVBAYTAkRFMT0w
 | 
			
		||||
OwYDVQQKFDRSZWd1bGllcnVuZ3NiZWjIb3JkZSBmyHVyIFRlbGVrb21tdW5pa2F0
 | 
			
		||||
aW9uIHVuZCBQb3N0MSEwDAYHAoIGAQoHFBMBMTARBgNVBAMUCjZSLUNhIDE6UE4w
 | 
			
		||||
IhgPMjAwMTAyMDEwOTUyMTdaGA8yMDA1MDYwMTA5NTIxN1owbzELMAkGA1UEBhMC
 | 
			
		||||
REUxPTA7BgNVBAoUNFJlZ3VsaWVydW5nc2JlaMhvcmRlIGbIdXIgVGVsZWtvbW11
 | 
			
		||||
bmlrYXRpb24gdW5kIFBvc3QxITAMBgcCggYBCgcUEwExMBEGA1UEAxQKNlItQ2Eg
 | 
			
		||||
MTpQTjCBoTANBgkqhkiG9w0BAQEFAAOBjwAwgYsCgYEAg6KrFSTNXKqe+2GKGeW2
 | 
			
		||||
wTmbVeflNkp5H/YxA9K1zmEn5XjKm0S0jH4Wfms6ipPlURVaFwTfnB1s++AnJAWf
 | 
			
		||||
mayaE9BP/pdIY6WtZGgW6aZc32VDMCMKPWyBNyagsJVDmzlakIA5cXBVa7Xqqd3P
 | 
			
		||||
ew8i2feMnQXcqHfDv02CW88CBQDAAAABoxIwEDAOBgNVHQ8BAf8EBAMCAQYwCgYG
 | 
			
		||||
KyQDAwECBQADgYEAOkqkUwdaTCt8wcJLA2zLuOwL5ADHMWLhv6gr5zEF+VckA6qe
 | 
			
		||||
IVLVf8e7fYlRmzQd+5OJcGglCQJLGT+ZplI3Mjnrd4plkoTNKV4iOzBcvJD7K4tn
 | 
			
		||||
XPvs9wCFcC7QU7PLvc1FDsAlr7e4wyefZRDL+wbqNfI7QZTSF1ubLd9AzeQ=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
@@ -1,22 +0,0 @@
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIDpDCCAoygAwIBAgIBATANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEc
 | 
			
		||||
MBoGA1UEChMTQW1lcmljYSBPbmxpbmUgSW5jLjE2MDQGA1UEAxMtQW1lcmljYSBP
 | 
			
		||||
bmxpbmUgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAxMB4XDTAyMDUyODA2
 | 
			
		||||
MDAwMFoXDTM3MTExOTIwNDMwMFowYzELMAkGA1UEBhMCVVMxHDAaBgNVBAoTE0Ft
 | 
			
		||||
ZXJpY2EgT25saW5lIEluYy4xNjA0BgNVBAMTLUFtZXJpY2EgT25saW5lIFJvb3Qg
 | 
			
		||||
Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMTCCASIwDQYJKoZIhvcNAQEBBQADggEP
 | 
			
		||||
ADCCAQoCggEBAKgv6KRpBgNHw+kqmP8ZonCaxlCyfqXfaE0bfA+2l2h9LaaLl+lk
 | 
			
		||||
hsmj76CGv2BlnEtUiMJIxUo5vxTjWVXlGbR0yLQFOVwWpeKVBeASrlmLojNoWBym
 | 
			
		||||
1BW32J/X3HGrfpq/m44zDyL9Hy7nBzbvYjnF3cu6JRQj3gzGPTzOggjmZj7aUTsW
 | 
			
		||||
OqMFf6Dch9Wc/HKpoH145LcxVR5lu9RhsCFg7RAycsWSJR74kEoYeEfffjA3PlAb
 | 
			
		||||
2xzTa5qGUwew76wGePiEmf4hjUyAtgyC9mZweRrTT6PP8c9GsEsPPt2IYriMqQko
 | 
			
		||||
O3rHl+Ee5fSfwMCuJKDIodkP1nsmgmkyPacCAwEAAaNjMGEwDwYDVR0TAQH/BAUw
 | 
			
		||||
AwEB/zAdBgNVHQ4EFgQUAK3Zo/Z59m50qX8zPYEX10zPM94wHwYDVR0jBBgwFoAU
 | 
			
		||||
AK3Zo/Z59m50qX8zPYEX10zPM94wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEB
 | 
			
		||||
BQUAA4IBAQB8itEfGDeC4Liwo+1WlchiYZwFos3CYiZhzRAW18y0ZTTQEYqtqKkF
 | 
			
		||||
Zu90821fnZmv9ov761KyBZiibyrFVL0lvV+uyIbqRizBs73B6UlwGBaXCBOMIOAb
 | 
			
		||||
LjpHyx7kADCVW/RFo8AasAFOq73AI25jP4BKxQft3OJvx8Fi8eNy1gTIdGcL+oir
 | 
			
		||||
oQHIb/AUr9KZzVGTfu0uOMe9zkZQPXLjeSWdm4grECDdpbgyn43gKd8hdIaC2y+C
 | 
			
		||||
MMbHNYaz+ZZfRtsMRf3zUMNvxsNIrUam4SdHCh0Om7bCd39j8uB9Gr784N/Xx6ds
 | 
			
		||||
sPmuujz9dLQR6FgNgLzTqIA6me11zEZ7
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
@@ -1,33 +0,0 @@
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIFpDCCA4ygAwIBAgIBATANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEc
 | 
			
		||||
MBoGA1UEChMTQW1lcmljYSBPbmxpbmUgSW5jLjE2MDQGA1UEAxMtQW1lcmljYSBP
 | 
			
		||||
bmxpbmUgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAyMB4XDTAyMDUyODA2
 | 
			
		||||
MDAwMFoXDTM3MDkyOTE0MDgwMFowYzELMAkGA1UEBhMCVVMxHDAaBgNVBAoTE0Ft
 | 
			
		||||
ZXJpY2EgT25saW5lIEluYy4xNjA0BgNVBAMTLUFtZXJpY2EgT25saW5lIFJvb3Qg
 | 
			
		||||
Q2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIP
 | 
			
		||||
ADCCAgoCggIBAMxBRR3pPU0Q9oyxQcngXssNt79Hc9PwVU3dxgz6sWYFas14tNwC
 | 
			
		||||
206B89enfHG8dWOgXeMHDEjsJcQDIPT/DjsS/5uN4cbVG7RtIuOx238hZK+GvFci
 | 
			
		||||
KtZHgVdEglZTvYYUAQv8f3SkWq7xuhG1m1hagLQ3eAkzfDJHA1zEpYNI9FdWboE2
 | 
			
		||||
JxhP7JsowtS013wMPgwr38oE18aO6lhOqKSlGBxsRZijQdEt0sdtjRnxrXm3gT+9
 | 
			
		||||
BoInLRBYBbV4Bbkv2wxrkJB+FFk4u5QkE+XRnRTf04JNRvCAOVIyD+OEsnpD8l7e
 | 
			
		||||
Xz8d3eOyG6ChKiMDbi4BFYdcpnV1x5dhvt6G3NRI270qv0pV2uh9UPu0gBe4lL8B
 | 
			
		||||
PeraunzgWGcXuVjgiIZGZ2ydEEdYMtA1fHkqkKJaEBEjNa0vzORKW6fIJ/KD3l67
 | 
			
		||||
Xnfn6KVuY8INXWHQjNJsWiEOyiijzirplcdIz5ZvHZIlyMbGwcEMBawmxNJ10uEq
 | 
			
		||||
Z8A9W6Wa6897GqidFEXlD6CaZd4vKL3Ob5Rmg0gp2OpljK+T2WSfVVcmv2/LNzGZ
 | 
			
		||||
o2C7HK2JNDJiuEMhBnIMoVxtRsX6Kc8w3onccVvdtjc+31D1uAclJuW8tf48ArO3
 | 
			
		||||
+L5DwYcRlJ4jbBeKuIonDFRH8KmzwICMoCfrHRnjB453cMor9H124HhnAgMBAAGj
 | 
			
		||||
YzBhMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFE1FwWg4u3OpaaEg5+31IqEj
 | 
			
		||||
FNeeMB8GA1UdIwQYMBaAFE1FwWg4u3OpaaEg5+31IqEjFNeeMA4GA1UdDwEB/wQE
 | 
			
		||||
AwIBhjANBgkqhkiG9w0BAQUFAAOCAgEAZ2sGuV9FOypLM7PmG2tZTiLMubekJcmn
 | 
			
		||||
xPBUlgtk87FYT15R/LKXeydlwuXK5w0MJXti4/qftIe3RUavg6WXSIylvfEWK5t2
 | 
			
		||||
LHo1YGwRgJfMqZJS5ivmae2p+DYtLHe/YUjRYwu5W1LtGLBDQiKmsXeu3mnFzccc
 | 
			
		||||
obGlHBD7GL4acN3Bkku+KVqdPzW+5X1R+FXgJXUjhx5c3LqdsKyzadsXg8n33gy8
 | 
			
		||||
CNyRnqjQ1xU3c6U1uPx+xURABsPr+CKAXEfOAuMRn0T//ZoyzH1kUQ7rVyZ2OuMe
 | 
			
		||||
IjzCpjbdGe+n/BLzJsBZMYVMnNjP36TMzCmT/5RtdlwTCJfy7aULTd3oyWgOZtMA
 | 
			
		||||
DjMSW7yV5TKQqLPGbIOtd+6Lfn6xqavT4fG2wLHqiMDn05DpKJKUe2h7lyoKZy2F
 | 
			
		||||
AjgQ5ANh1NolNscIWC2hp1GvMApJ9aZphwctREZ2jirlmjvXGKL8nDgQzMY70rUX
 | 
			
		||||
Om/9riW99XJZZLF0KjhfGEzfz3EEWjbUvy+ZnOjZurGV5gJLIaFb1cFPj65pbVPb
 | 
			
		||||
AZO1XB4Y3WRayhgoPmMEEf0cjQAPuDffZ4qdZqkCapH/E8ovXYO8h5Ns3CRRFgQl
 | 
			
		||||
Zvqz2cK6Kb6aSDiCmfS/O0oxGfm/jiEzFMpPVF/7zvuPcX/9XhmgD0uRuMRUvAaw
 | 
			
		||||
RY8mkaKO/qk=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
@@ -1,23 +0,0 @@
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIID5jCCAs6gAwIBAgIBATANBgkqhkiG9w0BAQUFADCBgzELMAkGA1UEBhMCVVMx
 | 
			
		||||
HTAbBgNVBAoTFEFPTCBUaW1lIFdhcm5lciBJbmMuMRwwGgYDVQQLExNBbWVyaWNh
 | 
			
		||||
IE9ubGluZSBJbmMuMTcwNQYDVQQDEy5BT0wgVGltZSBXYXJuZXIgUm9vdCBDZXJ0
 | 
			
		||||
aWZpY2F0aW9uIEF1dGhvcml0eSAxMB4XDTAyMDUyOTA2MDAwMFoXDTM3MTEyMDE1
 | 
			
		||||
MDMwMFowgYMxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRBT0wgVGltZSBXYXJuZXIg
 | 
			
		||||
SW5jLjEcMBoGA1UECxMTQW1lcmljYSBPbmxpbmUgSW5jLjE3MDUGA1UEAxMuQU9M
 | 
			
		||||
IFRpbWUgV2FybmVyIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMTCCASIw
 | 
			
		||||
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAJnej8Mlo2k06AX3dLm/WpcZuS+U
 | 
			
		||||
0pPlLYnKhHw/EEMbjIt8hFj4JHxIzyr9wBXZGH6EGhfT257XyuTZ16pYUYfw8ItI
 | 
			
		||||
TuLCxFlpMGK2MKKMCxGZYTVtfu/FsRkGIBKOQuHfD5YQUqjPnF+VFNivO3ULMSAf
 | 
			
		||||
RC+iYkGzuxgh28pxPIzstrkNn+9R7017EvILDOGsQI93f7DKeHEMXRZxcKLXwjqF
 | 
			
		||||
zQ6axOAAsNUl6twr5JQtOJyJQVdkKGUZHLZEtMgxa44Be3ZZJX8VHIQIfHNlIAqh
 | 
			
		||||
BC4aMqiaILGcLCFZ5/vP7nAtCMpjPiybkxlqpMKX/7eGV4iFbJ4VFitNLLMCAwEA
 | 
			
		||||
AaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUoTYwFsuGkABFgFOxj8jY
 | 
			
		||||
PXy+XxIwHwYDVR0jBBgwFoAUoTYwFsuGkABFgFOxj8jYPXy+XxIwDgYDVR0PAQH/
 | 
			
		||||
BAQDAgGGMA0GCSqGSIb3DQEBBQUAA4IBAQCKIBilvrMvtKaEAEAwKfq0FHNMeUWn
 | 
			
		||||
9nDg6H5kHgqVfGphwu9OH77/yZkfB2FK4V1Mza3u0FIy2VkyvNp5ctZ7CegCgTXT
 | 
			
		||||
Ct8RHcl5oIBN/lrXVtbtDyqvpxh1MwzqwWEFT2qaifKNuZ8u77BfWgDrvq2g+EQF
 | 
			
		||||
Z7zLBO+eZMXpyD8Fv8YvBxzDNnGGyjhmSs3WuEvGbKeXO/oTLW4jYYehY0KswsuX
 | 
			
		||||
n2Fozy1MBJ3XJU8KDk2QixhWqJNIV9xvrr2eZ1d3iVCzvhGbRWeDhhmH05i9CBoW
 | 
			
		||||
H1iCC+GWaQVLjuyDUTEH1dSf/1l7qG6Fz9NLqUmwX7A5KGgOc90lmt4S
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
@@ -1,34 +0,0 @@
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIF5jCCA86gAwIBAgIBATANBgkqhkiG9w0BAQUFADCBgzELMAkGA1UEBhMCVVMx
 | 
			
		||||
HTAbBgNVBAoTFEFPTCBUaW1lIFdhcm5lciBJbmMuMRwwGgYDVQQLExNBbWVyaWNh
 | 
			
		||||
IE9ubGluZSBJbmMuMTcwNQYDVQQDEy5BT0wgVGltZSBXYXJuZXIgUm9vdCBDZXJ0
 | 
			
		||||
aWZpY2F0aW9uIEF1dGhvcml0eSAyMB4XDTAyMDUyOTA2MDAwMFoXDTM3MDkyODIz
 | 
			
		||||
NDMwMFowgYMxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRBT0wgVGltZSBXYXJuZXIg
 | 
			
		||||
SW5jLjEcMBoGA1UECxMTQW1lcmljYSBPbmxpbmUgSW5jLjE3MDUGA1UEAxMuQU9M
 | 
			
		||||
IFRpbWUgV2FybmVyIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgMjCCAiIw
 | 
			
		||||
DQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALQ3WggWmRToVbEbJGv8x4vmh6mJ
 | 
			
		||||
7ouZzU9AhqS2TcnZsdw8TQ2FTBVsRotSeJ/4I/1n9SQ6aF3Q92RhQVSji6UI0ilb
 | 
			
		||||
m2BPJoPRYxJWSXakFsKlnUWsi4SVqBax7J/qJBrvuVdcmiQhLE0OcR+mrF1FdAOY
 | 
			
		||||
xFSMFkpBd4aVdQxHAWZg/BXxD+r1FHjHDtdugRxev17nOirYlxcwfACtCJ0zr7iZ
 | 
			
		||||
YYCLqJV+FNwSbKTQ2O9ASQI2+W6p1h2WVgSysy0WVoaP2SBXgM1nEG2wTPDaRrbq
 | 
			
		||||
JS5Gr42whTg0ixQmgiusrpkLjhTXUr2eacOGAgvqdnUxCc4zGSGFQ+aJLZ8lN2fx
 | 
			
		||||
I2rSAG2X+Z/nKcrdH9cG6rjJuQkhn8g/BsXS6RJGAE57COtCPStIbp1n3UsC5ETz
 | 
			
		||||
kxmlJ85per5n0/xQpCyrw2u544BMzwVhSyvcG7mm0tCq9Stz+86QNZ8MUhy/XCFh
 | 
			
		||||
EVsVS6kkUfykXPcXnbDS+gfpj1bkGoxoigTTfFrjnqKhynFbotSg5ymFXQNoKk/S
 | 
			
		||||
Btc9+cMDLz9l+WceR0DTYw/j1Y75hauXTLPXJuuWCpTehTacyH+BCQJJKg71ZDIM
 | 
			
		||||
gtG6aoIbs0t0EfOMd9afv9w3pKdVBC/UMejTRrkDfNoSTllkt1ExMVCgyhwn2RAu
 | 
			
		||||
rda9EGYrw7AiShJbAgMBAAGjYzBhMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYE
 | 
			
		||||
FE9pbQN+nZ8HGEO8txBO1b+pxCAoMB8GA1UdIwQYMBaAFE9pbQN+nZ8HGEO8txBO
 | 
			
		||||
1b+pxCAoMA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQUFAAOCAgEAO/Ouyugu
 | 
			
		||||
h4X7ZVnnrREUpVe8WJ8kEle7+z802u6teio0cnAxa8cZmIDJgt43d15Ui47y6mdP
 | 
			
		||||
yXSEkVYJ1eV6moG2gcKtNuTxVBFT8zRFASbI5Rq8NEQh3q0l/HYWdyGQgJhXnU7q
 | 
			
		||||
7C+qPBR7V8F+GBRn7iTGvboVsNIYvbdVgaxTwOjdaRITQrcCtQVBynlQboIOcXKT
 | 
			
		||||
RuidDV29rs4prWPVVRaAMCf/drr3uNZK49m1+VLQTkCpx+XCMseqdiThawVQ68W/
 | 
			
		||||
ClTluUI8JPu3B5wwn3la5uBAUhX0/Kr0VvlEl4ftDmVyXr4m+02kLQgH3thcoNyB
 | 
			
		||||
M5kYJRF3p+v9WAksmWsbivNSPxpNSGDxoPYzAlOL7SUJuA0t7Zdz7NeWH45gDtoQ
 | 
			
		||||
my8YJPamTQr5O8t1wswvziRpyQoijlmn94IM19drNZxDAGrElWe6nEXLuA4399xO
 | 
			
		||||
AU++CrYD062KRffaJ00psUjf5BHklka9bAI+1lHIlRcBFanyqqryvy9lG2/QuRqT
 | 
			
		||||
9Y41xICHPpQvZuTpqP9BnHAqTyo5GJUefvthATxRCC4oGKQWDzH9OmwjkyB24f0H
 | 
			
		||||
hdFbP9IcczLd+rn4jM8Ch3qaluTtT4mNU0OrDhPAARW0eTjb/G49nlG2uBOLZ8/5
 | 
			
		||||
fNkiHfZdxRwBL5joeiQYvITX+txyW/fBOmg=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
@@ -1,39 +0,0 @@
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIG0zCCBbugAwIBAgIBADANBgkqhkiG9w0BAQUFADCBzDELMAkGA1UEBhMCQVQx
 | 
			
		||||
EDAOBgNVBAgTB0F1c3RyaWExDzANBgNVBAcTBlZpZW5uYTE6MDgGA1UEChMxQVJH
 | 
			
		||||
RSBEQVRFTiAtIEF1c3RyaWFuIFNvY2lldHkgZm9yIERhdGEgUHJvdGVjdGlvbjEl
 | 
			
		||||
MCMGA1UECxMcQS1DRVJUIENlcnRpZmljYXRpb24gU2VydmljZTEYMBYGA1UEAxMP
 | 
			
		||||
QS1DRVJUIEFEVkFOQ0VEMR0wGwYJKoZIhvcNAQkBFg5pbmZvQGEtY2VydC5hdDAe
 | 
			
		||||
Fw0wNDEwMjMxNDE0MTRaFw0xMTEwMjMxNDE0MTRaMIHMMQswCQYDVQQGEwJBVDEQ
 | 
			
		||||
MA4GA1UECBMHQXVzdHJpYTEPMA0GA1UEBxMGVmllbm5hMTowOAYDVQQKEzFBUkdF
 | 
			
		||||
IERBVEVOIC0gQXVzdHJpYW4gU29jaWV0eSBmb3IgRGF0YSBQcm90ZWN0aW9uMSUw
 | 
			
		||||
IwYDVQQLExxBLUNFUlQgQ2VydGlmaWNhdGlvbiBTZXJ2aWNlMRgwFgYDVQQDEw9B
 | 
			
		||||
LUNFUlQgQURWQU5DRUQxHTAbBgkqhkiG9w0BCQEWDmluZm9AYS1jZXJ0LmF0MIIB
 | 
			
		||||
IjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3euXIy+mnf6BYKbK+QH5k679
 | 
			
		||||
tUFqeT8jlZxMew8eNiHuw9KoxWBzL6KksK+5uK7Gatw+sbAYntEGE80P+Jg1hADM
 | 
			
		||||
e+Fr5V0bc6QS3gkVtfUCW/RIvfMM39oxvmqJmOgPnJU7H6+nmLtsq61tv9kVJi/2
 | 
			
		||||
4Y5wXW3odet72sF57EoG6s78w0BUVLNcMngS9bZZzmdG3/d6JbkGgoNF/8DcgCBJ
 | 
			
		||||
W/t0JrcIzyppXIOVtUzzOrrU86zuUgT3Rtkl5kjG7DEHpFb9H0fTOY1v8+gRoaO6
 | 
			
		||||
2gA0PCiysgVZjwgVeYe3KAg11nznyleDv198uK3Dc1oXIGYjJx2FpKWUvAuAEwID
 | 
			
		||||
AQABo4ICvDCCArgwHQYDVR0OBBYEFDd/Pj6ZcWDKJNSRE3nQdCm0qCTYMIH5BgNV
 | 
			
		||||
HSMEgfEwge6AFDd/Pj6ZcWDKJNSRE3nQdCm0qCTYoYHSpIHPMIHMMQswCQYDVQQG
 | 
			
		||||
EwJBVDEQMA4GA1UECBMHQXVzdHJpYTEPMA0GA1UEBxMGVmllbm5hMTowOAYDVQQK
 | 
			
		||||
EzFBUkdFIERBVEVOIC0gQXVzdHJpYW4gU29jaWV0eSBmb3IgRGF0YSBQcm90ZWN0
 | 
			
		||||
aW9uMSUwIwYDVQQLExxBLUNFUlQgQ2VydGlmaWNhdGlvbiBTZXJ2aWNlMRgwFgYD
 | 
			
		||||
VQQDEw9BLUNFUlQgQURWQU5DRUQxHTAbBgkqhkiG9w0BCQEWDmluZm9AYS1jZXJ0
 | 
			
		||||
LmF0ggEAMA8GA1UdEwEB/wQFMAMBAf8wCwYDVR0PBAQDAgHmMEcGA1UdJQRAMD4G
 | 
			
		||||
CCsGAQUFBwMBBggrBgEFBQcDAgYIKwYBBQUHAwMGCCsGAQUFBwMEBggrBgEFBQcD
 | 
			
		||||
CAYKKwYBBAGCNwoDBDARBglghkgBhvhCAQEEBAMCAP8wUQYDVR0gBEowSDBGBggq
 | 
			
		||||
KAAYAQEBAzA6MDgGCCsGAQUFBwIBFixodHRwOi8vd3d3LmEtY2VydC5hdC9jZXJ0
 | 
			
		||||
aWZpY2F0ZS1wb2xpY3kuaHRtbDA7BglghkgBhvhCAQgELhYsaHR0cDovL3d3dy5h
 | 
			
		||||
LWNlcnQuYXQvY2VydGlmaWNhdGUtcG9saWN5Lmh0bWwwGQYDVR0RBBIwEIEOaW5m
 | 
			
		||||
b0BhLWNlcnQuYXQwLwYDVR0SBCgwJoEOaW5mb0BhLWNlcnQuYXSGFGh0dHA6Ly93
 | 
			
		||||
d3cuYS1jZXJ0LmF0MEUGA1UdHwQ+MDwwOqA4oDaGNGh0dHBzOi8vc2VjdXJlLmEt
 | 
			
		||||
Y2VydC5hdC9jZ2ktYmluL2EtY2VydC1hZHZhbmNlZC5jZ2kwDQYJKoZIhvcNAQEF
 | 
			
		||||
BQADggEBACX1IvgfdG2rvfv35O48vSEvcVaEdlN8USFBHWz3JRAozgzvaBtwHkjK
 | 
			
		||||
Zwt5l/BWOtjbvHfRjDt7ijlBEcxOOrNC1ffyMHwHrXpvff6YpQ5wnxmIYEQcURiG
 | 
			
		||||
HMqruEX0WkuDNgSKwefsgXs27eeBauHgNGVcTYH1rmHu/ZyLpLxOyJQ2PCzA1DzW
 | 
			
		||||
3rWkIX92ogJ7lTRdWrbxwUL1XGinxnnaQ74+/y0pI9JNEv7ic2tpkweRMpkedaLW
 | 
			
		||||
msC1+orfKTebsg69aMaCx7o6jNONRmR/7TVaPf8/k6g52cHZ9YWjQvup22b5rWxG
 | 
			
		||||
J5r5LZ4vCPmF4+T4lutjUYAa/lGuQTg=
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
@@ -1,23 +0,0 @@
 | 
			
		||||
-----BEGIN CERTIFICATE-----
 | 
			
		||||
MIIDwzCCAyygAwIBAgIBADANBgkqhkiG9w0BAQQFADCBmDELMAkGA1UEBhMCQVQx
 | 
			
		||||
EDAOBgNVBAgTB0F1c3RyaWExDzANBgNVBAcTBlZpZW5uYTFCMEAGA1UEChM5QXJn
 | 
			
		||||
ZSBEYXRlbiBPZXN0ZXJyZWljaGlzY2hlIEdlc2VsbHNjaGFmdCBmdWVyIERhdGVu
 | 
			
		||||
c2NodXR6MSIwIAYJKoZIhvcNAQkBFhNhLWNlcnRAYXJnZWRhdGVuLmF0MB4XDTAx
 | 
			
		||||
MDIxMjExMzAzMFoXDTA5MDIxMjExMzAzMFowgZgxCzAJBgNVBAYTAkFUMRAwDgYD
 | 
			
		||||
VQQIEwdBdXN0cmlhMQ8wDQYDVQQHEwZWaWVubmExQjBABgNVBAoTOUFyZ2UgRGF0
 | 
			
		||||
ZW4gT2VzdGVycmVpY2hpc2NoZSBHZXNlbGxzY2hhZnQgZnVlciBEYXRlbnNjaHV0
 | 
			
		||||
ejEiMCAGCSqGSIb3DQEJARYTYS1jZXJ0QGFyZ2VkYXRlbi5hdDCBnzANBgkqhkiG
 | 
			
		||||
9w0BAQEFAAOBjQAwgYkCgYEAwgsHqoNtmmrJ86+e1I4hOVBaL4kokqKN2IPOIL+1
 | 
			
		||||
XwY8vfOOUfPEdhWpaC0ldt7VYrksgDiUccgH0FROANWK2GkfKMDzjjXHysR04uEb
 | 
			
		||||
Om7Kqjqn0nproOGkFG+QvBZgs+Ws+HXNFJA6V76fU4+JXq4452LSK4Lr5YcBquu3
 | 
			
		||||
NJECAwEAAaOCARkwggEVMB0GA1UdDgQWBBQ0j59zH/G31zRjgK1y2P//tSAWZjCB
 | 
			
		||||
xQYDVR0jBIG9MIG6gBQ0j59zH/G31zRjgK1y2P//tSAWZqGBnqSBmzCBmDELMAkG
 | 
			
		||||
A1UEBhMCQVQxEDAOBgNVBAgTB0F1c3RyaWExDzANBgNVBAcTBlZpZW5uYTFCMEAG
 | 
			
		||||
A1UEChM5QXJnZSBEYXRlbiBPZXN0ZXJyZWljaGlzY2hlIEdlc2VsbHNjaGFmdCBm
 | 
			
		||||
dWVyIERhdGVuc2NodXR6MSIwIAYJKoZIhvcNAQkBFhNhLWNlcnRAYXJnZWRhdGVu
 | 
			
		||||
LmF0ggEAMAwGA1UdEwQFMAMBAf8wCwYDVR0PBAQDAgEGMBEGCWCGSAGG+EIBAQQE
 | 
			
		||||
AwICBDANBgkqhkiG9w0BAQQFAAOBgQBFuJYncqMYB6gXQS3eDOI90BEHfFTKy/dV
 | 
			
		||||
AV+K7QdAYikWmqgBheRdPKddJdccPy/Zl/p3ZT7GhDyC5f3wZjcuu8AJ27BNwbCA
 | 
			
		||||
x54dgxgCNcyPm79nY8MRtEdEpoRGdSsFKJemz6hpXM++MWFciyrRWIIA44XB0Gv3
 | 
			
		||||
US0spjsDPQ==
 | 
			
		||||
-----END CERTIFICATE-----
 | 
			
		||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user