Compare commits
	
		
			2703 Commits
		
	
	
		
			OpenSSL_0_
			...
			OpenSSL-en
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 
						 | 
					a307eeba84 | ||
| 
						 | 
					1fbc936cca | ||
| 
						 | 
					ac63f88790 | ||
| 
						 | 
					ecfb406f1e | ||
| 
						 | 
					eb272ac0b0 | ||
| 
						 | 
					63c43dcc59 | ||
| 
						 | 
					8562801137 | ||
| 
						 | 
					5d8094143e | ||
| 
						 | 
					bb6dcb54f9 | ||
| 
						 | 
					0a3ea5d34a | ||
| 
						 | 
					a5e4c0bb9e | ||
| 
						 | 
					df9badad4c | ||
| 
						 | 
					cad4b840c8 | ||
| 
						 | 
					37a92e9ce4 | ||
| 
						 | 
					1896ce3558 | ||
| 
						 | 
					c4af8daf34 | ||
| 
						 | 
					0357422d14 | ||
| 
						 | 
					b4ac8b1e0a | ||
| 
						 | 
					adccc4cc7e | ||
| 
						 | 
					bbc89d2e1f | ||
| 
						 | 
					d3ee37c5d9 | ||
| 
						 | 
					1e6c9fc26f | ||
| 
						 | 
					3d4bb90138 | ||
| 
						 | 
					f51cf14b85 | ||
| 
						 | 
					194dd04699 | ||
| 
						 | 
					14f7ee4916 | ||
| 
						 | 
					a29d78e90b | ||
| 
						 | 
					5b054c6955 | ||
| 
						 | 
					10654d3a74 | ||
| 
						 | 
					6017e604f8 | ||
| 
						 | 
					3837491174 | ||
| 
						 | 
					86a921af06 | ||
| 
						 | 
					616df35633 | ||
| 
						 | 
					e44fcedadf | ||
| 
						 | 
					6f8f443170 | ||
| 
						 | 
					d18af3f37e | ||
| 
						 | 
					48fe4d6233 | ||
| 
						 | 
					7b8250053b | ||
| 
						 | 
					251cb4cfed | ||
| 
						 | 
					24a93e6cdd | ||
| 
						 | 
					40e15f9d78 | ||
| 
						 | 
					b4f682d32f | ||
| 
						 | 
					83d0e5e512 | ||
| 
						 | 
					c540bd2851 | ||
| 
						 | 
					4e20b1a656 | ||
| 
						 | 
					cc5ba6a7b6 | ||
| 
						 | 
					0396479dec | ||
| 
						 | 
					e34cfcf7e1 | ||
| 
						 | 
					1358835050 | ||
| 
						 | 
					754d494bef | ||
| 
						 | 
					6ad0776236 | ||
| 
						 | 
					ca7fcc65ef | ||
| 
						 | 
					42909e3968 | ||
| 
						 | 
					c108108028 | ||
| 
						 | 
					5451e0d924 | ||
| 
						 | 
					4ea3855514 | ||
| 
						 | 
					20a9b1a7cf | ||
| 
						 | 
					156e85578d | ||
| 
						 | 
					b28ec12420 | ||
| 
						 | 
					bb62a8b0c5 | ||
| 
						 | 
					a75d8bebd2 | ||
| 
						 | 
					b72ff47037 | ||
| 
						 | 
					a2b03690a8 | ||
| 
						 | 
					abb48d5a5f | ||
| 
						 | 
					0e99546424 | ||
| 
						 | 
					bd9e2e4c53 | ||
| 
						 | 
					ff612904d2 | ||
| 
						 | 
					429cf462d0 | ||
| 
						 | 
					c62b26fdc6 | ||
| 
						 | 
					e0a9ba9c3c | ||
| 
						 | 
					2dc769a1c1 | ||
| 
						 | 
					4f98cbabde | ||
| 
						 | 
					98499135d7 | ||
| 
						 | 
					3285076c8e | ||
| 
						 | 
					3b4cfea688 | ||
| 
						 | 
					de10f6900d | ||
| 
						 | 
					adfe54b7be | ||
| 
						 | 
					b576337e8b | ||
| 
						 | 
					4de633dd5f | ||
| 
						 | 
					91f29a38a0 | ||
| 
						 | 
					1d5bd6cf71 | ||
| 
						 | 
					226cc7ded4 | ||
| 
						 | 
					e869d4bd32 | ||
| 
						 | 
					60428dbf0a | ||
| 
						 | 
					70d70a3c81 | ||
| 
						 | 
					f1f25544e0 | ||
| 
						 | 
					2e0db07627 | ||
| 
						 | 
					58fc62296f | ||
| 
						 | 
					df9cc1535e | ||
| 
						 | 
					c4b36ff474 | ||
| 
						 | 
					f418f8c17c | ||
| 
						 | 
					5277d7cb7c | ||
| 
						 | 
					0657bf9c14 | ||
| 
						 | 
					5b438e9b0f | ||
| 
						 | 
					7b4c588f58 | ||
| 
						 | 
					1d00800e88 | ||
| 
						 | 
					774530f412 | ||
| 
						 | 
					fb171e534e | ||
| 
						 | 
					7d7db13e67 | ||
| 
						 | 
					45abac85a9 | ||
| 
						 | 
					24b8dc9a55 | ||
| 
						 | 
					d8c79c7f72 | ||
| 
						 | 
					3a12ce0137 | ||
| 
						 | 
					9bd35f6376 | ||
| 
						 | 
					62763f682b | ||
| 
						 | 
					38e3c5815c | ||
| 
						 | 
					f8fe20e0d9 | ||
| 
						 | 
					65e8167079 | ||
| 
						 | 
					757a8b4621 | ||
| 
						 | 
					5cac59b6c1 | ||
| 
						 | 
					bad4058574 | ||
| 
						 | 
					d8c2adae57 | ||
| 
						 | 
					786e0c2424 | ||
| 
						 | 
					794103d285 | ||
| 
						 | 
					c454dbcd32 | ||
| 
						 | 
					f3a3106807 | ||
| 
						 | 
					62dc5aad06 | ||
| 
						 | 
					45ecfb1973 | ||
| 
						 | 
					f23478c314 | ||
| 
						 | 
					3d2e469cfa | ||
| 
						 | 
					bf401a2aef | ||
| 
						 | 
					06a2b07bb0 | ||
| 
						 | 
					8700e7b3cf | ||
| 
						 | 
					7f19d42e9d | ||
| 
						 | 
					d7bbd31efe | ||
| 
						 | 
					fafc7f9875 | ||
| 
						 | 
					d88a26c489 | ||
| 
						 | 
					64b48877fa | ||
| 
						 | 
					b31cc2d9f7 | ||
| 
						 | 
					f196522159 | ||
| 
						 | 
					4ff18c8c3e | ||
| 
						 | 
					db4a465974 | ||
| 
						 | 
					3cdc8ad07a | ||
| 
						 | 
					cd9bed6d1d | ||
| 
						 | 
					2c1571b4ff | ||
| 
						 | 
					6767a53669 | ||
| 
						 | 
					ba93fd6a38 | ||
| 
						 | 
					d7c06e9ec7 | ||
| 
						 | 
					386828d029 | ||
| 
						 | 
					d339187b1a | ||
| 
						 | 
					61fca8b69b | ||
| 
						 | 
					bb5ea36b96 | ||
| 
						 | 
					e3a9164073 | ||
| 
						 | 
					f85c9904c6 | ||
| 
						 | 
					48bf4aae24 | ||
| 
						 | 
					6231576088 | ||
| 
						 | 
					4270144b39 | ||
| 
						 | 
					5031a89dc3 | ||
| 
						 | 
					bbd1c84e6e | ||
| 
						 | 
					a2cf08cc23 | ||
| 
						 | 
					d3a73875e2 | ||
| 
						 | 
					41d2a336ee | ||
| 
						 | 
					627774fd87 | ||
| 
						 | 
					a5bc1e8568 | ||
| 
						 | 
					c38171ba1f | ||
| 
						 | 
					bb3ee8e75d | ||
| 
						 | 
					32654e792b | ||
| 
						 | 
					19f2192136 | ||
| 
						 | 
					1961b327eb | ||
| 
						 | 
					2ae87d465e | ||
| 
						 | 
					e3ef8d2e6b | ||
| 
						 | 
					65a87c7d01 | ||
| 
						 | 
					72e3c20c14 | ||
| 
						 | 
					ec0f19597e | ||
| 
						 | 
					fa2b8db499 | ||
| 
						 | 
					1aa0d94781 | ||
| 
						 | 
					dc644fe229 | ||
| 
						 | 
					47ddf355b4 | ||
| 
						 | 
					941181ec0f | ||
| 
						 | 
					d399fdf877 | ||
| 
						 | 
					487550b61d | ||
| 
						 | 
					35618bf6ad | ||
| 
						 | 
					460fe31f0c | ||
| 
						 | 
					14565bedaf | ||
| 
						 | 
					02cc82ff8a | ||
| 
						 | 
					38f3b3e29c | ||
| 
						 | 
					4dc719fc37 | ||
| 
						 | 
					48f2ef8d00 | ||
| 
						 | 
					be1bd9239f | ||
| 
						 | 
					b8feddae71 | ||
| 
						 | 
					a9daa46758 | ||
| 
						 | 
					569afce4b0 | ||
| 
						 | 
					a9aa3d580c | ||
| 
						 | 
					56a6ccc84f | ||
| 
						 | 
					03c4d82fa1 | ||
| 
						 | 
					7ab1a39181 | ||
| 
						 | 
					56dde3ebe6 | ||
| 
						 | 
					6525ced540 | ||
| 
						 | 
					32d0ad41a4 | ||
| 
						 | 
					e28e42a549 | ||
| 
						 | 
					ff055b5c89 | ||
| 
						 | 
					d8770f3ece | ||
| 
						 | 
					4981372d03 | ||
| 
						 | 
					3ebac273f5 | ||
| 
						 | 
					5af18f65f4 | ||
| 
						 | 
					a9b34991d9 | ||
| 
						 | 
					bc36ee6227 | ||
| 
						 | 
					f2bc668429 | ||
| 
						 | 
					8120813066 | ||
| 
						 | 
					7242cd8f8f | ||
| 
						 | 
					12c2fe8d53 | ||
| 
						 | 
					28143c66e1 | ||
| 
						 | 
					335c4f0966 | ||
| 
						 | 
					5003a61b9f | ||
| 
						 | 
					7bd51947e5 | ||
| 
						 | 
					4901b41653 | ||
| 
						 | 
					74cd365b03 | ||
| 
						 | 
					2affbab9fc | ||
| 
						 | 
					cf1b7d9664 | ||
| 
						 | 
					649c5a2b09 | ||
| 
						 | 
					07247321c6 | ||
| 
						 | 
					0c43540433 | ||
| 
						 | 
					acba75c59d | ||
| 
						 | 
					267a1927eb | ||
| 
						 | 
					b0c8638650 | ||
| 
						 | 
					b36c170d1b | ||
| 
						 | 
					934397ec66 | ||
| 
						 | 
					0f8631495d | ||
| 
						 | 
					95ffe86dbc | ||
| 
						 | 
					87b79c3ef3 | ||
| 
						 | 
					52d160d85d | ||
| 
						 | 
					54ff1e6ae5 | ||
| 
						 | 
					a6b7ffddac | ||
| 
						 | 
					f30d34f3a8 | ||
| 
						 | 
					84a2173797 | ||
| 
						 | 
					52b621db88 | ||
| 
						 | 
					a6ed5dd674 | ||
| 
						 | 
					1417f2dccb | ||
| 
						 | 
					f2e5ca84d4 | ||
| 
						 | 
					36fafffae2 | ||
| 
						 | 
					cdc7b8cc60 | ||
| 
						 | 
					720235eeec | ||
| 
						 | 
					8e495e4ac7 | ||
| 
						 | 
					2afbd6fa08 | ||
| 
						 | 
					f282ca7413 | ||
| 
						 | 
					67c1801924 | ||
| 
						 | 
					46a58ab946 | ||
| 
						 | 
					94fcd01349 | ||
| 
						 | 
					9a04387362 | ||
| 
						 | 
					282d8b1c38 | ||
| 
						 | 
					41ecaba97e | ||
| 
						 | 
					96dfab9e0e | ||
| 
						 | 
					1b65ce7db3 | ||
| 
						 | 
					7b9cb4a224 | ||
| 
						 | 
					bc2dfde4b3 | ||
| 
						 | 
					ec9dc137e7 | ||
| 
						 | 
					620cea37e0 | ||
| 
						 | 
					c15e036398 | ||
| 
						 | 
					ccb08f98ae | ||
| 
						 | 
					e306892994 | ||
| 
						 | 
					836f996010 | ||
| 
						 | 
					1613c4d3bf | ||
| 
						 | 
					b5f6d9dc6e | ||
| 
						 | 
					c063f2c5ec | ||
| 
						 | 
					c47c619680 | ||
| 
						 | 
					93cd57a578 | ||
| 
						 | 
					49ce63cd7c | ||
| 
						 | 
					b3f2e399d2 | ||
| 
						 | 
					8c950429a9 | ||
| 
						 | 
					c2bf70a27c | ||
| 
						 | 
					9235adbf47 | ||
| 
						 | 
					a71b5abfa4 | ||
| 
						 | 
					928cc3a6de | ||
| 
						 | 
					466e4249ab | ||
| 
						 | 
					9fbc45b159 | ||
| 
						 | 
					792e2ce7f4 | ||
| 
						 | 
					3952584571 | ||
| 
						 | 
					a5d2acfc79 | ||
| 
						 | 
					35ed8cb8b6 | ||
| 
						 | 
					7edc5ed90a | ||
| 
						 | 
					420125f996 | ||
| 
						 | 
					57e7d3ce15 | ||
| 
						 | 
					a8ebe4697e | ||
| 
						 | 
					deb2c1a1c5 | ||
| 
						 | 
					d4219c485b | ||
| 
						 | 
					73fc98a7bf | ||
| 
						 | 
					259810e05b | ||
| 
						 | 
					171cc53a96 | ||
| 
						 | 
					9eea2be6f1 | ||
| 
						 | 
					69a03c1799 | ||
| 
						 | 
					4327aae816 | ||
| 
						 | 
					741a9690df | ||
| 
						 | 
					e24e40657f | ||
| 
						 | 
					448361a86c | ||
| 
						 | 
					26e083ccb7 | ||
| 
						 | 
					4978361212 | ||
| 
						 | 
					247c1361f3 | ||
| 
						 | 
					1618bc7921 | ||
| 
						 | 
					1b843d3c69 | ||
| 
						 | 
					0bc6597d4d | ||
| 
						 | 
					2b916952a8 | ||
| 
						 | 
					02e4fbed3d | ||
| 
						 | 
					7403c34b0b | ||
| 
						 | 
					9022f2403b | ||
| 
						 | 
					08f3f07212 | ||
| 
						 | 
					8cbceba610 | ||
| 
						 | 
					88ce56f8c1 | ||
| 
						 | 
					664d83bb23 | ||
| 
						 | 
					8cff6331c9 | ||
| 
						 | 
					cd6aa710b5 | ||
| 
						 | 
					903872d65e | ||
| 
						 | 
					16a44ae7e9 | ||
| 
						 | 
					739423fceb | ||
| 
						 | 
					78f3a2aad7 | ||
| 
						 | 
					b847024026 | ||
| 
						 | 
					50d5199120 | ||
| 
						 | 
					9020b86250 | ||
| 
						 | 
					a342cc5a70 | ||
| 
						 | 
					67c3cf0675 | ||
| 
						 | 
					9a875a3574 | ||
| 
						 | 
					a43cf9fae9 | ||
| 
						 | 
					9ae9c221de | ||
| 
						 | 
					4256650d68 | ||
| 
						 | 
					ae0665b8f1 | ||
| 
						 | 
					75802000c8 | ||
| 
						 | 
					325ae88efb | ||
| 
						 | 
					a25b265d27 | ||
| 
						 | 
					d0a8af61b1 | ||
| 
						 | 
					e58d808a4c | ||
| 
						 | 
					751b5e8ff2 | ||
| 
						 | 
					36f74d60b3 | ||
| 
						 | 
					9756da13dd | ||
| 
						 | 
					893b76c544 | ||
| 
						 | 
					b5a6f0a92d | ||
| 
						 | 
					ba8e28248f | ||
| 
						 | 
					bfcec27d61 | ||
| 
						 | 
					8e8972bb68 | ||
| 
						 | 
					57108f0ad5 | ||
| 
						 | 
					73758d435b | ||
| 
						 | 
					90f63e8f83 | ||
| 
						 | 
					e8af92fcb1 | ||
| 
						 | 
					361ef5f4dc | ||
| 
						 | 
					b3466895e6 | ||
| 
						 | 
					81f169e95c | ||
| 
						 | 
					a068630a20 | ||
| 
						 | 
					dfebac32c0 | ||
| 
						 | 
					ab5db00717 | ||
| 
						 | 
					6308af199d | ||
| 
						 | 
					8e5b6314ef | ||
| 
						 | 
					b4b1bdd5d3 | ||
| 
						 | 
					5782ceb298 | ||
| 
						 | 
					cc85ec447b | ||
| 
						 | 
					c67cdb50d2 | ||
| 
						 | 
					af5473c45a | ||
| 
						 | 
					f2c46006e7 | ||
| 
						 | 
					69e42952e1 | ||
| 
						 | 
					adf87b2df5 | ||
| 
						 | 
					40753f760d | ||
| 
						 | 
					d199858e89 | ||
| 
						 | 
					10a2975a27 | ||
| 
						 | 
					9b4dc8308f | ||
| 
						 | 
					b93642c5cc | ||
| 
						 | 
					a5435e8b29 | ||
| 
						 | 
					72e2d9138c | ||
| 
						 | 
					1dd080bca4 | ||
| 
						 | 
					f648590991 | ||
| 
						 | 
					a14280d41e | ||
| 
						 | 
					91b842c972 | ||
| 
						 | 
					eddf82a36a | ||
| 
						 | 
					673b3fde82 | ||
| 
						 | 
					a87e50a945 | ||
| 
						 | 
					b62a0c4cab | ||
| 
						 | 
					c06648f7f0 | ||
| 
						 | 
					cd56182b41 | ||
| 
						 | 
					65a22e8e4d | ||
| 
						 | 
					cbf0f45f90 | ||
| 
						 | 
					b2293b1e9b | ||
| 
						 | 
					04e53c273f | ||
| 
						 | 
					599c03530a | ||
| 
						 | 
					56a67adb64 | ||
| 
						 | 
					28e5428d5d | ||
| 
						 | 
					3c91484052 | ||
| 
						 | 
					98d517c5da | ||
| 
						 | 
					18602745de | ||
| 
						 | 
					ad2e032049 | ||
| 
						 | 
					601140b363 | ||
| 
						 | 
					e02cc10ea4 | ||
| 
						 | 
					b5524a3ac3 | ||
| 
						 | 
					0c61e299b3 | ||
| 
						 | 
					0b33bc65cd | ||
| 
						 | 
					0f5fa24a7c | ||
| 
						 | 
					8e96183506 | ||
| 
						 | 
					a8312c0e24 | ||
| 
						 | 
					bf0d176e48 | ||
| 
						 | 
					ec5add8784 | ||
| 
						 | 
					856d456a71 | ||
| 
						 | 
					7f2113a2d5 | ||
| 
						 | 
					97f56446a3 | ||
| 
						 | 
					5d92be8cc6 | ||
| 
						 | 
					e102a3dcfd | ||
| 
						 | 
					ecbe07817a | ||
| 
						 | 
					71db02813c | ||
| 
						 | 
					a6574c21eb | ||
| 
						 | 
					26da3e65ac | ||
| 
						 | 
					21cd437886 | ||
| 
						 | 
					f09628e42f | ||
| 
						 | 
					6f346c7115 | ||
| 
						 | 
					d8ecc56c9d | ||
| 
						 | 
					4e1209ebf8 | ||
| 
						 | 
					78d3b819f0 | ||
| 
						 | 
					200b24e391 | ||
| 
						 | 
					1690c2b26e | ||
| 
						 | 
					701adceb12 | ||
| 
						 | 
					3f07fe09b5 | ||
| 
						 | 
					f86c5c9ac7 | ||
| 
						 | 
					66a0def81b | ||
| 
						 | 
					73e92de577 | ||
| 
						 | 
					09ab755c55 | ||
| 
						 | 
					ec558b6548 | ||
| 
						 | 
					037a9f9c1a | ||
| 
						 | 
					29e1fdf3f2 | ||
| 
						 | 
					28ddfc61dc | ||
| 
						 | 
					725c88879c | ||
| 
						 | 
					a0aae68cf6 | ||
| 
						 | 
					57d2f21782 | ||
| 
						 | 
					895959b736 | ||
| 
						 | 
					3c07b4c2ee | ||
| 
						 | 
					1cc0b0a66a | ||
| 
						 | 
					beb23252a6 | ||
| 
						 | 
					3ba25ee86a | ||
| 
						 | 
					0be35f5c51 | ||
| 
						 | 
					60f7492646 | ||
| 
						 | 
					1456d1860e | ||
| 
						 | 
					5755cab49d | ||
| 
						 | 
					975842f9fb | ||
| 
						 | 
					126fe085db | ||
| 
						 | 
					123d24d600 | ||
| 
						 | 
					3880cd35ad | ||
| 
						 | 
					cb38052b3a | ||
| 
						 | 
					f640ee90c3 | ||
| 
						 | 
					09f4278d25 | ||
| 
						 | 
					1f47ec53a2 | ||
| 
						 | 
					959f67d6a4 | ||
| 
						 | 
					b2e7419a1d | ||
| 
						 | 
					6546fdfaf8 | ||
| 
						 | 
					3a3ca1d474 | ||
| 
						 | 
					7522254b48 | ||
| 
						 | 
					f1a6a0d4dd | ||
| 
						 | 
					9c67ab2f26 | ||
| 
						 | 
					1a7b2d33f4 | ||
| 
						 | 
					6e2dad1cc7 | ||
| 
						 | 
					2c0d10123e | ||
| 
						 | 
					3ac82faae5 | ||
| 
						 | 
					c08523d862 | ||
| 
						 | 
					137e601277 | ||
| 
						 | 
					09f4bd2a39 | ||
| 
						 | 
					2fc0d1f15e | ||
| 
						 | 
					2a86064f95 | ||
| 
						 | 
					016d7d250a | ||
| 
						 | 
					2c15d426b9 | ||
| 
						 | 
					bdcfe1d165 | ||
| 
						 | 
					3b28dbce7e | ||
| 
						 | 
					5a4fbc69c3 | ||
| 
						 | 
					7e7c8952b5 | ||
| 
						 | 
					de487514ae | ||
| 
						 | 
					06db4253e2 | ||
| 
						 | 
					4ce7894c4a | ||
| 
						 | 
					36f554d43c | ||
| 
						 | 
					8d28d5f81b | ||
| 
						 | 
					53b407da84 | ||
| 
						 | 
					765e531159 | ||
| 
						 | 
					de282fe3ba | ||
| 
						 | 
					36ac656a1b | ||
| 
						 | 
					2aff7727f7 | ||
| 
						 | 
					cc93ae3ef4 | ||
| 
						 | 
					34d69d3b23 | ||
| 
						 | 
					daea0ff8a9 | ||
| 
						 | 
					448701473a | ||
| 
						 | 
					572f0017d5 | ||
| 
						 | 
					df2c442a6d | ||
| 
						 | 
					23e2947cc8 | ||
| 
						 | 
					44b51ca36c | ||
| 
						 | 
					bbf848ce8d | ||
| 
						 | 
					d0fa136ce2 | ||
| 
						 | 
					15156cce0e | ||
| 
						 | 
					9d6b1ce644 | ||
| 
						 | 
					66ebbb6a56 | ||
| 
						 | 
					c5e48d8b01 | ||
| 
						 | 
					8dea52fa42 | ||
| 
						 | 
					f7356b677b | ||
| 
						 | 
					80d89e6a6a | ||
| 
						 | 
					bc5f2740d2 | ||
| 
						 | 
					aa66eba7c8 | ||
| 
						 | 
					f27b45d237 | ||
| 
						 | 
					3bb4736289 | ||
| 
						 | 
					bac685417a | ||
| 
						 | 
					1a4d6400ae | ||
| 
						 | 
					322006dcb1 | ||
| 
						 | 
					db01d55671 | ||
| 
						 | 
					0a52d38b31 | ||
| 
						 | 
					902d1051b1 | ||
| 
						 | 
					f67868ff4c | ||
| 
						 | 
					a6576c56dd | ||
| 
						 | 
					240f516939 | ||
| 
						 | 
					ef8f14a882 | ||
| 
						 | 
					aecb0b018f | ||
| 
						 | 
					e4d56bab5b | ||
| 
						 | 
					1435ccfba1 | ||
| 
						 | 
					d766a23deb | ||
| 
						 | 
					b1e21f8fac | ||
| 
						 | 
					9347ba487c | ||
| 
						 | 
					c28500900e | ||
| 
						 | 
					e4c5391ddb | ||
| 
						 | 
					0c34556cbd | ||
| 
						 | 
					b50118ca3e | ||
| 
						 | 
					a57ecb95f6 | ||
| 
						 | 
					428a55a0fe | ||
| 
						 | 
					cc74659fcc | ||
| 
						 | 
					90e7ce363a | ||
| 
						 | 
					a47b505e37 | ||
| 
						 | 
					9f49524331 | ||
| 
						 | 
					6a2347ee45 | ||
| 
						 | 
					e5164b7041 | ||
| 
						 | 
					ebff44b83a | ||
| 
						 | 
					c0e7c3aab9 | ||
| 
						 | 
					733777275b | ||
| 
						 | 
					f1919c3df9 | ||
| 
						 | 
					97b1719583 | ||
| 
						 | 
					b0dc680f71 | ||
| 
						 | 
					addb309ad6 | ||
| 
						 | 
					152a689cf9 | ||
| 
						 | 
					35a99b6380 | ||
| 
						 | 
					dfa46e502d | ||
| 
						 | 
					c21c35e6a4 | ||
| 
						 | 
					b26f84cbbd | ||
| 
						 | 
					0dba0613ea | ||
| 
						 | 
					e0c875081e | ||
| 
						 | 
					ea1b7fe6d4 | ||
| 
						 | 
					db88223baa | ||
| 
						 | 
					d29b63bc9b | ||
| 
						 | 
					1946cd8bc2 | ||
| 
						 | 
					111482cf2e | ||
| 
						 | 
					52a1bab2d9 | ||
| 
						 | 
					0826c85f4c | ||
| 
						 | 
					385d81380c | ||
| 
						 | 
					862e973b50 | ||
| 
						 | 
					2efff10cfa | ||
| 
						 | 
					33479d275a | ||
| 
						 | 
					3e7a6396ed | ||
| 
						 | 
					5a12df5c40 | ||
| 
						 | 
					b5a25a430a | ||
| 
						 | 
					592c784ffe | ||
| 
						 | 
					17e757478a | ||
| 
						 | 
					a023052580 | ||
| 
						 | 
					4b757c830d | ||
| 
						 | 
					9b7a552f4b | ||
| 
						 | 
					8df788c97f | ||
| 
						 | 
					12cfcc128c | ||
| 
						 | 
					f9b3bff6f7 | ||
| 
						 | 
					fc2e05c2d5 | ||
| 
						 | 
					b2993bdea1 | ||
| 
						 | 
					470fa98f8a | ||
| 
						 | 
					de6e207db6 | ||
| 
						 | 
					1363155145 | ||
| 
						 | 
					db5bda670f | ||
| 
						 | 
					0ae485dc07 | ||
| 
						 | 
					19cda70045 | ||
| 
						 | 
					4751717cd8 | ||
| 
						 | 
					bd68b6b1f6 | ||
| 
						 | 
					cd9b7d7c35 | ||
| 
						 | 
					058123afb6 | ||
| 
						 | 
					a4614bf06d | ||
| 
						 | 
					23f80f46a4 | ||
| 
						 | 
					c4438dc0e5 | ||
| 
						 | 
					04ca16890b | ||
| 
						 | 
					20f88b9bd4 | ||
| 
						 | 
					25439b76ad | ||
| 
						 | 
					3465dd3853 | ||
| 
						 | 
					ac445acf69 | ||
| 
						 | 
					77ac92d00a | ||
| 
						 | 
					73c2522c7c | ||
| 
						 | 
					6b5d39e82d | ||
| 
						 | 
					cd2eebfd64 | ||
| 
						 | 
					06676624fc | ||
| 
						 | 
					ef8b601789 | ||
| 
						 | 
					01e62900c7 | ||
| 
						 | 
					d50f1bdfac | ||
| 
						 | 
					38b40c624c | ||
| 
						 | 
					eb1f1b0a34 | ||
| 
						 | 
					a9376dbff9 | ||
| 
						 | 
					14697d9d6d | ||
| 
						 | 
					c6a926d9e2 | ||
| 
						 | 
					c1db5bfc08 | ||
| 
						 | 
					429b8162c6 | ||
| 
						 | 
					0dd2254d76 | ||
| 
						 | 
					03a0848922 | ||
| 
						 | 
					9161672950 | ||
| 
						 | 
					a08bcccc67 | ||
| 
						 | 
					bdec3c5323 | ||
| 
						 | 
					53d286797c | ||
| 
						 | 
					b6cafbd7d8 | ||
| 
						 | 
					499e167fda | ||
| 
						 | 
					0135e33511 | ||
| 
						 | 
					f2cc7559dd | ||
| 
						 | 
					fe8686ba4b | ||
| 
						 | 
					4aa69fe0b6 | ||
| 
						 | 
					b984cd2b01 | ||
| 
						 | 
					adcc64cd9e | ||
| 
						 | 
					c94b6de017 | ||
| 
						 | 
					000e21779c | ||
| 
						 | 
					f1d6f64c8e | ||
| 
						 | 
					d79cab27a5 | ||
| 
						 | 
					24b44446e2 | ||
| 
						 | 
					87739b2c53 | ||
| 
						 | 
					c782089611 | ||
| 
						 | 
					265592b99a | ||
| 
						 | 
					077ff61eef | ||
| 
						 | 
					dcbd0d74d5 | ||
| 
						 | 
					1ec0a3862e | ||
| 
						 | 
					946cd9a540 | ||
| 
						 | 
					0ac87024e3 | ||
| 
						 | 
					7abe830501 | ||
| 
						 | 
					5acaa49504 | ||
| 
						 | 
					535b9b5724 | ||
| 
						 | 
					78a0c1f18d | ||
| 
						 | 
					6cc5e19d47 | ||
| 
						 | 
					7e0c5264e7 | ||
| 
						 | 
					73343ac38a | ||
| 
						 | 
					d53d271728 | ||
| 
						 | 
					37fc8c3747 | ||
| 
						 | 
					01412ec600 | ||
| 
						 | 
					c4f3542abf | ||
| 
						 | 
					c799770060 | ||
| 
						 | 
					cd26e6c79d | ||
| 
						 | 
					4e773226f5 | ||
| 
						 | 
					646d56956b | ||
| 
						 | 
					0cc1115643 | ||
| 
						 | 
					257341b5b4 | ||
| 
						 | 
					83f2571782 | ||
| 
						 | 
					baa257f1ed | ||
| 
						 | 
					e06cc57118 | ||
| 
						 | 
					0450d28759 | ||
| 
						 | 
					7f56097c65 | ||
| 
						 | 
					7396958515 | ||
| 
						 | 
					3c758be86e | ||
| 
						 | 
					227385b719 | ||
| 
						 | 
					f7a059316f | ||
| 
						 | 
					b1d6e3f551 | ||
| 
						 | 
					db70a3fd6e | ||
| 
						 | 
					28fd5c60de | ||
| 
						 | 
					cbd48ba626 | ||
| 
						 | 
					67d93e6f49 | ||
| 
						 | 
					afb83c45e6 | ||
| 
						 | 
					43fcc1b096 | ||
| 
						 | 
					d5695a26a6 | ||
| 
						 | 
					8bfc8f934f | ||
| 
						 | 
					ef02b10a16 | ||
| 
						 | 
					803e4e93d4 | ||
| 
						 | 
					60b8607727 | ||
| 
						 | 
					159564ae9f | ||
| 
						 | 
					cd1bf28e2c | ||
| 
						 | 
					74e10aa58b | ||
| 
						 | 
					5f524accc1 | ||
| 
						 | 
					451e60e99f | ||
| 
						 | 
					89c16ab53e | ||
| 
						 | 
					820aaa5fc5 | ||
| 
						 | 
					993ea851f5 | ||
| 
						 | 
					305db17b5f | ||
| 
						 | 
					6a8ba34f9d | ||
| 
						 | 
					f777408fc5 | ||
| 
						 | 
					2984b0ae24 | ||
| 
						 | 
					3d6001f7b9 | ||
| 
						 | 
					f6a8898fc3 | ||
| 
						 | 
					757e392d4e | ||
| 
						 | 
					2f9f0c72de | ||
| 
						 | 
					cb4ae6c0d3 | ||
| 
						 | 
					359fd02fec | ||
| 
						 | 
					e1a8ac495b | ||
| 
						 | 
					0b5806b5f5 | ||
| 
						 | 
					ccb9643f02 | ||
| 
						 | 
					7f7b8d6871 | ||
| 
						 | 
					bb7e632aef | ||
| 
						 | 
					55d892e373 | ||
| 
						 | 
					f971ccb264 | ||
| 
						 | 
					a4aba800d9 | ||
| 
						 | 
					669cefdd35 | ||
| 
						 | 
					7be7c2eda5 | ||
| 
						 | 
					8de2910b5c | ||
| 
						 | 
					74489a3668 | ||
| 
						 | 
					e06433d9ba | ||
| 
						 | 
					e0bf5c11ea | ||
| 
						 | 
					58f0f52e67 | ||
| 
						 | 
					55b3c877c7 | ||
| 
						 | 
					bbbc96a87e | ||
| 
						 | 
					5e4ca4220e | ||
| 
						 | 
					e5828cd46f | ||
| 
						 | 
					7081f3bd89 | ||
| 
						 | 
					0413ba429c | ||
| 
						 | 
					29c1f0615b | ||
| 
						 | 
					10e473e930 | ||
| 
						 | 
					e7ef1a561a | ||
| 
						 | 
					458d356db9 | ||
| 
						 | 
					020fc820dc | ||
| 
						 | 
					bc8a9f1f0f | ||
| 
						 | 
					6b77e6d7f3 | ||
| 
						 | 
					361c7f2b52 | ||
| 
						 | 
					9f6fe8dbe7 | ||
| 
						 | 
					ee78e1fc8b | ||
| 
						 | 
					864170286a | ||
| 
						 | 
					02af65b347 | ||
| 
						 | 
					2f13ee21ea | ||
| 
						 | 
					1d833a9910 | ||
| 
						 | 
					11c0f1201c | ||
| 
						 | 
					69e7805f54 | ||
| 
						 | 
					e264cfe17a | ||
| 
						 | 
					8224b0cbe5 | ||
| 
						 | 
					15d52ddb55 | ||
| 
						 | 
					d48f487e2c | ||
| 
						 | 
					ce23b0f73e | ||
| 
						 | 
					d313047f63 | ||
| 
						 | 
					d1855cc7af | ||
| 
						 | 
					14c6d27d63 | ||
| 
						 | 
					dcea8e12e2 | ||
| 
						 | 
					26b264795d | ||
| 
						 | 
					501ebf16b6 | ||
| 
						 | 
					815c83f70a | ||
| 
						 | 
					92125ffaec | ||
| 
						 | 
					7db2fcaa81 | ||
| 
						 | 
					7d09713d09 | ||
| 
						 | 
					3aba98e787 | ||
| 
						 | 
					32d862ede4 | ||
| 
						 | 
					a44f26d5c9 | ||
| 
						 | 
					3e126d3610 | ||
| 
						 | 
					5660eb489e | ||
| 
						 | 
					7c155330de | ||
| 
						 | 
					8bb4ad88d8 | ||
| 
						 | 
					eb64730b9c | ||
| 
						 | 
					34a1488220 | ||
| 
						 | 
					5270e7025e | ||
| 
						 | 
					1df586bec2 | ||
| 
						 | 
					551e5990d2 | ||
| 
						 | 
					d9efa3616a | ||
| 
						 | 
					51c8dc37dd | ||
| 
						 | 
					28967cf079 | ||
| 
						 | 
					a2bbe59401 | ||
| 
						 | 
					421cb50b2d | ||
| 
						 | 
					0fa504b68d | ||
| 
						 | 
					705bfcf8e7 | ||
| 
						 | 
					4fb40db932 | ||
| 
						 | 
					9dd0463852 | ||
| 
						 | 
					5cb5715f97 | ||
| 
						 | 
					e9a583aa26 | ||
| 
						 | 
					f3f316f13f | ||
| 
						 | 
					99b1aaf2ec | ||
| 
						 | 
					53400da75c | ||
| 
						 | 
					2b59a6ac14 | ||
| 
						 | 
					48d89b560c | ||
| 
						 | 
					b5a43800ef | ||
| 
						 | 
					0fd44e2ddb | ||
| 
						 | 
					0a2221f9ad | ||
| 
						 | 
					567f17cfe0 | ||
| 
						 | 
					627ec355d8 | ||
| 
						 | 
					c80abb148d | ||
| 
						 | 
					4184a78761 | ||
| 
						 | 
					bbdc9c98a8 | ||
| 
						 | 
					11b62699a1 | ||
| 
						 | 
					14a74a21f0 | ||
| 
						 | 
					c8cda405e7 | ||
| 
						 | 
					befb3e7a4d | ||
| 
						 | 
					c6f1787bbd | ||
| 
						 | 
					9bd3bd227f | ||
| 
						 | 
					d0ef53bd2d | ||
| 
						 | 
					8d3f155a66 | ||
| 
						 | 
					ef0ab7f94f | ||
| 
						 | 
					bf55ece1c1 | ||
| 
						 | 
					51754ec835 | ||
| 
						 | 
					1bc5dd3efc | ||
| 
						 | 
					0ded1638ba | ||
| 
						 | 
					71d525c9f6 | ||
| 
						 | 
					757ab9b506 | ||
| 
						 | 
					3ab5651112 | ||
| 
						 | 
					82ce0b2308 | ||
| 
						 | 
					a22fb399cb | ||
| 
						 | 
					8df8f27513 | ||
| 
						 | 
					cde70093ac | ||
| 
						 | 
					5f97f508e4 | ||
| 
						 | 
					868af8e4be | ||
| 
						 | 
					553615f500 | ||
| 
						 | 
					924046ce75 | ||
| 
						 | 
					e100946038 | ||
| 
						 | 
					9e2c0f41d7 | ||
| 
						 | 
					5ef67042f9 | ||
| 
						 | 
					53fe8d5be5 | ||
| 
						 | 
					5209202f3b | ||
| 
						 | 
					8c23788dd1 | ||
| 
						 | 
					ef76e3dbda | ||
| 
						 | 
					7ba839bfe2 | ||
| 
						 | 
					d2dcf4f40d | ||
| 
						 | 
					75a382bd90 | ||
| 
						 | 
					5b0a0544f2 | ||
| 
						 | 
					a0ec9cf6d5 | ||
| 
						 | 
					e9ebf346c4 | ||
| 
						 | 
					73701c27b3 | ||
| 
						 | 
					8ca533e378 | ||
| 
						 | 
					d0c9858914 | ||
| 
						 | 
					4ef897d1fc | ||
| 
						 | 
					356c06c776 | ||
| 
						 | 
					ef71cb6daf | ||
| 
						 | 
					2e7e3d6ce9 | ||
| 
						 | 
					a269d312da | ||
| 
						 | 
					a87aa87bcc | ||
| 
						 | 
					6df3553255 | ||
| 
						 | 
					2eaad87f36 | ||
| 
						 | 
					b7af080fb1 | ||
| 
						 | 
					3a0afe1eed | ||
| 
						 | 
					086a32d754 | ||
| 
						 | 
					544ebbceb4 | ||
| 
						 | 
					6d0dcbedb1 | ||
| 
						 | 
					19a5e404cb | ||
| 
						 | 
					88aeb646bd | ||
| 
						 | 
					46b1b91309 | ||
| 
						 | 
					be054868a1 | ||
| 
						 | 
					0acc90e5f7 | ||
| 
						 | 
					4e20a4e688 | ||
| 
						 | 
					9ef9e78520 | ||
| 
						 | 
					e3f527177b | ||
| 
						 | 
					393e826ec3 | ||
| 
						 | 
					f09a419c6a | ||
| 
						 | 
					f4bdbfea66 | ||
| 
						 | 
					f00ba75c69 | ||
| 
						 | 
					c5e8580e7b | ||
| 
						 | 
					47dc5a1321 | ||
| 
						 | 
					16221173c8 | ||
| 
						 | 
					0e8f2fdfdd | ||
| 
						 | 
					fec8c79a7e | ||
| 
						 | 
					56245be46d | ||
| 
						 | 
					3476515195 | ||
| 
						 | 
					eb206eb8be | ||
| 
						 | 
					fda05b2155 | ||
| 
						 | 
					8c4ab6d5ae | ||
| 
						 | 
					8fdec3e558 | ||
| 
						 | 
					e1db7a5e30 | ||
| 
						 | 
					69431c2998 | ||
| 
						 | 
					90d7fc1de4 | ||
| 
						 | 
					bb28bcdf98 | ||
| 
						 | 
					d49da3aa5b | ||
| 
						 | 
					fc55bf3b20 | ||
| 
						 | 
					03dbae0d20 | ||
| 
						 | 
					5a5accdd64 | ||
| 
						 | 
					f1192b7f2e | ||
| 
						 | 
					dbba890cf1 | ||
| 
						 | 
					3f8b90c345 | ||
| 
						 | 
					28a63d3e6f | ||
| 
						 | 
					318e09356b | ||
| 
						 | 
					4839df4061 | ||
| 
						 | 
					6b3a4ffe36 | ||
| 
						 | 
					9cfb6bbd29 | ||
| 
						 | 
					7f6e0a4c09 | ||
| 
						 | 
					6cffb201f3 | ||
| 
						 | 
					4b0f00b7ce | ||
| 
						 | 
					4aa4f333ed | ||
| 
						 | 
					a04cfb72d5 | ||
| 
						 | 
					1cbb729fdc | ||
| 
						 | 
					d176986488 | ||
| 
						 | 
					c759ddd676 | ||
| 
						 | 
					9cfab47b18 | ||
| 
						 | 
					6e3dfc1f3b | ||
| 
						 | 
					ef63568e94 | ||
| 
						 | 
					27f00db152 | ||
| 
						 | 
					d40898dfab | ||
| 
						 | 
					a9c33b529e | ||
| 
						 | 
					422e5a4807 | ||
| 
						 | 
					6397710486 | ||
| 
						 | 
					10bb0dbfec | ||
| 
						 | 
					5deb47f12a | ||
| 
						 | 
					c19b6c922a | ||
| 
						 | 
					c5f8bbbc0b | ||
| 
						 | 
					775c289db5 | ||
| 
						 | 
					099f5bfeba | ||
| 
						 | 
					4759abc5f2 | ||
| 
						 | 
					e31e385ce3 | ||
| 
						 | 
					103a604932 | ||
| 
						 | 
					12f49bd79d | ||
| 
						 | 
					b22bda21a1 | ||
| 
						 | 
					b38d84d867 | ||
| 
						 | 
					50b14a38f5 | ||
| 
						 | 
					edb0d64367 | ||
| 
						 | 
					4b250a3d25 | ||
| 
						 | 
					33b1a4c218 | ||
| 
						 | 
					c200ff0446 | ||
| 
						 | 
					a7ce1f0514 | ||
| 
						 | 
					645749ef98 | ||
| 
						 | 
					4cae3ac371 | ||
| 
						 | 
					9a0c0d3f74 | ||
| 
						 | 
					7cae5f9fc8 | ||
| 
						 | 
					18edda0f92 | ||
| 
						 | 
					89681b183d | ||
| 
						 | 
					63ccddf717 | ||
| 
						 | 
					c8973693ab | ||
| 
						 | 
					4e87e05b25 | ||
| 
						 | 
					fe03519704 | ||
| 
						 | 
					b004872c59 | ||
| 
						 | 
					933f32cc4d | ||
| 
						 | 
					c6def253b4 | ||
| 
						 | 
					dd3430a6e9 | ||
| 
						 | 
					cb1fbf8e6a | ||
| 
						 | 
					51012a0969 | ||
| 
						 | 
					a45bd29535 | ||
| 
						 | 
					688fbf5475 | ||
| 
						 | 
					f4364e0730 | ||
| 
						 | 
					fae8762630 | ||
| 
						 | 
					28178bcf24 | ||
| 
						 | 
					cec7fe4da6 | ||
| 
						 | 
					c15602f48e | ||
| 
						 | 
					3b2cbbcb9a | ||
| 
						 | 
					c69c47b9fe | ||
| 
						 | 
					5d1a5ddb65 | ||
| 
						 | 
					f97cc10372 | ||
| 
						 | 
					a3829b8650 | ||
| 
						 | 
					615513ba52 | ||
| 
						 | 
					2bd8aaefa4 | ||
| 
						 | 
					252d333fc1 | ||
| 
						 | 
					2aa4e2e2d4 | ||
| 
						 | 
					c6cda0bdb7 | ||
| 
						 | 
					730e37edb6 | ||
| 
						 | 
					4b6e6ab91c | ||
| 
						 | 
					24842e0586 | ||
| 
						 | 
					159cf04e86 | ||
| 
						 | 
					676432d4e1 | ||
| 
						 | 
					1e72b77994 | ||
| 
						 | 
					1cf3bbaea6 | ||
| 
						 | 
					d448429e52 | ||
| 
						 | 
					4534fb1c86 | ||
| 
						 | 
					362f2b69ff | ||
| 
						 | 
					3c184d8180 | ||
| 
						 | 
					ce6990739e | ||
| 
						 | 
					42cc160301 | ||
| 
						 | 
					a440d6636f | ||
| 
						 | 
					91e8cc6216 | ||
| 
						 | 
					0e61cfff53 | ||
| 
						 | 
					d0c2ebf414 | ||
| 
						 | 
					e17b712894 | ||
| 
						 | 
					1d95fb659d | ||
| 
						 | 
					62324627aa | ||
| 
						 | 
					f77600524f | ||
| 
						 | 
					623eea376a | ||
| 
						 | 
					ebcdd0c43e | ||
| 
						 | 
					5ef8093732 | ||
| 
						 | 
					6d50071e84 | ||
| 
						 | 
					60dae9985d | ||
| 
						 | 
					df320c4473 | ||
| 
						 | 
					3aa477f6ec | ||
| 
						 | 
					282f92f7dd | ||
| 
						 | 
					8e913bff55 | ||
| 
						 | 
					07fcf422a1 | ||
| 
						 | 
					8de7587e02 | ||
| 
						 | 
					da542e1bf7 | ||
| 
						 | 
					93fe6e13a3 | ||
| 
						 | 
					90ac586317 | ||
| 
						 | 
					2c281ebb6c | ||
| 
						 | 
					37b08e8365 | ||
| 
						 | 
					318f962928 | ||
| 
						 | 
					acb5b34328 | ||
| 
						 | 
					c1629c9ea2 | ||
| 
						 | 
					1e4e549296 | ||
| 
						 | 
					439fb8e1e0 | ||
| 
						 | 
					53e44d90c7 | ||
| 
						 | 
					32751b8ab1 | ||
| 
						 | 
					15c0fb18a2 | ||
| 
						 | 
					f30839ecaa | ||
| 
						 | 
					5ce0e07da7 | ||
| 
						 | 
					1c86d93ca5 | ||
| 
						 | 
					eb31944f81 | ||
| 
						 | 
					ea4e4149af | ||
| 
						 | 
					0e05f54516 | ||
| 
						 | 
					095aadc43f | ||
| 
						 | 
					68a1c6b0d9 | ||
| 
						 | 
					bda702ef83 | ||
| 
						 | 
					a4129c6e33 | ||
| 
						 | 
					848f3d40c8 | ||
| 
						 | 
					1949e78336 | ||
| 
						 | 
					2273d6b657 | ||
| 
						 | 
					e39c194387 | ||
| 
						 | 
					e1b78bc64d | ||
| 
						 | 
					e65c84abb0 | ||
| 
						 | 
					8eec1389fb | ||
| 
						 | 
					e38dabbc0c | ||
| 
						 | 
					54731d75d7 | ||
| 
						 | 
					18f2259499 | ||
| 
						 | 
					1d84fd64fc | ||
| 
						 | 
					03ed26afdd | ||
| 
						 | 
					775bcebde5 | ||
| 
						 | 
					7fcc8326e3 | ||
| 
						 | 
					cc99526db1 | ||
| 
						 | 
					72660f5f15 | ||
| 
						 | 
					bace212474 | ||
| 
						 | 
					e117a890ca | ||
| 
						 | 
					5614bb91f5 | ||
| 
						 | 
					7abee0cedf | ||
| 
						 | 
					6dcbaf5857 | ||
| 
						 | 
					baa080d46a | ||
| 
						 | 
					0dcf7fd543 | ||
| 
						 | 
					02539402af | ||
| 
						 | 
					02ef611ef3 | ||
| 
						 | 
					24b8bf2163 | ||
| 
						 | 
					e37c27d239 | ||
| 
						 | 
					270f4f6d63 | ||
| 
						 | 
					e147c6fef8 | ||
| 
						 | 
					cea81a62ff | ||
| 
						 | 
					c0366d89f6 | ||
| 
						 | 
					523d778aef | ||
| 
						 | 
					5b7417dbe1 | ||
| 
						 | 
					5401c4c2bf | ||
| 
						 | 
					c11dead17c | ||
| 
						 | 
					4041156461 | ||
| 
						 | 
					279fff0d7f | ||
| 
						 | 
					54f10e6adc | ||
| 
						 | 
					fb1cba063d | ||
| 
						 | 
					e4daf9dfce | ||
| 
						 | 
					8a26980b07 | ||
| 
						 | 
					1e27f4b68c | ||
| 
						 | 
					2be9694116 | ||
| 
						 | 
					03ea28c985 | ||
| 
						 | 
					0f92cae9bc | ||
| 
						 | 
					a9740b7da6 | ||
| 
						 | 
					b46ba9b1bc | ||
| 
						 | 
					d572cb6c1c | ||
| 
						 | 
					05c2b37176 | ||
| 
						 | 
					8e1ec9fb37 | ||
| 
						 | 
					dc005a7367 | ||
| 
						 | 
					8c0514f741 | ||
| 
						 | 
					2aff74dd68 | ||
| 
						 | 
					b924f04784 | ||
| 
						 | 
					d63b8db852 | ||
| 
						 | 
					2959f292db | ||
| 
						 | 
					965c17756a | ||
| 
						 | 
					0c415ddd67 | ||
| 
						 | 
					16e91fe8ab | ||
| 
						 | 
					74d2b0f112 | ||
| 
						 | 
					d40a9e8257 | ||
| 
						 | 
					da867a51a0 | ||
| 
						 | 
					25814b9690 | ||
| 
						 | 
					ec6a40e278 | ||
| 
						 | 
					4a6367ae66 | ||
| 
						 | 
					bed1847b6a | ||
| 
						 | 
					4d0c6b2936 | ||
| 
						 | 
					25a73f2690 | ||
| 
						 | 
					0fc7c5010d | ||
| 
						 | 
					166e1f304b | ||
| 
						 | 
					b1ccd57b18 | ||
| 
						 | 
					5fd0cd9a9b | ||
| 
						 | 
					97d8e82c4c | ||
| 
						 | 
					d7b9c76c72 | ||
| 
						 | 
					ef413a7ee8 | ||
| 
						 | 
					0baed24c1b | ||
| 
						 | 
					dcd4d341e1 | ||
| 
						 | 
					61b337bd22 | ||
| 
						 | 
					06b71aec85 | ||
| 
						 | 
					4f7068c165 | ||
| 
						 | 
					527cc9841c | ||
| 
						 | 
					b144a5e907 | ||
| 
						 | 
					c5a3b7e790 | ||
| 
						 | 
					a652ffc4b5 | ||
| 
						 | 
					eec79f9bab | ||
| 
						 | 
					a1b15ac21f | ||
| 
						 | 
					709e85953d | ||
| 
						 | 
					84b65340e1 | ||
| 
						 | 
					f50c11ca40 | ||
| 
						 | 
					6901ba7dc8 | ||
| 
						 | 
					ab13064406 | ||
| 
						 | 
					cfd3bb1785 | ||
| 
						 | 
					192295a094 | ||
| 
						 | 
					62ab514e98 | ||
| 
						 | 
					724f9694a6 | ||
| 
						 | 
					948d0125db | ||
| 
						 | 
					7dfded5c26 | ||
| 
						 | 
					9fc2570677 | ||
| 
						 | 
					79d2eb64bb | ||
| 
						 | 
					1974a58fe0 | ||
| 
						 | 
					827dbcb150 | ||
| 
						 | 
					47770c4dfb | ||
| 
						 | 
					7228920ca8 | ||
| 
						 | 
					61f175f4ba | ||
| 
						 | 
					26b0d15628 | ||
| 
						 | 
					15387be289 | ||
| 
						 | 
					f684090cbe | ||
| 
						 | 
					b7c190d97b | ||
| 
						 | 
					82aec1cc35 | ||
| 
						 | 
					75cb225989 | ||
| 
						 | 
					36124b1087 | ||
| 
						 | 
					1af407e78f | ||
| 
						 | 
					2b40660ec1 | ||
| 
						 | 
					f5882ce758 | ||
| 
						 | 
					34417732fa | ||
| 
						 | 
					b894b13059 | ||
| 
						 | 
					bbb720034a | ||
| 
						 | 
					4af6e2432b | ||
| 
						 | 
					f3f53c8ca5 | ||
| 
						 | 
					2f043896d1 | ||
| 
						 | 
					29eb7d9ce0 | ||
| 
						 | 
					34216c0422 | ||
| 
						 | 
					22c7ea4068 | ||
| 
						 | 
					29dc25e88a | ||
| 
						 | 
					0572abbf53 | ||
| 
						 | 
					7d95ff76e6 | ||
| 
						 | 
					affadbef0b | ||
| 
						 | 
					397bd0938a | ||
| 
						 | 
					bbb8de0966 | ||
| 
						 | 
					5e38616380 | ||
| 
						 | 
					54705b3992 | ||
| 
						 | 
					4ed601b172 | ||
| 
						 | 
					04a3ae5592 | ||
| 
						 | 
					bd08a2bd0c | ||
| 
						 | 
					55ac522068 | ||
| 
						 | 
					ccc265eaa7 | ||
| 
						 | 
					a545c6f6b1 | ||
| 
						 | 
					5b774c67d3 | ||
| 
						 | 
					7049ef5f90 | ||
| 
						 | 
					7df1c720f6 | ||
| 
						 | 
					b3756cf0e9 | ||
| 
						 | 
					065866b28d | ||
| 
						 | 
					dcb1ef5c22 | ||
| 
						 | 
					d428bf8c56 | ||
| 
						 | 
					d096b524af | ||
| 
						 | 
					c9b51693dc | ||
| 
						 | 
					cae0ae2e4b | ||
| 
						 | 
					469938cb40 | ||
| 
						 | 
					eaa2818189 | ||
| 
						 | 
					622ec449e5 | ||
| 
						 | 
					bb531a0a1c | ||
| 
						 | 
					e6629837a9 | ||
| 
						 | 
					97a377b973 | ||
| 
						 | 
					6fd5a04729 | ||
| 
						 | 
					0f4e21360d | ||
| 
						 | 
					d03e0f3411 | ||
| 
						 | 
					12dc462520 | ||
| 
						 | 
					967f4ca847 | ||
| 
						 | 
					368f85545e | ||
| 
						 | 
					c59cb511f3 | ||
| 
						 | 
					fa1194d30a | ||
| 
						 | 
					25b93b9def | ||
| 
						 | 
					b98ebe0fa5 | ||
| 
						 | 
					3009458e2f | ||
| 
						 | 
					5ce42a7e68 | ||
| 
						 | 
					9ee1c838cb | ||
| 
						 | 
					88364bc2bc | ||
| 
						 | 
					35140f3354 | ||
| 
						 | 
					15c2e1260b | ||
| 
						 | 
					d309394447 | ||
| 
						 | 
					d4fbe3182d | ||
| 
						 | 
					5584fa1709 | ||
| 
						 | 
					2d978cbd30 | ||
| 
						 | 
					0a3f67e3b0 | ||
| 
						 | 
					ea58130d1a | ||
| 
						 | 
					3132e196bd | ||
| 
						 | 
					51b66427c9 | ||
| 
						 | 
					69764d720a | ||
| 
						 | 
					fcc6a1c4ec | ||
| 
						 | 
					55bad949ed | ||
| 
						 | 
					bb1c9dcc3b | ||
| 
						 | 
					aa04f1d7ad | ||
| 
						 | 
					f4b45b76ef | ||
| 
						 | 
					554097ff7f | ||
| 
						 | 
					96f3b56c8c | ||
| 
						 | 
					28b3b4c6e6 | ||
| 
						 | 
					ee087bb8eb | ||
| 
						 | 
					acab12fbe3 | ||
| 
						 | 
					1ba5b1b530 | ||
| 
						 | 
					e5acb2bd2e | ||
| 
						 | 
					173e243aae | ||
| 
						 | 
					d786112124 | ||
| 
						 | 
					cc244b371d | ||
| 
						 | 
					bdecf23415 | ||
| 
						 | 
					bd4e152791 | ||
| 
						 | 
					aa826d88e1 | ||
| 
						 | 
					37569e64e8 | ||
| 
						 | 
					a657546f9c | ||
| 
						 | 
					8083e1bd9e | ||
| 
						 | 
					8b4e27e26e | ||
| 
						 | 
					d6ade7422a | ||
| 
						 | 
					ca1e465f6d | ||
| 
						 | 
					f6c1c9e95d | ||
| 
						 | 
					03ef63ba69 | ||
| 
						 | 
					2dbef509e2 | ||
| 
						 | 
					a4125514f5 | ||
| 
						 | 
					033d001e90 | ||
| 
						 | 
					284ef5f357 | ||
| 
						 | 
					47ff5de8c2 | ||
| 
						 | 
					34f0fe9de0 | ||
| 
						 | 
					ccb9aae905 | ||
| 
						 | 
					f4316c36df | ||
| 
						 | 
					8886f118db | ||
| 
						 | 
					f944e7845c | ||
| 
						 | 
					6b7a83c7b0 | ||
| 
						 | 
					f6cd2d38c0 | ||
| 
						 | 
					d55a3cf19d | ||
| 
						 | 
					fa729135d8 | ||
| 
						 | 
					b436a98257 | ||
| 
						 | 
					2d789604b8 | ||
| 
						 | 
					c4558f8291 | ||
| 
						 | 
					2ad3c4c89e | ||
| 
						 | 
					3866db2d5a | ||
| 
						 | 
					8ad7635ec9 | ||
| 
						 | 
					c0722725f9 | ||
| 
						 | 
					25063f1d9b | ||
| 
						 | 
					fd13f0ee52 | ||
| 
						 | 
					cb9c5dc571 | ||
| 
						 | 
					a6f8bbcad9 | ||
| 
						 | 
					b364e5d27b | ||
| 
						 | 
					16ece03a2e | ||
| 
						 | 
					094fe66d9f | ||
| 
						 | 
					9f10f9beeb | ||
| 
						 | 
					27d7260075 | ||
| 
						 | 
					a46229b43f | ||
| 
						 | 
					c7a48d3d00 | ||
| 
						 | 
					9188480827 | ||
| 
						 | 
					2b912846b9 | ||
| 
						 | 
					854067e8e4 | ||
| 
						 | 
					eb2f937b93 | ||
| 
						 | 
					a338e21bd1 | ||
| 
						 | 
					64c4f5732d | ||
| 
						 | 
					5789f8f780 | ||
| 
						 | 
					9b2961573a | ||
| 
						 | 
					f3052a9eee | ||
| 
						 | 
					d5870bbe23 | ||
| 
						 | 
					c2bbf9cf6c | ||
| 
						 | 
					8f0d68fa27 | ||
| 
						 | 
					d54f8c8cf6 | ||
| 
						 | 
					e0b0dc11df | ||
| 
						 | 
					75c4f7e097 | ||
| 
						 | 
					904cb691f3 | ||
| 
						 | 
					3f2599d97d | ||
| 
						 | 
					186a6f4876 | ||
| 
						 | 
					69b5d3c51f | ||
| 
						 | 
					2bfb4dbce4 | ||
| 
						 | 
					e1e9ead6fb | ||
| 
						 | 
					4e74239cca | ||
| 
						 | 
					5ac85984ec | ||
| 
						 | 
					e11b297730 | ||
| 
						 | 
					48555cf0fc | ||
| 
						 | 
					ae02fc5348 | ||
| 
						 | 
					93e147dd32 | ||
| 
						 | 
					3257904c56 | ||
| 
						 | 
					2a7619d762 | ||
| 
						 | 
					70d03c4f59 | ||
| 
						 | 
					5971d37400 | ||
| 
						 | 
					d813a428a7 | ||
| 
						 | 
					3b2972d8d9 | ||
| 
						 | 
					2165d91196 | ||
| 
						 | 
					fc99c92835 | ||
| 
						 | 
					f365611ca3 | ||
| 
						 | 
					523c83ec9a | ||
| 
						 | 
					20d242b0de | ||
| 
						 | 
					dffd72f171 | ||
| 
						 | 
					3b3bc455d0 | ||
| 
						 | 
					e871dcbc23 | ||
| 
						 | 
					1dde74f229 | ||
| 
						 | 
					adbd4ed16d | ||
| 
						 | 
					665b5ab5a7 | ||
| 
						 | 
					13232559fc | ||
| 
						 | 
					1b2f8b6e2a | ||
| 
						 | 
					1f4643a2f4 | ||
| 
						 | 
					8ba92cfe81 | ||
| 
						 | 
					fc57ebc057 | ||
| 
						 | 
					e958c5afe7 | ||
| 
						 | 
					431b0cce7d | ||
| 
						 | 
					1023b1220e | ||
| 
						 | 
					ff4e9d91d9 | ||
| 
						 | 
					ce2d00b2b4 | ||
| 
						 | 
					90ae4673a5 | ||
| 
						 | 
					2a98f41708 | ||
| 
						 | 
					fb0b844a7d | ||
| 
						 | 
					ac57d15b75 | ||
| 
						 | 
					4dd4535441 | ||
| 
						 | 
					8415060e1e | ||
| 
						 | 
					1a797ac67c | ||
| 
						 | 
					130832150c | ||
| 
						 | 
					7ef8206859 | ||
| 
						 | 
					ccd98b43ed | ||
| 
						 | 
					438fa2fdc1 | ||
| 
						 | 
					d32e8acf08 | ||
| 
						 | 
					0f4805f515 | ||
| 
						 | 
					d8c4d0e819 | ||
| 
						 | 
					b215f70a0e | ||
| 
						 | 
					562ba1715a | ||
| 
						 | 
					55b7688ef5 | ||
| 
						 | 
					3b21161922 | ||
| 
						 | 
					7ed20a2158 | ||
| 
						 | 
					95a9fea711 | ||
| 
						 | 
					e73a6965e3 | ||
| 
						 | 
					9bc629208f | ||
| 
						 | 
					4b88270ba8 | ||
| 
						 | 
					c79223040d | ||
| 
						 | 
					a8b07aa4e9 | ||
| 
						 | 
					3f39e5ae6c | ||
| 
						 | 
					3aceb94b9e | ||
| 
						 | 
					fb3e1eeb93 | ||
| 
						 | 
					f03aa651c0 | ||
| 
						 | 
					5d07c20d8e | ||
| 
						 | 
					4ee1eb7bd4 | ||
| 
						 | 
					e9a68cfbc3 | ||
| 
						 | 
					d3ed8ceb3d | ||
| 
						 | 
					569e7f6ef2 | ||
| 
						 | 
					6c62150674 | ||
| 
						 | 
					aa23a57918 | ||
| 
						 | 
					8e2c277353 | ||
| 
						 | 
					f20ee31477 | ||
| 
						 | 
					f18ef82a9f | ||
| 
						 | 
					1e55286996 | ||
| 
						 | 
					cc015c48db | ||
| 
						 | 
					9a4051050c | ||
| 
						 | 
					4c4ea428cc | ||
| 
						 | 
					28e94dc70d | ||
| 
						 | 
					f812743544 | ||
| 
						 | 
					9ef876f269 | ||
| 
						 | 
					87f3435f78 | ||
| 
						 | 
					86787f93d6 | ||
| 
						 | 
					24bec03beb | ||
| 
						 | 
					c3b1424cc0 | ||
| 
						 | 
					8ba6d1b0cc | ||
| 
						 | 
					1c4f90a05d | ||
| 
						 | 
					44317f04b1 | ||
| 
						 | 
					b7b40c3120 | ||
| 
						 | 
					e366f2b876 | ||
| 
						 | 
					fd75eb50c0 | ||
| 
						 | 
					a91dedca48 | ||
| 
						 | 
					482a9d41b9 | ||
| 
						 | 
					a71e2621bc | ||
| 
						 | 
					b908bd4e15 | ||
| 
						 | 
					05d909c549 | ||
| 
						 | 
					ef33b97050 | ||
| 
						 | 
					814ed26cfa | ||
| 
						 | 
					6da6a11331 | ||
| 
						 | 
					3dd985ee2a | ||
| 
						 | 
					f1d92d941e | ||
| 
						 | 
					dc434bbcb0 | ||
| 
						 | 
					947b3b8baf | ||
| 
						 | 
					d44c7dcf00 | ||
| 
						 | 
					f8989a2155 | ||
| 
						 | 
					6dad7bd69c | ||
| 
						 | 
					208f3688e0 | ||
| 
						 | 
					b598ea93e7 | ||
| 
						 | 
					7e6502a6cb | ||
| 
						 | 
					9887c71c41 | ||
| 
						 | 
					62187daf9f | ||
| 
						 | 
					e7cae74725 | ||
| 
						 | 
					e6441154fc | ||
| 
						 | 
					849c0e3046 | ||
| 
						 | 
					b368eddd04 | ||
| 
						 | 
					823d8a6eb1 | ||
| 
						 | 
					bc596a7418 | ||
| 
						 | 
					be5d92e014 | ||
| 
						 | 
					c32364f54c | ||
| 
						 | 
					1921eaad64 | ||
| 
						 | 
					5decfb7002 | ||
| 
						 | 
					26a3a48d65 | ||
| 
						 | 
					de42b6a7a8 | ||
| 
						 | 
					922ebc7b0d | ||
| 
						 | 
					b194041adf | ||
| 
						 | 
					db82b8f9bd | ||
| 
						 | 
					a9ef75c50d | ||
| 
						 | 
					7edd20916a | ||
| 
						 | 
					e41c8d6ad4 | ||
| 
						 | 
					ccd86b68ef | ||
| 
						 | 
					7bb7043580 | ||
| 
						 | 
					f3e9b338e0 | ||
| 
						 | 
					cbb6ad9d10 | ||
| 
						 | 
					727daea783 | ||
| 
						 | 
					2453890463 | ||
| 
						 | 
					78e2426859 | ||
| 
						 | 
					602ef2ae00 | ||
| 
						 | 
					31efc3a78d | ||
| 
						 | 
					a4e31088ce | ||
| 
						 | 
					e20d7d7167 | ||
| 
						 | 
					b108611622 | ||
| 
						 | 
					15e98129b2 | ||
| 
						 | 
					af463e7e19 | ||
| 
						 | 
					01296a6de0 | ||
| 
						 | 
					2ace287dea | ||
| 
						 | 
					939fff6799 | ||
| 
						 | 
					361ee9733f | ||
| 
						 | 
					49528751b8 | ||
| 
						 | 
					50008364a6 | ||
| 
						 | 
					547bf7f983 | ||
| 
						 | 
					fbecbc8cfb | ||
| 
						 | 
					6a1129837a | ||
| 
						 | 
					20ca3d49e7 | ||
| 
						 | 
					5da2f69f41 | ||
| 
						 | 
					57ae2e2428 | ||
| 
						 | 
					f156d5495d | ||
| 
						 | 
					380d3aa6be | ||
| 
						 | 
					4c0aee5a75 | ||
| 
						 | 
					96d7e0ece7 | ||
| 
						 | 
					974e22704d | ||
| 
						 | 
					835475a2d6 | ||
| 
						 | 
					a26f2b5e62 | ||
| 
						 | 
					67e08eb185 | ||
| 
						 | 
					8c343cf861 | ||
| 
						 | 
					4dbe060f2c | ||
| 
						 | 
					e212226828 | ||
| 
						 | 
					e9e6b88b35 | ||
| 
						 | 
					0b4cb28f39 | ||
| 
						 | 
					9c5ed502ee | ||
| 
						 | 
					6111f7408b | ||
| 
						 | 
					b6577e040e | ||
| 
						 | 
					360370d953 | ||
| 
						 | 
					1fab73ac85 | ||
| 
						 | 
					be06a9348d | ||
| 
						 | 
					7f0606016c | ||
| 
						 | 
					bb51f21728 | ||
| 
						 | 
					0e0e569cbf | ||
| 
						 | 
					71c8e9f1c3 | ||
| 
						 | 
					e759b095d4 | ||
| 
						 | 
					afa0598f06 | ||
| 
						 | 
					7b224903f4 | ||
| 
						 | 
					93d8bfcdc4 | ||
| 
						 | 
					2c05c494c0 | ||
| 
						 | 
					2933ed4df7 | ||
| 
						 | 
					b4b41f48d1 | ||
| 
						 | 
					447a9638b7 | ||
| 
						 | 
					4d29312ce1 | ||
| 
						 | 
					c129544f0f | ||
| 
						 | 
					063c0502ef | ||
| 
						 | 
					2ea0910031 | ||
| 
						 | 
					33399fdee2 | ||
| 
						 | 
					a45623c447 | ||
| 
						 | 
					145d39fbe5 | ||
| 
						 | 
					d9586857d6 | ||
| 
						 | 
					c95b7a723f | ||
| 
						 | 
					5569e1c39a | ||
| 
						 | 
					89269c84fe | ||
| 
						 | 
					608c31c60d | ||
| 
						 | 
					6d7cce481e | ||
| 
						 | 
					6d52cf2149 | ||
| 
						 | 
					439df5087f | ||
| 
						 | 
					0d3b0afe9e | ||
| 
						 | 
					abc9400e10 | ||
| 
						 | 
					371acb22e6 | ||
| 
						 | 
					5de603abc8 | ||
| 
						 | 
					f2716dada0 | ||
| 
						 | 
					b4604683fa | ||
| 
						 | 
					0e1c06128a | ||
| 
						 | 
					0c109ea2cb | ||
| 
						 | 
					911ea946cb | ||
| 
						 | 
					c22e4b19e6 | ||
| 
						 | 
					991f0706d8 | ||
| 
						 | 
					fd73a2121c | ||
| 
						 | 
					50e4e9283d | ||
| 
						 | 
					8530712dff | ||
| 
						 | 
					0cb957a684 | ||
| 
						 | 
					a331a305e9 | ||
| 
						 | 
					316e6a66f2 | ||
| 
						 | 
					c4d0df0c4f | ||
| 
						 | 
					aa9fb57b99 | ||
| 
						 | 
					6596268675 | ||
| 
						 | 
					b50e1bd3c3 | ||
| 
						 | 
					82271cee5b | ||
| 
						 | 
					22a415478f | ||
| 
						 | 
					dcba2534fa | ||
| 
						 | 
					b222eb6443 | ||
| 
						 | 
					3973628ea6 | ||
| 
						 | 
					7fc840cc85 | ||
| 
						 | 
					4adcfa052f | ||
| 
						 | 
					09451b6857 | ||
| 
						 | 
					21346b7a04 | ||
| 
						 | 
					ebbaebf784 | ||
| 
						 | 
					da414db464 | ||
| 
						 | 
					deb4d50e51 | ||
| 
						 | 
					ffb488781f | ||
| 
						 | 
					b9e6391582 | ||
| 
						 | 
					2c8c4ce2e0 | ||
| 
						 | 
					bc36f18117 | ||
| 
						 | 
					e5c84d5152 | ||
| 
						 | 
					d49f3797a5 | ||
| 
						 | 
					b87ef9460b | ||
| 
						 | 
					a9831305d8 | ||
| 
						 | 
					7a807ad8a7 | ||
| 
						 | 
					d86b6915be | ||
| 
						 | 
					05e15b046f | ||
| 
						 | 
					1d90f28029 | ||
| 
						 | 
					8acdd759b9 | ||
| 
						 | 
					46b3bd5454 | ||
| 
						 | 
					51175595b3 | ||
| 
						 | 
					eca57e925a | ||
| 
						 | 
					bc2aadad84 | ||
| 
						 | 
					6ef4d9d512 | ||
| 
						 | 
					9ec0126ed2 | ||
| 
						 | 
					8f4fac7f96 | ||
| 
						 | 
					02859fb74a | ||
| 
						 | 
					3e3844b554 | ||
| 
						 | 
					c90341a155 | ||
| 
						 | 
					7c6c052e68 | ||
| 
						 | 
					5e61580bbd | ||
| 
						 | 
					561c71a76b | ||
| 
						 | 
					c2359eb18c | ||
| 
						 | 
					cf194c1f68 | ||
| 
						 | 
					b841e0acd8 | ||
| 
						 | 
					35af460fef | ||
| 
						 | 
					7ae634de49 | ||
| 
						 | 
					8311d32378 | ||
| 
						 | 
					eff5f6124c | ||
| 
						 | 
					edbcba6c6b | ||
| 
						 | 
					3bc90f2373 | ||
| 
						 | 
					98e04f9eeb | ||
| 
						 | 
					6e9aee5724 | ||
| 
						 | 
					b475baffb2 | ||
| 
						 | 
					617d71bc12 | ||
| 
						 | 
					9cead2f2a5 | ||
| 
						 | 
					ce24e726b4 | ||
| 
						 | 
					7d05b51ade | ||
| 
						 | 
					9b77955be9 | ||
| 
						 | 
					60e9a78437 | ||
| 
						 | 
					3fbde72468 | ||
| 
						 | 
					67a8142ce0 | ||
| 
						 | 
					afee764c4a | ||
| 
						 | 
					2d99cee790 | ||
| 
						 | 
					1adfda4151 | ||
| 
						 | 
					f09ba50ec3 | ||
| 
						 | 
					67b2f21382 | ||
| 
						 | 
					3bead95bae | ||
| 
						 | 
					6e1c21abe4 | ||
| 
						 | 
					8f0edcda9e | ||
| 
						 | 
					0b6d88b3b8 | ||
| 
						 | 
					46e80a30e0 | ||
| 
						 | 
					fd430ae94c | ||
| 
						 | 
					1d6750b759 | ||
| 
						 | 
					6e56312f1a | ||
| 
						 | 
					90cc4e29b3 | ||
| 
						 | 
					97197984aa | ||
| 
						 | 
					0806278561 | ||
| 
						 | 
					e8dbc15933 | ||
| 
						 | 
					0fa197d8bc | ||
| 
						 | 
					fd72d831b7 | ||
| 
						 | 
					1bb30673f9 | ||
| 
						 | 
					87351c586e | ||
| 
						 | 
					72fbca2c47 | ||
| 
						 | 
					555b22cfca | ||
| 
						 | 
					513393f8d4 | ||
| 
						 | 
					e77066ea0a | ||
| 
						 | 
					d12cd41900 | ||
| 
						 | 
					17b99efcb0 | ||
| 
						 | 
					afc48ea543 | ||
| 
						 | 
					b313adc4b6 | ||
| 
						 | 
					623bb80b77 | ||
| 
						 | 
					f69ef67c2b | ||
| 
						 | 
					cdbd4a7229 | ||
| 
						 | 
					71b4d8971b | ||
| 
						 | 
					88220dcb21 | ||
| 
						 | 
					b7a81df46a | ||
| 
						 | 
					21173cf936 | ||
| 
						 | 
					35a79ecbae | ||
| 
						 | 
					311c6efa81 | ||
| 
						 | 
					c81ccaddad | ||
| 
						 | 
					fc450b24b4 | ||
| 
						 | 
					be1755f1cf | ||
| 
						 | 
					3cf4f5d05e | ||
| 
						 | 
					a1a96e54a4 | ||
| 
						 | 
					a6aa71ff5f | ||
| 
						 | 
					87b89b799f | ||
| 
						 | 
					f3f3cc0cca | ||
| 
						 | 
					c97b11f4b3 | ||
| 
						 | 
					2501b335fa | ||
| 
						 | 
					48b83a2504 | ||
| 
						 | 
					e55818b9d3 | ||
| 
						 | 
					ea82355258 | ||
| 
						 | 
					1f39d082c6 | ||
| 
						 | 
					edb93ae643 | ||
| 
						 | 
					395df2fe30 | ||
| 
						 | 
					7af4816f0e | ||
| 
						 | 
					369782ac50 | ||
| 
						 | 
					fc79993620 | ||
| 
						 | 
					7043a4fc4a | ||
| 
						 | 
					50c16ed350 | ||
| 
						 | 
					6e22639f46 | ||
| 
						 | 
					cde245bdcd | ||
| 
						 | 
					1f515cfe09 | ||
| 
						 | 
					ee7f80c580 | ||
| 
						 | 
					158ef04857 | ||
| 
						 | 
					511e596b8a | ||
| 
						 | 
					2202d75ed7 | ||
| 
						 | 
					299e7c9145 | ||
| 
						 | 
					fb51beb591 | ||
| 
						 | 
					cc497fb04a | ||
| 
						 | 
					98ff3937bb | ||
| 
						 | 
					82dccbd72a | ||
| 
						 | 
					448e2f9ba7 | ||
| 
						 | 
					24aaff588a | ||
| 
						 | 
					d8779db47b | ||
| 
						 | 
					2db90e3ad3 | ||
| 
						 | 
					cff4cbaaa7 | ||
| 
						 | 
					2d708bf61d | ||
| 
						 | 
					1fff621bd7 | ||
| 
						 | 
					5241a83b2d | ||
| 
						 | 
					008fee3838 | ||
| 
						 | 
					8824ec7cd5 | ||
| 
						 | 
					80870566cf | ||
| 
						 | 
					5d8118d218 | ||
| 
						 | 
					8a270a0f41 | ||
| 
						 | 
					c13ee21492 | ||
| 
						 | 
					df1ff3f1b3 | ||
| 
						 | 
					7694ddcbc0 | ||
| 
						 | 
					66b9c3cae0 | ||
| 
						 | 
					46c4647e3c | ||
| 
						 | 
					d58d6c2783 | ||
| 
						 | 
					95fabd2fbc | ||
| 
						 | 
					7d2509b6df | ||
| 
						 | 
					65b002f399 | ||
| 
						 | 
					bc23b70e47 | ||
| 
						 | 
					41f0aae69b | ||
| 
						 | 
					ee607d338a | ||
| 
						 | 
					e11f0de67f | ||
| 
						 | 
					563f1503a8 | ||
| 
						 | 
					88f17a5e98 | ||
| 
						 | 
					863fe2ecac | ||
| 
						 | 
					3a6a39c373 | ||
| 
						 | 
					cee814f9d5 | ||
| 
						 | 
					bf8479d22f | ||
| 
						 | 
					4a56f7493c | ||
| 
						 | 
					f95808e8a5 | ||
| 
						 | 
					b70dcdfc3f | ||
| 
						 | 
					4991d07cf3 | ||
| 
						 | 
					9e03333fd5 | ||
| 
						 | 
					9f06706bf7 | ||
| 
						 | 
					153a59f46d | ||
| 
						 | 
					2d5e449a18 | ||
| 
						 | 
					e458958280 | ||
| 
						 | 
					ce301b6b0b | ||
| 
						 | 
					0dd3989868 | ||
| 
						 | 
					a10c512afa | ||
| 
						 | 
					9f5d2069a4 | ||
| 
						 | 
					e4947bfec7 | ||
| 
						 | 
					837174dd63 | ||
| 
						 | 
					97025c5fc0 | ||
| 
						 | 
					e743a5134e | ||
| 
						 | 
					97853bd5c1 | ||
| 
						 | 
					c61252001b | ||
| 
						 | 
					9886f42014 | ||
| 
						 | 
					b7e1636171 | ||
| 
						 | 
					3bf7ef5389 | ||
| 
						 | 
					f71732627a | ||
| 
						 | 
					daf4e53e86 | ||
| 
						 | 
					068fdce877 | ||
| 
						 | 
					fa0ca35b95 | ||
| 
						 | 
					48fe0eec67 | ||
| 
						 | 
					4c4d87f95f | ||
| 
						 | 
					4013f3bf1e | ||
| 
						 | 
					fe10275da8 | ||
| 
						 | 
					de83c12253 | ||
| 
						 | 
					59fc2b0fc2 | ||
| 
						 | 
					5ba7c902e5 | ||
| 
						 | 
					3916800fef | ||
| 
						 | 
					1a2450bfc3 | ||
| 
						 | 
					cf7fa82897 | ||
| 
						 | 
					e45b3305b7 | ||
| 
						 | 
					0cff255077 | ||
| 
						 | 
					0a150c5c9f | ||
| 
						 | 
					c7fecee8b5 | ||
| 
						 | 
					7f1120994e | ||
| 
						 | 
					938d90db71 | ||
| 
						 | 
					d796041832 | ||
| 
						 | 
					37634c8bc9 | ||
| 
						 | 
					741e600c12 | ||
| 
						 | 
					bb2276abf7 | ||
| 
						 | 
					41918458c0 | ||
| 
						 | 
					d6f68fa314 | ||
| 
						 | 
					645820f273 | ||
| 
						 | 
					d9c88a3902 | ||
| 
						 | 
					a8883854a3 | ||
| 
						 | 
					84d14408bf | ||
| 
						 | 
					7c472f706e | ||
| 
						 | 
					df83eeb710 | ||
| 
						 | 
					743e7be913 | ||
| 
						 | 
					5eb8ca4d92 | ||
| 
						 | 
					2d092edf5e | ||
| 
						 | 
					5ee0d9c4a3 | ||
| 
						 | 
					84339237d1 | ||
| 
						 | 
					0056ef5d01 | ||
| 
						 | 
					41b8994e99 | ||
| 
						 | 
					582e592924 | ||
| 
						 | 
					8782a42627 | ||
| 
						 | 
					0b8fa44ef0 | ||
| 
						 | 
					7a2dfc2a20 | ||
| 
						 | 
					99a97051d4 | ||
| 
						 | 
					410243f197 | ||
| 
						 | 
					24282b87f1 | ||
| 
						 | 
					afbd0746cf | ||
| 
						 | 
					55f7d65db0 | ||
| 
						 | 
					f1a617edc9 | ||
| 
						 | 
					47722fe636 | ||
| 
						 | 
					27b782732f | ||
| 
						 | 
					19c057da2e | ||
| 
						 | 
					2c51f2d909 | ||
| 
						 | 
					dd8ec7cc69 | ||
| 
						 | 
					569be0710b | ||
| 
						 | 
					0816bc220b | ||
| 
						 | 
					010712ff23 | ||
| 
						 | 
					0ea3465576 | ||
| 
						 | 
					96723a3a68 | ||
| 
						 | 
					e33f347ac6 | ||
| 
						 | 
					fee2dc8ec9 | ||
| 
						 | 
					e64dceab74 | ||
| 
						 | 
					c9e1fe33be | ||
| 
						 | 
					2da0c11926 | ||
| 
						 | 
					a4709b3d88 | ||
| 
						 | 
					865874f2dd | ||
| 
						 | 
					82b931860a | ||
| 
						 | 
					11750113c6 | ||
| 
						 | 
					74cdf6f73a | ||
| 
						 | 
					8e8125c57c | ||
| 
						 | 
					42a9af38e7 | ||
| 
						 | 
					1b7aee1d4e | ||
| 
						 | 
					4ba48ec4d0 | ||
| 
						 | 
					c257cce913 | ||
| 
						 | 
					88b04f03cf | ||
| 
						 | 
					b546cff875 | ||
| 
						 | 
					4cdd275f63 | ||
| 
						 | 
					6eec83bcf9 | ||
| 
						 | 
					facf472744 | ||
| 
						 | 
					3aefe30469 | ||
| 
						 | 
					c7fea63467 | ||
| 
						 | 
					4cce82446c | ||
| 
						 | 
					fd74679ae2 | ||
| 
						 | 
					587bb0e02e | ||
| 
						 | 
					2eb5bc5c6d | ||
| 
						 | 
					8f6dc9c50f | ||
| 
						 | 
					c850925cdf | ||
| 
						 | 
					707ef52e21 | ||
| 
						 | 
					e485afdab5 | ||
| 
						 | 
					fc2b051796 | ||
| 
						 | 
					cee0bbc709 | ||
| 
						 | 
					405896785d | ||
| 
						 | 
					2e98ec5651 | ||
| 
						 | 
					47f87f536a | ||
| 
						 | 
					981cdfab86 | ||
| 
						 | 
					13bf48c77a | ||
| 
						 | 
					a1a426ea20 | ||
| 
						 | 
					4f07317ffa | ||
| 
						 | 
					cde28e18bf | ||
| 
						 | 
					6209ada910 | ||
| 
						 | 
					2e904727c2 | ||
| 
						 | 
					1a8b087ad7 | ||
| 
						 | 
					5ee6cc1162 | ||
| 
						 | 
					a5770be6ae | ||
| 
						 | 
					0a9d53e9eb | ||
| 
						 | 
					688938fbb4 | ||
| 
						 | 
					9b95f1df4b | ||
| 
						 | 
					94de04192d | ||
| 
						 | 
					1070e0e2ee | ||
| 
						 | 
					1b199605c4 | ||
| 
						 | 
					f27e41349f | ||
| 
						 | 
					775c63fc02 | ||
| 
						 | 
					db209ec295 | ||
| 
						 | 
					0202197dbf | ||
| 
						 | 
					63933136ab | ||
| 
						 | 
					6ee6fdf555 | ||
| 
						 | 
					c131593d48 | ||
| 
						 | 
					6d0d5431d4 | ||
| 
						 | 
					7bd3a58022 | ||
| 
						 | 
					921c9bd539 | ||
| 
						 | 
					8072c135cb | ||
| 
						 | 
					1472f300d5 | ||
| 
						 | 
					60b8e17568 | ||
| 
						 | 
					a1990dd76d | ||
| 
						 | 
					cb464c38b2 | ||
| 
						 | 
					9a5a7401e9 | ||
| 
						 | 
					234b5e9611 | ||
| 
						 | 
					8ab59e7a49 | ||
| 
						 | 
					668ba7d63f | ||
| 
						 | 
					c7cb16a8ff | ||
| 
						 | 
					47c177c7b3 | ||
| 
						 | 
					b755955a53 | ||
| 
						 | 
					7c0dc41c38 | ||
| 
						 | 
					1b8b0a8294 | ||
| 
						 | 
					c29b6d560b | ||
| 
						 | 
					1340db6569 | ||
| 
						 | 
					9da65c3280 | ||
| 
						 | 
					dc8c8cda4d | ||
| 
						 | 
					2d2d31394a | ||
| 
						 | 
					1e7396beeb | ||
| 
						 | 
					582afb4bd7 | ||
| 
						 | 
					f63500c09c | ||
| 
						 | 
					f36e02b2ef | ||
| 
						 | 
					3e0f27f3c9 | ||
| 
						 | 
					17dddc0596 | ||
| 
						 | 
					b91f8a482c | ||
| 
						 | 
					e0b8b39f3a | ||
| 
						 | 
					87a025cbb4 | ||
| 
						 | 
					3167f68faf | ||
| 
						 | 
					d52c973498 | ||
| 
						 | 
					dbe7113308 | ||
| 
						 | 
					1c890fa864 | ||
| 
						 | 
					b08b07b8ae | ||
| 
						 | 
					4621a00063 | ||
| 
						 | 
					7dce5a727a | ||
| 
						 | 
					3813046dc5 | ||
| 
						 | 
					a6fc578bd5 | ||
| 
						 | 
					e01eed0fae | ||
| 
						 | 
					5946ede512 | ||
| 
						 | 
					e5599db448 | ||
| 
						 | 
					26fb2b4b44 | ||
| 
						 | 
					5e7bec63eb | ||
| 
						 | 
					4101054ab5 | ||
| 
						 | 
					fea217f96f | ||
| 
						 | 
					cacbb51ee1 | ||
| 
						 | 
					40134e22d0 | ||
| 
						 | 
					a3b17baf4e | ||
| 
						 | 
					b478e91fda | ||
| 
						 | 
					935a50e886 | ||
| 
						 | 
					b05c7211cb | ||
| 
						 | 
					c6709c6b0f | ||
| 
						 | 
					fbb41ae0ad | ||
| 
						 | 
					766d78c8f5 | ||
| 
						 | 
					c04949e978 | ||
| 
						 | 
					505b5a0ee0 | ||
| 
						 | 
					e8973060ee | ||
| 
						 | 
					a3321387c1 | ||
| 
						 | 
					9fd4ee5d7c | ||
| 
						 | 
					f6de86dc3d | ||
| 
						 | 
					1a33f6da8b | ||
| 
						 | 
					0dd0cbf554 | ||
| 
						 | 
					a610374cb2 | ||
| 
						 | 
					a7b991bd68 | ||
| 
						 | 
					a4cfd178f9 | ||
| 
						 | 
					2c0ff02fba | ||
| 
						 | 
					29a5374fb6 | ||
| 
						 | 
					4d524e10b4 | ||
| 
						 | 
					c6a33c6f61 | ||
| 
						 | 
					07fb39c32e | ||
| 
						 | 
					8d5b4ee1ca | ||
| 
						 | 
					331b59214b | ||
| 
						 | 
					4c5fac4ac4 | ||
| 
						 | 
					390ead1e9a | ||
| 
						 | 
					ac9c1bcb81 | ||
| 
						 | 
					4ec2d4d2b3 | ||
| 
						 | 
					5921ea3bcf | ||
| 
						 | 
					2dbb3ccd5c | ||
| 
						 | 
					9f7f1ff75e | ||
| 
						 | 
					b6891e9c35 | ||
| 
						 | 
					d7f0ab5ff4 | ||
| 
						 | 
					49976df599 | ||
| 
						 | 
					e6a58767c5 | ||
| 
						 | 
					9ae2ad23e6 | ||
| 
						 | 
					4a26329b4c | ||
| 
						 | 
					71308c3bb5 | ||
| 
						 | 
					720b590f56 | ||
| 
						 | 
					cdf20e0839 | ||
| 
						 | 
					88886fd305 | ||
| 
						 | 
					2b670ea298 | ||
| 
						 | 
					be7ae17560 | ||
| 
						 | 
					c1ce32f1bf | ||
| 
						 | 
					f9a7c34f4b | ||
| 
						 | 
					41e68ef25f | ||
| 
						 | 
					3142c86d65 | ||
| 
						 | 
					4b42658082 | ||
| 
						 | 
					3f2b5a88ad | ||
| 
						 | 
					43e9d805e8 | ||
| 
						 | 
					de4b598946 | ||
| 
						 | 
					17ef291661 | ||
| 
						 | 
					261b5d96ad | ||
| 
						 | 
					fc6d523f0a | ||
| 
						 | 
					72b60351f1 | ||
| 
						 | 
					1b8a8088a5 | ||
| 
						 | 
					a2a0158959 | ||
| 
						 | 
					e7ecc7d4dd | ||
| 
						 | 
					8bd5b7944e | ||
| 
						 | 
					745c70e565 | ||
| 
						 | 
					9dd2b2a940 | ||
| 
						 | 
					10a926c1eb | ||
| 
						 | 
					d3442bc780 | ||
| 
						 | 
					dab6f09573 | ||
| 
						 | 
					45206340d3 | ||
| 
						 | 
					b35e9050f2 | ||
| 
						 | 
					9f7b1b24e2 | ||
| 
						 | 
					4ec19e203c | ||
| 
						 | 
					d754b3850f | ||
| 
						 | 
					853f757ece | ||
| 
						 | 
					ae1bb4e572 | ||
| 
						 | 
					fb77c6fb45 | ||
| 
						 | 
					7fa1343e93 | ||
| 
						 | 
					ad86060357 | ||
| 
						 | 
					e5b4462f47 | ||
| 
						 | 
					26dc267f8c | ||
| 
						 | 
					a91451ef13 | ||
| 
						 | 
					fb044c592d | ||
| 
						 | 
					4328d51d08 | ||
| 
						 | 
					8a208cba97 | ||
| 
						 | 
					5c2ec54f12 | ||
| 
						 | 
					73c5591944 | ||
| 
						 | 
					c417db4675 | ||
| 
						 | 
					671cf7f54a | ||
| 
						 | 
					cd3c54e50f | ||
| 
						 | 
					a3fe382e2d | ||
| 
						 | 
					bd03b99b9b | ||
| 
						 | 
					8691ff97a1 | ||
| 
						 | 
					bd44570322 | ||
| 
						 | 
					e1c55191cb | ||
| 
						 | 
					02d034cc24 | ||
| 
						 | 
					2aca27a9a8 | ||
| 
						 | 
					bc80c86031 | ||
| 
						 | 
					f8bbcf3af0 | ||
| 
						 | 
					89cee61b45 | ||
| 
						 | 
					de469ef21e | ||
| 
						 | 
					ea96c4bc7f | ||
| 
						 | 
					207c7df746 | ||
| 
						 | 
					5f5b8d2bcd | ||
| 
						 | 
					c6ce792fc5 | ||
| 
						 | 
					c9080477ec | ||
| 
						 | 
					bcba6cc60f | ||
| 
						 | 
					d13e4eb0b5 | ||
| 
						 | 
					07fc35519e | ||
| 
						 | 
					3ebf0be142 | ||
| 
						 | 
					cbcc5c01f9 | ||
| 
						 | 
					e6e7b5f3df | ||
| 
						 | 
					b1f8affbd5 | ||
| 
						 | 
					efb416299f | ||
| 
						 | 
					f6814ea43a | ||
| 
						 | 
					5160448b98 | ||
| 
						 | 
					667ac4ec6a | ||
| 
						 | 
					bb325c7d6a | ||
| 
						 | 
					0a751d8ce8 | ||
| 
						 | 
					a5d9c6e4fe | ||
| 
						 | 
					8ce288a881 | ||
| 
						 | 
					cf0694015e | ||
| 
						 | 
					0cd4498b8f | ||
| 
						 | 
					f07fb9b24b | ||
| 
						 | 
					1e8f28c491 | ||
| 
						 | 
					7948febeca | ||
| 
						 | 
					ff8a4c47ce | ||
| 
						 | 
					4e539aaa1e | ||
| 
						 | 
					4facdbb5fa | ||
| 
						 | 
					1c6fbf9ea2 | ||
| 
						 | 
					3cbe1980fd | ||
| 
						 | 
					6d9ca500d8 | ||
| 
						 | 
					fcb20be846 | ||
| 
						 | 
					cae55bfc68 | ||
| 
						 | 
					0fad6cb7e7 | ||
| 
						 | 
					7cf6e2a35b | ||
| 
						 | 
					8652d1c22e | ||
| 
						 | 
					4a6222d71b | ||
| 
						 | 
					e290c7d4e0 | ||
| 
						 | 
					29a28ee503 | ||
| 
						 | 
					66430207a4 | ||
| 
						 | 
					eb5a6a55c5 | ||
| 
						 | 
					37e48b88ad | ||
| 
						 | 
					6535eb1728 | ||
| 
						 | 
					9b141126d4 | ||
| 
						 | 
					7e708ebee0 | ||
| 
						 | 
					c236e66d62 | ||
| 
						 | 
					981b87f712 | ||
| 
						 | 
					d716308288 | ||
| 
						 | 
					af57d84312 | ||
| 
						 | 
					53002dc691 | ||
| 
						 | 
					f50c049707 | ||
| 
						 | 
					b136aa5423 | ||
| 
						 | 
					ce76ce43ae | ||
| 
						 | 
					b20b78b720 | ||
| 
						 | 
					657e60fa00 | ||
| 
						 | 
					9dbc41d7ee | ||
| 
						 | 
					82fc1d9c28 | ||
| 
						 | 
					7999c65c9b | ||
| 
						 | 
					bfe30e4d1b | ||
| 
						 | 
					aff0825c61 | ||
| 
						 | 
					e74231ed9e | ||
| 
						 | 
					fb81ac5e6b | ||
| 
						 | 
					54a34aecc3 | ||
| 
						 | 
					1399f17a07 | ||
| 
						 | 
					0bde1089f8 | ||
| 
						 | 
					cf802b983f | ||
| 
						 | 
					20ead2c6f7 | ||
| 
						 | 
					fef47a1d1e | ||
| 
						 | 
					ee25d40bea | ||
| 
						 | 
					cb5b7850ac | ||
| 
						 | 
					fe7cd1647d | ||
| 
						 | 
					1c8337abe3 | ||
| 
						 | 
					2c5fe5b12a | ||
| 
						 | 
					f40c02d908 | ||
| 
						 | 
					8efb60144d | ||
| 
						 | 
					388f2f56f2 | ||
| 
						 | 
					f5a8d67872 | ||
| 
						 | 
					89ec98e0ce | ||
| 
						 | 
					6671fe16ee | ||
| 
						 | 
					4e3b0992da | ||
| 
						 | 
					98d0b2e375 | ||
| 
						 | 
					51ca375e7e | ||
| 
						 | 
					1749d8a039 | ||
| 
						 | 
					9d1a01be8f | ||
| 
						 | 
					74235cc9ec | ||
| 
						 | 
					da0fc5bf0f | ||
| 
						 | 
					cdd43b5ba5 | ||
| 
						 | 
					1baa94907c | ||
| 
						 | 
					7865b871c0 | ||
| 
						 | 
					a87030a1ed | ||
| 
						 | 
					15701211b5 | ||
| 
						 | 
					1e264ff325 | ||
| 
						 | 
					f27c5509f7 | ||
| 
						 | 
					e1314b5716 | ||
| 
						 | 
					07e6dbde66 | ||
| 
						 | 
					1f36fe2835 | ||
| 
						 | 
					aa3353fda2 | ||
| 
						 | 
					2af9fd006d | ||
| 
						 | 
					90644dd74d | ||
| 
						 | 
					75b0edaafa | ||
| 
						 | 
					f95a9f678a | ||
| 
						 | 
					0b3300f866 | ||
| 
						 | 
					953aa79040 | ||
| 
						 | 
					01d16b54c2 | ||
| 
						 | 
					3ac60a612e | ||
| 
						 | 
					294b3c1a9c | ||
| 
						 | 
					6c2c3e9ba9 | ||
| 
						 | 
					157be2b67d | ||
| 
						 | 
					5d6e31dbe6 | ||
| 
						 | 
					38e33cef15 | ||
| 
						 | 
					0c23524963 | ||
| 
						 | 
					480116f062 | ||
| 
						 | 
					2233bed1cb | ||
| 
						 | 
					ec1258dd44 | ||
| 
						 | 
					b99b110766 | ||
| 
						 | 
					6e0cad8d34 | ||
| 
						 | 
					5f5e96d92b | ||
| 
						 | 
					38b1fa8995 | ||
| 
						 | 
					387ca353fa | ||
| 
						 | 
					d629757a84 | ||
| 
						 | 
					fc58fa8bb8 | ||
| 
						 | 
					e93f9a3284 | ||
| 
						 | 
					bb075f8833 | ||
| 
						 | 
					52732b38da | ||
| 
						 | 
					ada3cc4a8f | ||
| 
						 | 
					a598cd1ab4 | ||
| 
						 | 
					2557eaeac8 | ||
| 
						 | 
					a46faa2bfd | ||
| 
						 | 
					aabbb7451b | ||
| 
						 | 
					4a1a3440a4 | ||
| 
						 | 
					1d7d74647a | ||
| 
						 | 
					05ccd698b9 | ||
| 
						 | 
					f13b93d3b4 | ||
| 
						 | 
					7be5af1ddf | ||
| 
						 | 
					baf32381b5 | ||
| 
						 | 
					1675f6eb05 | ||
| 
						 | 
					8548d44270 | ||
| 
						 | 
					fd38fecc1a | ||
| 
						 | 
					3bec05e933 | ||
| 
						 | 
					223fc8654a | ||
| 
						 | 
					0e930f25d2 | ||
| 
						 | 
					dd9d233e2a | ||
| 
						 | 
					dd8dec69b8 | ||
| 
						 | 
					ce052b6c3b | ||
| 
						 | 
					e84c2d2679 | ||
| 
						 | 
					fabce04122 | ||
| 
						 | 
					64287002ce | ||
| 
						 | 
					c88a900fa1 | ||
| 
						 | 
					2a99e8b9df | ||
| 
						 | 
					99e812cb93 | ||
| 
						 | 
					fcb76baeb0 | ||
| 
						 | 
					4486d0cd7a | ||
| 
						 | 
					09483c58e3 | ||
| 
						 | 
					bda70ed430 | ||
| 
						 | 
					018e57c74d | ||
| 
						 | 
					3604a4d3d1 | ||
| 
						 | 
					3779469192 | ||
| 
						 | 
					0b5cfe32e9 | ||
| 
						 | 
					cc8709a090 | ||
| 
						 | 
					2c8aeddc5d | ||
| 
						 | 
					720b3598d6 | ||
| 
						 | 
					60b5245360 | ||
| 
						 | 
					5d82c5b3f4 | ||
| 
						 | 
					674b8eec4c | ||
| 
						 | 
					033db22d57 | ||
| 
						 | 
					af6f388180 | ||
| 
						 | 
					af5eb82979 | ||
| 
						 | 
					435b72dd4f | ||
| 
						 | 
					8100490a72 | ||
| 
						 | 
					dd46d58f65 | ||
| 
						 | 
					e7f97e2d22 | ||
| 
						 | 
					731d9c5fb5 | ||
| 
						 | 
					4699af98e6 | ||
| 
						 | 
					b25c8db872 | ||
| 
						 | 
					b838465135 | ||
| 
						 | 
					6481f3d29d | ||
| 
						 | 
					4146aa6b42 | ||
| 
						 | 
					4f392a200e | ||
| 
						 | 
					97c1f605f4 | ||
| 
						 | 
					281959aa61 | ||
| 
						 | 
					6e6bc352b1 | ||
| 
						 | 
					77b47b9036 | ||
| 
						 | 
					721b5b2a5c | ||
| 
						 | 
					a9188d4e17 | ||
| 
						 | 
					ea5e7bcf63 | ||
| 
						 | 
					c89cb36dbf | ||
| 
						 | 
					7be760be38 | ||
| 
						 | 
					7256ce6a8c | ||
| 
						 | 
					fb8d5a16a3 | ||
| 
						 | 
					9c86df6a98 | ||
| 
						 | 
					2697557764 | ||
| 
						 | 
					b058a08085 | ||
| 
						 | 
					e7399bf592 | ||
| 
						 | 
					cef80e8c14 | ||
| 
						 | 
					aa82db4fb4 | ||
| 
						 | 
					b0bb2b914a | ||
| 
						 | 
					88618bac73 | ||
| 
						 | 
					373b575f5a | ||
| 
						 | 
					e1798f856d | ||
| 
						 | 
					243ba4095c | ||
| 
						 | 
					29ccd81f58 | ||
| 
						 | 
					b9d82f4735 | ||
| 
						 | 
					d593983da4 | ||
| 
						 | 
					9597902a91 | ||
| 
						 | 
					7d388202bd | ||
| 
						 | 
					691401fc53 | ||
| 
						 | 
					4fd2ead09d | ||
| 
						 | 
					b46c3e9b69 | ||
| 
						 | 
					ed84dfab00 | ||
| 
						 | 
					375a7a9383 | ||
| 
						 | 
					105c0be00f | ||
| 
						 | 
					7f5b6f0f19 | ||
| 
						 | 
					0c50e02b30 | ||
| 
						 | 
					a8eeb155b5 | ||
| 
						 | 
					2f878669b7 | ||
| 
						 | 
					f2b86c955c | ||
| 
						 | 
					11afb40c01 | ||
| 
						 | 
					2c736d077b | ||
| 
						 | 
					0983760dfc | ||
| 
						 | 
					a873356c00 | ||
| 
						 | 
					eb952088f0 | ||
| 
						 | 
					22e219d90f | ||
| 
						 | 
					036c8d7e7b | ||
| 
						 | 
					6a3fff5ecf | ||
| 
						 | 
					76aa0ddc86 | ||
| 
						 | 
					e4b7645631 | ||
| 
						 | 
					90308e7072 | ||
| 
						 | 
					2186cd8ef1 | ||
| 
						 | 
					de73e397f8 | ||
| 
						 | 
					cbfa4c32c0 | ||
| 
						 | 
					f1d712ce80 | ||
| 
						 | 
					cc96f6b7a4 | ||
| 
						 | 
					3cc6cdea0f | ||
| 
						 | 
					c51ae173a6 | ||
| 
						 | 
					7e3d8df1bb | ||
| 
						 | 
					efeca6aa32 | ||
| 
						 | 
					4b08eaf5c7 | ||
| 
						 | 
					25f923ddd1 | ||
| 
						 | 
					150a4320d8 | ||
| 
						 | 
					a2151c5b9a | ||
| 
						 | 
					752d706aaf | ||
| 
						 | 
					c3ed3b6eab | ||
| 
						 | 
					c708302516 | ||
| 
						 | 
					3ea4404fd7 | ||
| 
						 | 
					7328b0a89d | ||
| 
						 | 
					ef7eaa4cb0 | ||
| 
						 | 
					dad666fbbe | ||
| 
						 | 
					5b58baee3c | ||
| 
						 | 
					69396b4199 | ||
| 
						 | 
					918a8a16fa | ||
| 
						 | 
					d2b6c3f31f | ||
| 
						 | 
					63da21c01b | ||
| 
						 | 
					b64e735b08 | ||
| 
						 | 
					9ea76b951d | ||
| 
						 | 
					0f583f69f3 | ||
| 
						 | 
					fc6be0fa56 | ||
| 
						 | 
					2fdf5d7c23 | ||
| 
						 | 
					1f2f922455 | ||
| 
						 | 
					19d2bb574b | ||
| 
						 | 
					35f4850ae0 | ||
| 
						 | 
					add9e2544a | ||
| 
						 | 
					b38f9f66c3 | ||
| 
						 | 
					ca03109c3a | ||
| 
						 | 
					9fb617e252 | ||
| 
						 | 
					f2d9a32cf4 | ||
| 
						 | 
					245206eadd | ||
| 
						 | 
					c44f754047 | ||
| 
						 | 
					023f77002f | ||
| 
						 | 
					3a4f14f3d1 | ||
| 
						 | 
					37b0d5d05d | ||
| 
						 | 
					1eab9a1fbb | ||
| 
						 | 
					2e97d4f9f5 | ||
| 
						 | 
					bdf5e18317 | ||
| 
						 | 
					3d14b9d04a | ||
| 
						 | 
					20432eae41 | ||
| 
						 | 
					47134b7864 | ||
| 
						 | 
					45fd4dbb84 | ||
| 
						 | 
					9535f8c165 | ||
| 
						 | 
					891e465607 | ||
| 
						 | 
					f45f40ffff | ||
| 
						 | 
					6447cce372 | ||
| 
						 | 
					76997b7dd0 | ||
| 
						 | 
					e6f3c5850e | ||
| 
						 | 
					b96eb06f79 | ||
| 
						 | 
					36217a9424 | ||
| 
						 | 
					12aefe78f0 | ||
| 
						 | 
					525f51f6c9 | ||
| 
						 | 
					78baa17ad0 | ||
| 
						 | 
					a9e9db8153 | ||
| 
						 | 
					e76f935ead | ||
| 
						 | 
					15df5802fd | ||
| 
						 | 
					099bf0e959 | ||
| 
						 | 
					404fb7149e | ||
| 
						 | 
					a7c5241f5f | ||
| 
						 | 
					099f1b32c8 | ||
| 
						 | 
					9a1e34e5de | ||
| 
						 | 
					2b6313d0da | ||
| 
						 | 
					75acc288ca | ||
| 
						 | 
					0cd08cce17 | ||
| 
						 | 
					03c48fa07b | ||
| 
						 | 
					f3a2a04496 | ||
| 
						 | 
					d8df48a9bc | ||
| 
						 | 
					78bf1920a2 | ||
| 
						 | 
					3db1f2d5be | ||
| 
						 | 
					e8f48dbacc | ||
| 
						 | 
					08807172b2 | ||
| 
						 | 
					9ac42ed8fc | ||
| 
						 | 
					1ad9bdf253 | ||
| 
						 | 
					8a1580096b | ||
| 
						 | 
					a5ec86d16c | ||
| 
						 | 
					1887988497 | ||
| 
						 | 
					3fc9635ea7 | ||
| 
						 | 
					3b14cb717d | ||
| 
						 | 
					55f30198ad | ||
| 
						 | 
					2449961ab2 | ||
| 
						 | 
					b216664f66 | ||
| 
						 | 
					d8223efd04 | ||
| 
						 | 
					e3775a33c1 | ||
| 
						 | 
					a4af39ac44 | ||
| 
						 | 
					63daa2aaf4 | ||
| 
						 | 
					a2121e0aee | ||
| 
						 | 
					55ec5861c8 | ||
| 
						 | 
					5a9a4b299c | ||
| 
						 | 
					bc3baeacca | ||
| 
						 | 
					9f382899b2 | ||
| 
						 | 
					cd9860af26 | ||
| 
						 | 
					23fb9bc0eb | ||
| 
						 | 
					cddfe788fb | ||
| 
						 | 
					21131f00d7 | ||
| 
						 | 
					6ea5314007 | ||
| 
						 | 
					dd4134101f | ||
| 
						 | 
					08cba61011 | ||
| 
						 | 
					fea9afbfc7 | ||
| 
						 | 
					5f2f0b5596 | ||
| 
						 | 
					7b418a474c | ||
| 
						 | 
					bb7cd4e3eb | ||
| 
						 | 
					13938aceca | ||
| 
						 | 
					51630a3706 | ||
| 
						 | 
					74ecf9e2bb | ||
| 
						 | 
					21f775522b | ||
| 
						 | 
					9868232ae1 | ||
| 
						 | 
					d4cec6a13d | ||
| 
						 | 
					1126239111 | ||
| 
						 | 
					6d3724d3b0 | ||
| 
						 | 
					52664f5081 | ||
| 
						 | 
					a716d72734 | ||
| 
						 | 
					44eca70641 | ||
| 
						 | 
					5ef738240a | ||
| 
						 | 
					1088e27ca8 | ||
| 
						 | 
					4f23052492 | ||
| 
						 | 
					f76d8c4747 | ||
| 
						 | 
					b1fe6ca175 | ||
| 
						 | 
					91895a5938 | ||
| 
						 | 
					6d1b637ba1 | ||
| 
						 | 
					fd699ac55f | ||
| 
						 | 
					e947f39689 | ||
| 
						 | 
					b7cfcfb7f8 | ||
| 
						 | 
					06556a1744 | ||
| 
						 | 
					4abc5c624a | ||
| 
						 | 
					a0e9f529a4 | ||
| 
						 | 
					0286d94454 | ||
| 
						 | 
					938ead8f88 | ||
| 
						 | 
					6828f02c9a | ||
| 
						 | 
					47d216940c | ||
| 
						 | 
					01aad2c80a | ||
| 
						 | 
					71d7526b72 | ||
| 
						 | 
					1f575f1b1d | ||
| 
						 | 
					f18a93ab04 | ||
| 
						 | 
					03da458a06 | ||
| 
						 | 
					f48158b854 | ||
| 
						 | 
					b3e1a4c68c | ||
| 
						 | 
					849c0fe240 | ||
| 
						 | 
					ca0e2bc973 | ||
| 
						 | 
					13427e4561 | ||
| 
						 | 
					02ab618c97 | ||
| 
						 | 
					82a2d07262 | ||
| 
						 | 
					c96ab5101a | ||
| 
						 | 
					954ef7ef69 | ||
| 
						 | 
					c4471290c0 | ||
| 
						 | 
					5e76807bbd | ||
| 
						 | 
					af29811edd | ||
| 
						 | 
					53b1899e3c | ||
| 
						 | 
					174a4a8c89 | ||
| 
						 | 
					aba3e65f2c | ||
| 
						 | 
					0d9cfe1ae7 | ||
| 
						 | 
					95fdc5eef9 | ||
| 
						 | 
					5fe2085bba | ||
| 
						 | 
					a0ad17bb6c | ||
| 
						 | 
					ce1b4fe146 | ||
| 
						 | 
					ce2c95b2a2 | ||
| 
						 | 
					b05eaeb545 | ||
| 
						 | 
					9716a8f9f2 | ||
| 
						 | 
					74400f7348 | ||
| 
						 | 
					62ac293801 | ||
| 
						 | 
					c1e744b912 | ||
| 
						 | 
					847c52e47f | ||
| 
						 | 
					99e87569fd | ||
| 
						 | 
					640588bbfb | ||
| 
						 | 
					a31011e8e0 | ||
| 
						 | 
					38899535f8 | ||
| 
						 | 
					b6b1f0d0aa | ||
| 
						 | 
					798757762a | ||
| 
						 | 
					a5fcd09e75 | ||
| 
						 | 
					f769ce3ea4 | ||
| 
						 | 
					042a93e443 | ||
| 
						 | 
					cbb448c945 | ||
| 
						 | 
					462f79ec44 | ||
| 
						 | 
					08e9c1af6c | ||
| 
						 | 
					023c8d0b0a | ||
| 
						 | 
					673b102c5b | ||
| 
						 | 
					56a3fec1b1 | ||
| 
						 | 
					4654ef985b | ||
| 
						 | 
					0b62b30233 | ||
| 
						 | 
					7e102e28e1 | ||
| 
						 | 
					2dae04d038 | ||
| 
						 | 
					def38e38ec | ||
| 
						 | 
					d71c6bc5a4 | ||
| 
						 | 
					2d681b779c | ||
| 
						 | 
					3908cdf442 | ||
| 
						 | 
					3ea23631d4 | ||
| 
						 | 
					393f2c651d | ||
| 
						 | 
					f846335657 | ||
| 
						 | 
					2b024cd242 | ||
| 
						 | 
					18c77bf29e | ||
| 
						 | 
					4579dd5dc6 | ||
| 
						 | 
					c91e125934 | ||
| 
						 | 
					d4cf2f1882 | ||
| 
						 | 
					de808df47b | ||
| 
						 | 
					8e1589ece5 | ||
| 
						 | 
					49e747e670 | ||
| 
						 | 
					39b30b6ab7 | ||
| 
						 | 
					e405b8d120 | ||
| 
						 | 
					6cc4ee03df | ||
| 
						 | 
					8569c322be | ||
| 
						 | 
					dd73193c83 | ||
| 
						 | 
					4ad378ea43 | ||
| 
						 | 
					0ca6d7c6b1 | ||
| 
						 | 
					0f7e6fe10c | ||
| 
						 | 
					ca7fea9656 | ||
| 
						 | 
					eb02599870 | ||
| 
						 | 
					f4e723f3e7 | ||
| 
						 | 
					96c2201bef | ||
| 
						 | 
					cd357c75b2 | ||
| 
						 | 
					06f4536a61 | ||
| 
						 | 
					bf1966354a | ||
| 
						 | 
					1c80019a2c | ||
| 
						 | 
					090d848ea8 | ||
| 
						 | 
					9a0f732d75 | ||
| 
						 | 
					d79812b0fa | ||
| 
						 | 
					0d3118bed3 | ||
| 
						 | 
					4dd60b3b96 | ||
| 
						 | 
					d0f2876c3f | ||
| 
						 | 
					ac7da00048 | ||
| 
						 | 
					17f389bbbf | ||
| 
						 | 
					5bdae1675c | ||
| 
						 | 
					cb0369d885 | ||
| 
						 | 
					778f1092dd | ||
| 
						 | 
					5671876d1d | ||
| 
						 | 
					6f7af1524e | ||
| 
						 | 
					ac3e3cdc96 | ||
| 
						 | 
					953ad1bc10 | ||
| 
						 | 
					c82c1d4a9d | ||
| 
						 | 
					63d3f44abf | ||
| 
						 | 
					d680ba8617 | ||
| 
						 | 
					396f631458 | ||
| 
						 | 
					0d64ea89f7 | ||
| 
						 | 
					c1cd88a0eb | ||
| 
						 | 
					4a61a64f50 | ||
| 
						 | 
					6882a96446 | ||
| 
						 | 
					c1082a90bb | ||
| 
						 | 
					b7d7440cf5 | ||
| 
						 | 
					9bb2560cf7 | ||
| 
						 | 
					b82ccbb7a0 | ||
| 
						 | 
					a785abc324 | ||
| 
						 | 
					092ec334f0 | ||
| 
						 | 
					232616efce | ||
| 
						 | 
					a32640b0f4 | ||
| 
						 | 
					69fb1c3f9d | ||
| 
						 | 
					7f7c318cfc | ||
| 
						 | 
					aef838fc95 | ||
| 
						 | 
					b74ba295da | ||
| 
						 | 
					ba3a6e7262 | ||
| 
						 | 
					f70df1b887 | ||
| 
						 | 
					074309b7ee | ||
| 
						 | 
					77fa04a9bc | ||
| 
						 | 
					497cc4b35e | ||
| 
						 | 
					1e4149350c | ||
| 
						 | 
					8ce97163a2 | ||
| 
						 | 
					ac8b4ee04a | ||
| 
						 | 
					2d4287da34 | ||
| 
						 | 
					2d0c55eda2 | ||
| 
						 | 
					28e0be13f6 | ||
| 
						 | 
					b357e95cc4 | ||
| 
						 | 
					1cbde6e4fa | ||
| 
						 | 
					87a25f9032 | ||
| 
						 | 
					f9150e5421 | ||
| 
						 | 
					c79b16e11d | ||
| 
						 | 
					43ca6c02dc | ||
| 
						 | 
					0bbd03525e | ||
| 
						 | 
					7b65c3298f | ||
| 
						 | 
					13066cee60 | ||
| 
						 | 
					c0711f7f0f | ||
| 
						 | 
					8484721adb | ||
| 
						 | 
					de1915e48c | ||
| 
						 | 
					6e4a3b5529 | ||
| 
						 | 
					c6c3450643 | ||
| 
						 | 
					2cfa692136 | ||
| 
						 | 
					364836ca1c | ||
| 
						 | 
					0b7618888b | ||
| 
						 | 
					5c1d0b314a | ||
| 
						 | 
					2b7af70139 | ||
| 
						 | 
					1bf0b46b13 | ||
| 
						 | 
					27ad06a627 | ||
| 
						 | 
					cab161c85f | ||
| 
						 | 
					99cc4f075c | ||
| 
						 | 
					690233bccc | ||
| 
						 | 
					fd52057729 | ||
| 
						 | 
					8b94634428 | ||
| 
						 | 
					019a7aba4a | ||
| 
						 | 
					87c49f622e | ||
| 
						 | 
					29159a42d2 | ||
| 
						 | 
					1b1a6e7808 | ||
| 
						 | 
					385be6eb20 | ||
| 
						 | 
					d91e201e96 | ||
| 
						 | 
					2c720c746b | ||
| 
						 | 
					be1027e108 | ||
| 
						 | 
					447174741c | ||
| 
						 | 
					9a577e29e8 | ||
| 
						 | 
					dfbaf95618 | ||
| 
						 | 
					204cf1abb0 | ||
| 
						 | 
					5e63691972 | ||
| 
						 | 
					a9642be663 | ||
| 
						 | 
					f1e3dc2284 | ||
| 
						 | 
					70d65fe0e0 | ||
| 
						 | 
					6368c8b7d6 | ||
| 
						 | 
					1d5edd0882 | ||
| 
						 | 
					246528ae56 | ||
| 
						 | 
					670fc9d2f0 | ||
| 
						 | 
					ab3f0c6658 | ||
| 
						 | 
					9639515871 | ||
| 
						 | 
					5a97a0b6e4 | ||
| 
						 | 
					1bdb8633c1 | ||
| 
						 | 
					c97cbcb35b | ||
| 
						 | 
					9918762413 | ||
| 
						 | 
					ed7f60fbf9 | ||
| 
						 | 
					a12258fcd2 | ||
| 
						 | 
					e42979f2c5 | ||
| 
						 | 
					b1816a0408 | ||
| 
						 | 
					1a677f7aea | ||
| 
						 | 
					48c843c367 | ||
| 
						 | 
					90f14e251e | ||
| 
						 | 
					e9185df40e | ||
| 
						 | 
					ef54bde85b | ||
| 
						 | 
					5067cce541 | ||
| 
						 | 
					41a6fdea80 | ||
| 
						 | 
					ab8f6b415f | ||
| 
						 | 
					97e84e38df | ||
| 
						 | 
					316d5cdc85 | ||
| 
						 | 
					4c8319c0f5 | ||
| 
						 | 
					50ccbc13f6 | ||
| 
						 | 
					3518b4cd08 | ||
| 
						 | 
					a851544169 | ||
| 
						 | 
					2b8e4959fb | ||
| 
						 | 
					f3e67ac1bc | ||
| 
						 | 
					927ddaffeb | ||
| 
						 | 
					a63a3f58fd | ||
| 
						 | 
					f3db3d172f | ||
| 
						 | 
					e014492646 | ||
| 
						 | 
					4c22909e31 | ||
| 
						 | 
					8d85b33eb5 | ||
| 
						 | 
					0dd25e3606 | ||
| 
						 | 
					a40f6dce87 | ||
| 
						 | 
					08dbdb85ee | ||
| 
						 | 
					922180d794 | ||
| 
						 | 
					12ea44704a | ||
| 
						 | 
					4320afe3be | ||
| 
						 | 
					fd556cbfb6 | ||
| 
						 | 
					4f75a6e574 | ||
| 
						 | 
					7463ca9acc | ||
| 
						 | 
					571199434c | ||
| 
						 | 
					37b7185b5d | ||
| 
						 | 
					8c197cc55e | ||
| 
						 | 
					3e3d2ea2fc | ||
| 
						 | 
					770d19b862 | ||
| 
						 | 
					5965902e6e | ||
| 
						 | 
					7fbd8db184 | ||
| 
						 | 
					2e0fc87599 | ||
| 
						 | 
					488c06579e | ||
| 
						 | 
					9715f4786d | ||
| 
						 | 
					96821cedd7 | ||
| 
						 | 
					1656ef2997 | ||
| 
						 | 
					da8fa72f99 | ||
| 
						 | 
					6841fb0d1e | ||
| 
						 | 
					a0618e3e5e | ||
| 
						 | 
					ccb8a026c0 | ||
| 
						 | 
					fccbb9b34f | ||
| 
						 | 
					15a4b40c7f | ||
| 
						 | 
					f66c303201 | ||
| 
						 | 
					40e29b1976 | ||
| 
						 | 
					22341d4085 | ||
| 
						 | 
					cad4e62b24 | ||
| 
						 | 
					49b8142262 | ||
| 
						 | 
					f0e8ae723c | ||
| 
						 | 
					93c106c4b9 | ||
| 
						 | 
					74678cc2f8 | ||
| 
						 | 
					664b99853c | ||
| 
						 | 
					16bc9fea4d | ||
| 
						 | 
					ae6767430e | ||
| 
						 | 
					cea538154b | ||
| 
						 | 
					5f12fc006e | ||
| 
						 | 
					7363455fac | ||
| 
						 | 
					eaccfe8b29 | ||
| 
						 | 
					d2759c2135 | ||
| 
						 | 
					9c962484fe | ||
| 
						 | 
					e391116a48 | ||
| 
						 | 
					458cddc104 | ||
| 
						 | 
					3dff94c2e4 | ||
| 
						 | 
					dc347119e6 | ||
| 
						 | 
					6434450cd6 | ||
| 
						 | 
					f6f0420dfe | ||
| 
						 | 
					cfa3747ba9 | ||
| 
						 | 
					4f6235f701 | ||
| 
						 | 
					9a3bbbce91 | ||
| 
						 | 
					c69e361f1c | ||
| 
						 | 
					b5b22731f1 | ||
| 
						 | 
					924154d9f2 | ||
| 
						 | 
					b617a5be59 | ||
| 
						 | 
					7eea36bb48 | ||
| 
						 | 
					bbdb543844 | ||
| 
						 | 
					5059658219 | ||
| 
						 | 
					d9f0016bc5 | ||
| 
						 | 
					6b521df33c | ||
| 
						 | 
					72e2ffee20 | ||
| 
						 | 
					3a55fc1aab | ||
| 
						 | 
					8735ee6f5d | ||
| 
						 | 
					6519b2cb92 | ||
| 
						 | 
					03cd49447f | ||
| 
						 | 
					f598cd13a3 | ||
| 
						 | 
					f513939ebb | ||
| 
						 | 
					0ab8beb480 | ||
| 
						 | 
					f7daafa442 | ||
| 
						 | 
					f8be08d200 | ||
| 
						 | 
					777ab7e611 | ||
| 
						 | 
					a026fd201f | ||
| 
						 | 
					9e935d7e4c | ||
| 
						 | 
					975d3dc2ca | ||
| 
						 | 
					6888f2b35c | ||
| 
						 | 
					fbabb75207 | ||
| 
						 | 
					1489ccf695 | ||
| 
						 | 
					11302c699d | ||
| 
						 | 
					5685dcd445 | ||
| 
						 | 
					c91b5c717c | ||
| 
						 | 
					e334d78b87 | ||
| 
						 | 
					b2f82c3fe3 | ||
| 
						 | 
					11b1adadbd | ||
| 
						 | 
					1afd8b3942 | ||
| 
						 | 
					e105643595 | ||
| 
						 | 
					e0371fe4dc | ||
| 
						 | 
					5271ebd9a3 | ||
| 
						 | 
					5676d8cb76 | ||
| 
						 | 
					ce8b257413 | ||
| 
						 | 
					e371828067 | ||
| 
						 | 
					7722424462 | ||
| 
						 | 
					a14d1a03ec | ||
| 
						 | 
					ff1b7e09bc | ||
| 
						 | 
					731cae1428 | ||
| 
						 | 
					2765813cf6 | ||
| 
						 | 
					9c729e0a6d | ||
| 
						 | 
					baac3b4b5f | ||
| 
						 | 
					227cd06ffe | ||
| 
						 | 
					9b67b4b3ca | ||
| 
						 | 
					034292ad6a | ||
| 
						 | 
					946cbf67af | ||
| 
						 | 
					170afce58d | ||
| 
						 | 
					dbd665c210 | ||
| 
						 | 
					66ab08b1cf | ||
| 
						 | 
					0c5a65639d | ||
| 
						 | 
					f76a8084df | ||
| 
						 | 
					10cea23bd4 | ||
| 
						 | 
					a6c1b3a9ac | ||
| 
						 | 
					ba404b5e86 | ||
| 
						 | 
					8623f693d9 | ||
| 
						 | 
					11af1a2758 | ||
| 
						 | 
					9209c9fc1a | ||
| 
						 | 
					a111306bbc | ||
| 
						 | 
					2de625408a | ||
| 
						 | 
					56f74f2ec3 | ||
| 
						 | 
					8050bc7955 | ||
| 
						 | 
					9c789ad188 | ||
| 
						 | 
					2eae234023 | ||
| 
						 | 
					6c82fda2dd | ||
| 
						 | 
					d486601f41 | ||
| 
						 | 
					b52d109518 | ||
| 
						 | 
					31b4896209 | ||
| 
						 | 
					11e4b79a3a | ||
| 
						 | 
					9239e45ba6 | ||
| 
						 | 
					d7fcc7f6c6 | ||
| 
						 | 
					e0f12c41de | ||
| 
						 | 
					5b5dd0c057 | ||
| 
						 | 
					95d29597b7 | ||
| 
						 | 
					9bce3070ac | ||
| 
						 | 
					a9ffce0a25 | ||
| 
						 | 
					8e9eae0f8a | ||
| 
						 | 
					565d1065c3 | ||
| 
						 | 
					86b0c475d7 | ||
| 
						 | 
					84757d677f | ||
| 
						 | 
					522aefbb5a | ||
| 
						 | 
					74a6c7f384 | ||
| 
						 | 
					247cf8d279 | ||
| 
						 | 
					b7d135b353 | ||
| 
						 | 
					d58d092bc9 | ||
| 
						 | 
					9d9b559ef0 | ||
| 
						 | 
					06018c4685 | ||
| 
						 | 
					5f6d0ea210 | ||
| 
						 | 
					5a2e24bad8 | ||
| 
						 | 
					2330e18bf1 | ||
| 
						 | 
					0b977773d2 | ||
| 
						 | 
					62c419d603 | ||
| 
						 | 
					adc7fe123b | ||
| 
						 | 
					f352de9f1d | ||
| 
						 | 
					f62676b92d | ||
| 
						 | 
					32933c961b | ||
| 
						 | 
					a7bd03960c | ||
| 
						 | 
					5765e24f14 | ||
| 
						 | 
					3bcfce2881 | ||
| 
						 | 
					df63a389a5 | ||
| 
						 | 
					4e6ec1da04 | ||
| 
						 | 
					7740a1c6ef | ||
| 
						 | 
					c77f47abfa | ||
| 
						 | 
					8151f52add | ||
| 
						 | 
					e766a681aa | ||
| 
						 | 
					9e952fc877 | ||
| 
						 | 
					05861c77e7 | ||
| 
						 | 
					233bf734d3 | ||
| 
						 | 
					9fe6729b46 | ||
| 
						 | 
					72fbe87dc6 | ||
| 
						 | 
					cfce2335e9 | ||
| 
						 | 
					908eb7b85a | ||
| 
						 | 
					bf0870ac73 | ||
| 
						 | 
					f947eb318e | ||
| 
						 | 
					93fd0fd61f | ||
| 
						 | 
					bebf2787ea | ||
| 
						 | 
					f439123f38 | ||
| 
						 | 
					c035b0c3b2 | ||
| 
						 | 
					f058888738 | ||
| 
						 | 
					eabea024e8 | ||
| 
						 | 
					8eb57af5fe | ||
| 
						 | 
					1aad3392e5 | ||
| 
						 | 
					ba9f280885 | ||
| 
						 | 
					ce9449cf50 | ||
| 
						 | 
					97e4a93245 | ||
| 
						 | 
					3928b6bf48 | ||
| 
						 | 
					b1c4fe3625 | ||
| 
						 | 
					9e06f6f601 | ||
| 
						 | 
					d4443edc57 | ||
| 
						 | 
					6576774b51 | ||
| 
						 | 
					861b0ddd27 | ||
| 
						 | 
					3a66e306e4 | ||
| 
						 | 
					272c933315 | ||
| 
						 | 
					47aae74e4a | ||
| 
						 | 
					cf2562e772 | ||
| 
						 | 
					8e21c14607 | ||
| 
						 | 
					2bd83ca1c9 | ||
| 
						 | 
					69cbf46811 | ||
| 
						 | 
					095ce35378 | ||
| 
						 | 
					e7871ffaa8 | ||
| 
						 | 
					8d8a8041ec | ||
| 
						 | 
					3cbb7937fa | ||
| 
						 | 
					600dec1586 | ||
| 
						 | 
					b0c6fb8064 | ||
| 
						 | 
					ef8335d900 | ||
| 
						 | 
					505cdbec5c | ||
| 
						 | 
					167f3af2ce | ||
| 
						 | 
					84c15db551 | ||
| 
						 | 
					ca570cfdbc | ||
| 
						 | 
					af258e0dec | ||
| 
						 | 
					1ec7ac3ce7 | ||
| 
						 | 
					885982dc6e | ||
| 
						 | 
					a53955d8ab | ||
| 
						 | 
					9231f47796 | ||
| 
						 | 
					5c03115af1 | ||
| 
						 | 
					91174a91b9 | ||
| 
						 | 
					1e44804e33 | ||
| 
						 | 
					eaeb1870d4 | ||
| 
						 | 
					3a0d23c87e | ||
| 
						 | 
					b4f76582d4 | ||
| 
						 | 
					213a75dbf2 | ||
| 
						 | 
					5c0a48655f | ||
| 
						 | 
					8188e1537b | ||
| 
						 | 
					8f0edcd142 | ||
| 
						 | 
					a1195a19f5 | ||
| 
						 | 
					b05b50e67b | ||
| 
						 | 
					778ec213fb | ||
| 
						 | 
					7eeb37e1e4 | ||
| 
						 | 
					0a78c29760 | ||
| 
						 | 
					246ffa4571 | ||
| 
						 | 
					748365eed7 | ||
| 
						 | 
					6d114240b9 | ||
| 
						 | 
					426edadf98 | ||
| 
						 | 
					62aa714f00 | ||
| 
						 | 
					a8aae85a80 | ||
| 
						 | 
					b6436ff2c2 | ||
| 
						 | 
					02ee237fdf | ||
| 
						 | 
					0cceb1c708 | ||
| 
						 | 
					7e258a56da | ||
| 
						 | 
					fc875472d0 | ||
| 
						 | 
					e5e932d212 | ||
| 
						 | 
					ee8ba0b26c | ||
| 
						 | 
					838d25a1ec | ||
| 
						 | 
					5132cadf21 | ||
| 
						 | 
					80c38957bc | 
@@ -4,3 +4,12 @@ makefile.one
 | 
				
			|||||||
tmp
 | 
					tmp
 | 
				
			||||||
out
 | 
					out
 | 
				
			||||||
outinc
 | 
					outinc
 | 
				
			||||||
 | 
					rehash.time
 | 
				
			||||||
 | 
					testlog
 | 
				
			||||||
 | 
					make.log
 | 
				
			||||||
 | 
					maketest.log
 | 
				
			||||||
 | 
					cctest
 | 
				
			||||||
 | 
					cctest.c
 | 
				
			||||||
 | 
					cctest.a
 | 
				
			||||||
 | 
					libcrypto.so.*
 | 
				
			||||||
 | 
					libssl.so.*
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										432
									
								
								FAQ
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										432
									
								
								FAQ
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,432 @@
 | 
				
			|||||||
 | 
					OpenSSL  -  Frequently Asked Questions
 | 
				
			||||||
 | 
					--------------------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Which is the current version of OpenSSL?
 | 
				
			||||||
 | 
					* Where is the documentation?
 | 
				
			||||||
 | 
					* How can I contact the OpenSSL developers?
 | 
				
			||||||
 | 
					* Do I need patent licenses to use OpenSSL?
 | 
				
			||||||
 | 
					* Is OpenSSL thread-safe?
 | 
				
			||||||
 | 
					* Why do I get a "PRNG not seeded" error message?
 | 
				
			||||||
 | 
					* Why does the linker complain about undefined symbols?
 | 
				
			||||||
 | 
					* Where can I get a compiled version of OpenSSL?
 | 
				
			||||||
 | 
					* I've compiled a program under Windows and it crashes: why?
 | 
				
			||||||
 | 
					* How do I read or write a DER encoded buffer using the ASN1 functions?
 | 
				
			||||||
 | 
					* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
 | 
				
			||||||
 | 
					* I've called <some function> and it fails, why?
 | 
				
			||||||
 | 
					* I just get a load of numbers for the error output, what do they mean?
 | 
				
			||||||
 | 
					* Why do I get errors about unknown algorithms?
 | 
				
			||||||
 | 
					* How do I create certificates or certificate requests?
 | 
				
			||||||
 | 
					* Why can't I create certificate requests?
 | 
				
			||||||
 | 
					* Why does <SSL program> fail with a certificate verify error?
 | 
				
			||||||
 | 
					* Why can I only use weak ciphers when I connect to a server using OpenSSL?
 | 
				
			||||||
 | 
					* How can I create DSA certificates?
 | 
				
			||||||
 | 
					* Why can't I make an SSL connection using a DSA certificate?
 | 
				
			||||||
 | 
					* How can I remove the passphrase on a private key?
 | 
				
			||||||
 | 
					* Why can't the OpenSSH configure script detect OpenSSL?
 | 
				
			||||||
 | 
					* Why does the OpenSSL test fail with "bc: command not found"?
 | 
				
			||||||
 | 
					* Why does the OpenSSL test fail with "bc: 1 no implemented"?
 | 
				
			||||||
 | 
					* Why does the OpenSSL compilation fail on Alpha True64 Unix?
 | 
				
			||||||
 | 
					* Why does the OpenSSL compilation fail with "ar: command not found"?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Which is the current version of OpenSSL?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The current version is available from <URL: http://www.openssl.org>.
 | 
				
			||||||
 | 
					OpenSSL 0.9.6 was released on September 24th, 2000.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					In addition to the current stable release, you can also access daily
 | 
				
			||||||
 | 
					snapshots of the OpenSSL development version at <URL:
 | 
				
			||||||
 | 
					ftp://ftp.openssl.org/snapshot/>, or get it by anonymous CVS access.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Where is the documentation?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OpenSSL is a library that provides cryptographic functionality to
 | 
				
			||||||
 | 
					applications such as secure web servers.  Be sure to read the
 | 
				
			||||||
 | 
					documentation of the application you want to use.  The INSTALL file
 | 
				
			||||||
 | 
					explains how to install this library.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OpenSSL includes a command line utility that can be used to perform a
 | 
				
			||||||
 | 
					variety of cryptographic functions.  It is described in the openssl(1)
 | 
				
			||||||
 | 
					manpage.  Documentation for developers is currently being written.  A
 | 
				
			||||||
 | 
					few manual pages already are available; overviews over libcrypto and
 | 
				
			||||||
 | 
					libssl are given in the crypto(3) and ssl(3) manpages.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The OpenSSL manpages are installed in /usr/local/ssl/man/ (or a
 | 
				
			||||||
 | 
					different directory if you specified one as described in INSTALL).
 | 
				
			||||||
 | 
					In addition, you can read the most current versions at
 | 
				
			||||||
 | 
					<URL: http://www.openssl.org/docs/>.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					For information on parts of libcrypto that are not yet documented, you
 | 
				
			||||||
 | 
					might want to read Ariel Glenn's documentation on SSLeay 0.9, OpenSSL's
 | 
				
			||||||
 | 
					predecessor, at <URL: http://www.columbia.edu/~ariel/ssleay/>.  Much
 | 
				
			||||||
 | 
					of this still applies to OpenSSL.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					There is some documentation about certificate extensions and PKCS#12
 | 
				
			||||||
 | 
					in doc/openssl.txt
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The original SSLeay documentation is included in OpenSSL as
 | 
				
			||||||
 | 
					doc/ssleay.txt.  It may be useful when none of the other resources
 | 
				
			||||||
 | 
					help, but please note that it reflects the obsolete version SSLeay
 | 
				
			||||||
 | 
					0.6.6.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* How can I contact the OpenSSL developers?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The README file describes how to submit bug reports and patches to
 | 
				
			||||||
 | 
					OpenSSL.  Information on the OpenSSL mailing lists is available from
 | 
				
			||||||
 | 
					<URL: http://www.openssl.org>.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Do I need patent licenses to use OpenSSL?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The patents section of the README file lists patents that may apply to
 | 
				
			||||||
 | 
					you if you want to use OpenSSL.  For information on intellectual
 | 
				
			||||||
 | 
					property rights, please consult a lawyer.  The OpenSSL team does not
 | 
				
			||||||
 | 
					offer legal advice.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					You can configure OpenSSL so as not to use RC5 and IDEA by using
 | 
				
			||||||
 | 
					 ./config no-rc5 no-idea
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Is OpenSSL thread-safe?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Yes (with limitations: an SSL connection may not concurrently be used
 | 
				
			||||||
 | 
					by multiple threads).  On Windows and many Unix systems, OpenSSL
 | 
				
			||||||
 | 
					automatically uses the multi-threaded versions of the standard
 | 
				
			||||||
 | 
					libraries.  If your platform is not one of these, consult the INSTALL
 | 
				
			||||||
 | 
					file.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Multi-threaded applications must provide two callback functions to
 | 
				
			||||||
 | 
					OpenSSL.  This is described in the threads(3) manpage.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why do I get a "PRNG not seeded" error message?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Cryptographic software needs a source of unpredictable data to work
 | 
				
			||||||
 | 
					correctly.  Many open source operating systems provide a "randomness
 | 
				
			||||||
 | 
					device" that serves this purpose.  On other systems, applications have
 | 
				
			||||||
 | 
					to call the RAND_add() or RAND_seed() function with appropriate data
 | 
				
			||||||
 | 
					before generating keys or performing public key encryption.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Some broken applications do not do this.  As of version 0.9.5, the
 | 
				
			||||||
 | 
					OpenSSL functions that need randomness report an error if the random
 | 
				
			||||||
 | 
					number generator has not been seeded with at least 128 bits of
 | 
				
			||||||
 | 
					randomness.  If this error occurs, please contact the author of the
 | 
				
			||||||
 | 
					application you are using.  It is likely that it never worked
 | 
				
			||||||
 | 
					correctly.  OpenSSL 0.9.5 and later make the error visible by refusing
 | 
				
			||||||
 | 
					to perform potentially insecure encryption.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					On systems without /dev/urandom, it is a good idea to use the Entropy
 | 
				
			||||||
 | 
					Gathering Demon; see the RAND_egd() manpage for details.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Most components of the openssl command line tool try to use the
 | 
				
			||||||
 | 
					file $HOME/.rnd (or $RANDFILE, if this environment variable is set)
 | 
				
			||||||
 | 
					for seeding the PRNG.  If this file does not exist or is too short,
 | 
				
			||||||
 | 
					the "PRNG not seeded" error message may occur.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					[Note to OpenSSL 0.9.5 users: The command "openssl rsa" in version
 | 
				
			||||||
 | 
					0.9.5 does not do this and will fail on systems without /dev/urandom
 | 
				
			||||||
 | 
					when trying to password-encrypt an RSA key!  This is a bug in the
 | 
				
			||||||
 | 
					library; try a later version instead.]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					For Solaris 2.6, Tim Nibbe <tnibbe@sprint.net> and others have suggested
 | 
				
			||||||
 | 
					installing the SUNski package from Sun patch 105710-01 (Sparc) which
 | 
				
			||||||
 | 
					adds a /dev/random device and make sure it gets used, usually through
 | 
				
			||||||
 | 
					$RANDFILE.  There are probably similar patches for the other Solaris
 | 
				
			||||||
 | 
					versions.  However, be warned that /dev/random is usually a blocking
 | 
				
			||||||
 | 
					device, which may have some effects on OpenSSL.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why does the linker complain about undefined symbols?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Maybe the compilation was interrupted, and make doesn't notice that
 | 
				
			||||||
 | 
					something is missing.  Run "make clean; make".
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					If you used ./Configure instead of ./config, make sure that you
 | 
				
			||||||
 | 
					selected the right target.  File formats may differ slightly between
 | 
				
			||||||
 | 
					OS versions (for example sparcv8/sparcv9, or a.out/elf).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					In case you get errors about the following symbols, use the config
 | 
				
			||||||
 | 
					option "no-asm", as described in INSTALL:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 BF_cbc_encrypt, BF_decrypt, BF_encrypt, CAST_cbc_encrypt,
 | 
				
			||||||
 | 
					 CAST_decrypt, CAST_encrypt, RC4, RC5_32_cbc_encrypt, RC5_32_decrypt,
 | 
				
			||||||
 | 
					 RC5_32_encrypt, bn_add_words, bn_div_words, bn_mul_add_words,
 | 
				
			||||||
 | 
					 bn_mul_comba4, bn_mul_comba8, bn_mul_words, bn_sqr_comba4,
 | 
				
			||||||
 | 
					 bn_sqr_comba8, bn_sqr_words, bn_sub_words, des_decrypt3,
 | 
				
			||||||
 | 
					 des_ede3_cbc_encrypt, des_encrypt, des_encrypt2, des_encrypt3,
 | 
				
			||||||
 | 
					 des_ncbc_encrypt, md5_block_asm_host_order, sha1_block_asm_data_order
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					If none of these helps, you may want to try using the current snapshot.
 | 
				
			||||||
 | 
					If the problem persists, please submit a bug report.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Where can I get a compiled version of OpenSSL?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Some applications that use OpenSSL are distributed in binary form.
 | 
				
			||||||
 | 
					When using such an application, you don't need to install OpenSSL
 | 
				
			||||||
 | 
					yourself; the application will include the required parts (e.g. DLLs).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					If you want to install OpenSSL on a Windows system and you don't have
 | 
				
			||||||
 | 
					a C compiler, read the "Mingw32" section of INSTALL.W32 for information
 | 
				
			||||||
 | 
					on how to obtain and install the free GNU C compiler.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					A number of Linux and *BSD distributions include OpenSSL.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* I've compiled a program under Windows and it crashes: why?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					This is usually because you've missed the comment in INSTALL.W32. You
 | 
				
			||||||
 | 
					must link with the multithreaded DLL version of the VC++ runtime library
 | 
				
			||||||
 | 
					otherwise the conflict will cause a program to crash: typically on the
 | 
				
			||||||
 | 
					first BIO related read or write operation.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* How do I read or write a DER encoded buffer using the ASN1 functions?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					You have two options. You can either use a memory BIO in conjunction
 | 
				
			||||||
 | 
					with the i2d_XXX_bio() or d2i_XXX_bio() functions or you can use the
 | 
				
			||||||
 | 
					i2d_XXX(), d2i_XXX() functions directly. Since these are often the
 | 
				
			||||||
 | 
					cause of grief here are some code fragments using PKCS7 as an example:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					unsigned char *buf, *p;
 | 
				
			||||||
 | 
					int len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					len = i2d_PKCS7(p7, NULL);
 | 
				
			||||||
 | 
					buf = OPENSSL_malloc(len); /* or Malloc, error checking omitted */
 | 
				
			||||||
 | 
					p = buf;
 | 
				
			||||||
 | 
					i2d_PKCS7(p7, &p);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					At this point buf contains the len bytes of the DER encoding of
 | 
				
			||||||
 | 
					p7.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The opposite assumes we already have len bytes in buf:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					unsigned char *p;
 | 
				
			||||||
 | 
					p = buf;
 | 
				
			||||||
 | 
					p7 = d2i_PKCS7(NULL, &p, len);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					At this point p7 contains a valid PKCS7 structure of NULL if an error
 | 
				
			||||||
 | 
					occurred. If an error occurred ERR_print_errors(bio) should give more
 | 
				
			||||||
 | 
					information.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The reason for the temporary variable 'p' is that the ASN1 functions
 | 
				
			||||||
 | 
					increment the passed pointer so it is ready to read or write the next
 | 
				
			||||||
 | 
					structure. This is often a cause of problems: without the temporary
 | 
				
			||||||
 | 
					variable the buffer pointer is changed to point just after the data
 | 
				
			||||||
 | 
					that has been read or written. This may well be uninitialized data
 | 
				
			||||||
 | 
					and attempts to free the buffer will have unpredictable results
 | 
				
			||||||
 | 
					because it no longer points to the same address.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* I've tried using <M_some_evil_pkcs12_macro> and I get errors why?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					This usually happens when you try compiling something using the PKCS#12
 | 
				
			||||||
 | 
					macros with a C++ compiler. There is hardly ever any need to use the
 | 
				
			||||||
 | 
					PKCS#12 macros in a program, it is much easier to parse and create
 | 
				
			||||||
 | 
					PKCS#12 files using the PKCS12_parse() and PKCS12_create() functions
 | 
				
			||||||
 | 
					documented in doc/openssl.txt and with examples in demos/pkcs12. The
 | 
				
			||||||
 | 
					'pkcs12' application has to use the macros because it prints out 
 | 
				
			||||||
 | 
					debugging information.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* I've called <some function> and it fails, why?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Before submitting a report or asking in one of the mailing lists, you
 | 
				
			||||||
 | 
					should try to determine the cause. In particular, you should call
 | 
				
			||||||
 | 
					ERR_print_errors() or ERR_print_errors_fp() after the failed call
 | 
				
			||||||
 | 
					and see if the message helps. Note that the problem may occur earlier
 | 
				
			||||||
 | 
					than you think -- you should check for errors after every call where
 | 
				
			||||||
 | 
					it is possible, otherwise the actual problem may be hidden because
 | 
				
			||||||
 | 
					some OpenSSL functions clear the error state.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* I just get a load of numbers for the error output, what do they mean?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The actual format is described in the ERR_print_errors() manual page.
 | 
				
			||||||
 | 
					You should call the function ERR_load_crypto_strings() before hand and
 | 
				
			||||||
 | 
					the message will be output in text form. If you can't do this (for example
 | 
				
			||||||
 | 
					it is a pre-compiled binary) you can use the errstr utility on the error
 | 
				
			||||||
 | 
					code itself (the hex digits after the second colon).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why do I get errors about unknown algorithms?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					This can happen under several circumstances such as reading in an
 | 
				
			||||||
 | 
					encrypted private key or attempting to decrypt a PKCS#12 file. The cause
 | 
				
			||||||
 | 
					is forgetting to load OpenSSL's table of algorithms with
 | 
				
			||||||
 | 
					OpenSSL_add_all_algorithms(). See the manual page for more information.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* How do I create certificates or certificate requests?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Check out the CA.pl(1) manual page. This provides a simple wrapper round
 | 
				
			||||||
 | 
					the 'req', 'verify', 'ca' and 'pkcs12' utilities. For finer control check
 | 
				
			||||||
 | 
					out the manual pages for the individual utilities and the certificate
 | 
				
			||||||
 | 
					extensions documentation (currently in doc/openssl.txt).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why can't I create certificate requests?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					You typically get the error:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						unable to find 'distinguished_name' in config
 | 
				
			||||||
 | 
						problems making Certificate Request
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					This is because it can't find the configuration file. Check out the
 | 
				
			||||||
 | 
					DIAGNOSTICS section of req(1) for more information.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why does <SSL program> fail with a certificate verify error?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					This problem is usually indicated by log messages saying something like
 | 
				
			||||||
 | 
					"unable to get local issuer certificate" or "self signed certificate".
 | 
				
			||||||
 | 
					When a certificate is verified its root CA must be "trusted" by OpenSSL
 | 
				
			||||||
 | 
					this typically means that the CA certificate must be placed in a directory
 | 
				
			||||||
 | 
					or file and the relevant program configured to read it. The OpenSSL program
 | 
				
			||||||
 | 
					'verify' behaves in a similar way and issues similar error messages: check
 | 
				
			||||||
 | 
					the verify(1) program manual page for more information.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why can I only use weak ciphers when I connect to a server using OpenSSL?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					This is almost certainly because you are using an old "export grade" browser
 | 
				
			||||||
 | 
					which only supports weak encryption. Upgrade your browser to support 128 bit
 | 
				
			||||||
 | 
					ciphers.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* How can I create DSA certificates?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Check the CA.pl(1) manual page for a DSA certificate example.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why can't I make an SSL connection to a server using a DSA certificate?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Typically you'll see a message saying there are no shared ciphers when
 | 
				
			||||||
 | 
					the same setup works fine with an RSA certificate. There are two possible
 | 
				
			||||||
 | 
					causes. The client may not support connections to DSA servers most web
 | 
				
			||||||
 | 
					browsers (including Netscape and MSIE) only support connections to servers
 | 
				
			||||||
 | 
					supporting RSA cipher suites. The other cause is that a set of DH parameters
 | 
				
			||||||
 | 
					has not been supplied to the server. DH parameters can be created with the
 | 
				
			||||||
 | 
					dhparam(1) command and loaded using the SSL_CTX_set_tmp_dh() for example:
 | 
				
			||||||
 | 
					check the source to s_server in apps/s_server.c for an example.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* How can I remove the passphrase on a private key?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Firstly you should be really *really* sure you want to do this. Leaving
 | 
				
			||||||
 | 
					a private key unencrypted is a major security risk. If you decide that
 | 
				
			||||||
 | 
					you do have to do this check the EXAMPLES sections of the rsa(1) and
 | 
				
			||||||
 | 
					dsa(1) manual pages.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why can't the OpenSSH configure script detect OpenSSL?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					There is a problem with OpenSSH 1.2.2p1, in that the configure script
 | 
				
			||||||
 | 
					can't find the installed OpenSSL libraries.  The problem is actually
 | 
				
			||||||
 | 
					a small glitch that is easily solved with the following patch to be
 | 
				
			||||||
 | 
					applied to the OpenSSH distribution:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					----- snip:start -----
 | 
				
			||||||
 | 
					--- openssh-1.2.2p1/configure.in.orig	Thu Mar 23 18:56:58 2000
 | 
				
			||||||
 | 
					+++ openssh-1.2.2p1/configure.in	Thu Mar 23 18:55:05 2000
 | 
				
			||||||
 | 
					@@ -152,10 +152,10 @@
 | 
				
			||||||
 | 
					 AC_MSG_CHECKING([for OpenSSL/SSLeay directory])
 | 
				
			||||||
 | 
					 for ssldir in "" $tryssldir /usr /usr/local/openssl /usr/lib/openssl /usr/local/ssl /usr/lib/ssl /usr/local /usr/pkg /opt /opt/openssl ; do
 | 
				
			||||||
 | 
					 	if test ! -z "$ssldir" ; then
 | 
				
			||||||
 | 
					-		LIBS="$saved_LIBS -L$ssldir"
 | 
				
			||||||
 | 
					+		LIBS="$saved_LIBS -L$ssldir/lib"
 | 
				
			||||||
 | 
					 		CFLAGS="$CFLAGS -I$ssldir/include"
 | 
				
			||||||
 | 
					 		if test "x$need_dash_r" = "x1" ; then
 | 
				
			||||||
 | 
					-			LIBS="$LIBS -R$ssldir"
 | 
				
			||||||
 | 
					+			LIBS="$LIBS -R$ssldir/lib"
 | 
				
			||||||
 | 
					 		fi
 | 
				
			||||||
 | 
					 	fi
 | 
				
			||||||
 | 
					 	LIBS="$LIBS -lcrypto"
 | 
				
			||||||
 | 
					--- openssh-1.2.2p1/configure.orig	Thu Mar 23 18:55:02 2000
 | 
				
			||||||
 | 
					+++ openssh-1.2.2p1/configure	Thu Mar 23 18:57:08 2000
 | 
				
			||||||
 | 
					@@ -1890,10 +1890,10 @@
 | 
				
			||||||
 | 
					 echo "configure:1891: checking for OpenSSL/SSLeay directory" >&5
 | 
				
			||||||
 | 
					 for ssldir in "" $tryssldir /usr /usr/local/openssl /usr/lib/openssl /usr/local/ssl /usr/lib/ssl /usr/local /usr/pkg /opt /opt/openssl ; do
 | 
				
			||||||
 | 
					 	if test ! -z "$ssldir" ; then
 | 
				
			||||||
 | 
					-		LIBS="$saved_LIBS -L$ssldir"
 | 
				
			||||||
 | 
					+		LIBS="$saved_LIBS -L$ssldir/lib"
 | 
				
			||||||
 | 
					 		CFLAGS="$CFLAGS -I$ssldir/include"
 | 
				
			||||||
 | 
					 		if test "x$need_dash_r" = "x1" ; then
 | 
				
			||||||
 | 
					-			LIBS="$LIBS -R$ssldir"
 | 
				
			||||||
 | 
					+			LIBS="$LIBS -R$ssldir/lib"
 | 
				
			||||||
 | 
					 		fi
 | 
				
			||||||
 | 
					 	fi
 | 
				
			||||||
 | 
					 	LIBS="$LIBS -lcrypto"
 | 
				
			||||||
 | 
					----- snip:end -----
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why does the OpenSSL test fail with "bc: command not found"?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					You didn't install "bc", the Unix calculator.  If you want to run the
 | 
				
			||||||
 | 
					tests, get GNU bc from ftp://ftp.gnu.org or from your OS distributor.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why does the OpenSSL test fail with "bc: 1 no implemented"?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					On some SCO installations or versions, bc has a bug that gets triggered when
 | 
				
			||||||
 | 
					you run the test suite (using "make test").  The message returned is "bc:
 | 
				
			||||||
 | 
					1 not implemented".  The best way to deal with this is to find another
 | 
				
			||||||
 | 
					implementation of bc and compile/install it.  For example, GNU bc (see
 | 
				
			||||||
 | 
					http://www.gnu.org/software/software.html for download instructions) can
 | 
				
			||||||
 | 
					be safely used.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why does the OpenSSL compilation fail on Alpha True64 Unix?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					On some Alpha installations running True64 Unix and Compaq C, the compilation
 | 
				
			||||||
 | 
					of crypto/sha/sha_dgst.c fails with the message 'Fatal:  Insufficient virtual
 | 
				
			||||||
 | 
					memory to continue compilation.'  As far as the tests have shown, this may be
 | 
				
			||||||
 | 
					a compiler bug.  What happens is that it eats up a lot of resident memory
 | 
				
			||||||
 | 
					to build something, probably a table.  The problem is clearly in the
 | 
				
			||||||
 | 
					optimization code, because if one eliminates optimization completely (-O0),
 | 
				
			||||||
 | 
					the compilation goes through (and the compiler consumes about 2MB of resident
 | 
				
			||||||
 | 
					memory instead of 240MB or whatever one's limit is currently).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					There are three options to solve this problem:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					1. set your current data segment size soft limit higher.  Experience shows
 | 
				
			||||||
 | 
					that about 241000 kbytes seems to be enough on an AlphaServer DS10.  You do
 | 
				
			||||||
 | 
					this with the command 'ulimit -Sd nnnnnn', where 'nnnnnn' is the number of
 | 
				
			||||||
 | 
					kbytes to set the limit to.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					2. If you have a hard limit that is lower than what you need and you can't
 | 
				
			||||||
 | 
					get it changed, you can compile all of OpenSSL with -O0 as optimization
 | 
				
			||||||
 | 
					level.  This is however not a very nice thing to do for those who expect to
 | 
				
			||||||
 | 
					get the best result from OpenSSL.  A bit more complicated solution is the
 | 
				
			||||||
 | 
					following:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					----- snip:start -----
 | 
				
			||||||
 | 
					  make DIRS=crypto SDIRS=sha "`grep '^CFLAG=' Makefile.ssl | \
 | 
				
			||||||
 | 
					       sed -e 's/ -O[0-9] / -O0 /'`"
 | 
				
			||||||
 | 
					  rm `ls crypto/*.o crypto/sha/*.o | grep -v 'sha_dgst\.o'`
 | 
				
			||||||
 | 
					  make
 | 
				
			||||||
 | 
					----- snip:end -----
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					This will only compile sha_dgst.c with -O0, the rest with the optimization
 | 
				
			||||||
 | 
					level chosen by the configuration process.  When the above is done, do the
 | 
				
			||||||
 | 
					test and installation and you're set.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					* Why does the OpenSSL compilation fail with "ar: command not found"?
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Getting this message is quite usual on Solaris 2, because Sun has hidden
 | 
				
			||||||
 | 
					away 'ar' and other development commands in directories that aren't in
 | 
				
			||||||
 | 
					$PATH by default.  One of those directories is '/usr/ccs/bin'.  The
 | 
				
			||||||
 | 
					quickest way to fix this is to do the following (it assumes you use sh
 | 
				
			||||||
 | 
					or any sh-compatible shell):
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					----- snip:start -----
 | 
				
			||||||
 | 
					  PATH=${PATH}:/usr/ccs/bin; export PATH
 | 
				
			||||||
 | 
					----- snip:end -----
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					and then redo the compilation.  What you should really do is make sure
 | 
				
			||||||
 | 
					'/usr/ccs/bin' is permanently in your $PATH, for example through your
 | 
				
			||||||
 | 
					'.profile' (again, assuming you use a sh-compatible shell).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
							
								
								
									
										197
									
								
								INSTALL
									
									
									
									
									
								
							
							
						
						
									
										197
									
								
								INSTALL
									
									
									
									
									
								
							@@ -2,8 +2,8 @@
 | 
				
			|||||||
 INSTALLATION ON THE UNIX PLATFORM
 | 
					 INSTALLATION ON THE UNIX PLATFORM
 | 
				
			||||||
 ---------------------------------
 | 
					 ---------------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 [See INSTALL.W32 for instructions for compiling OpenSSL on Windows systems,
 | 
					 [Installation on Windows, OpenVMS and MacOS (before MacOS X) is described
 | 
				
			||||||
  and INSTALL.VMS for installing on OpenVMS systems.]
 | 
					  in INSTALL.W32, INSTALL.VMS and INSTALL.MacOS.]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 To install OpenSSL, you will need:
 | 
					 To install OpenSSL, you will need:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -33,7 +33,8 @@
 | 
				
			|||||||
 Configuration Options
 | 
					 Configuration Options
 | 
				
			||||||
 ---------------------
 | 
					 ---------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 There are several options to ./config to customize the build:
 | 
					 There are several options to ./config (or ./Configure) to customize
 | 
				
			||||||
 | 
					 the build:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  --prefix=DIR  Install in DIR/bin, DIR/lib, DIR/include/openssl.
 | 
					  --prefix=DIR  Install in DIR/bin, DIR/lib, DIR/include/openssl.
 | 
				
			||||||
	        Configuration files used by OpenSSL will be in DIR/ssl
 | 
						        Configuration files used by OpenSSL will be in DIR/ssl
 | 
				
			||||||
@@ -52,6 +53,15 @@
 | 
				
			|||||||
                This will usually require additional system-dependent options!
 | 
					                This will usually require additional system-dependent options!
 | 
				
			||||||
                See "Note on multi-threading" below.
 | 
					                See "Note on multi-threading" below.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  no-shared     Don't try to create shared libraries.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  shared        In addition to the usual static libraries, create shared
 | 
				
			||||||
 | 
					                libraries on platforms where it's supported.  See "Note on
 | 
				
			||||||
 | 
					                shared libraries" below.  THIS IS NOT RECOMMENDED!  Since
 | 
				
			||||||
 | 
					                this is a development branch, the positions of the ENGINE
 | 
				
			||||||
 | 
					                symbols in the transfer vector are constantly moving, so
 | 
				
			||||||
 | 
					                binary backward compatibility can't be guaranteed in any way.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  no-asm        Do not use assembler code.
 | 
					  no-asm        Do not use assembler code.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  386           Use the 80386 instruction set only (the default x86 code is
 | 
					  386           Use the 80386 instruction set only (the default x86 code is
 | 
				
			||||||
@@ -77,8 +87,9 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
     This guesses at your operating system (and compiler, if necessary) and
 | 
					     This guesses at your operating system (and compiler, if necessary) and
 | 
				
			||||||
     configures OpenSSL based on this guess. Run ./config -t to see
 | 
					     configures OpenSSL based on this guess. Run ./config -t to see
 | 
				
			||||||
     if it guessed correctly. If it did not get it correct or you want to
 | 
					     if it guessed correctly. If you want to use a different compiler, you
 | 
				
			||||||
     use a different compiler then go to step 1b. Otherwise go to step 2.
 | 
					     are cross-compiling for another platform, or the ./config guess was
 | 
				
			||||||
 | 
					     wrong for other reasons, go to step 1b. Otherwise go to step 2.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
     On some systems, you can include debugging information as follows:
 | 
					     On some systems, you can include debugging information as follows:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -101,7 +112,8 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
     If your system is not available, you will have to edit the Configure
 | 
					     If your system is not available, you will have to edit the Configure
 | 
				
			||||||
     program and add the correct configuration for your system. The
 | 
					     program and add the correct configuration for your system. The
 | 
				
			||||||
     generic configurations "cc" or "gcc" should usually work.
 | 
					     generic configurations "cc" or "gcc" should usually work on 32 bit
 | 
				
			||||||
 | 
					     systems.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
     Configure creates the file Makefile.ssl from Makefile.org and
 | 
					     Configure creates the file Makefile.ssl from Makefile.org and
 | 
				
			||||||
     defines various macros in crypto/opensslconf.h (generated from
 | 
					     defines various macros in crypto/opensslconf.h (generated from
 | 
				
			||||||
@@ -115,23 +127,30 @@
 | 
				
			|||||||
     OpenSSL binary ("openssl"). The libraries will be built in the top-level
 | 
					     OpenSSL binary ("openssl"). The libraries will be built in the top-level
 | 
				
			||||||
     directory, and the binary will be in the "apps" directory.
 | 
					     directory, and the binary will be in the "apps" directory.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
     If "make" fails, please report the problem to <openssl-bugs@openssl.org>.
 | 
					     If "make" fails, look at the output.  There may be reasons for
 | 
				
			||||||
     Include the output of "./config -t" and the OpenSSL version
 | 
					     the failure that isn't a problem in OpenSSL itself (like missing
 | 
				
			||||||
     number in your message.
 | 
					     standard headers).  If it is a problem with OpenSSL itself, please
 | 
				
			||||||
 | 
					     report the problem to <openssl-bugs@openssl.org> (note that your
 | 
				
			||||||
 | 
					     message will be forwarded to a public mailing list).  Include the
 | 
				
			||||||
 | 
					     output of "make report" in your message.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
     [If you encounter assembler error messages, try the "no-asm"
 | 
					     [If you encounter assembler error messages, try the "no-asm"
 | 
				
			||||||
     configuration option as an immediate fix.  Note that on Solaris x86
 | 
					     configuration option as an immediate fix.]
 | 
				
			||||||
     (not on Sparcs!) you may have to install the GNU assembler to use
 | 
					
 | 
				
			||||||
     OpenSSL assembler code -- /usr/ccs/bin/as won't do.]
 | 
					     Compiling parts of OpenSSL with gcc and others with the system
 | 
				
			||||||
 | 
					     compiler will result in unresolved symbols on some systems.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  3. After a successful build, the libraries should be tested. Run:
 | 
					  3. After a successful build, the libraries should be tested. Run:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
       $ make test
 | 
					       $ make test
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    If a test fails, try removing any compiler optimization flags from
 | 
					     If a test fails, look at the output.  There may be reasons for
 | 
				
			||||||
    the CFLAGS line in Makefile.ssl and run "make clean; make". Please
 | 
					     the failure that isn't a problem in OpenSSL itself (like a missing
 | 
				
			||||||
    send a bug report to <openssl-bugs@openssl.org>, including the
 | 
					     or malfunctioning bc).  If it is a problem with OpenSSL itself,
 | 
				
			||||||
    output of "openssl version -a" and of the failed test.
 | 
					     try removing any compiler optimization flags from the CFLAGS line
 | 
				
			||||||
 | 
					     in Makefile.ssl and run "make clean; make". Please send a bug
 | 
				
			||||||
 | 
					     report to <openssl-bugs@openssl.org>, including the output of
 | 
				
			||||||
 | 
					     "make report".
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  4. If everything tests ok, install OpenSSL with
 | 
					  4. If everything tests ok, install OpenSSL with
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -142,11 +161,13 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
       certs           Initially empty, this is the default location
 | 
					       certs           Initially empty, this is the default location
 | 
				
			||||||
                       for certificate files.
 | 
					                       for certificate files.
 | 
				
			||||||
 | 
					       man/man1        Manual pages for the 'openssl' command line tool
 | 
				
			||||||
 | 
					       man/man3        Manual pages for the libraries (very incomplete)
 | 
				
			||||||
       misc            Various scripts.
 | 
					       misc            Various scripts.
 | 
				
			||||||
       private         Initially empty, this is the default location
 | 
					       private         Initially empty, this is the default location
 | 
				
			||||||
                       for private key files.
 | 
					                       for private key files.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
     If you didn't chose a different installation prefix, the
 | 
					     If you didn't choose a different installation prefix, the
 | 
				
			||||||
     following additional subdirectories will be created:
 | 
					     following additional subdirectories will be created:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
       bin             Contains the openssl binary and a few other 
 | 
					       bin             Contains the openssl binary and a few other 
 | 
				
			||||||
@@ -248,137 +269,13 @@
 | 
				
			|||||||
 from the Configure script.)
 | 
					 from the Configure script.)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
--------------------------------------------------------------------------------
 | 
					 Note on shared libraries
 | 
				
			||||||
The orignal Unix build instructions from SSLeay follow. 
 | 
					 ------------------------
 | 
				
			||||||
Note: some of this may be out of date and no longer applicable
 | 
					 | 
				
			||||||
--------------------------------------------------------------------------------
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
# When bringing the SSLeay distribution back from the evil intel world
 | 
					 For some systems, the OpenSSL Configure script knows what is needed to
 | 
				
			||||||
# of Windows NT, do the following to make it nice again under unix :-)
 | 
					 build shared libraries for libcrypto and libssl.  On these systems,
 | 
				
			||||||
# You don't normally need to run this.
 | 
					 the shared libraries are currently not created by default, but giving
 | 
				
			||||||
sh util/fixNT.sh	# This only works for NT now - eay - 21-Jun-1996
 | 
					 the option "shared" will get them created.  This method supports Makefile
 | 
				
			||||||
 | 
					 targets for shared library creation, like linux-shared.  Those targets
 | 
				
			||||||
# If you have perl, and it is not in /usr/local/bin, you can run
 | 
					 can currently be used on their own just as well, but this is expected
 | 
				
			||||||
perl util/perlpath.pl /new/path
 | 
					 to change in future versions of OpenSSL.
 | 
				
			||||||
# and this will fix the paths in all the scripts.  DO NOT put
 | 
					 | 
				
			||||||
# /new/path/perl, just /new/path. The build
 | 
					 | 
				
			||||||
# environment always run scripts as 'perl perlscript.pl' but some of the
 | 
					 | 
				
			||||||
# 'applications' are easier to usr with the path fixed.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# Edit crypto/cryptlib.h, tools/c_rehash, and Makefile.ssl
 | 
					 | 
				
			||||||
# to set the install locations if you don't like
 | 
					 | 
				
			||||||
# the default location of /usr/local/ssl
 | 
					 | 
				
			||||||
# Do this by running
 | 
					 | 
				
			||||||
perl util/ssldir.pl /new/ssl/home
 | 
					 | 
				
			||||||
# if you have perl, or by hand if not.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# If things have been stuffed up with the sym links, run
 | 
					 | 
				
			||||||
make -f Makefile.ssl links
 | 
					 | 
				
			||||||
# This will re-populate lib/include with symlinks and for each
 | 
					 | 
				
			||||||
# directory, link Makefile to Makefile.ssl
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# Setup the machine dependent stuff for the top level makefile
 | 
					 | 
				
			||||||
# and some select .h files
 | 
					 | 
				
			||||||
# If you don't have perl, this will bomb, in which case just edit the
 | 
					 | 
				
			||||||
# top level Makefile.ssl
 | 
					 | 
				
			||||||
./Configure 'system type'
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# The 'Configure' command contains default configuration parameters
 | 
					 | 
				
			||||||
# for lots of machines.  Configure edits 5 lines in the top level Makefile
 | 
					 | 
				
			||||||
# It modifies the following values in the following files
 | 
					 | 
				
			||||||
Makefile.ssl		CC CFLAG EX_LIBS BN_MULW
 | 
					 | 
				
			||||||
crypto/des/des.h	DES_LONG
 | 
					 | 
				
			||||||
crypto/des/des_locl.h	DES_PTR
 | 
					 | 
				
			||||||
crypto/md2/md2.h	MD2_INT
 | 
					 | 
				
			||||||
crypto/rc4/rc4.h	RC4_INT
 | 
					 | 
				
			||||||
crypto/rc4/rc4_enc.c	RC4_INDEX
 | 
					 | 
				
			||||||
crypto/rc2/rc2.h	RC2_INT
 | 
					 | 
				
			||||||
crypto/bf/bf_locl.h	BF_INT
 | 
					 | 
				
			||||||
crypto/idea/idea.h	IDEA_INT
 | 
					 | 
				
			||||||
crypto/bn/bn.h		BN_LLONG (and defines one of SIXTY_FOUR_BIT,
 | 
					 | 
				
			||||||
				  SIXTY_FOUR_BIT_LONG, THIRTY_TWO_BIT,
 | 
					 | 
				
			||||||
				  SIXTEEN_BIT or EIGHT_BIT)
 | 
					 | 
				
			||||||
Please remember that all these files are actually copies of the file with
 | 
					 | 
				
			||||||
a .org extention.  So if you change crypto/des/des.h, the next time
 | 
					 | 
				
			||||||
you run Configure, it will be runover by a 'configured' version of
 | 
					 | 
				
			||||||
crypto/des/des.org.  So to make the changer the default, change the .org
 | 
					 | 
				
			||||||
files.  The reason these files have to be edited is because most of
 | 
					 | 
				
			||||||
these modifications change the size of fundamental data types.
 | 
					 | 
				
			||||||
While in theory this stuff is optional, it often makes a big
 | 
					 | 
				
			||||||
difference in performance and when using assember, it is importaint
 | 
					 | 
				
			||||||
for the 'Bignum bits' match those required by the assember code.
 | 
					 | 
				
			||||||
A warning for people using gcc with sparc cpu's.  Gcc needs the -mv8
 | 
					 | 
				
			||||||
flag to use the hardware multiply instruction which was not present in
 | 
					 | 
				
			||||||
earlier versions of the sparc CPU.  I define it by default.  If you
 | 
					 | 
				
			||||||
have an old sparc, and it crashes, try rebuilding with this flag
 | 
					 | 
				
			||||||
removed.  I am leaving this flag on by default because it makes
 | 
					 | 
				
			||||||
things run 4 times faster :-)
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# clean out all the old stuff
 | 
					 | 
				
			||||||
make clean
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# Do a make depend only if you have the makedepend command installed
 | 
					 | 
				
			||||||
# This is not needed but it does make things nice when developing.
 | 
					 | 
				
			||||||
make depend
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# make should build everything
 | 
					 | 
				
			||||||
make
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# fix up the demo certificate hash directory if it has been stuffed up.
 | 
					 | 
				
			||||||
make rehash
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# test everything
 | 
					 | 
				
			||||||
make test
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# install the lot
 | 
					 | 
				
			||||||
make install
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# It is worth noting that all the applications are built into the one
 | 
					 | 
				
			||||||
# program, ssleay, which is then has links from the other programs
 | 
					 | 
				
			||||||
# names to it.
 | 
					 | 
				
			||||||
# The applicatons can be built by themselves, just don't define the
 | 
					 | 
				
			||||||
# 'MONOLITH' flag.  So to build the 'enc' program stand alone,
 | 
					 | 
				
			||||||
gcc -O2 -Iinclude apps/enc.c apps/apps.c libcrypto.a
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# Other useful make options are
 | 
					 | 
				
			||||||
make makefile.one
 | 
					 | 
				
			||||||
# which generate a 'makefile.one' file which will build the complete
 | 
					 | 
				
			||||||
# SSLeay distribution with temp. files in './tmp' and 'installable' files
 | 
					 | 
				
			||||||
# in './out'
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# Have a look at running
 | 
					 | 
				
			||||||
perl util/mk1mf.pl help
 | 
					 | 
				
			||||||
# this can be used to generate a single makefile and is about the only
 | 
					 | 
				
			||||||
# way to generate makefiles for windows.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
# There is actually a final way of building SSLeay.
 | 
					 | 
				
			||||||
gcc -O2 -c -Icrypto -Iinclude crypto/crypto.c
 | 
					 | 
				
			||||||
gcc -O2 -c -Issl -Iinclude ssl/ssl.c
 | 
					 | 
				
			||||||
# and you now have the 2 libraries as single object files :-).
 | 
					 | 
				
			||||||
# If you want to use the assember code for your particular platform
 | 
					 | 
				
			||||||
# (DEC alpha/x86 are the main ones, the other assember is just the
 | 
					 | 
				
			||||||
# output from gcc) you will need to link the assember with the above generated
 | 
					 | 
				
			||||||
# object file and also do the above compile as
 | 
					 | 
				
			||||||
gcc -O2 -DBN_ASM -c -Icrypto -Iinclude crypto/crypto.c
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
This last option is probably the best way to go when porting to another
 | 
					 | 
				
			||||||
platform or building shared libraries.  It is not good for development so
 | 
					 | 
				
			||||||
I don't normally use it.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
To build shared libararies under unix, have a look in shlib, basically 
 | 
					 | 
				
			||||||
you are on your own, but it is quite easy and all you have to do
 | 
					 | 
				
			||||||
is compile 2 (or 3) files.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
For mult-threading, have a read of doc/threads.doc.  Again it is quite
 | 
					 | 
				
			||||||
easy and normally only requires some extra callbacks to be defined
 | 
					 | 
				
			||||||
by the application.
 | 
					 | 
				
			||||||
The examples for solaris and windows NT/95 are in the mt directory.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
have fun
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
eric 25-Jun-1997
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
IRIX 5.x will build as a 32 bit system with mips1 assember.
 | 
					 | 
				
			||||||
IRIX 6.x will build as a 64 bit system with mips3 assember.  It conforms
 | 
					 | 
				
			||||||
to n32 standards. In theory you can compile the 64 bit assember under
 | 
					 | 
				
			||||||
IRIX 5.x but you will have to have the correct system software installed.
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										72
									
								
								INSTALL.MacOS
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										72
									
								
								INSTALL.MacOS
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,72 @@
 | 
				
			|||||||
 | 
					OpenSSL - Port To The Macintosh
 | 
				
			||||||
 | 
					===============================
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Thanks to Roy Wood <roy@centricsystems.ca> initial support for MacOS (pre
 | 
				
			||||||
 | 
					X) is now provided. "Initial" means that unlike other platforms where you
 | 
				
			||||||
 | 
					get an SDK and a "swiss army" openssl application, on Macintosh you only
 | 
				
			||||||
 | 
					get one sample application which fetches a page over HTTPS(*) and dumps it
 | 
				
			||||||
 | 
					in a window. We don't even build the test applications so that we can't
 | 
				
			||||||
 | 
					guarantee that all algorithms are operational.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Required software:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					- StuffIt Expander 5.5 or later, alternatively MacGzip and SUNtar;
 | 
				
			||||||
 | 
					- Scriptable Finder;
 | 
				
			||||||
 | 
					- CodeWarrior Pro 5;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Installation procedure:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					- fetch the source at ftp://ftp.openssl.org/ (well, you probably already
 | 
				
			||||||
 | 
					  did, huh?)
 | 
				
			||||||
 | 
					- unpack the .tar.gz file:
 | 
				
			||||||
 | 
						- if you have StuffIt Expander then just drag it over it;
 | 
				
			||||||
 | 
						- otherwise uncompress it with MacGzip and then unpack with SUNtar;
 | 
				
			||||||
 | 
					- locate MacOS folder in OpenSSL source tree and open it;
 | 
				
			||||||
 | 
					- unbinhex mklinks.as.hqx and OpenSSL.mcp.hqx if present (**), do it
 | 
				
			||||||
 | 
					  "in-place", i.e. unpacked files should end-up in the very same folder;
 | 
				
			||||||
 | 
					- execute mklinks.as;
 | 
				
			||||||
 | 
					- open OpenSSL.mcp(***) and build 'GetHTTPS PPC' target(****);
 | 
				
			||||||
 | 
					- that's it for now;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					(*)	URL is hardcoded into ./MacOS/GetHTTPS.src/GetHTTPS.cpp, lines 40
 | 
				
			||||||
 | 
					        to 42, change appropriately.
 | 
				
			||||||
 | 
					(**)	If you use SUNtar, then it might have already unbinhexed the files
 | 
				
			||||||
 | 
						in question.
 | 
				
			||||||
 | 
					(***)	The project file was saved with CW Pro 5.3. If you have earlier
 | 
				
			||||||
 | 
						version and it refuses to open it, then download
 | 
				
			||||||
 | 
						http://www.openssl.org/~appro/OpenSSL.mcp.xml and import it
 | 
				
			||||||
 | 
						overwriting the original OpenSSL.mcp.
 | 
				
			||||||
 | 
					(****)	Other targets are work in progress. If you feel like giving 'em a
 | 
				
			||||||
 | 
						shot, then you should know that OpenSSL* and Lib* targets are
 | 
				
			||||||
 | 
						supposed to be built with the GUSI, MacOS library which mimics
 | 
				
			||||||
 | 
						BSD sockets and some other POSIX APIs. The GUSI distribution is
 | 
				
			||||||
 | 
						expected to be found in the same directory as openssl source tree,
 | 
				
			||||||
 | 
						i.e. in the parent directory to the one where this very file,
 | 
				
			||||||
 | 
						namely INSTALL.MacOS. For more informations about GUSI, see
 | 
				
			||||||
 | 
						http://www.iis.ee.ethz.ch/~neeri/macintosh/gusi-qa.html
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Finally some essential comments from our generous contributor:-)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					"I've gotten OpenSSL working on the Macintosh. It's probably a bit of a
 | 
				
			||||||
 | 
					hack, but it works for what I'm doing. If you don't like the way I've done
 | 
				
			||||||
 | 
					it, then feel free to change what I've done. I freely admit that I've done
 | 
				
			||||||
 | 
					some less-than-ideal things in my port, and if you don't like the way I've
 | 
				
			||||||
 | 
					done something, then feel free to change it-- I won't be offended!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					... I've tweaked "bss_sock.c" a little to call routines in a "MacSocket"
 | 
				
			||||||
 | 
					library I wrote. My MacSocket library is a wrapper around OpenTransport,
 | 
				
			||||||
 | 
					handling stuff like endpoint creation, reading, writing, etc. It is not
 | 
				
			||||||
 | 
					designed as a high-performance package such as you'd use in a webserver,
 | 
				
			||||||
 | 
					but is fine for lots of other applications. MacSocket also uses some other
 | 
				
			||||||
 | 
					code libraries I've written to deal with string manipulations and error
 | 
				
			||||||
 | 
					handling. Feel free to use these things in your own code, but give me
 | 
				
			||||||
 | 
					credit and/or send me free stuff in appreciation! :-)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					...
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					If you have any questions, feel free to email me as the following:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					roy@centricsystems.ca
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					-Roy Wood"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
							
								
								
									
										108
									
								
								INSTALL.VMS
									
									
									
									
									
								
							
							
						
						
									
										108
									
								
								INSTALL.VMS
									
									
									
									
									
								
							@@ -8,13 +8,44 @@ Intro:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
This file is divided in the following parts:
 | 
					This file is divided in the following parts:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Checking the distribution	- Mandatory reading.
 | 
				
			||||||
  Compilation			- Mandatory reading.
 | 
					  Compilation			- Mandatory reading.
 | 
				
			||||||
 | 
					  Logical names			- Mandatory reading.
 | 
				
			||||||
  Test				- Mandatory reading.
 | 
					  Test				- Mandatory reading.
 | 
				
			||||||
  Installation			- Mandatory reading.
 | 
					  Installation			- Mandatory reading.
 | 
				
			||||||
  Backward portability		- Read if it's an issue.
 | 
					  Backward portability		- Read if it's an issue.
 | 
				
			||||||
  Possible bugs or quirks	- A few warnings on things that
 | 
					  Possible bugs or quirks	- A few warnings on things that
 | 
				
			||||||
				  may go wrong or may surprise you.
 | 
									  may go wrong or may surprise you.
 | 
				
			||||||
  Report			- How to get in touch with me.
 | 
					  TODO				- Things that are to come.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Checking the distribution:
 | 
				
			||||||
 | 
					==========================
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					There have been reports of places where the distribution didn't quite get
 | 
				
			||||||
 | 
					through, for example if you've copied the tree from a NFS-mounted unix
 | 
				
			||||||
 | 
					mount point.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The easiest way to check if everything got through as it should is to check
 | 
				
			||||||
 | 
					for oen of the following files:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						[.CRYPTO]OPENSSLCONF.H_IN
 | 
				
			||||||
 | 
						[.CRYPTO]OPENSSLCONF_H.IN
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					They should never exist both at once, but one of them should (preferably
 | 
				
			||||||
 | 
					the first variant).  If you can't find any of those two, something went
 | 
				
			||||||
 | 
					wrong.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					The best way to get a correct distribution is to download the gzipped tar
 | 
				
			||||||
 | 
					file from ftp://ftp.openssl.org/source/, use GUNZIP to uncompress it and
 | 
				
			||||||
 | 
					use VMSTAR to unpack the resulting tar file.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					GUNZIP is available in many places on the net.  One of the distribution
 | 
				
			||||||
 | 
					points is the WKU software archive, ftp://ftp.wku.edu/vms/fileserv/ .
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					VMSTAR is also available in many places on the net.  The recommended place
 | 
				
			||||||
 | 
					to find information about it is http://www.free.lp.se/vmstar/ .
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Compilation:
 | 
					Compilation:
 | 
				
			||||||
============
 | 
					============
 | 
				
			||||||
@@ -35,26 +66,33 @@ directory.  The syntax is trhe following:
 | 
				
			|||||||
<option> must be one of the following:
 | 
					<option> must be one of the following:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      ALL       Just build "everything".
 | 
					      ALL       Just build "everything".
 | 
				
			||||||
      DATE      Just build the "[.INCLUDE]DATE.H" file.
 | 
					      CONFIG    Just build the "[.CRYPTO]OPENSSLCONF.H" file.
 | 
				
			||||||
 | 
					      BUILDINF  Just build the "[.INCLUDE]BUILDINF.H" file.
 | 
				
			||||||
      SOFTLINKS Just copies some files, to simulate Unix soft links.
 | 
					      SOFTLINKS Just copies some files, to simulate Unix soft links.
 | 
				
			||||||
 | 
					      BUILDALL  Same as ALL, except CONFIG, BUILDINF and SOFTILNKS aren't done.
 | 
				
			||||||
      RSAREF    Just build the "[.xxx.EXE.RSAREF]LIBRSAGLUE.OLB" library.
 | 
					      RSAREF    Just build the "[.xxx.EXE.RSAREF]LIBRSAGLUE.OLB" library.
 | 
				
			||||||
      CRYPTO    Just build the "[.xxx.EXE.CRYPTO]LIBCRYPTO.OLB" library.
 | 
					      CRYPTO    Just build the "[.xxx.EXE.CRYPTO]LIBCRYPTO.OLB" library.
 | 
				
			||||||
      SSL       Just build the "[.xxx.EXE.SSL]LIBSSL.OLB" library.
 | 
					      SSL       Just build the "[.xxx.EXE.SSL]LIBSSL.OLB" library.
 | 
				
			||||||
      SSL_TASK  Just build the "[.xxx.EXE.SSL]SSL_TASK.EXE" program.
 | 
					      SSL_TASK  Just build the "[.xxx.EXE.SSL]SSL_TASK.EXE" program.
 | 
				
			||||||
      TEST      Just build the "test" programs for OpenSSL.
 | 
					      TEST      Just build the "[.xxx.EXE.TEST]" test programs for OpenSSL.
 | 
				
			||||||
      APPS      Just build the "application" programs for OpenSSL.
 | 
					      APPS      Just build the "[.xxx.EXE.APPS]" application programs for OpenSSL.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
<rsaref-p> must be one of the following:
 | 
					<rsaref-p> must be one of the following:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      RSAREF    compile using the RSAREF Library
 | 
					      RSAREF    compile using the RSAREF Library
 | 
				
			||||||
      NORSAREF  compile without using RSAREF
 | 
					      NORSAREF  compile without using RSAREF
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Note: The RSAREF libraries are NOT INCLUDED and you have to
 | 
					Note 0: The RASREF library IS NO LONGER NEEDED.  The RSA patent
 | 
				
			||||||
      download it from "ftp://ftp.rsa.com/rsaref".  You have to
 | 
					        expires September 20, 2000, and RSA Security chose to make
 | 
				
			||||||
      get the ".tar-Z" file as the ".zip" file dosen't have the
 | 
					        the algorithm public domain two weeks before that.
 | 
				
			||||||
      directory structure stored.  You have to extract the file
 | 
					
 | 
				
			||||||
      into the [.RSAREF] directory as that is where the scripts
 | 
					Note 1: If you still want to use RSAREF, the library is NOT INCLUDED
 | 
				
			||||||
      will look for the files.
 | 
					        and you have to download it.  RSA Security doesn't carry it
 | 
				
			||||||
 | 
					        any more, but there are a number of places where you can find
 | 
				
			||||||
 | 
					        it.  You have to get the ".tar-Z" file as the ".zip" file
 | 
				
			||||||
 | 
					        doesn't have the directory structure stored.  You have to
 | 
				
			||||||
 | 
					        extract the file into the [.RSAREF] directory as that is where
 | 
				
			||||||
 | 
					        the scripts will look for the files.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Note 2: I have never done this, so I've no idea if it works or not.
 | 
					Note 2: I have never done this, so I've no idea if it works or not.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -65,7 +103,6 @@ Note 2: I have never done this, so I've no idea if it works or not.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
<compiler> must be one of the following:
 | 
					<compiler> must be one of the following:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
      VAXC      For VAX C.
 | 
					 | 
				
			||||||
      DECC      For DEC C.
 | 
					      DECC      For DEC C.
 | 
				
			||||||
      GNUC      For GNU C.
 | 
					      GNUC      For GNU C.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -77,15 +114,33 @@ named LIBSSL.OLB, and you will find a bunch of useful programs in
 | 
				
			|||||||
just to test them.  For production use, make sure you install first, see
 | 
					just to test them.  For production use, make sure you install first, see
 | 
				
			||||||
Installation below.
 | 
					Installation below.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Note: Some programs in this package require a TCP/IP library.
 | 
					Note 1: Some programs in this package require a TCP/IP library.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Note 2: if you want to compile the crypto library only, please make sure
 | 
					Note 2: if you want to compile the crypto library only, please make sure
 | 
				
			||||||
        you have at least done a @MAKEVMS DATE and a @MAKEVMS SOFTLINKS.
 | 
					        you have at least done a @MAKEVMS CONFIG, a @MAKEVMS BUILDINF and
 | 
				
			||||||
        A lot of things will break if you don't.
 | 
					        a @MAKEVMS SOFTLINKS.  A lot of things will break if you don't.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Logical names:
 | 
				
			||||||
 | 
					==============
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					There are a few things that can't currently be given through the command
 | 
				
			||||||
 | 
					line.  Instead, logical names are used.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Currently, the logical names supported are:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      OPENSSL_NO_ASM    with value YES, the assembler parts of OpenSSL will
 | 
				
			||||||
 | 
					                        not be used.  Instead, plain C implementations are
 | 
				
			||||||
 | 
					                        used.  This is good to try if something doesn't work.
 | 
				
			||||||
 | 
					      OPENSSL_NO_'alg'  with value YES, the corresponding crypto algorithm
 | 
				
			||||||
 | 
					                        will not be implemented.  Supported algorithms to
 | 
				
			||||||
 | 
					                        do this with are: RSA, DSA, DH, MD2, MD4, MD5, RIPEMD,
 | 
				
			||||||
 | 
					                        SHA, DES, MDC2, CR2, RC4, RC5, IDEA, BF, CAST, HMAC,
 | 
				
			||||||
 | 
					                        SSL2.  So, for example, having the logical name
 | 
				
			||||||
 | 
					                        OPENSSL_NO_RSA with the value YES means that the
 | 
				
			||||||
 | 
					                        LIBCRYPTO.OLB library will not contain an RSA
 | 
				
			||||||
 | 
					                        implementation.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Note 3: Alpha users will get a number of informational messages when
 | 
					 | 
				
			||||||
        compiling the [.asm]vms.mar file in the BN (bignum) part of
 | 
					 | 
				
			||||||
        the crypto library.  These can be safely ignored.
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
Test:
 | 
					Test:
 | 
				
			||||||
=====
 | 
					=====
 | 
				
			||||||
@@ -99,6 +154,7 @@ it's an ugly hack!) and rebuild. Please send a bug report to
 | 
				
			|||||||
<openssl-bugs@openssl.org>, including the output of "openssl version -a"
 | 
					<openssl-bugs@openssl.org>, including the output of "openssl version -a"
 | 
				
			||||||
and of the failed test.
 | 
					and of the failed test.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Installation:
 | 
					Installation:
 | 
				
			||||||
=============
 | 
					=============
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -158,6 +214,7 @@ The logical names that are set up are the following:
 | 
				
			|||||||
		(the NOTE in section 4 of "Installation in Detail").
 | 
							(the NOTE in section 4 of "Installation in Detail").
 | 
				
			||||||
		You don't need to "deleting old header files"!!!
 | 
							You don't need to "deleting old header files"!!!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Backward portability:
 | 
					Backward portability:
 | 
				
			||||||
=====================
 | 
					=====================
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -175,7 +232,7 @@ dependent on the OpenVMS version or the C library version, *and* you
 | 
				
			|||||||
can use those macros to simulate older OpenVMS or C library versions,
 | 
					can use those macros to simulate older OpenVMS or C library versions,
 | 
				
			||||||
by defining the macros _VMS_V6_SOURCE, __VMS_VER and __CTRL_VER with
 | 
					by defining the macros _VMS_V6_SOURCE, __VMS_VER and __CTRL_VER with
 | 
				
			||||||
correct values.  In the compilation scripts, I've provided the possibility
 | 
					correct values.  In the compilation scripts, I've provided the possibility
 | 
				
			||||||
for the user to influense the creation of such macros, through a bunch of
 | 
					for the user to influence the creation of such macros, through a bunch of
 | 
				
			||||||
symbols, all having names starting with USER_.  Here's the list of them:
 | 
					symbols, all having names starting with USER_.  Here's the list of them:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  USER_CCFLAGS		 - Used to give additional qualifiers to the
 | 
					  USER_CCFLAGS		 - Used to give additional qualifiers to the
 | 
				
			||||||
@@ -212,19 +269,6 @@ directory by default, it may very well be that you have to give them
 | 
				
			|||||||
extra arguments.  Please experiment.
 | 
					extra arguments.  Please experiment.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Report:
 | 
					 | 
				
			||||||
=======
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
I maintain a few mailinglists for bug reports and such on software that
 | 
					 | 
				
			||||||
I develop/port/enhance/destroy.  Please look at http://www.free.lp.se/
 | 
					 | 
				
			||||||
for further info.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
-- 
 | 
					 | 
				
			||||||
Richard Levitte <richard@levitte.org>
 | 
					 | 
				
			||||||
1999-03-09
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
TODO:
 | 
					TODO:
 | 
				
			||||||
=====
 | 
					=====
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -242,4 +286,4 @@ have any ideas.
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
--
 | 
					--
 | 
				
			||||||
Richard Levitte <richard@levitte.org>
 | 
					Richard Levitte <richard@levitte.org>
 | 
				
			||||||
1999-05-24
 | 
					2000-02-27
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										319
									
								
								INSTALL.W32
									
									
									
									
									
								
							
							
						
						
									
										319
									
								
								INSTALL.W32
									
									
									
									
									
								
							@@ -4,7 +4,7 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 Heres a few comments about building OpenSSL in Windows environments. Most of
 | 
					 Heres a few comments about building OpenSSL in Windows environments. Most of
 | 
				
			||||||
 this is tested on Win32 but it may also work in Win 3.1 with some
 | 
					 this is tested on Win32 but it may also work in Win 3.1 with some
 | 
				
			||||||
 modification.  See the end of this file for Eric's original comments.
 | 
					 modification.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 You need Perl for Win32 (available from http://www.activestate.com/ActivePerl)
 | 
					 You need Perl for Win32 (available from http://www.activestate.com/ActivePerl)
 | 
				
			||||||
 and one of the following C compilers:
 | 
					 and one of the following C compilers:
 | 
				
			||||||
@@ -13,6 +13,26 @@
 | 
				
			|||||||
  * Borland C
 | 
					  * Borland C
 | 
				
			||||||
  * GNU C (Mingw32 or Cygwin32)
 | 
					  * GNU C (Mingw32 or Cygwin32)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 If you want to compile in the assembly language routines with Visual C++ then
 | 
				
			||||||
 | 
					 you will need an assembler. This is worth doing because it will result in
 | 
				
			||||||
 | 
					 faster code: for example it will typically result in a 2 times speedup in the
 | 
				
			||||||
 | 
					 RSA routines. Currently the following assemblers are supported:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  * Microsoft MASM (aka "ml")
 | 
				
			||||||
 | 
					  * Free Netwide Assembler NASM.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 MASM was at one point distributed with VC++. It is now distributed with some
 | 
				
			||||||
 | 
					 Microsoft DDKs, for example the Windows NT 4.0 DDK and the Windows 98 DDK. If
 | 
				
			||||||
 | 
					 you do not have either of these DDKs then you can just download the binaries
 | 
				
			||||||
 | 
					 for the Windows 98 DDK and extract and rename the two files XXXXXml.exe and
 | 
				
			||||||
 | 
					 XXXXXml.err, to ml.exe and ml.err and install somewhere on your PATH. Both
 | 
				
			||||||
 | 
					 DDKs can be downloaded from the Microsoft developers site www.msdn.com.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 NASM is freely available. Version 0.98 was used during testing: other versions
 | 
				
			||||||
 | 
					 may also work. It is available from many places, see for example:
 | 
				
			||||||
 | 
					 http://www.kernel.org/pub/software/devel/nasm/binaries/win32/
 | 
				
			||||||
 | 
					 The NASM binary nasmw.exe needs to be installed anywhere on your PATH.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 If you are compiling from a tarball or a CVS snapshot then the Win32 files
 | 
					 If you are compiling from a tarball or a CVS snapshot then the Win32 files
 | 
				
			||||||
 may well be not up to date. This may mean that some "tweaking" is required to
 | 
					 may well be not up to date. This may mean that some "tweaking" is required to
 | 
				
			||||||
 get it all to work. See the trouble shooting section later on for if (when?)
 | 
					 get it all to work. See the trouble shooting section later on for if (when?)
 | 
				
			||||||
@@ -21,13 +41,27 @@
 | 
				
			|||||||
 Visual C++
 | 
					 Visual C++
 | 
				
			||||||
 ----------
 | 
					 ----------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Firstly you should run Configure and build the Win32 Makefiles:
 | 
					 Firstly you should run Configure:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 > perl Configure VC-WIN32
 | 
					 > perl Configure VC-WIN32
 | 
				
			||||||
 > ms\do_ms
 | 
					
 | 
				
			||||||
 | 
					 Next you need to build the Makefiles and optionally the assembly language
 | 
				
			||||||
 | 
					 files:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 - If you are using MASM then run:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   > ms\do_masm
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 - If you are using NASM then run:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   > ms\do_nasm
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 - If you don't want to use the assembly language files at all then run:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					   > ms\do_ms
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 If you get errors about things not having numbers assigned then check the
 | 
					 If you get errors about things not having numbers assigned then check the
 | 
				
			||||||
 troubleshooting section: you probably wont be able to compile it as it
 | 
					 troubleshooting section: you probably won't be able to compile it as it
 | 
				
			||||||
 stands.
 | 
					 stands.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Then from the VC++ environment at a prompt do:
 | 
					 Then from the VC++ environment at a prompt do:
 | 
				
			||||||
@@ -42,10 +76,10 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 Tweaks:
 | 
					 Tweaks:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 There are various changes you can make to the Win32 compile environment. If
 | 
					 There are various changes you can make to the Win32 compile environment. By
 | 
				
			||||||
 you have the MASM assembler 'ml' then you can try the assembly language code.
 | 
					 default the library is not compiled with debugging symbols. If you add 'debug'
 | 
				
			||||||
 To do this remove the 'no-asm' part from do_ms.bat. You can also add 'debug'
 | 
					 to the mk1mk.pl lines in the do_* batch file then debugging symbols will be
 | 
				
			||||||
 here to make a debugging version of the library.
 | 
					 compiled in.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 The default Win32 environment is to leave out any Windows NT specific
 | 
					 The default Win32 environment is to leave out any Windows NT specific
 | 
				
			||||||
 features.
 | 
					 features.
 | 
				
			||||||
@@ -74,18 +108,20 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 * Compiler installation:
 | 
					 * Compiler installation:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
   Mingw32 is available from <ftp://ftp.xraylith.wisc.edu/pub/khan/gnu-win32/
 | 
					   Mingw32 is available from <ftp://ftp.xraylith.wisc.edu/pub/khan/
 | 
				
			||||||
   mingw32/egcs-1.1.2/egcs-1.1.2-mingw32.zip>. GNU make is at
 | 
					   gnu-win32/mingw32/gcc-2.95.2/gcc-2.95.2-msvcrt.exe>. GNU make is at
 | 
				
			||||||
   <ftp://agnes.dida.physik.uni-essen.de/home/janjaap/mingw32/binaries/
 | 
					   <ftp://agnes.dida.physik.uni-essen.de/home/janjaap/mingw32/binaries/
 | 
				
			||||||
   make-3.76.1.zip>. Install both of them in C:\egcs-1.1.2 and run
 | 
					   make-3.76.1.zip>. Install both of them in C:\egcs-1.1.2 and run
 | 
				
			||||||
   C:\egcs-1.1.2\mingw32.bat to set the PATH.
 | 
					   C:\egcs-1.1.2\mingw32.bat to set the PATH.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 * Compile OpenSSL:
 | 
					 * Compile OpenSSL:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
   > perl Configure Mingw32
 | 
					   > ms\mingw32
 | 
				
			||||||
   > ms\mw.bat
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
   This will create the library and binaries in out.
 | 
					   This will create the library and binaries in out. In case any problems
 | 
				
			||||||
 | 
					   occur, try
 | 
				
			||||||
 | 
					   > ms\mingw32 no-asm
 | 
				
			||||||
 | 
					   instead.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
   libcrypto.a and libssl.a are the static libraries. To use the DLLs,
 | 
					   libcrypto.a and libssl.a are the static libraries. To use the DLLs,
 | 
				
			||||||
   link with libeay32.a and libssl32.a instead.
 | 
					   link with libeay32.a and libssl32.a instead.
 | 
				
			||||||
@@ -98,6 +134,81 @@
 | 
				
			|||||||
   > cd out
 | 
					   > cd out
 | 
				
			||||||
   > ..\ms\test
 | 
					   > ..\ms\test
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 GNU C (CygWin32)
 | 
				
			||||||
 | 
					 ---------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 CygWin32 provides a bash shell and GNU tools environment running on
 | 
				
			||||||
 | 
					 NT 4.0, Windows 9x and Windows 2000. Consequently, a make of OpenSSL
 | 
				
			||||||
 | 
					 with CygWin is closer to a GNU bash environment such as Linux rather
 | 
				
			||||||
 | 
					 than other W32 makes that are based on a single makefile approach.
 | 
				
			||||||
 | 
					 CygWin32 implements Posix/Unix calls through cygwin1.dll, and is
 | 
				
			||||||
 | 
					 contrasted to Mingw32 which links dynamically to msvcrt.dll or
 | 
				
			||||||
 | 
					 crtdll.dll.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 To build OpenSSL using CygWin32:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 * Install CygWin32 (see http://sourceware.cygnus.com/cygwin)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 * Install Perl and ensure it is in the path
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 * Run the CygWin bash shell
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 * $ tar zxvf openssl-x.x.x.tar.gz
 | 
				
			||||||
 | 
					   $ cd openssl-x.x.x
 | 
				
			||||||
 | 
					   $ ./Configure no-threads CygWin32
 | 
				
			||||||
 | 
					   [...]
 | 
				
			||||||
 | 
					   $ make
 | 
				
			||||||
 | 
					   [...]
 | 
				
			||||||
 | 
					   $ make test
 | 
				
			||||||
 | 
					   $ make install
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 This will create a default install in /usr/local/ssl.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 CygWin32 Notes:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 "make test" and normal file operations may fail in directories
 | 
				
			||||||
 | 
					 mounted as text (i.e. mount -t c:\somewhere /home) due to CygWin
 | 
				
			||||||
 | 
					 stripping of carriage returns. To avoid this ensure that a binary
 | 
				
			||||||
 | 
					 mount is used, e.g. mount -b c:\somewhere /home.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 As of version 1.1.1 CygWin32 is relatively unstable in its handling
 | 
				
			||||||
 | 
					 of cr/lf issues. These make procedures succeeded with versions 1.1 and
 | 
				
			||||||
 | 
					 the snapshot 20000524 (Slow!).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 "bc" is not provided in the CygWin32 distribution.  This causes a
 | 
				
			||||||
 | 
					 non-fatal error in "make test" but is otherwise harmless.  If
 | 
				
			||||||
 | 
					 desired, GNU bc can be built with CygWin32 without change.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Installation
 | 
				
			||||||
 | 
					 ------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 There's currently no real installation procedure for Win32.  There are,
 | 
				
			||||||
 | 
					 however, some suggestions:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    - do nothing.  The include files are found in the inc32/ subdirectory,
 | 
				
			||||||
 | 
					      all binaries are found in out32dll/ or out32/ depending if you built
 | 
				
			||||||
 | 
					      dynamic or static libraries.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    - do as is written in INSTALL.Win32 that comes with modssl:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						$ md c:\openssl 
 | 
				
			||||||
 | 
						$ md c:\openssl\bin
 | 
				
			||||||
 | 
						$ md c:\openssl\lib
 | 
				
			||||||
 | 
						$ md c:\openssl\include
 | 
				
			||||||
 | 
						$ md c:\openssl\include\openssl
 | 
				
			||||||
 | 
						$ copy /b inc32\*               c:\openssl\include\openssl
 | 
				
			||||||
 | 
						$ copy /b out32dll\ssleay32.lib c:\openssl\lib
 | 
				
			||||||
 | 
						$ copy /b out32dll\libeay32.lib c:\openssl\lib
 | 
				
			||||||
 | 
						$ copy /b out32dll\ssleay32.dll c:\openssl\bin
 | 
				
			||||||
 | 
						$ copy /b out32dll\libeay32.dll c:\openssl\bin
 | 
				
			||||||
 | 
						$ copy /b out32dll\openssl.exe  c:\openssl\bin
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      Of course, you can choose another device than c:.  C: is used here
 | 
				
			||||||
 | 
					      because that's usually the first (and often only) harddisk device.
 | 
				
			||||||
 | 
					      Note: in the modssl INSTALL.Win32, p: is used rather than c:.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Troubleshooting
 | 
					 Troubleshooting
 | 
				
			||||||
 ---------------
 | 
					 ---------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -108,17 +219,21 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 > perl util\mkdef.pl crypto ssl update
 | 
					 > perl util\mkdef.pl crypto ssl update
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 then ms\do_ms should not give a warning any more. However the numbers that
 | 
					 then ms\do_XXX should not give a warning any more. However the numbers that
 | 
				
			||||||
 get assigned by this technique may not match those that eventually get
 | 
					 get assigned by this technique may not match those that eventually get
 | 
				
			||||||
 assigned in the CVS tree: so anything linked against this version of the
 | 
					 assigned in the CVS tree: so anything linked against this version of the
 | 
				
			||||||
 library may need to be recompiled.
 | 
					 library may need to be recompiled.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 If you get errors about unresolved externals then this means that either you
 | 
					 If you get errors about unresolved symbols there are several possible
 | 
				
			||||||
 didn't read the note above about functions not having numbers assigned or
 | 
					 causes.
 | 
				
			||||||
 someone forgot to add a function to the header file.
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
 In this latter case check out the header file to see if the function is
 | 
					 If this happens when the DLL is being linked and you have disabled some
 | 
				
			||||||
 defined in the header file.
 | 
					 ciphers then it is possible the DEF file generator hasn't removed all
 | 
				
			||||||
 | 
					 the disabled symbols: the easiest solution is to edit the DEF files manually
 | 
				
			||||||
 | 
					 to delete them. The DEF files are ms\libeay32.def ms\ssleay32.def.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Another cause is if you missed or ignored the errors about missing numbers
 | 
				
			||||||
 | 
					 mentioned above.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 If you get warnings in the code then the compilation will halt.
 | 
					 If you get warnings in the code then the compilation will halt.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -133,159 +248,13 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 One final comment about compiling applications linked to the OpenSSL library.
 | 
					 One final comment about compiling applications linked to the OpenSSL library.
 | 
				
			||||||
 If you don't use the multithreaded DLL runtime library (/MD option) your
 | 
					 If you don't use the multithreaded DLL runtime library (/MD option) your
 | 
				
			||||||
 program will almost certainly crash: see the original SSLeay description
 | 
					 program will almost certainly crash because malloc gets confused -- the
 | 
				
			||||||
 below for more details.
 | 
					 OpenSSL DLLs are statically linked to one version, the application must
 | 
				
			||||||
 | 
					 not use a different one.  You might be able to work around such problems
 | 
				
			||||||
--------------------------------------------------------------------------------
 | 
					 by adding CRYPTO_malloc_init() to your program before any calls to the
 | 
				
			||||||
The orignal Windows build instructions from SSLeay follow. 
 | 
					 OpenSSL libraries: This tells the OpenSSL libraries to use the same
 | 
				
			||||||
Note: some of this may be out of date and no longer applicable. In particular
 | 
					 malloc(), free() and realloc() as the application.  However there are many
 | 
				
			||||||
the Crypto_malloc_init() comment appears to be wrong: you always need to use
 | 
					 standard library functions used by OpenSSL that call malloc() internally
 | 
				
			||||||
the same runtime library as the DLL itself.
 | 
					 (e.g. fopen()), and OpenSSL cannot change these; so in general you cannot
 | 
				
			||||||
--------------------------------------------------------------------------------
 | 
					 rely on CYRPTO_malloc_init() solving your problem, and you should
 | 
				
			||||||
 | 
					 consistently use the multithreaded library.
 | 
				
			||||||
The Microsoft World.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
The good news, to build SSLeay for the Microsft World
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
Windows 3.1 DLL's
 | 
					 | 
				
			||||||
perl Configure VC-WIN16
 | 
					 | 
				
			||||||
nmake -f ms\w31dll.mak
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
Windows NT/95 DLL's
 | 
					 | 
				
			||||||
perl Configure VC-WIN32
 | 
					 | 
				
			||||||
nmake -f ms\ntdll.mak
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
Now the bad news
 | 
					 | 
				
			||||||
All builds were done using Microsofts Visual C++ 1.52c and [45].x.
 | 
					 | 
				
			||||||
If you are a borland person, you are probably going to have to help me
 | 
					 | 
				
			||||||
finish the stuff in util/pl/BC*pl
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
All builds were made under Windows NT - this means long filenames, so
 | 
					 | 
				
			||||||
you may have problems under Windows 3.1 but probably not under 95.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
Because file pointers don't work in DLL's under Windows 3.1 (well at
 | 
					 | 
				
			||||||
least stdin/stdout don't and I don't like having to differentiate
 | 
					 | 
				
			||||||
between these and other file pointers), I now use the BIO file-pointer
 | 
					 | 
				
			||||||
module, which needs to be linked into your application.  You can either
 | 
					 | 
				
			||||||
use the memory buffer BIO for IO, or compile bss_file.c into your
 | 
					 | 
				
			||||||
application, it is in the apps directory and is just a copy of
 | 
					 | 
				
			||||||
crypto/buffer/bss_file.c with #define APPS_WIN16 added.
 | 
					 | 
				
			||||||
I have not yet automated the makefile to automatically copy it into 'out'
 | 
					 | 
				
			||||||
for a win 3.1 build....
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
All callbacks passed into SSLeay for Windows 3.1 need to be of type
 | 
					 | 
				
			||||||
_far _loadds.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
I don't support building with the pascal calling convention.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
The DLL and static builds are large memory model.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
To build static libraries for NT/95 or win 3.1
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
perl util/mk1mf.pl VC-WIN32 > mf-stat.nt
 | 
					 | 
				
			||||||
perl util/mk1mf.pl VC-WIN16 > mf-stat.w31
 | 
					 | 
				
			||||||
for DLL's
 | 
					 | 
				
			||||||
perl util/mk1mf.pl dll VC-WIN32	> mf-dll.nt
 | 
					 | 
				
			||||||
perl util/mk1mf.pl dll VC-WIN16 > mf-dll.w31
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
Again you will notice that if you dont have perl, you cannot do this.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
Now the next importaint issue.  Running Configure!
 | 
					 | 
				
			||||||
I have small assember code files for critical big number library operation
 | 
					 | 
				
			||||||
in crypto/bn/asm.  There is, asm code, object files and uuencode
 | 
					 | 
				
			||||||
object files.  They are
 | 
					 | 
				
			||||||
x86nt32.asm	- 32bit flat memory model assember - suitable Win32
 | 
					 | 
				
			||||||
x86w16.asm	- 16bit assember - used in the msdos build.
 | 
					 | 
				
			||||||
x86w32.asm	- 32bit assember, win 3.1 segments, used for win16 build.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
If you feel compelled to build the 16bit maths routines in the windows 3.1
 | 
					 | 
				
			||||||
build,
 | 
					 | 
				
			||||||
perl Configure VC-W31-16
 | 
					 | 
				
			||||||
perl util/mk1mf.pl dll VC-W31-16 > mf-dll.w31
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
If you hate assember and don't want anything to do with it,
 | 
					 | 
				
			||||||
perl util/mk1mf.pl no-asm VC-WIN16 > mf-dll.w31
 | 
					 | 
				
			||||||
will work for any of the makefile generations.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
There are more options to mk1mf.pl but these all leave the temporary
 | 
					 | 
				
			||||||
files in 'tmp' and the output files in 'out' by default.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
The NT build is done for console mode.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
The Windows 3.1 version of SSLeay uses quickwin, the interface is ugly
 | 
					 | 
				
			||||||
but it is better than nothing.  If you want ugly, try doing anything
 | 
					 | 
				
			||||||
that involves getting a password.  I decided to be ugly instead of
 | 
					 | 
				
			||||||
echoing characters.  For Windows 3.1 I would just sugest using the
 | 
					 | 
				
			||||||
msdos version of the ssleay application for command line work.
 | 
					 | 
				
			||||||
The QuickWin build is primarily for testing.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
For both NT and Windows 3.1, I have not written the code so that
 | 
					 | 
				
			||||||
s_client, s_server can take input from the keyboard.  You can happily
 | 
					 | 
				
			||||||
start applications up in separate windows, watch them handshake, and then sit
 | 
					 | 
				
			||||||
there for-ever.  I have not had the time to get this working, and I've
 | 
					 | 
				
			||||||
been able to test things from a unix box to the NT box :-).
 | 
					 | 
				
			||||||
Try running ssleay s_server on the windows box
 | 
					 | 
				
			||||||
(with either -cert ../apps/server.pem -www)
 | 
					 | 
				
			||||||
and run ssleay s_time from another window.
 | 
					 | 
				
			||||||
This often stuffs up on Windows 3.1, but I'm not worried since this is
 | 
					 | 
				
			||||||
probably a problem with my demo applications, not the libraries.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
After a build of one of the version of microsoft SSLeay,
 | 
					 | 
				
			||||||
'cd ms' and then run 'test'.  This should check everything out and
 | 
					 | 
				
			||||||
even does a trial run of generating certificates.
 | 
					 | 
				
			||||||
'test.bat' requires that perl be install, you be in the ms directory
 | 
					 | 
				
			||||||
(not the test directory, thats for unix so stay out :-) and that the
 | 
					 | 
				
			||||||
build output directory be ../out 
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
On a last note, you will probably get division by zero errors and
 | 
					 | 
				
			||||||
stuff after a build.  This is due to your own inability to follow
 | 
					 | 
				
			||||||
instructions :-).
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
The reasons for the problem is probably one of the following.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
1)	You did not run Configure.  This is critical for windows 3.1 when
 | 
					 | 
				
			||||||
	using assember.  The values in crypto/bn/bn.h must match the
 | 
					 | 
				
			||||||
	ones requred for the assember code.  (remember that if you
 | 
					 | 
				
			||||||
	edit crypto/bn/bn.h by hand, it will be clobered the next time
 | 
					 | 
				
			||||||
	you run Configure by the contents of crypto/bn/bn.org).
 | 
					 | 
				
			||||||
	SSLeay version -o will list the compile options.
 | 
					 | 
				
			||||||
	For VC-WIN32 you need bn(64,32) or bn(32,32)
 | 
					 | 
				
			||||||
	For VC-W31-32/VC-WIN16 you need bn(32,32)
 | 
					 | 
				
			||||||
	For VC-W31-16 you need bn(32,16) or bn(16,16)
 | 
					 | 
				
			||||||
	For VC-MSDOS you need bn(32,16) or bn(16,16).
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	The first number will be 2 times bigger than the second if
 | 
					 | 
				
			||||||
	BN_LLONG is defined in bn.h and the size of the second number
 | 
					 | 
				
			||||||
	depends on the 'bits' defined at the start of bn.h.  Have a
 | 
					 | 
				
			||||||
	look, it's all reasonably clear.
 | 
					 | 
				
			||||||
	If you want to start messing with 8 bit builds and things like
 | 
					 | 
				
			||||||
	that, build without the assember by re-generating a makefile
 | 
					 | 
				
			||||||
	via 'perl util/mk1mf.pl no-asm'.
 | 
					 | 
				
			||||||
2)	You tried to build under MS-DOS or Windows 3.1 using the /G3
 | 
					 | 
				
			||||||
	option.  Don't.  It is buggy (thats why you just got that
 | 
					 | 
				
			||||||
	error) and unless you want to work out which optimising flag
 | 
					 | 
				
			||||||
	to turn off, I'm not going to help you :-).  I also noticed
 | 
					 | 
				
			||||||
	that code often ran slower when compiled with /G3.
 | 
					 | 
				
			||||||
3)	Under NT/95, malloc goes stupid.  You are probably linking with
 | 
					 | 
				
			||||||
	the wrong library, there are problems if you mix the threaded
 | 
					 | 
				
			||||||
	and non-threaded libraries (due to the DLL being staticly
 | 
					 | 
				
			||||||
	linked with one and the applicaion using another.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
Well hopefully thats most of the MS issues handled, see you in ssl-users :-).
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
eric 30-Aug-1996
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
SSLeay 0.6.5
 | 
					 | 
				
			||||||
For Windows 95/NT, add CRYPTO_malloc_init() to your program before any
 | 
					 | 
				
			||||||
calls to the SSLeay libraries.  This function will insert callbacks so that
 | 
					 | 
				
			||||||
the SSLeay libraries will use the same malloc(), free() and realloc() as
 | 
					 | 
				
			||||||
your application so 'problem 3)' mentioned above will go away.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
There is now DES assember for Windows NT/95.  The file is
 | 
					 | 
				
			||||||
crypto/des/asm/win32.asm and replaces crypto/des/des_enc.c in the build.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
There is also Blowfish assember for Windows NT/95.  The file is
 | 
					 | 
				
			||||||
crypto/bf/asm/win32.asm and replaces crypto/bf/bf_enc.c in the build.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
eric 25-Jun-1997
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										2
									
								
								LICENSE
									
									
									
									
									
								
							
							
						
						
									
										2
									
								
								LICENSE
									
									
									
									
									
								
							@@ -12,7 +12,7 @@
 | 
				
			|||||||
  ---------------
 | 
					  ---------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* ====================================================================
 | 
					/* ====================================================================
 | 
				
			||||||
 * Copyright (c) 1998-1999 The OpenSSL Project.  All rights reserved.
 | 
					 * Copyright (c) 1998-2001 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * Redistribution and use in source and binary forms, with or without
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 * modification, are permitted provided that the following conditions
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										62
									
								
								MacOS/GUSI_Init.cpp
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										62
									
								
								MacOS/GUSI_Init.cpp
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,62 @@
 | 
				
			|||||||
 | 
					/**************** BEGIN GUSI CONFIGURATION ****************************
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * GUSI Configuration section generated by GUSI Configurator
 | 
				
			||||||
 | 
					 * last modified: Wed Jan  5 20:33:51 2000
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This section will be overwritten by the next run of Configurator.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define GUSI_SOURCE
 | 
				
			||||||
 | 
					#include <GUSIConfig.h>
 | 
				
			||||||
 | 
					#include <sys/cdefs.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Declarations of Socket Factories */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					__BEGIN_DECLS
 | 
				
			||||||
 | 
					void GUSIwithInetSockets();
 | 
				
			||||||
 | 
					void GUSIwithLocalSockets();
 | 
				
			||||||
 | 
					void GUSIwithMTInetSockets();
 | 
				
			||||||
 | 
					void GUSIwithMTTcpSockets();
 | 
				
			||||||
 | 
					void GUSIwithMTUdpSockets();
 | 
				
			||||||
 | 
					void GUSIwithOTInetSockets();
 | 
				
			||||||
 | 
					void GUSIwithOTTcpSockets();
 | 
				
			||||||
 | 
					void GUSIwithOTUdpSockets();
 | 
				
			||||||
 | 
					void GUSIwithPPCSockets();
 | 
				
			||||||
 | 
					void GUSISetupFactories();
 | 
				
			||||||
 | 
					__END_DECLS
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Configure Socket Factories */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void GUSISetupFactories()
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					#ifdef GUSISetupFactories_BeginHook
 | 
				
			||||||
 | 
						GUSISetupFactories_BeginHook
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						GUSIwithInetSockets();
 | 
				
			||||||
 | 
					#ifdef GUSISetupFactories_EndHook
 | 
				
			||||||
 | 
						GUSISetupFactories_EndHook
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Declarations of File Devices */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					__BEGIN_DECLS
 | 
				
			||||||
 | 
					void GUSIwithDConSockets();
 | 
				
			||||||
 | 
					void GUSIwithNullSockets();
 | 
				
			||||||
 | 
					void GUSISetupDevices();
 | 
				
			||||||
 | 
					__END_DECLS
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Configure File Devices */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void GUSISetupDevices()
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					#ifdef GUSISetupDevices_BeginHook
 | 
				
			||||||
 | 
						GUSISetupDevices_BeginHook
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						GUSIwithNullSockets();
 | 
				
			||||||
 | 
					#ifdef GUSISetupDevices_EndHook
 | 
				
			||||||
 | 
						GUSISetupDevices_EndHook
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**************** END GUSI CONFIGURATION *************************/
 | 
				
			||||||
							
								
								
									
										2753
									
								
								MacOS/GetHTTPS.src/CPStringUtils.cpp
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										2753
									
								
								MacOS/GetHTTPS.src/CPStringUtils.cpp
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										104
									
								
								MacOS/GetHTTPS.src/CPStringUtils.hpp
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										104
									
								
								MacOS/GetHTTPS.src/CPStringUtils.hpp
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,104 @@
 | 
				
			|||||||
 | 
					#pragma once
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __cplusplus
 | 
				
			||||||
 | 
					extern "C" {
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CopyPStrToCStr(const unsigned char *thePStr,char *theCStr,const int maxCStrLength);
 | 
				
			||||||
 | 
					void CopyPStrToPStr(const unsigned char *theSrcPStr,unsigned char *theDstPStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					void CopyCStrToCStr(const char *theSrcCStr,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					void CopyCStrToPStr(const char *theSrcCStr,unsigned char *theDstPStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					void ConcatPStrToCStr(const unsigned char *thePStr,char *theCStr,const int maxCStrLength);
 | 
				
			||||||
 | 
					void ConcatPStrToPStr(const unsigned char *theSrcPStr,unsigned char *theDstPStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					void ConcatCStrToPStr(const char *theSrcCStr,unsigned char *theDstPStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					void ConcatCStrToCStr(const char *theSrcCStr,char *theDstCStr,const int maxCStrLength);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void ConcatCharToCStr(const char theChar,char *theDstCStr,const int maxCStrLength);
 | 
				
			||||||
 | 
					void ConcatCharToPStr(const char theChar,unsigned char *theDstPStr,const int maxPStrLength);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int ComparePStrs(const unsigned char *theFirstPStr,const unsigned char *theSecondPStr,const Boolean ignoreCase = true);
 | 
				
			||||||
 | 
					int CompareCStrs(const char *theFirstCStr,const char *theSecondCStr,const Boolean ignoreCase = true);
 | 
				
			||||||
 | 
					int CompareCStrToPStr(const char *theCStr,const unsigned char *thePStr,const Boolean ignoreCase = true);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Boolean CStrsAreEqual(const char *theFirstCStr,const char *theSecondCStr,const Boolean ignoreCase = true);
 | 
				
			||||||
 | 
					Boolean PStrsAreEqual(const unsigned char *theFirstCStr,const unsigned char *theSecondCStr,const Boolean ignoreCase = true);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CopyLongIntToCStr(const long theNum,char *theCStr,const int maxCStrLength,const int numDigits = -1);
 | 
				
			||||||
 | 
					void CopyUnsignedLongIntToCStr(const unsigned long theNum,char *theCStr,const int maxCStrLength);
 | 
				
			||||||
 | 
					void ConcatLongIntToCStr(const long theNum,char *theCStr,const int maxCStrLength,const int numDigits = -1);
 | 
				
			||||||
 | 
					void CopyCStrAndConcatLongIntToCStr(const char *theSrcCStr,const long theNum,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CopyLongIntToPStr(const long theNum,unsigned char *thePStr,const int maxPStrLength,const int numDigits = -1);
 | 
				
			||||||
 | 
					void ConcatLongIntToPStr(const long theNum,unsigned char *thePStr,const int maxPStrLength,const int numDigits = -1);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					long CStrLength(const char *theCString);
 | 
				
			||||||
 | 
					long PStrLength(const unsigned char *thePString);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr CopyCStrToExistingHandle(const char *theCString,Handle theHandle);
 | 
				
			||||||
 | 
					OSErr CopyLongIntToExistingHandle(const long inTheLongInt,Handle theHandle);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr CopyCStrToNewHandle(const char *theCString,Handle *theHandle);
 | 
				
			||||||
 | 
					OSErr CopyPStrToNewHandle(const unsigned char *thePString,Handle *theHandle);
 | 
				
			||||||
 | 
					OSErr CopyLongIntToNewHandle(const long inTheLongInt,Handle *theHandle);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr AppendCStrToHandle(const char *theCString,Handle theHandle,long *currentLength = nil,long *maxLength = nil);
 | 
				
			||||||
 | 
					OSErr AppendCharsToHandle(const char *theChars,const int numChars,Handle theHandle,long *currentLength = nil,long *maxLength = nil);
 | 
				
			||||||
 | 
					OSErr AppendPStrToHandle(const unsigned char *thePString,Handle theHandle,long *currentLength = nil);
 | 
				
			||||||
 | 
					OSErr AppendLongIntToHandle(const long inTheLongInt,Handle theHandle,long *currentLength = nil);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void ZeroMem(void *theMemPtr,const unsigned long numBytes);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					char *FindCharInCStr(const char theChar,const char *theCString);
 | 
				
			||||||
 | 
					long FindCharOffsetInCStr(const char theChar,const char *theCString,const Boolean inIgnoreCase = false);
 | 
				
			||||||
 | 
					long FindCStrOffsetInCStr(const char *theCSubstring,const char *theCString,const Boolean inIgnoreCase = false);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CopyCSubstrToCStr(const char *theSrcCStr,const int maxCharsToCopy,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					void CopyCSubstrToPStr(const char *theSrcCStr,const int maxCharsToCopy,unsigned char *theDstPStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void InsertCStrIntoCStr(const char *theSrcCStr,const int theInsertionOffset,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					void InsertPStrIntoCStr(const unsigned char *theSrcPStr,const int theInsertionOffset,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					OSErr InsertCStrIntoHandle(const char *theCString,Handle theHandle,const long inInsertOffset);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CopyCStrAndInsertCStrIntoCStr(const char *theSrcCStr,const char *theInsertCStr,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CopyCStrAndInsertCStrsLongIntsIntoCStr(const char *theSrcCStr,const char **theInsertCStrs,const long *theLongInts,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CopyCStrAndInsert1LongIntIntoCStr(const char *theSrcCStr,const long theNum,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					void CopyCStrAndInsert2LongIntsIntoCStr(const char *theSrcCStr,const long long1,const long long2,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					void CopyCStrAndInsert3LongIntsIntoCStr(const char *theSrcCStr,const long long1,const long long2,const long long3,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CopyCStrAndInsertCStrLongIntIntoCStr(const char *theSrcCStr,const char *theInsertCStr,const long theNum,char *theDstCStr,const int maxDstStrLength);
 | 
				
			||||||
 | 
					OSErr CopyCStrAndInsertCStrLongIntIntoHandle(const char *theSrcCStr,const char *theInsertCStr,const long theNum,Handle *theHandle);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr CopyIndexedWordToCStr(char *theSrcCStr,int whichWord,char *theDstCStr,int maxDstCStrLength);
 | 
				
			||||||
 | 
					OSErr CopyIndexedWordToNewHandle(char *theSrcCStr,int whichWord,Handle *outTheHandle);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr CopyIndexedLineToCStr(const char *theSrcCStr,int inWhichLine,int *lineEndIndex,Boolean *gotLastLine,char *theDstCStr,const int maxDstCStrLength);
 | 
				
			||||||
 | 
					OSErr CopyIndexedLineToNewHandle(const char *theSrcCStr,int inWhichLine,Handle *outNewHandle);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr ExtractIntFromCStr(const char *theSrcCStr,int *outInt,Boolean skipLeadingSpaces = true);
 | 
				
			||||||
 | 
					OSErr ExtractIntFromPStr(const unsigned char *theSrcPStr,int *outInt,Boolean skipLeadingSpaces = true);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void ConvertCStrToUpperCase(char *theSrcCStr);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int CountOccurencesOfCharInCStr(const char inChar,const char *inSrcCStr);
 | 
				
			||||||
 | 
					int CountWordsInCStr(const char *inSrcCStr);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr CountDigits(const char *inCStr,int *outNumIntegerDigits,int *outNumFractDigits);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void ExtractCStrItemFromCStr(const char *inSrcCStr,const char inItemDelimiter,const int inItemNumber,Boolean *foundItem,char *outDstCharPtr,const int inDstCharPtrMaxLength,const Boolean inTreatMultipleDelimsAsSingleDelim = false);
 | 
				
			||||||
 | 
					OSErr ExtractCStrItemFromCStrIntoNewHandle(const char *inSrcCStr,const char inItemDelimiter,const int inItemNumber,Boolean *foundItem,Handle *outNewHandle,const Boolean inTreatMultipleDelimsAsSingleDelim = false);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr ExtractFloatFromCStr(const char *inCString,extended80 *outFloat);
 | 
				
			||||||
 | 
					OSErr CopyFloatToCStr(const extended80 *theFloat,char *theCStr,const int maxCStrLength,const int inMaxNumIntDigits = -1,const int inMaxNumFractDigits = -1);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void SkipWhiteSpace(char **ioSrcCharPtr,const Boolean inStopAtEOL = false);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __cplusplus
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
							
								
								
									
										170
									
								
								MacOS/GetHTTPS.src/ErrorHandling.cpp
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										170
									
								
								MacOS/GetHTTPS.src/ErrorHandling.cpp
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,170 @@
 | 
				
			|||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright (c) 1998-1999 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer. 
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in
 | 
				
			||||||
 | 
					 *    the documentation and/or other materials provided with the
 | 
				
			||||||
 | 
					 *    distribution.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this
 | 
				
			||||||
 | 
					 *    software must display the following acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
				
			||||||
 | 
					 *    endorse or promote products derived from this software without
 | 
				
			||||||
 | 
					 *    prior written permission. For written permission, please contact
 | 
				
			||||||
 | 
					 *    openssl-core@openssl.org.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 5. Products derived from this software may not be called "OpenSSL"
 | 
				
			||||||
 | 
					 *    nor may "OpenSSL" appear in their names without prior written
 | 
				
			||||||
 | 
					 *    permission of the OpenSSL Project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 6. Redistributions of any form whatsoever must retain the following
 | 
				
			||||||
 | 
					 *    acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
				
			||||||
 | 
					 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
				
			||||||
 | 
					 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
				
			||||||
 | 
					 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
				
			||||||
 | 
					 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
				
			||||||
 | 
					 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
				
			||||||
 | 
					 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
				
			||||||
 | 
					 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
				
			||||||
 | 
					 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
				
			||||||
 | 
					 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * ====================================================================
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This product includes cryptographic software written by Eric Young
 | 
				
			||||||
 | 
					 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
				
			||||||
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					 
 | 
				
			||||||
 | 
					 
 | 
				
			||||||
 | 
					 
 | 
				
			||||||
 | 
					 #include "ErrorHandling.hpp"
 | 
				
			||||||
 | 
					#include "CPStringUtils.hpp"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __EXCEPTIONS_ENABLED__
 | 
				
			||||||
 | 
						#include "CMyException.hpp"
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static char					gErrorMessageBuffer[512];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					char 						*gErrorMessage = gErrorMessageBuffer;
 | 
				
			||||||
 | 
					int							gErrorMessageMaxLength = sizeof(gErrorMessageBuffer);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void SetErrorMessage(const char *theErrorMessage)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						if (theErrorMessage != nil)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							CopyCStrToCStr(theErrorMessage,gErrorMessage,gErrorMessageMaxLength);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void SetErrorMessageAndAppendLongInt(const char *theErrorMessage,const long theLongInt)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						if (theErrorMessage != nil)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							CopyCStrAndConcatLongIntToCStr(theErrorMessage,theLongInt,gErrorMessage,gErrorMessageMaxLength);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void SetErrorMessageAndCStrAndLongInt(const char *theErrorMessage,const char * theCStr,const long theLongInt)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						if (theErrorMessage != nil)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							CopyCStrAndInsertCStrLongIntIntoCStr(theErrorMessage,theCStr,theLongInt,gErrorMessage,gErrorMessageMaxLength);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void SetErrorMessageAndCStr(const char *theErrorMessage,const char * theCStr)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						if (theErrorMessage != nil)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							CopyCStrAndInsertCStrLongIntIntoCStr(theErrorMessage,theCStr,-1,gErrorMessage,gErrorMessageMaxLength);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void AppendCStrToErrorMessage(const char *theErrorMessage)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						if (theErrorMessage != nil)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							ConcatCStrToCStr(theErrorMessage,gErrorMessage,gErrorMessageMaxLength);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void AppendLongIntToErrorMessage(const long theLongInt)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						ConcatLongIntToCStr(theLongInt,gErrorMessage,gErrorMessageMaxLength);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					char *GetErrorMessage(void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						return gErrorMessage;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr GetErrorMessageInNewHandle(Handle *inoutHandle)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					OSErr		errCode;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						errCode = CopyCStrToNewHandle(gErrorMessage,inoutHandle);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						return(errCode);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr GetErrorMessageInExistingHandle(Handle inoutHandle)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					OSErr		errCode;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						errCode = CopyCStrToExistingHandle(gErrorMessage,inoutHandle);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						return(errCode);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr AppendErrorMessageToHandle(Handle inoutHandle)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					OSErr		errCode;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						errCode = AppendCStrToHandle(gErrorMessage,inoutHandle,nil);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						return(errCode);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __EXCEPTIONS_ENABLED__
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void ThrowErrorMessageException(void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						ThrowDescriptiveException(gErrorMessage);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
							
								
								
									
										147
									
								
								MacOS/GetHTTPS.src/ErrorHandling.hpp
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										147
									
								
								MacOS/GetHTTPS.src/ErrorHandling.hpp
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,147 @@
 | 
				
			|||||||
 | 
					#ifdef __cplusplus
 | 
				
			||||||
 | 
					extern "C" {
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef kGenericError
 | 
				
			||||||
 | 
						#define kGenericError		-1
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					extern char	*gErrorMessage;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void SetErrorMessage(const char *theErrorMessage);
 | 
				
			||||||
 | 
					void SetErrorMessageAndAppendLongInt(const char *theErrorMessage,const long theLongInt);
 | 
				
			||||||
 | 
					void SetErrorMessageAndCStrAndLongInt(const char *theErrorMessage,const char * theCStr,const long theLongInt);
 | 
				
			||||||
 | 
					void SetErrorMessageAndCStr(const char *theErrorMessage,const char * theCStr);
 | 
				
			||||||
 | 
					void AppendCStrToErrorMessage(const char *theErrorMessage);
 | 
				
			||||||
 | 
					void AppendLongIntToErrorMessage(const long theLongInt);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					char *GetErrorMessage(void);
 | 
				
			||||||
 | 
					OSErr GetErrorMessageInNewHandle(Handle *inoutHandle);
 | 
				
			||||||
 | 
					OSErr GetErrorMessageInExistingHandle(Handle inoutHandle);
 | 
				
			||||||
 | 
					OSErr AppendErrorMessageToHandle(Handle inoutHandle);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __EXCEPTIONS_ENABLED__
 | 
				
			||||||
 | 
						void ThrowErrorMessageException(void);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	A bunch of evil macros that would be uneccessary if I were always using C++ !
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SetErrorMessageAndBailIfNil(theArg,theMessage)								\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
						if (theArg == nil)																\
 | 
				
			||||||
 | 
						{																				\
 | 
				
			||||||
 | 
							SetErrorMessage(theMessage);												\
 | 
				
			||||||
 | 
							errCode = kGenericError;													\
 | 
				
			||||||
 | 
							goto EXITPOINT;																\
 | 
				
			||||||
 | 
						}																				\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SetErrorMessageAndBail(theMessage)											\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
							SetErrorMessage(theMessage);												\
 | 
				
			||||||
 | 
							errCode = kGenericError;													\
 | 
				
			||||||
 | 
							goto EXITPOINT;																\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SetErrorMessageAndLongIntAndBail(theMessage,theLongInt)						\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
							SetErrorMessageAndAppendLongInt(theMessage,theLongInt);						\
 | 
				
			||||||
 | 
							errCode = kGenericError;													\
 | 
				
			||||||
 | 
							goto EXITPOINT;																\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SetErrorMessageAndLongIntAndBailIfError(theErrCode,theMessage,theLongInt)	\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
						if (theErrCode != noErr)														\
 | 
				
			||||||
 | 
						{																				\
 | 
				
			||||||
 | 
							SetErrorMessageAndAppendLongInt(theMessage,theLongInt);						\
 | 
				
			||||||
 | 
							errCode = theErrCode;														\
 | 
				
			||||||
 | 
							goto EXITPOINT;																\
 | 
				
			||||||
 | 
						}																				\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SetErrorMessageCStrLongIntAndBailIfError(theErrCode,theMessage,theCStr,theLongInt)	\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
						if (theErrCode != noErr)														\
 | 
				
			||||||
 | 
						{																				\
 | 
				
			||||||
 | 
							SetErrorMessageAndCStrAndLongInt(theMessage,theCStr,theLongInt);			\
 | 
				
			||||||
 | 
							errCode = theErrCode;														\
 | 
				
			||||||
 | 
							goto EXITPOINT;																\
 | 
				
			||||||
 | 
						}																				\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SetErrorMessageAndCStrAndBail(theMessage,theCStr)							\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
						SetErrorMessageAndCStr(theMessage,theCStr);										\
 | 
				
			||||||
 | 
						errCode = kGenericError;														\
 | 
				
			||||||
 | 
						goto EXITPOINT;																	\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SetErrorMessageAndBailIfError(theErrCode,theMessage)						\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
						if (theErrCode != noErr)														\
 | 
				
			||||||
 | 
						{																				\
 | 
				
			||||||
 | 
							SetErrorMessage(theMessage);												\
 | 
				
			||||||
 | 
							errCode = theErrCode;														\
 | 
				
			||||||
 | 
							goto EXITPOINT;																\
 | 
				
			||||||
 | 
						}																				\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SetErrorMessageAndLongIntAndBailIfNil(theArg,theMessage,theLongInt)			\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
						if (theArg == nil)																\
 | 
				
			||||||
 | 
						{																				\
 | 
				
			||||||
 | 
							SetErrorMessageAndAppendLongInt(theMessage,theLongInt);						\
 | 
				
			||||||
 | 
							errCode = kGenericError;													\
 | 
				
			||||||
 | 
							goto EXITPOINT;																\
 | 
				
			||||||
 | 
						}																				\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define BailIfError(theErrCode)														\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
						if ((theErrCode) != noErr)														\
 | 
				
			||||||
 | 
						{																				\
 | 
				
			||||||
 | 
							goto EXITPOINT;																\
 | 
				
			||||||
 | 
						}																				\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SetErrCodeAndBail(theErrCode)												\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
						errCode = theErrCode;															\
 | 
				
			||||||
 | 
																										\
 | 
				
			||||||
 | 
						goto EXITPOINT;																	\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SetErrorCodeAndMessageAndBail(theErrCode,theMessage)						\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
						SetErrorMessage(theMessage);													\
 | 
				
			||||||
 | 
						errCode = theErrCode;															\
 | 
				
			||||||
 | 
						goto EXITPOINT;																	\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define BailNow()																	\
 | 
				
			||||||
 | 
					{																					\
 | 
				
			||||||
 | 
						errCode = kGenericError;														\
 | 
				
			||||||
 | 
						goto EXITPOINT;																	\
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __cplusplus
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
							
								
								
									
										209
									
								
								MacOS/GetHTTPS.src/GetHTTPS.cpp
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										209
									
								
								MacOS/GetHTTPS.src/GetHTTPS.cpp
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,209 @@
 | 
				
			|||||||
 | 
					/*
 | 
				
			||||||
 | 
					 *	An demo illustrating how to retrieve a URI from a secure HTTP server.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 *	Author: 	Roy Wood
 | 
				
			||||||
 | 
					 *	Date:		September 7, 1999
 | 
				
			||||||
 | 
					 *	Comments:	This relies heavily on my MacSockets library.
 | 
				
			||||||
 | 
					 *				This project is also set up so that it expects the OpenSSL source folder (0.9.4 as I write this)
 | 
				
			||||||
 | 
					 *				to live in a folder called "OpenSSL-0.9.4" in this project's parent folder.  For example:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 *					Macintosh HD:
 | 
				
			||||||
 | 
					 *						Development:
 | 
				
			||||||
 | 
					 *							OpenSSL-0.9.4:
 | 
				
			||||||
 | 
					 *								(OpenSSL sources here)
 | 
				
			||||||
 | 
					 *							OpenSSL Example:
 | 
				
			||||||
 | 
					 *								(OpenSSL example junk here)
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 *				Also-- before attempting to compile this, make sure the aliases in "OpenSSL-0.9.4:include:openssl" 
 | 
				
			||||||
 | 
					 *				are installed!  Use the AppleScript applet in the "openssl-0.9.4" folder to do this!
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* modified to seed the PRNG */
 | 
				
			||||||
 | 
					/* modified to use CRandomizer for seeding */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Include some funky libs I've developed over time
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "CPStringUtils.hpp"
 | 
				
			||||||
 | 
					#include "ErrorHandling.hpp"
 | 
				
			||||||
 | 
					#include "MacSocket.h"
 | 
				
			||||||
 | 
					#include "Randomizer.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	We use the OpenSSL implementation of SSL....
 | 
				
			||||||
 | 
					//	This was a lot of work to finally get going, though you wouldn't know it by the results!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/ssl.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <timer.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Let's try grabbing some data from here:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define kHTTPS_DNS		"www.apache-ssl.org"
 | 
				
			||||||
 | 
					#define kHTTPS_Port		443
 | 
				
			||||||
 | 
					#define kHTTPS_URI		"/"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Forward-declare this
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr MyMacSocket_IdleWaitCallback(void *inUserRefPtr);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	My idle-wait callback.  Doesn't do much, does it?  Silly cooperative multitasking.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr MyMacSocket_IdleWaitCallback(void *inUserRefPtr)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					#pragma unused(inUserRefPtr)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					EventRecord		theEvent;
 | 
				
			||||||
 | 
						::EventAvail(everyEvent,&theEvent);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						CRandomizer *randomizer = (CRandomizer*)inUserRefPtr;
 | 
				
			||||||
 | 
						if (randomizer)
 | 
				
			||||||
 | 
							randomizer->PeriodicAction();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return(noErr);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Finally!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void main(void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						OSErr				errCode;
 | 
				
			||||||
 | 
						int					theSocket = -1;
 | 
				
			||||||
 | 
						int					theTimeout = 30;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						SSL_CTX				*ssl_ctx = nil;
 | 
				
			||||||
 | 
						SSL					*ssl = nil;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						char				tempString[256];
 | 
				
			||||||
 | 
						UnsignedWide		microTickCount;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						CRandomizer randomizer;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						printf("OpenSSL Demo by Roy Wood, roy@centricsystems.ca\n\n");
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						BailIfError(errCode = MacSocket_Startup());
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						//	Create a socket-like object
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						BailIfError(errCode = MacSocket_socket(&theSocket,false,theTimeout * 60,MyMacSocket_IdleWaitCallback,&randomizer));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						//	Set up the connect string and try to connect
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						CopyCStrAndInsertCStrLongIntIntoCStr("%s:%ld",kHTTPS_DNS,kHTTPS_Port,tempString,sizeof(tempString));
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						printf("Connecting to %s....\n",tempString);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						BailIfError(errCode = MacSocket_connect(theSocket,tempString));
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						//	Init SSL stuff
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						SSL_load_error_strings();
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						SSLeay_add_ssl_algorithms();
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						//	Pick the SSL method
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					//	ssl_ctx = SSL_CTX_new(SSLv2_client_method());
 | 
				
			||||||
 | 
						ssl_ctx = SSL_CTX_new(SSLv23_client_method());
 | 
				
			||||||
 | 
					//	ssl_ctx = SSL_CTX_new(SSLv3_client_method());
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						//	Create an SSL thingey and try to negotiate the connection
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						ssl = SSL_new(ssl_ctx);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						SSL_set_fd(ssl,theSocket);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						errCode = SSL_connect(ssl);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (errCode < 0)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							SetErrorMessageAndLongIntAndBail("OpenSSL: Can't initiate SSL connection, SSL_connect() = ",errCode);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						//	Request the URI from the host
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						CopyCStrToCStr("GET ",tempString,sizeof(tempString));
 | 
				
			||||||
 | 
						ConcatCStrToCStr(kHTTPS_URI,tempString,sizeof(tempString));
 | 
				
			||||||
 | 
						ConcatCStrToCStr(" HTTP/1.0\r\n\r\n",tempString,sizeof(tempString));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						errCode = SSL_write(ssl,tempString,CStrLength(tempString));
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (errCode < 0)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							SetErrorMessageAndLongIntAndBail("OpenSSL: Error writing data via ssl, SSL_write() = ",errCode);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for (;;)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						char	tempString[256];
 | 
				
			||||||
 | 
						int		bytesRead;
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							//	Read some bytes and dump them to the console
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							bytesRead = SSL_read(ssl,tempString,sizeof(tempString) - 1);
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							if (bytesRead == 0 && MacSocket_RemoteEndIsClosing(theSocket))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							else if (bytesRead < 0)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								SetErrorMessageAndLongIntAndBail("OpenSSL: Error reading data via ssl, SSL_read() = ",bytesRead);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							tempString[bytesRead] = '\0';
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							printf(tempString);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						printf("\n\n\n");
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						//	All done!
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						errCode = noErr;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					EXITPOINT:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						//	Clean up and go home
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (theSocket >= 0)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							MacSocket_close(theSocket);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (ssl != nil)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							SSL_free(ssl);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (ssl_ctx != nil)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							SSL_CTX_free(ssl_ctx);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (errCode != noErr)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							printf("An error occurred:\n");
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							printf(GetErrorMessage());
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						MacSocket_Shutdown();
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										1607
									
								
								MacOS/GetHTTPS.src/MacSocket.cpp
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1607
									
								
								MacOS/GetHTTPS.src/MacSocket.cpp
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										103
									
								
								MacOS/GetHTTPS.src/MacSocket.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										103
									
								
								MacOS/GetHTTPS.src/MacSocket.h
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,103 @@
 | 
				
			|||||||
 | 
					#pragma once
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __cplusplus
 | 
				
			||||||
 | 
					extern "C" {
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					enum
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						kMacSocket_TimeoutErr = -2
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Since MacSocket does busy waiting, I do a callback while waiting
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					typedef OSErr (*MacSocket_IdleWaitCallback)(void *);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call this before anything else!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr MacSocket_Startup(void);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call this to cleanup before quitting
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr MacSocket_Shutdown(void);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call this to allocate a "socket" (reference number is returned in outSocketNum)
 | 
				
			||||||
 | 
					//	Note that inDoThreadSwitching is pretty much irrelevant right now, since I ignore it
 | 
				
			||||||
 | 
					//	The inTimeoutTicks parameter is applied during reads/writes of data
 | 
				
			||||||
 | 
					//	The inIdleWaitCallback parameter specifies a callback which is called during busy-waiting periods
 | 
				
			||||||
 | 
					//	The inUserRefPtr parameter is passed back to the idle-wait callback
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr MacSocket_socket(int *outSocketNum,const Boolean inDoThreadSwitching,const long inTimeoutTicks,MacSocket_IdleWaitCallback inIdleWaitCallback,void *inUserRefPtr);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call this to connect to an IP/DNS address
 | 
				
			||||||
 | 
					//	Note that inTargetAddressAndPort is in "IP:port" format-- e.g. 10.1.1.1:123
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr MacSocket_connect(const int inSocketNum,char *inTargetAddressAndPort);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call this to listen on a port
 | 
				
			||||||
 | 
					//	Since this a low-performance implementation, I allow a maximum of 1 (one!) incoming request when I listen
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr MacSocket_listen(const int inSocketNum,const int inPortNum);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call this to close a socket
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					OSErr MacSocket_close(const int inSocketNum);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call this to receive data on a socket
 | 
				
			||||||
 | 
					//	Most parameters' purpose are obvious-- except maybe "inBlock" which controls whether I wait for data or return immediately
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MacSocket_recv(const int inSocketNum,void *outBuff,int outBuffLength,const Boolean inBlock);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call this to send data on a socket
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MacSocket_send(const int inSocketNum,void *inBuff,int inBuffLength);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	If zero bytes were read in a call to MacSocket_recv(), it may be that the remote end has done a half-close
 | 
				
			||||||
 | 
					//	This function will let you check whether that's true or not
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Boolean MacSocket_RemoteEndIsClosing(const int inSocketNum);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call this to see if the listen has completed after a call to MacSocket_listen()
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Boolean MacSocket_ListenCompleted(const int inSocketNum);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	These really aren't very useful anymore
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Boolean MacSocket_LocalEndIsOpen(const int inSocketNum);
 | 
				
			||||||
 | 
					Boolean MacSocket_RemoteEndIsOpen(const int inSocketNum);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	You may wish to change the userRefPtr for a socket callback-- use this to do it
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void MacSocket_SetUserRefPtr(const int inSocketNum,void *inNewRefPtr);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call these to get the socket's IP:port descriptor
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void MacSocket_GetLocalIPAndPort(const int inSocketNum,char *outIPAndPort,const int inIPAndPortLength);
 | 
				
			||||||
 | 
					void MacSocket_GetRemoteIPAndPort(const int inSocketNum,char *outIPAndPort,const int inIPAndPortLength);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//	Call this to get error info from a socket
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void MacSocket_GetSocketErrorInfo(const int inSocketNum,int *outSocketErrCode,char *outSocketErrString,const int inSocketErrStringMaxLength);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __cplusplus
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
							
								
								
									
										4940
									
								
								MacOS/OpenSSL.mcp.hqx
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										4940
									
								
								MacOS/OpenSSL.mcp.hqx
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										476
									
								
								MacOS/Randomizer.cpp
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										476
									
								
								MacOS/Randomizer.cpp
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,476 @@
 | 
				
			|||||||
 | 
					/* 
 | 
				
			||||||
 | 
					------- Strong random data generation on a Macintosh (pre - OS X) ------
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
					--	GENERAL: We aim to generate unpredictable bits without explicit
 | 
				
			||||||
 | 
						user interaction. A general review of the problem may be found
 | 
				
			||||||
 | 
						in RFC 1750, "Randomness Recommendations for Security", and some
 | 
				
			||||||
 | 
						more discussion, of general and Mac-specific issues has appeared
 | 
				
			||||||
 | 
						in "Using and Creating Cryptographic- Quality Random Numbers" by
 | 
				
			||||||
 | 
						Jon Callas (www.merrymeet.com/jon/usingrandom.html).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						The data and entropy estimates provided below are based on my
 | 
				
			||||||
 | 
						limited experimentation and estimates, rather than by any
 | 
				
			||||||
 | 
						rigorous study, and the entropy estimates tend to be optimistic.
 | 
				
			||||||
 | 
						They should not be considered absolute.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						Some of the information being collected may be correlated in
 | 
				
			||||||
 | 
						subtle ways. That includes mouse positions, timings, and disk
 | 
				
			||||||
 | 
						size measurements. Some obvious correlations will be eliminated
 | 
				
			||||||
 | 
						by the programmer, but other, weaker ones may remain. The
 | 
				
			||||||
 | 
						reliability of the code depends on such correlations being
 | 
				
			||||||
 | 
						poorly understood, both by us and by potential interceptors.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						This package has been planned to be used with OpenSSL, v. 0.9.5.
 | 
				
			||||||
 | 
						It requires the OpenSSL function RAND_add. 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					--	OTHER WORK: Some source code and other details have been
 | 
				
			||||||
 | 
						published elsewhere, but I haven't found any to be satisfactory
 | 
				
			||||||
 | 
						for the Mac per se:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						* The Linux random number generator (by Theodore Ts'o, in
 | 
				
			||||||
 | 
						  drivers/char/random.c), is a carefully designed open-source
 | 
				
			||||||
 | 
						  crypto random number package. It collects data from a variety
 | 
				
			||||||
 | 
						  of sources, including mouse, keyboard and other interrupts.
 | 
				
			||||||
 | 
						  One nice feature is that it explicitly estimates the entropy
 | 
				
			||||||
 | 
						  of the data it collects. Some of its features (e.g. interrupt
 | 
				
			||||||
 | 
						  timing) cannot be reliably exported to the Mac without using
 | 
				
			||||||
 | 
						  undocumented APIs.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						* Truerand by Don P. Mitchell and Matt Blaze uses variations
 | 
				
			||||||
 | 
						  between different timing mechanisms on the same system. This
 | 
				
			||||||
 | 
						  has not been tested on the Mac, but requires preemptive
 | 
				
			||||||
 | 
						  multitasking, and is hardware-dependent, and can't be relied
 | 
				
			||||||
 | 
						  on to work well if only one oscillator is present.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						* Cryptlib's RNG for the Mac (RNDMAC.C by Peter Gutmann),
 | 
				
			||||||
 | 
						  gathers a lot of information about the machine and system
 | 
				
			||||||
 | 
						  environment. Unfortunately, much of it is constant from one
 | 
				
			||||||
 | 
						  startup to the next. In other words, the random seed could be
 | 
				
			||||||
 | 
						  the same from one day to the next. Some of the APIs are
 | 
				
			||||||
 | 
						  hardware-dependent, and not all are compatible with Carbon (OS
 | 
				
			||||||
 | 
						  X). Incidentally, the EGD library is based on the UNIX entropy
 | 
				
			||||||
 | 
						  gathering methods in cryptlib, and isn't suitable for MacOS
 | 
				
			||||||
 | 
						  either.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						* Mozilla (and perhaps earlier versions of Netscape) uses the
 | 
				
			||||||
 | 
						  time of day (in seconds) and an uninitialized local variable
 | 
				
			||||||
 | 
						  to seed the random number generator. The time of day is known
 | 
				
			||||||
 | 
						  to an outside interceptor (to within the accuracy of the
 | 
				
			||||||
 | 
						  system clock). The uninitialized variable could easily be
 | 
				
			||||||
 | 
						  identical between subsequent launches of an application, if it
 | 
				
			||||||
 | 
						  is reached through the same path.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						* OpenSSL provides the function RAND_screen(), by G. van
 | 
				
			||||||
 | 
						  Oosten, which hashes the contents of the screen to generate a
 | 
				
			||||||
 | 
						  seed. This is not useful for an extension or for an
 | 
				
			||||||
 | 
						  application which launches at startup time, since the screen
 | 
				
			||||||
 | 
						  is likely to look identical from one launch to the next. This
 | 
				
			||||||
 | 
						  method is also rather slow.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						* Using variations in disk drive seek times has been proposed
 | 
				
			||||||
 | 
						  (Davis, Ihaka and Fenstermacher, world.std.com/~dtd/;
 | 
				
			||||||
 | 
						  Jakobsson, Shriver, Hillyer and Juels,
 | 
				
			||||||
 | 
						  www.bell-labs.com/user/shriver/random.html). These variations
 | 
				
			||||||
 | 
						  appear to be due to air turbulence inside the disk drive
 | 
				
			||||||
 | 
						  mechanism, and are very strongly unpredictable. Unfortunately
 | 
				
			||||||
 | 
						  this technique is slow, and some implementations of it may be
 | 
				
			||||||
 | 
						  patented (see Shriver's page above.) It of course cannot be
 | 
				
			||||||
 | 
						  used with a RAM disk.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					--	TIMING: On the 601 PowerPC the time base register is guaranteed
 | 
				
			||||||
 | 
						to change at least once every 10 addi instructions, i.e. 10
 | 
				
			||||||
 | 
						cycles. On a 60 MHz machine (slowest PowerPC) this translates to
 | 
				
			||||||
 | 
						a resolution of 1/6 usec. Newer machines seem to be using a 10
 | 
				
			||||||
 | 
						cycle resolution as well.
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						For 68K Macs, the Microseconds() call may be used. See Develop
 | 
				
			||||||
 | 
						issue 29 on the Apple developer site
 | 
				
			||||||
 | 
						(developer.apple.com/dev/techsupport/develop/issue29/minow.html)
 | 
				
			||||||
 | 
						for information on its accuracy and resolution. The code below
 | 
				
			||||||
 | 
						has been tested only on PowerPC based machines.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						The time from machine startup to the launch of an application in
 | 
				
			||||||
 | 
						the startup folder has a variance of about 1.6 msec on a new G4
 | 
				
			||||||
 | 
						machine with a defragmented and optimized disk, most extensions
 | 
				
			||||||
 | 
						off and no icons on the desktop. This can be reasonably taken as
 | 
				
			||||||
 | 
						a lower bound on the variance. Most of this variation is likely
 | 
				
			||||||
 | 
						due to disk seek time variability. The distribution of startup
 | 
				
			||||||
 | 
						times is probably not entirely even or uncorrelated. This needs
 | 
				
			||||||
 | 
						to be investigated, but I am guessing that it not a majpor
 | 
				
			||||||
 | 
						problem. Entropy = log2 (1600/0.166) ~= 13 bits on a 60 MHz
 | 
				
			||||||
 | 
						machine, ~16 bits for a 450 MHz machine.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						User-launched application startup times will have a variance of
 | 
				
			||||||
 | 
						a second or more relative to machine startup time. Entropy >~22
 | 
				
			||||||
 | 
						bits.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						Machine startup time is available with a 1-second resolution. It
 | 
				
			||||||
 | 
						is predictable to no better a minute or two, in the case of
 | 
				
			||||||
 | 
						people who show up punctually to work at the same time and
 | 
				
			||||||
 | 
						immediately start their computer. Using the scheduled startup
 | 
				
			||||||
 | 
						feature (when available) will cause the machine to start up at
 | 
				
			||||||
 | 
						the same time every day, making the value predictable. Entropy
 | 
				
			||||||
 | 
						>~7 bits, or 0 bits with scheduled startup.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						The time of day is of course known to an outsider and thus has 0
 | 
				
			||||||
 | 
						entropy if the system clock is regularly calibrated.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					--	KEY TIMING: A  very fast typist (120 wpm) will have a typical
 | 
				
			||||||
 | 
						inter-key timing interval of 100 msec. We can assume a variance
 | 
				
			||||||
 | 
						of no less than 2 msec -- maybe. Do good typists have a constant
 | 
				
			||||||
 | 
						rhythm, like drummers? Since what we measure is not the
 | 
				
			||||||
 | 
						key-generated interrupt but the time at which the key event was
 | 
				
			||||||
 | 
						taken off the event queue, our resolution is roughly the time
 | 
				
			||||||
 | 
						between process switches, at best 1 tick (17 msec). I  therefore
 | 
				
			||||||
 | 
						consider this technique questionable and not very useful for
 | 
				
			||||||
 | 
						obtaining high entropy data on the Mac.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					--	MOUSE POSITION AND TIMING: The high bits of the mouse position
 | 
				
			||||||
 | 
						are far from arbitrary, since the mouse tends to stay in a few
 | 
				
			||||||
 | 
						limited areas of the screen. I am guessing that the position of
 | 
				
			||||||
 | 
						the mouse is arbitrary within a 6 pixel square. Since the mouse
 | 
				
			||||||
 | 
						stays still for long periods of time, it should be sampled only
 | 
				
			||||||
 | 
						after it was moved, to avoid correlated data. This gives an
 | 
				
			||||||
 | 
						entropy of log2(6*6) ~= 5 bits per measurement.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						The time during which the mouse stays still can vary from zero
 | 
				
			||||||
 | 
						to, say, 5 seconds (occasionally longer). If the still time is
 | 
				
			||||||
 | 
						measured by sampling the mouse during null events, and null
 | 
				
			||||||
 | 
						events are received once per tick, its resolution is 1/60th of a
 | 
				
			||||||
 | 
						second, giving an entropy of log2 (60*5) ~= 8 bits per
 | 
				
			||||||
 | 
						measurement. Since the distribution of still times is uneven,
 | 
				
			||||||
 | 
						this estimate is on the high side.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						For simplicity and compatibility across system versions, the
 | 
				
			||||||
 | 
						mouse is to be sampled explicitly (e.g. in the event loop),
 | 
				
			||||||
 | 
						rather than in a time manager task.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					--	STARTUP DISK TOTAL FILE SIZE: Varies typically by at least 20k
 | 
				
			||||||
 | 
						from one startup to the next, with 'minimal' computer use. Won't
 | 
				
			||||||
 | 
						vary at all if machine is started again immediately after
 | 
				
			||||||
 | 
						startup (unless virtual memory is on), but any application which
 | 
				
			||||||
 | 
						uses the web and caches information to disk is likely to cause
 | 
				
			||||||
 | 
						this much variation or more. The variation is probably not
 | 
				
			||||||
 | 
						random, but I don't know in what way. File sizes tend to be
 | 
				
			||||||
 | 
						divisible by 4 bytes since file format fields are often
 | 
				
			||||||
 | 
						long-aligned. Entropy > log2 (20000/4) ~= 12 bits.
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					--	STARTUP DISK FIRST AVAILABLE ALLOCATION BLOCK: As the volume
 | 
				
			||||||
 | 
						gets fragmented this could be anywhere in principle. In a
 | 
				
			||||||
 | 
						perfectly unfragmented volume this will be strongly correlated
 | 
				
			||||||
 | 
						with the total file size on the disk. With more fragmentation
 | 
				
			||||||
 | 
						comes less certainty. I took the variation in this value to be
 | 
				
			||||||
 | 
						1/8 of the total file size on the volume.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					--	SYSTEM REQUIREMENTS: The code here requires System 7.0 and above
 | 
				
			||||||
 | 
						(for Gestalt and Microseconds calls). All the calls used are
 | 
				
			||||||
 | 
						Carbon-compatible.
 | 
				
			||||||
 | 
					*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*------------------------------ Includes ----------------------------*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "Randomizer.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// Mac OS API
 | 
				
			||||||
 | 
					#include <Files.h>
 | 
				
			||||||
 | 
					#include <Folders.h>
 | 
				
			||||||
 | 
					#include <Events.h>
 | 
				
			||||||
 | 
					#include <Processes.h>
 | 
				
			||||||
 | 
					#include <Gestalt.h>
 | 
				
			||||||
 | 
					#include <Resources.h>
 | 
				
			||||||
 | 
					#include <LowMem.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// Standard C library
 | 
				
			||||||
 | 
					#include <stdlib.h>
 | 
				
			||||||
 | 
					#include <math.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*---------------------- Function declarations -----------------------*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					// declared in OpenSSL/crypto/rand/rand.h
 | 
				
			||||||
 | 
					extern "C" void RAND_add (const void *buf, int num, double entropy);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					unsigned long GetPPCTimer (bool is601);	// Make it global if needed
 | 
				
			||||||
 | 
										// elsewhere
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*---------------------------- Constants -----------------------------*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define kMouseResolution 6		// Mouse position has to differ
 | 
				
			||||||
 | 
										// from the last one by this
 | 
				
			||||||
 | 
										// much to be entered
 | 
				
			||||||
 | 
					#define kMousePositionEntropy 5.16	// log2 (kMouseResolution**2)
 | 
				
			||||||
 | 
					#define kTypicalMouseIdleTicks 300.0	// I am guessing that a typical
 | 
				
			||||||
 | 
										// amount of time between mouse
 | 
				
			||||||
 | 
										// moves is 5 seconds
 | 
				
			||||||
 | 
					#define kVolumeBytesEntropy 12.0	// about log2 (20000/4),
 | 
				
			||||||
 | 
										// assuming a variation of 20K
 | 
				
			||||||
 | 
										// in total file size and
 | 
				
			||||||
 | 
										// long-aligned file formats.
 | 
				
			||||||
 | 
					#define kApplicationUpTimeEntropy 6.0	// Variance > 1 second, uptime
 | 
				
			||||||
 | 
										// in ticks  
 | 
				
			||||||
 | 
					#define kSysStartupEntropy 7.0		// Entropy for machine startup
 | 
				
			||||||
 | 
										// time
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*------------------------ Function definitions ----------------------*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					CRandomizer::CRandomizer (void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						long	result;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						mSupportsLargeVolumes =
 | 
				
			||||||
 | 
							(Gestalt(gestaltFSAttr, &result) == noErr) &&
 | 
				
			||||||
 | 
							((result & (1L << gestaltFSSupports2TBVols)) != 0);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (Gestalt (gestaltNativeCPUtype, &result) != noErr)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							mIsPowerPC = false;
 | 
				
			||||||
 | 
							mIs601 = false;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							mIs601 = (result == gestaltCPU601);
 | 
				
			||||||
 | 
							mIsPowerPC = (result >= gestaltCPU601);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						mLastMouse.h = mLastMouse.v = -10;	// First mouse will
 | 
				
			||||||
 | 
											// always be recorded
 | 
				
			||||||
 | 
						mLastPeriodicTicks = TickCount();
 | 
				
			||||||
 | 
						GetTimeBaseResolution ();
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						// Add initial entropy
 | 
				
			||||||
 | 
						AddTimeSinceMachineStartup ();
 | 
				
			||||||
 | 
						AddAbsoluteSystemStartupTime ();
 | 
				
			||||||
 | 
						AddStartupVolumeInfo ();
 | 
				
			||||||
 | 
						AddFiller ();
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CRandomizer::PeriodicAction (void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						AddCurrentMouse ();
 | 
				
			||||||
 | 
						AddNow (0.0);	// Should have a better entropy estimate here
 | 
				
			||||||
 | 
						mLastPeriodicTicks = TickCount();
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*------------------------- Private Methods --------------------------*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CRandomizer::AddCurrentMouse (void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						Point mouseLoc;
 | 
				
			||||||
 | 
						unsigned long lastCheck;	// Ticks since mouse was last
 | 
				
			||||||
 | 
										// sampled
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if TARGET_API_MAC_CARBON
 | 
				
			||||||
 | 
						GetGlobalMouse (&mouseLoc);
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
						mouseLoc = LMGetMouseLocation();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (labs (mLastMouse.h - mouseLoc.h) > kMouseResolution/2 &&
 | 
				
			||||||
 | 
						    labs (mLastMouse.v - mouseLoc.v) > kMouseResolution/2)
 | 
				
			||||||
 | 
							AddBytes (&mouseLoc, sizeof (mouseLoc),
 | 
				
			||||||
 | 
									kMousePositionEntropy);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (mLastMouse.h == mouseLoc.h && mLastMouse.v == mouseLoc.v)
 | 
				
			||||||
 | 
							mMouseStill ++;
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							double entropy;
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							// Mouse has moved. Add the number of measurements for
 | 
				
			||||||
 | 
							// which it's been still. If the resolution is too
 | 
				
			||||||
 | 
							// coarse, assume the entropy is 0.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							lastCheck = TickCount() - mLastPeriodicTicks;
 | 
				
			||||||
 | 
							if (lastCheck <= 0)
 | 
				
			||||||
 | 
								lastCheck = 1;
 | 
				
			||||||
 | 
							entropy = log2l
 | 
				
			||||||
 | 
								(kTypicalMouseIdleTicks/(double)lastCheck);
 | 
				
			||||||
 | 
							if (entropy < 0.0)
 | 
				
			||||||
 | 
								entropy = 0.0;
 | 
				
			||||||
 | 
							AddBytes (&mMouseStill, sizeof (mMouseStill), entropy);
 | 
				
			||||||
 | 
							mMouseStill = 0;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						mLastMouse = mouseLoc;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CRandomizer::AddAbsoluteSystemStartupTime (void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						unsigned long	now;		// Time in seconds since
 | 
				
			||||||
 | 
										// 1/1/1904
 | 
				
			||||||
 | 
						GetDateTime (&now);
 | 
				
			||||||
 | 
						now -= TickCount() / 60;	// Time in ticks since machine
 | 
				
			||||||
 | 
										// startup
 | 
				
			||||||
 | 
						AddBytes (&now, sizeof (now), kSysStartupEntropy);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CRandomizer::AddTimeSinceMachineStartup (void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						AddNow (1.5);			// Uncertainty in app startup
 | 
				
			||||||
 | 
										// time is > 1.5 msec (for
 | 
				
			||||||
 | 
										// automated app startup).
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CRandomizer::AddAppRunningTime (void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						ProcessSerialNumber PSN;
 | 
				
			||||||
 | 
						ProcessInfoRec		ProcessInfo;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						ProcessInfo.processInfoLength = sizeof (ProcessInfoRec);
 | 
				
			||||||
 | 
						ProcessInfo.processName = nil;
 | 
				
			||||||
 | 
						ProcessInfo.processAppSpec = nil;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						GetCurrentProcess (&PSN);
 | 
				
			||||||
 | 
						GetProcessInformation (&PSN, &ProcessInfo);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// Now add the amount of time in ticks that the current process
 | 
				
			||||||
 | 
						// has been active
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						AddBytes (&ProcessInfo, sizeof (ProcessInfoRec),
 | 
				
			||||||
 | 
								kApplicationUpTimeEntropy);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CRandomizer::AddStartupVolumeInfo (void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						short			vRefNum;
 | 
				
			||||||
 | 
						long			dirID;
 | 
				
			||||||
 | 
						XVolumeParam	pb;
 | 
				
			||||||
 | 
						OSErr			err;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (!mSupportsLargeVolumes)
 | 
				
			||||||
 | 
							return;
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
						FindFolder (kOnSystemDisk, kSystemFolderType, kDontCreateFolder,
 | 
				
			||||||
 | 
								&vRefNum, &dirID);
 | 
				
			||||||
 | 
						pb.ioVRefNum = vRefNum;
 | 
				
			||||||
 | 
						pb.ioCompletion = 0;
 | 
				
			||||||
 | 
						pb.ioNamePtr = 0;
 | 
				
			||||||
 | 
						pb.ioVolIndex = 0;
 | 
				
			||||||
 | 
						err = PBXGetVolInfoSync (&pb);
 | 
				
			||||||
 | 
						if (err != noErr)
 | 
				
			||||||
 | 
							return;
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
						// Base the entropy on the amount of space used on the disk and
 | 
				
			||||||
 | 
						// on the next available allocation block. A lot else might be
 | 
				
			||||||
 | 
						// unpredictable, so might as well toss the whole block in. See
 | 
				
			||||||
 | 
						// comments for entropy estimate justifications.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						AddBytes (&pb, sizeof (pb),
 | 
				
			||||||
 | 
							kVolumeBytesEntropy +
 | 
				
			||||||
 | 
							log2l (((pb.ioVTotalBytes.hi - pb.ioVFreeBytes.hi)
 | 
				
			||||||
 | 
									* 4294967296.0D +
 | 
				
			||||||
 | 
								(pb.ioVTotalBytes.lo - pb.ioVFreeBytes.lo))
 | 
				
			||||||
 | 
									/ pb.ioVAlBlkSiz - 3.0));
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
						On a typical startup CRandomizer will come up with about 60
 | 
				
			||||||
 | 
						bits of good, unpredictable data. Assuming no more input will
 | 
				
			||||||
 | 
						be available, we'll need some more lower-quality data to give
 | 
				
			||||||
 | 
						OpenSSL the 128 bits of entropy it desires. AddFiller adds some
 | 
				
			||||||
 | 
						relatively predictable data into the soup.
 | 
				
			||||||
 | 
					*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CRandomizer::AddFiller (void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						struct
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							ProcessSerialNumber psn;	// Front process serial
 | 
				
			||||||
 | 
											// number
 | 
				
			||||||
 | 
							RGBColor	hiliteRGBValue;	// User-selected
 | 
				
			||||||
 | 
											// highlight color
 | 
				
			||||||
 | 
							long		processCount;	// Number of active
 | 
				
			||||||
 | 
											// processes
 | 
				
			||||||
 | 
							long		cpuSpeed;	// Processor speed
 | 
				
			||||||
 | 
							long		totalMemory;	// Total logical memory
 | 
				
			||||||
 | 
											// (incl. virtual one)
 | 
				
			||||||
 | 
							long		systemVersion;	// OS version
 | 
				
			||||||
 | 
							short		resFile;	// Current resource file
 | 
				
			||||||
 | 
						} data;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						GetNextProcess ((ProcessSerialNumber*) kNoProcess);
 | 
				
			||||||
 | 
						while (GetNextProcess (&data.psn) == noErr)
 | 
				
			||||||
 | 
							data.processCount++;
 | 
				
			||||||
 | 
						GetFrontProcess (&data.psn);
 | 
				
			||||||
 | 
						LMGetHiliteRGB (&data.hiliteRGBValue);
 | 
				
			||||||
 | 
						Gestalt (gestaltProcClkSpeed, &data.cpuSpeed);
 | 
				
			||||||
 | 
						Gestalt (gestaltLogicalRAMSize, &data.totalMemory);
 | 
				
			||||||
 | 
						Gestalt (gestaltSystemVersion, &data.systemVersion);
 | 
				
			||||||
 | 
						data.resFile = CurResFile ();
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						// Here we pretend to feed the PRNG completely random data. This
 | 
				
			||||||
 | 
						// is of course false, as much of the above data is predictable
 | 
				
			||||||
 | 
						// by an outsider. At this point we don't have any more
 | 
				
			||||||
 | 
						// randomness to add, but with OpenSSL we must have a 128 bit
 | 
				
			||||||
 | 
						// seed before we can start. We just add what we can, without a
 | 
				
			||||||
 | 
						// real entropy estimate, and hope for the best.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						AddBytes (&data, sizeof(data), 8.0 * sizeof(data));
 | 
				
			||||||
 | 
						AddCurrentMouse ();
 | 
				
			||||||
 | 
						AddNow (1.0);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//-------------------  LOW LEVEL ---------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CRandomizer::AddBytes (void *data, long size, double entropy)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						RAND_add (data, size, entropy * 0.125);	// Convert entropy bits
 | 
				
			||||||
 | 
											// to bytes
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CRandomizer::AddNow (double millisecondUncertainty)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						long time = SysTimer();
 | 
				
			||||||
 | 
						AddBytes (&time, sizeof (time), log2l (millisecondUncertainty *
 | 
				
			||||||
 | 
								mTimebaseTicksPerMillisec));
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					//----------------- TIMING SUPPORT ------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void CRandomizer::GetTimeBaseResolution (void)
 | 
				
			||||||
 | 
					{	
 | 
				
			||||||
 | 
					#ifdef __powerc
 | 
				
			||||||
 | 
						long speed;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						// gestaltProcClkSpeed available on System 7.5.2 and above
 | 
				
			||||||
 | 
						if (Gestalt (gestaltProcClkSpeed, &speed) != noErr)
 | 
				
			||||||
 | 
							// Only PowerPCs running pre-7.5.2 are 60-80 MHz
 | 
				
			||||||
 | 
							// machines.
 | 
				
			||||||
 | 
							mTimebaseTicksPerMillisec =  6000.0D;
 | 
				
			||||||
 | 
						// Assume 10 cycles per clock update, as in 601 spec. Seems true
 | 
				
			||||||
 | 
						// for later chips as well.
 | 
				
			||||||
 | 
						mTimebaseTicksPerMillisec = speed / 1.0e4D;
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
						// 68K VIA-based machines (see Develop Magazine no. 29)
 | 
				
			||||||
 | 
						mTimebaseTicksPerMillisec = 783.360D;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					unsigned long CRandomizer::SysTimer (void)	// returns the lower 32
 | 
				
			||||||
 | 
											// bit of the chip timer
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					#ifdef __powerc
 | 
				
			||||||
 | 
						return GetPPCTimer (mIs601);
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
						UnsignedWide usec;
 | 
				
			||||||
 | 
						Microseconds (&usec);
 | 
				
			||||||
 | 
						return usec.lo;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef __powerc
 | 
				
			||||||
 | 
					// The timebase is available through mfspr on 601, mftb on later chips.
 | 
				
			||||||
 | 
					// Motorola recommends that an 601 implementation map mftb to mfspr
 | 
				
			||||||
 | 
					// through an exception, but I haven't tested to see if MacOS actually
 | 
				
			||||||
 | 
					// does this. We only sample the lower 32 bits of the timer (i.e. a
 | 
				
			||||||
 | 
					// few minutes of resolution)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					asm unsigned long GetPPCTimer (register bool is601)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						cmplwi	is601, 0	// Check if 601
 | 
				
			||||||
 | 
						bne	_601		// if non-zero goto _601
 | 
				
			||||||
 | 
						mftb  	r3		// Available on 603 and later.
 | 
				
			||||||
 | 
						blr			// return with result in r3
 | 
				
			||||||
 | 
					_601:
 | 
				
			||||||
 | 
						mfspr r3, spr5  	// Available on 601 only.
 | 
				
			||||||
 | 
									// blr inserted automatically
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
							
								
								
									
										43
									
								
								MacOS/Randomizer.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										43
									
								
								MacOS/Randomizer.h
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,43 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 | 
					//	Gathers unpredictable system data to be used for generating
 | 
				
			||||||
 | 
					//	random bits
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <MacTypes.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					class CRandomizer
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
					public:
 | 
				
			||||||
 | 
						CRandomizer (void);
 | 
				
			||||||
 | 
						void PeriodicAction (void);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					private:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// Private calls
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						void		AddTimeSinceMachineStartup (void);
 | 
				
			||||||
 | 
						void		AddAbsoluteSystemStartupTime (void);
 | 
				
			||||||
 | 
						void		AddAppRunningTime (void);
 | 
				
			||||||
 | 
						void		AddStartupVolumeInfo (void);
 | 
				
			||||||
 | 
						void		AddFiller (void);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						void		AddCurrentMouse (void);
 | 
				
			||||||
 | 
						void		AddNow (double millisecondUncertainty);
 | 
				
			||||||
 | 
						void		AddBytes (void *data, long size, double entropy);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						void		GetTimeBaseResolution (void);
 | 
				
			||||||
 | 
						unsigned long	SysTimer (void);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						// System Info	
 | 
				
			||||||
 | 
						bool		mSupportsLargeVolumes;
 | 
				
			||||||
 | 
						bool		mIsPowerPC;
 | 
				
			||||||
 | 
						bool		mIs601;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						// Time info
 | 
				
			||||||
 | 
						double		mTimebaseTicksPerMillisec;
 | 
				
			||||||
 | 
						unsigned long	mLastPeriodicTicks;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						// Mouse info
 | 
				
			||||||
 | 
						long		mSamplePeriod;
 | 
				
			||||||
 | 
						Point		mLastMouse;
 | 
				
			||||||
 | 
						long		mMouseStill;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
							
								
								
									
										18
									
								
								MacOS/TODO
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								MacOS/TODO
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,18 @@
 | 
				
			|||||||
 | 
					-------------------------------------------------------------------
 | 
				
			||||||
 | 
					Verify server certificate
 | 
				
			||||||
 | 
					-------------------------------------------------------------------
 | 
				
			||||||
 | 
					Currently omitted from the project:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						crypto/tmdiff.c
 | 
				
			||||||
 | 
						crypto/bio/bss_conn.c
 | 
				
			||||||
 | 
						crypto/bio/b_sock.c
 | 
				
			||||||
 | 
						crypto/bio/bss_acpt.c
 | 
				
			||||||
 | 
						crypto/bio/bss_log.h
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					-------------------------------------------------------------------
 | 
				
			||||||
 | 
					Build libraries to link with...
 | 
				
			||||||
 | 
					-------------------------------------------------------------------
 | 
				
			||||||
 | 
					Port openssl application.
 | 
				
			||||||
 | 
					-------------------------------------------------------------------
 | 
				
			||||||
 | 
					BN optimizations (currently PPC version is compiled with BN_LLONG)
 | 
				
			||||||
 | 
					-------------------------------------------------------------------
 | 
				
			||||||
							
								
								
									
										9
									
								
								MacOS/_MWERKS_GUSI_prefix.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										9
									
								
								MacOS/_MWERKS_GUSI_prefix.h
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,9 @@
 | 
				
			|||||||
 | 
					#include <MacHeaders.h>
 | 
				
			||||||
 | 
					#define B_ENDIAN
 | 
				
			||||||
 | 
					#ifdef __POWERPC__
 | 
				
			||||||
 | 
					#pragma longlong on
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if 1
 | 
				
			||||||
 | 
					#define MAC_OS_GUSI_SOURCE
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#define MONOLITH
 | 
				
			||||||
							
								
								
									
										9
									
								
								MacOS/_MWERKS_prefix.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										9
									
								
								MacOS/_MWERKS_prefix.h
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,9 @@
 | 
				
			|||||||
 | 
					#include <MacHeaders.h>
 | 
				
			||||||
 | 
					#define B_ENDIAN
 | 
				
			||||||
 | 
					#ifdef __POWERPC__
 | 
				
			||||||
 | 
					#pragma longlong on
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if 0
 | 
				
			||||||
 | 
					#define MAC_OS_GUSI_SOURCE
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#define MONOLITH
 | 
				
			||||||
							
								
								
									
										5
									
								
								MacOS/buildinf.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										5
									
								
								MacOS/buildinf.h
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,5 @@
 | 
				
			|||||||
 | 
					#ifndef MK1MF_BUILD
 | 
				
			||||||
 | 
					#  define CFLAGS	"-DB_ENDIAN"
 | 
				
			||||||
 | 
					#  define PLATFORM	"macos"
 | 
				
			||||||
 | 
					#  define DATE		"Sun Feb 27 19:44:16 MET 2000"
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
							
								
								
									
										820
									
								
								MacOS/mklinks.as.hqx
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										820
									
								
								MacOS/mklinks.as.hqx
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,820 @@
 | 
				
			|||||||
 | 
					(This file must be converted with BinHex 4.0)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					:#QeVE'PZDh-ZBA-!39"36'&`E(3J!!!!!!!!!*LiI6m!!!!!!3!!!*G#!!#@3J!
 | 
				
			||||||
 | 
					!!AChFQPd!!!!K3)"!3m(Fh9`F'pbG!!!!)B#!3%$"(0eFQ8!!!#(!J-%"!3("3C
 | 
				
			||||||
 | 
					cGfPdBfJ!!!#)!J%"#39cH@jMD!!!!)N#"J%$!`-&"3-'FhPcG'9Y!!!!LJ)&"3)
 | 
				
			||||||
 | 
					%!J8("!-#!`4dB@*X!!!!L`))!3-$!`-$!`-$"(4PE'`!!!#-!J)"#38$G'KP!!!
 | 
				
			||||||
 | 
					!M3))(J)@!Ki#!J))!K)#!`)B!Kd%G'KPE3!!!)i#!J%&#`4dD'9j!!!!M`)#!J)
 | 
				
			||||||
 | 
					#$3TdD(*[G@GSEh9d!!!!N!!#!3%&"(4TCQB!!!#4!J%"!`4dD@eP!!!!NJ)"!JS
 | 
				
			||||||
 | 
					#!h4T!!!!'N!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!H!!!!!!!#!!!!!!
 | 
				
			||||||
 | 
					!!!!!!!!!!!!!rrrrr`!!!$3!!!!N!!!!!#"[!!5JAb"[!!5K++!M6R9$9'mJFR9
 | 
				
			||||||
 | 
					Z)(4SDA-JFf0bDA"d)'&`F'aTBf&dD@pZ,#"jEh8JEA9cG#"QDA*cG#"TER0dB@a
 | 
				
			||||||
 | 
					X)%&`F'aP8f0bDA"d,J!!!)C8D'Pc)(0MFQP`G#"MFQ9KG'9c)#iZ,fPZBfaeC'8
 | 
				
			||||||
 | 
					[Eh"PER0cE#"KEQ3JCQPXE(-JDA3JGfPdD#"ZC@0PFh0KFRNJB@aTBA0PFbi0$8P
 | 
				
			||||||
 | 
					d)'eTCfKd)(4KDf8JB5"hD'PXC5"dEb"MEfe`E'9dC5"cEb"`E'9KFf8JBQ8JF'&
 | 
				
			||||||
 | 
					dD@9ZG$SY+3!!!#S!!J!!!!!!$3!+!"!!!!!-!!!!!!!!!!!!63!0!!S!%!%!!!`
 | 
				
			||||||
 | 
					!!!!!!!!!!!!B!!!!+!!!!!!!!!!)!!!!)!#N2c`!!DR`!!!!l!!!!!&19[ri,`0
 | 
				
			||||||
 | 
					f!#m$-$bKVDG'*KmY52ri,`-`2+LITdBQ(b!ZrrLa`'FJ,`-J2'0`ER4"l[rm)NL
 | 
				
			||||||
 | 
					KV5+)*Kp+3'B)5Ulrr'F#GJ%3!bBZrr41ANje6PB!!#m-@Bm[2%j29%Nr2!#!U"m
 | 
				
			||||||
 | 
					SAb!-CJK`!cm!UFKJ+#m-UC)J9#!)d+J!'#&!!"JJ9#!)d+J!(#&!!"a9Mbm8)&q
 | 
				
			||||||
 | 
					JAMk!9%mSE[rm6Pj1G8j@!!![$%kkre4+!'FU@Bm[2'&`E(3[2(0MF(4`)DJU+&m
 | 
				
			||||||
 | 
					J$'F5@Bm[$#mm!!!!!A!!U#UTp&K26VVrG#KZrra1ANje!!!!('&`E(3!!!!"4P*
 | 
				
			||||||
 | 
					&4J!!!!!!J%P$6L-!!!!!!*B!!!!"!!!!!!G"8&"-!!!!!!!"!!!"!!!!!S!!!!4
 | 
				
			||||||
 | 
					!!!"i)!!!K"!!!3))!!)#"!!%"!)!#!J"!"!8!)!J)J"!3%%!)2#!J"#*!%!)KJ!
 | 
				
			||||||
 | 
					J")3!)!*!!"!")!!3!K!!%!3)!"!)"!!J%!)!3#!"!)"!!S%!J!5#!3!)4!)!#%J
 | 
				
			||||||
 | 
					%!!KB#!!%C"!!!m)J!!!"3!!!!)!!!!%!!!!$J!!!"m!!!(rJ!!$rm!!"rrJ!!rr
 | 
				
			||||||
 | 
					m!!IrrJ!2rrm!(rrrJ$rrrm"rrrrJrrrrm2rrrrMrrrrmrrrrrRrrrrmrrrrq(rr
 | 
				
			||||||
 | 
					rr!rrrrJ(rrr`!rrri!(rrm!$rrq!"rrr!!rrrJ!2rr`!$rri!!IRm!!$`q!!!!(
 | 
				
			||||||
 | 
					!!!!!J!!!!!)!!!!!!!!!!!m!!!!!!!!!!!!!!!!!!!$`m!!!!!!!!!!!!!!!!!!
 | 
				
			||||||
 | 
					2!!m!!!!!!!!!!!!!!!rrm!!!m!!!!!!!!!!!!!$`c0m!!!m!!!!!!!!!!!!2!!c
 | 
				
			||||||
 | 
					-m!!!m!!!!!!!!!!!m!$-cI!!!!m!!!!!!!!!$`!-c0m!!!!!m!!!!!!!!2!!c-h
 | 
				
			||||||
 | 
					`!!!!!!m!!!!!!!m!$-cIh`!!!!!!m!!!!!$`!-c0rGh`!!!!!!m!!!!2!!c-hph
 | 
				
			||||||
 | 
					-h`!!!!!!m!!!rrr-cIhF`-h`!!!!!!m!!2lFr0rGc!`-h`!!!!!!m!$pc-rph-$
 | 
				
			||||||
 | 
					!`-h`!!!!!!m!r-`2cF`-$!!-r3!!!!!!m!m!`-c!`-!!$0m!!!!!$-m!m!`-$!`
 | 
				
			||||||
 | 
					!!-cI!!!!!-c`!!m!`-$!!!`-h`!!!!c2!!!!m!`-!!$!c0m!!!$-m!!!!!m!`!!
 | 
				
			||||||
 | 
					-$-hm!!!-c`!!!!!!m!!!`-cIc!!!c2!!!!!!!!m!$!c0r-`!$-m!!!!!!!$pm-$
 | 
				
			||||||
 | 
					-hmc!!-c`!!!!!!!2hI`-cIc-!!c2!!!!!!!!rGc2c0r-`!$-m!!!!!!!!2h-cmh
 | 
				
			||||||
 | 
					mc!!-c`!!!!!!!!$mc!rIr-!!c2!!!!!!!!!!$m$2m!r-$-m!!!!!!!!!!!$rr`!
 | 
				
			||||||
 | 
					!r-c`!!!!!!!!!!!!!!!!!!r2!!!!!!!!!!!!!!!!!!!!m!!!!!!!!!!!!!"!!B!
 | 
				
			||||||
 | 
					13"%J)4"##18%Q)+3!%&!)5!L%%3BL#83*L!G3!#!!B!2`"rJ2r"rq2rmrrlrrhr
 | 
				
			||||||
 | 
					r2riIr"ri2r!ri"h!!)!!!!#!!!!!$r!!!!!!!2r`$`!!!!!2$!m!m!!!!2$!c`!
 | 
				
			||||||
 | 
					2!!!2$!c`!!$`!2r`cpm!!!m!rGrpc2!!!2$p$p`-c`!!$`m!`-$0m!$2!2!-$-h
 | 
				
			||||||
 | 
					`$2!!$`$-hm$2!!!2m-hm$2!!!2h2hm$2!!!!r-rm$2!!!!!2r`r2!!!!!!!!!2!
 | 
				
			||||||
 | 
					!!!!!!!#D8f0bDA"d)%&`F'aTBf&dD@pZ$3e8D'Pc)(0MFQP`G#"MFQ9KG'9c)#i
 | 
				
			||||||
 | 
					Z,fPZBfaeC'8[Eh"PER0cE#"KEQ3JCQPXE(-JDA3JGfPdD#"ZC@0PFh0KFRNJB@a
 | 
				
			||||||
 | 
					TBA0PFbi0$8Pd)'eTCfKd)(4KDf8JB5"hD'PXC5"dEb"MEfe`E'9dC5"cEb"`E'9
 | 
				
			||||||
 | 
					KFf8JBQ8JF'&dD@9ZG$SY+3!!!")!!J!!!!!!!!!!!!%!"J!'%iN!!!!+@1!!!b!
 | 
				
			||||||
 | 
					!!!-J!!!!!"3!+`!(!Cm#@!!V!!F"f!*B!!!!!3!!M`C'BA0N98&6)$%Z-6!a,M%
 | 
				
			||||||
 | 
					`$J!!!!32rrm!!3!#!!-"rrm!!!d!!3!"D`!!!!!!!!!%!J!%!!)!"3!'$3!&!!*
 | 
				
			||||||
 | 
					X!!)!!!U`!!IrrJd!"`!#6`!!!!!+X!!)!!N0!!J!!@X!!!!%#Um!#J)!#J!#!!X
 | 
				
			||||||
 | 
					!$!d!#`!#E!!#!!3!"2rprr`"rrd!!!(rr!!!!J!-!!)!$3!1$3!0!!*X!!%!"!!
 | 
				
			||||||
 | 
					%rrX!$`(rq`!!$!!2!&N!8b"(CA3JF'&dD#"dEb"dD'Pc)%&`F'aP8f0bDA"d)'&
 | 
				
			||||||
 | 
					`F'aPG$XJGA0P)'Pd)(4[)'C[FQdJG'KP)("KG'JJG'mJG'KP)'PZBfaeC'8JCQp
 | 
				
			||||||
 | 
					XC'9b!!)!!!)!$J!#!"!!%3d!%!!#E!!"!!3!"2rk!")"rrS!!!`!%J!Q!#!JB@j
 | 
				
			||||||
 | 
					N)(4SC5"[G'KPFL"bC@aPGQ&ZG#"QEfaNCA*c,J!#!!!#!"%!!J!6!"30!"-!!R-
 | 
				
			||||||
 | 
					!!!!%!"%!&3!@$3!9!!*M!!!!"!!1!"F!'!d!&`!#E!!&!!3!$!!CrrN0!"N!!Qi
 | 
				
			||||||
 | 
					!!!!%!!`!'J!E$3!D!!)d!!!!"3!-rrJ!(!Vrq!!%#Q0[BQS0!"`!!Q`!"3!'!!X
 | 
				
			||||||
 | 
					!(Irh$3!G!!0*!!)!"J!,rrB!([re#[rf!"JZC@&bFfCQC(*KE'Pc!!!!!!!!)!"
 | 
				
			||||||
 | 
					KCQ4b$3!H!!"Q!!!!"J!(![re!!!"rrF!!!d!'`!"E3!!!!3!"3!I$`!I!6J)ER9
 | 
				
			||||||
 | 
					XE!!!!!!!!Gq!rrm!!!!A"NCTEQ4PFJ!!(`*[Me!!ASfm!Qq,i!"HA[!!I&M!!!!
 | 
				
			||||||
 | 
					!!!!!'mi!!JN#!Qq-1!!!Kb%#Ei`J!!!!!%C14&*038e"3e-!!"%!B@aTF`!!!!!
 | 
				
			||||||
 | 
					!fJ!#!!!-6@&MD@jdEh0S)%K%!!!!!!!!!!!!!!!!!!!!XSA5h%*%!!!!!!!A"NC
 | 
				
			||||||
 | 
					TEQ4PFJ!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 | 
				
			||||||
 | 
					!!!!!!!!!!!!!!!!!!!!!3rLc#@a!4Nj%8Ne"3e2rrrrr!!!!!!!!!!!!!!!!!!!
 | 
				
			||||||
 | 
					!!!!!!!e6HA0dC@dJ4QpXC'9b!!!"!!3!!!!A!!)!)8eKBfPZG'pcD#")4$T6HA0
 | 
				
			||||||
 | 
					dC@dJ4QpXC'9b1NCTEQ4PFJ$rr`!!!Irj!!!0!"J!!@d!!!!-!!hrp!Vrp!!%#Q0
 | 
				
			||||||
 | 
					dH(30!"B!!@m!!!!!!!$rm`[rm`!5-!!(G'KPF'&dD!!(G'KP8'&dD!)!&!!#!#!
 | 
				
			||||||
 | 
					!)3d!)!!#E!!#!")!%[rbrr%"rr)!!!(rm3!!!J!K!!)!)J!M$3!L!!*b!!!!%J!
 | 
				
			||||||
 | 
					A!#3!*3d!*!!#EJ!$!")!&3!Q!#F0!#B!!6%!!!!6!"Arm!Vrm!!%#R4iC'`0!#F
 | 
				
			||||||
 | 
					!!6%!!!!5!"2rl`Vrl`!%#Q&cBh)0!#8!!@m!!!!!!!$rlJ[rlJ!F-!!-G'KPEfa
 | 
				
			||||||
 | 
					NC'9XD@ec!!adD'92E'4%C@aTEA-#!#-!!J!S!#N0!#J!!R)!!!!B!"d!+J!V$3!
 | 
				
			||||||
 | 
					U!!&Y!!!!'!!C!#`-!#`!"`!"1J!#!!!0!#X!!Qi!!`!!!!!!,3!Z$3!Y!!%a!!!
 | 
				
			||||||
 | 
					!'J!Frqd+rqd!"!TdH'4X$3!Z!!%a!!!!'3!Drq`+rq`!"!TKFf0b!J!T!!)!,`!
 | 
				
			||||||
 | 
					`$3![!!*X!!)!(J!Hrq[rkJ(rk`!!!IrU!!!#!$!!!J!a!$)0!$%!!R)!!!!H!#X
 | 
				
			||||||
 | 
					!-`!d$3!c!!*X!!8!(J!T!$Ark3d!03!#EJ!!!"i!+3!f!$F0!$B!!cF"!!!I!#R
 | 
				
			||||||
 | 
					rk!!i!$N+rqJ!"!TMDA4Y$3!i!!&Y!!!!)`!PrqF$rqF!!3d!13!"E3!!!#B!+2r
 | 
				
			||||||
 | 
					Q!rrQrrd0!$F!!@m!!!!H!"rrj3[rj3!5-!!(G'KPF'&dD!!(G'KP8'&dD!(rk3!
 | 
				
			||||||
 | 
					!$3!d!!&[!!!!!!!!rq3,rq3!)$!!$R4SCA"bEfTPBh4`BA4S!!jdD'93FQpUC@0
 | 
				
			||||||
 | 
					d8'&dD!)!-J!#!$S!1`d!1J!#FJ!!!#`!1`!m!$d0!$`!!Q-!!!!X!$N!2J!r$3!
 | 
				
			||||||
 | 
					q!!*X!!8!,!!h!%$ri`d!3!!#EJ!!!#`!0`""!%)0!%%!!cF"!!!Y!$IriJ"$!%3
 | 
				
			||||||
 | 
					+rq)!"!TMDA4Y$3"$!!&Y!!!!-3!crq%$rq%!!3d!4!!"E3!!!$3!0[rJ!rrJrri
 | 
				
			||||||
 | 
					0!%)!!@m!!!!X!#hrh`[rh`!5-!!(G'KPF'&dD!!(G'KP8'&dD!(ri`!!$3!r!!&
 | 
				
			||||||
 | 
					Y!!!!0`!irpi+rpi!"!T849K8$3!p!!&[!!!!!!!!rpd,rpd!&M!!#A4SC@ePF'&
 | 
				
			||||||
 | 
					dD!!*G'KP6@93BA4S!J!l!!)!43"'$3"&!!*X!!)!2!!mrpcrf`(rh!!!!IrE!!!
 | 
				
			||||||
 | 
					#!%B!!J"(!%J0!%F!!R)!!!!m!%8!53"+$3"*!!*M!!!!2!""!%X!6!d!5`!#BJ!
 | 
				
			||||||
 | 
					!!$`!2`"0!%i0!%d!!@m!!!!m!$hrfJ[rfJ!J-!!1G'KPF(*[DQ9MG("KG'J!$R4
 | 
				
			||||||
 | 
					SC9"bEfTPBh43BA4S$3"1!!&Y!!!!23!q!%m-!%m!$3!(D@jME(9NC3!#!!!0!%`
 | 
				
			||||||
 | 
					!!@d!!!!r!%$rf3Vrf3!%#P4&@&30!%S!!@m!!!!!!!$rf![rf!!Q-!!4D@jME(9
 | 
				
			||||||
 | 
					NC@C[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S!J")!!)!8!"4$3"3!!*b!!!
 | 
				
			||||||
 | 
					!4J"9!&)!8`d!8J!#B`!!!%B!83"8!&80!&3!!Q)!!!"'!%m!9J"A$3"@!!*L!!!
 | 
				
			||||||
 | 
					!4J",!&J!@3d!@!!"E`!!!%B!4rrA#rrA!#!`!!jdD'9`FQpUC@0dF'&dD!!1G'K
 | 
				
			||||||
 | 
					P8(*[DQ9MG&"KG'J0!&N!!@d!!!"(!%S!@J`!@J!0!!GTEQ0XG@4P!!)!!!d!9`!
 | 
				
			||||||
 | 
					"E3!!!%X!6J"E$!"E!!d!"fp`C@jcFf`!!J!!$3"9!!&Y!!!!6`"3rpB+rpB!"!T
 | 
				
			||||||
 | 
					849K8$3"6!!&[!!!!!!!!rp8,rp8!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&
 | 
				
			||||||
 | 
					dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S!J"4!!)!A!"G$3"F!!*b!!!!9J"
 | 
				
			||||||
 | 
					K!&i!A`d!AJ!#B`!!!&B!A3"J!'%0!'!!!Q)!!!"@!&X!BJ"M$3"L!!&[!!!!9J"
 | 
				
			||||||
 | 
					Arp3,rp3!)$!!$R4SCA"bEfTPBh4`BA4S!!jdD'93FQpUC@0d8'&dD!d!B`!"E3!
 | 
				
			||||||
 | 
					!!&F!@J"N$!"N!!`!"Q0bHA"dE`!#!!!0!'%!!@d!!!"E!&crd`Vrd`!%#P4&@&3
 | 
				
			||||||
 | 
					0!&m!!@m!!!!!!!$rdJ[rdJ!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4Qp
 | 
				
			||||||
 | 
					XC'9b8'&dD!)!A3!#!'8!CJd!C3!#FJ!!!')!E3"R!'J0!'F!!Q-!!!"L!'N!D3"
 | 
				
			||||||
 | 
					U$3"T!!*L!!!!BJ"R!'X!E!d!D`!"E`!!!')!Brr4#rr4!#!`!!jdD'9`FQpUC@0
 | 
				
			||||||
 | 
					dF'&dD!!1G'KP8(*[DQ9MG&"KG'J0!'`!!@d!!!"M!'B!E3`!E3!*!!0cFf`!!J!
 | 
				
			||||||
 | 
					!$3"U!!&Y!!!!C`"Srp!+rp!!"!T849K8$3"S!!&[!!!!!!!!rmm,rmm!(M!!$A0
 | 
				
			||||||
 | 
					cE'C[E'4PFR"KG'J!$A0cE%C[E'4PFP"KG'J#!'B!!J"Z!'m0!'i!!R)!!!"Z!(8
 | 
				
			||||||
 | 
					!F!"a$3"`!!*M!!!!EJ"a!()!F`d!FJ!"E`!!!'i!Err1#rr1!#!`!!jdD'9`FQp
 | 
				
			||||||
 | 
					UC@0dF'&dD!!1G'KP8(*[DQ9MG&"KG'J0!(-!!@d!!!"[!($rc3Vrc3!%#P4&@&3
 | 
				
			||||||
 | 
					0!(%!!@m!!!!!!!$rc![rc!!Q-!!4Eh"PER0cE'C[E'4PFR"KG'J!%@p`C@jcFfa
 | 
				
			||||||
 | 
					'EfaNCA*3BA4S!J"[!!)!G!"e$3"d!!*X!!)!GJ"frm[rbJ(rb`!!!Ir+!!!#!(8
 | 
				
			||||||
 | 
					!!J"f!(F0!(B!!R)!!!"f!(X!H!"j$3"i!!&[!!!!GJ"hrmN,rmN!($!!$(4SC@p
 | 
				
			||||||
 | 
					XC'4PE'PYF`!-G'KP6faN4'9XD@ec$3"j!!*Z!!-!!!!!!(S!H`d!HJ!"-3!!!(J
 | 
				
			||||||
 | 
					!H[r)#[r)!!3+G(KNE!d!H`!"-3!!!(F!H2r(#[r(!!3+BA0MFJ)!G`!#!(`!I3d
 | 
				
			||||||
 | 
					!I!!#E!!#!(`!I2r'rm8"rmB!!!(ra3!!!J"p!!)!IJ"r$3"q!!*X!!%!I!"mrm3
 | 
				
			||||||
 | 
					!J!(ra!!!$!#!!%!!1L"NC@aPG'8JEfaN)'PZBfaeC'8kEh"PER0cE#"QEfaNCA)
 | 
				
			||||||
 | 
					JB@jN)(*PBh*PBA4P)'Pd)'0XC@&ZE(N!!J!!!J"r!!)!J3##$3#"!!*X!!)!I!"
 | 
				
			||||||
 | 
					mrm2r`J(r``!!!Ir#!!!#!))!!J#$!)30!)-!!e%!!!"m!+8!K3#'!)F0!)8!!@X
 | 
				
			||||||
 | 
					!!!"r!*`!L!)!L!!#!)N!LJd!L3!$53!#!(m!N[r"!)[r`!Vr`3!B,QeTFf0cE'0
 | 
				
			||||||
 | 
					d+LSU+J!!!!!!!*!!!#SU+LS0!)X!!Qi!!!"r!)i!M!#0$3#-!!)d!!!!K`#1rlm
 | 
				
			||||||
 | 
					!MJVr[`!%#Q0QEf`0!)i!!@d!!!#+!)d!M``!M`!0!!G[F'9ZFh0X!!)!!!d!M3!
 | 
				
			||||||
 | 
					#0!!!!(m!Krqq!*!!#[qq!!3+BfC[E!d!N!!!!@m!!!#$!)Er[3[r[3!Q-!!4D@j
 | 
				
			||||||
 | 
					ME(9NC@C[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S![r!!!!#!)S!!J#4rl`
 | 
				
			||||||
 | 
					0!*%!!dN!!J#6!*crZ`#5rlS+rlX!'#jMEh*PC'9XEbSU+LS!!!!!!!#3!!!U+LS
 | 
				
			||||||
 | 
					U$3#5!!%a!!!!N`#BrlN+rlN!"!TcC@aP![qk!!!#rl`!!!d!KJ!$8J!!!!!!!2q
 | 
				
			||||||
 | 
					irlIrYJVrZ!!B,Q&cBh*PFR)J+LSU+J!!!!!!!*!!!#SU+LS"rlF!!!,rYJ!!$3#
 | 
				
			||||||
 | 
					(!!*X!!%!T!#Nrl8!N`(rY3!!$!#6!"-!$5"TCfj[FQ8JCA*bEh)!!J!!!J#%!!)
 | 
				
			||||||
 | 
					!P!#9$3#8!!*X!!)!TJ#Qrl6rX`(rY!!!!Iqc!!!#!*8!!J#@!*F0!*B!!dN!!J#
 | 
				
			||||||
 | 
					Q!,lrX[qa!*J+rl)!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Iqa!!!'!*J
 | 
				
			||||||
 | 
					!!rq`!*N!QJVrX!!%#QY[Bf`0!*N!!@d!!!#U!+hrV`VrV`!%#Q0QEf`'!*S!!rq
 | 
				
			||||||
 | 
					Z!*[rV3VrVJ!%#QPZFfJ0!*X!!M3!!!#`!,MrV!#F#[qX!!3+BfC[E!d!R!!"E`!
 | 
				
			||||||
 | 
					!!,3!YrqV#rqV!#B`!"&TEQ0XG@4PCQpXC'9bF'&dD!!4D@jME(9NC8C[E'4PFP"
 | 
				
			||||||
 | 
					KG'J'rkd!!!)!P`!#!*d!RJd!R3!#FJ!!!,m!aJ#I!+!0!*m!!Q`"!!#r!-)!SIq
 | 
				
			||||||
 | 
					U$3#K!!%a!!!![`$#rkN+rkN!"!TbFfad!IqU!!!0!+!!!@m!!!!!!!$rU![rU!!
 | 
				
			||||||
 | 
					Z-!!9G'KPEQ9hCQpXC'9bFQ9QCA*PEQ0P!"9dD'91CAG'EfaNCA*5C@CPFQ9ZBf8
 | 
				
			||||||
 | 
					#!*i!!J#L!+-0!+)!!dN!!J$(!-lrT`#NrkB+rkF!'#jYDA0MFfaMG#SU+LS!!!!
 | 
				
			||||||
 | 
					!!!#3!!!U+LSU$3#N!!&[!!!!a`$+rk8,rk8!,M!!&A4SC@jPGfC[E'4PFR*PCQ9
 | 
				
			||||||
 | 
					bC@jMC3!9G'KP6Q9h4QpXC'9b8Q9QCA*PEQ0P![qQ!!!#!+-!!J#P!+B0!+8!!R)
 | 
				
			||||||
 | 
					!!!$2!0`!T`#S$3#R!!&Y!!!!c`$5!+N-!+N!$3!(Eh"PER0cE!!#!!!0!+J!!Qi
 | 
				
			||||||
 | 
					!!!!!!!!!UJ#V$3#U!!%a!!!!e`$Erk3+rk3!"!T`EQ&Y$3#V!!%a!!!!dJ$Ark-
 | 
				
			||||||
 | 
					+rk-!"!TcC@aP!J#Q!!)!V!#Y$3#X!!*X!!)!h3$Grk,rS3(rSJ!!!IqK!!!#!+d
 | 
				
			||||||
 | 
					!!J#Z!+m0!+i!!Q`!!3$G!0hrS!#`!IqJ!!!-!,!!(`!C)&0dBA*d)'eKDfPZCb"
 | 
				
			||||||
 | 
					dD'8JB@aTBA0PF`!#!!!#!+m!!J#a!,)0!,%!!dN!!J$G!3ArRrqH!,-+rjm!'#j
 | 
				
			||||||
 | 
					MEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!IqH!!!'!,-!!rqG!,3!Y3VrR3!%#QY
 | 
				
			||||||
 | 
					[Bf`0!,3!!@d!!!$K!16rR!VrR!!%#Q&XD@%'!,8!!rqE!,B!Y`VrQ`!%#QPZFfJ
 | 
				
			||||||
 | 
					0!,B!!M3!!!$R!1rrQJ#i#[qD!!3+BfC[E!d!Z!!"E`!!!1X!l[qC#rqC!$3`!"K
 | 
				
			||||||
 | 
					[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&
 | 
				
			||||||
 | 
					dD!B!Y`!$rjJ!ZIqA#[qB!!3+G'mJ)!d!Z3!#EJ!!!2)!r`#k!,X0!,S!!M3!!!$
 | 
				
			||||||
 | 
					i!2rrPJ#m#[q@!!3+CQPXC3d![!!"E3!!!2X!rJ#p$!#p!"-!$@p`C@jcFfaMEfj
 | 
				
			||||||
 | 
					Q,QJ!!J!!$3#l!!)d!!!!mJ$irj8![JVrP3!%#Q0QEf`0!,i!!@m!!!$f!2IrP![
 | 
				
			||||||
 | 
					rP!!@-!!*G'KPE@9`BA4S!!PdD'90C9"KG'J'rjF!!!)!XJ!#!,m!`!d![`!#E!!
 | 
				
			||||||
 | 
					#!3B""[q6rj)"rj-!!!(rNJ!!!J$!!!)!`3$#$3$"!!*b!!!""J%4!--!a!d!``!
 | 
				
			||||||
 | 
					#BJ!!!3B"$3$&!-B0!-8!!@m!!!%'!3RrN3[rN3!N-!!3Bh*jF(4[CQpXC'9bF'&
 | 
				
			||||||
 | 
					dD!!3Bh*jF(4[4QpXC'9b8'&dD!d!aJ!"E3!!!3N"$!$($!$(!!X!"6TKFfia!!)
 | 
				
			||||||
 | 
					!!!d!a!!"E`!!!!!!!2q3!![rN!!!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)!`J!
 | 
				
			||||||
 | 
					#!-J!b3d!b!!$53!#!4)"22q2rii!bJVrM`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!
 | 
				
			||||||
 | 
					!!'jeE'`"rii!!!B!bJ!$rid!b`$-#[q0!!3+DfpME!d!b`!"E3!!!4B"'Iq-#[q
 | 
				
			||||||
 | 
					-!!3+B@aTB3B!c!!$riX!c3$1#[q,!!3+D@jcD!d!c3!#0!!!!4`"*2q+!-m+riS
 | 
				
			||||||
 | 
					!"!TMCQpX$3$2!!&[!!!")!%MriN,riN!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9
 | 
				
			||||||
 | 
					bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J$1!!2rL!$3riF+riJ!"!T
 | 
				
			||||||
 | 
					dEb!J$3$3!!*Z!!!"*`%f!0%!dJd!d3!#0!!!!5m"0[q'!0-+riB!"!TQD@aP$3$
 | 
				
			||||||
 | 
					6!!&Y!!!"-J%e!03-!03!$!!'BA0Z-5jS!!)!!!d!dJ!#0!!!!5F",rq&!08+ri8
 | 
				
			||||||
 | 
					!"!TMCQpX$3$9!!&[!!!"+`%Zri3,ri3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!E
 | 
				
			||||||
 | 
					rK`!!!J$*!!)!eJ$A$3$@!!0*!!)"23&Rri2rJJ$B#[q$!"JZBfpbC@0bC@`U+LS
 | 
				
			||||||
 | 
					U!!!!!!!!N!!!ER9XE!(rJJ!!"J$B!!2rJ3$C!0S+ri%!"!TVEf0X$3$C!!&Y!!!
 | 
				
			||||||
 | 
					"33&%ri!+ri!!"!TKE'PK"J$D!!2rI`$E!0`+rhm!"!TTER0S$3$E!!)d!!!"4`&
 | 
				
			||||||
 | 
					2rhi!h3VrIJ!%#Q0QEf`0!0d!!@m!!!&,!8lrI3[rI3!d-!!BEh"PER0cE'PZBfa
 | 
				
			||||||
 | 
					eC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!0`!!rpm!0l
 | 
				
			||||||
 | 
					rH`VrI!!%#R4[)#!0!0i!!Qi!!!&5!@%!h`$J$3$I!!)d!!!"@J&KrhS!i3VrHJ!
 | 
				
			||||||
 | 
					%#QCTE'80!1%!!@d!!!&G!@!!iJ`!iJ!3!!TKFfiaAfeKBbjS!!)!!!d!i!!#0!!
 | 
				
			||||||
 | 
					!!9)"@[pj!1-+rhN!"!TMCQpX$3$M!!&[!!!"9J&CrhJ,rhJ!&$!!#(4PEA"`BA4
 | 
				
			||||||
 | 
					S!!KdC@e`8'&dD!ErH`!!!J$A!!)!j!$P$3$N!!*X!!)"D!&SrhIrGJ(rG`!!!Ip
 | 
				
			||||||
 | 
					f!!!#!18!!J$Q!1F0!1B!!R)!!!&S!A-!k!$T$3$S!!*L!!!"D!&[!1S!k`d!kJ!
 | 
				
			||||||
 | 
					"E`!!!@J"Drpe#rpe!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*
 | 
				
			||||||
 | 
					3BA4S$3$V!!&Y!!!"D`&Z!1`-!1`!#J!%1Q*TE`!#!!!0!1N!!@m!!!!!!!$rG![
 | 
				
			||||||
 | 
					rG!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J$R!!)!l3$Z$3$Y!!0*!!)"G!'Hrh2
 | 
				
			||||||
 | 
					rFJ$[#[pc!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(rFJ!!"J$[!!2rF3$
 | 
				
			||||||
 | 
					`!2%+rh%!"!TVEf0X$3$`!!&Y!!!"H!&lrh!+rh!!"!TKE'PK"J$a!!2rE`$b!2-
 | 
				
			||||||
 | 
					+rfm!"!TTER0S$3$b!!)d!!!"IJ''rfi!p!VrEJ!%#Q0QEf`0!23!!@m!!!'#!BA
 | 
				
			||||||
 | 
					rE3[rE3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
 | 
				
			||||||
 | 
					NC8C[E'4PFP"KG'J'!2-!!rpX!2ArD`VrE!!%#R4[)#!0!28!!Qi!!!'*!CJ!pJ$
 | 
				
			||||||
 | 
					h$3$f!!)d!!!"N3'BrfS!q!VrDJ!%#QCTE'80!2J!!@d!!!'8!CF!q3`!q3!,!!9
 | 
				
			||||||
 | 
					LD@mZD!!#!!!0!2F!!M3!!!'*!C(rD3$k#[pT!!3+BfC[E!d!qJ!"E`!!!Bd"N!$
 | 
				
			||||||
 | 
					rD![rD!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[pV!!!#!1i!!J$l!2`0!2X!!Q`
 | 
				
			||||||
 | 
					!!J'I!CrrCrpQ!IpR!!!"rfB!!!)!r!!#!2d!rJd!r3!#FJ!!!Cm"UJ$r!3!0!2m
 | 
				
			||||||
 | 
					!!Q)!!!'I!DB"!3%#$3%"!!&[!!!"R`'Lrf8,rf8!*$!!%'0bHA"dEfC[E'4PFR"
 | 
				
			||||||
 | 
					KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!3)!!@d!!!'L!D8"!``"!`!*!!-kBQB!!J!
 | 
				
			||||||
 | 
					!$3%!!!&[!!!!!!!!rf3,rf3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)!rJ!#!33
 | 
				
			||||||
 | 
					""3d""!!$53!#!DX"eIpMrf)""JVrB`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'j
 | 
				
			||||||
 | 
					eE'`"rf)!!!B""J!$rf%""`%)#[pK!!3+DfpME!d""`!"E3!!!Dm"X[pJ#[pJ!!3
 | 
				
			||||||
 | 
					+B@aTB3B"#!!$rem"#3%+#[pI!!3+D@jcD!d"#3!#0!!!!E8"[IpH!3X+rei!"!T
 | 
				
			||||||
 | 
					MCQpX$3%,!!&[!!!"Z3'mred,red!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&
 | 
				
			||||||
 | 
					dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J%+!!2rA!%-reX+re`!"!TdEb!
 | 
				
			||||||
 | 
					J$3%-!!*Z!!!"`!(2!3d"$Jd"$3!#0!!!!FJ"crpD!3m+reS!"!TQD@aP$3%2!!&
 | 
				
			||||||
 | 
					Y!!!"b`(1!4!-!4!!%!!+BQa[GfCTFfJZD!!#!!!0!3i!!M3!!!(!!FMr@3%4#[p
 | 
				
			||||||
 | 
					C!!3+BfC[E!d"%3!"E`!!!F3"arpB#rpB!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J
 | 
				
			||||||
 | 
					'reX!!!)""3!#!4)"%`d"%J!#E!!#!GB"e[pAreB"reF!!!(r9J!!!J%6!!)"&!%
 | 
				
			||||||
 | 
					9$3%8!!*b!!!"eJ(K!4B"&`d"&J!#BJ!!!GB"h3%B!4N0!4J!!@m!!!(@!GRr93[
 | 
				
			||||||
 | 
					r93!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"'3!"E3!
 | 
				
			||||||
 | 
					!!GN"h!%D$!%D!!N!!cTLEJ!#!!!0!4F!!@m!!!!!!!$r9![r9!!8-!!)G'9YF("
 | 
				
			||||||
 | 
					KG'J!#(4PEA"3BA4S!J%9!!)"'`%F$3%E!!0*!!)"iJ)-re2r8J%G#[p6!"JZBfp
 | 
				
			||||||
 | 
					bC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(r8J!!"J%G!!2r83%H!4m+re%!"!TVEf0
 | 
				
			||||||
 | 
					X$3%H!!&Y!!!"jJ(Tre!+re!!"!TKE'PK"J%I!!2r6`%J!5%+rdm!"!TTER0S$3%
 | 
				
			||||||
 | 
					J!!)d!!!"l!(drdi")JVr6J!%#Q0QEf`0!5)!!@m!!!(`!I2r63[r63!d-!!BEh"
 | 
				
			||||||
 | 
					PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J
 | 
				
			||||||
 | 
					'!5%!!rp-!52r5`Vr6!!%#R4[)#!0!5-!!Qi!!!(h!JB"*!%P$3%N!!)d!!!"r`)
 | 
				
			||||||
 | 
					'rdS"*JVr5J!%#QCTE'80!5B!!@d!!!)#!J8"*``"*`!+!!4LELjS!!)!!!d"*3!
 | 
				
			||||||
 | 
					#0!!!!IF"rrp*!5J+rdN!"!TMCQpX$3%S!!&[!!!"q`(qrdJ,rdJ!&$!!#(4PEA"
 | 
				
			||||||
 | 
					`BA4S!!KdC@e`8'&dD!Er5`!!!J%F!!)"+3%U$3%T!!*X!!)#$3)0rdIr4J(r4`!
 | 
				
			||||||
 | 
					!!Ip'!!!#!5S!!J%V!5`0!5X!!R)!!!)0!KJ",3%Z$3%Y!!*L!!!#$3)8!5m"-!d
 | 
				
			||||||
 | 
					",`!"E`!!!Jd#%2p&#rp&!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'Efa
 | 
				
			||||||
 | 
					NCA*3BA4S$3%`!!&Y!!!#%!)6!6%-!6%!$3!(1Q*eCQCPFJ!#!!!0!5i!!@m!!!!
 | 
				
			||||||
 | 
					!!!$r4![r4!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J%X!!)"-J%c$3%b!!0*!!)
 | 
				
			||||||
 | 
					#'3*$rd2r3J%d#[p$!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(r3J!!"J%
 | 
				
			||||||
 | 
					d!!2r33%e!6B+rd%!"!TVEf0X$3%e!!&Y!!!#(3)Jrd!+rd!!"!TKE'PK"J%f!!2
 | 
				
			||||||
 | 
					r2`%h!6J+rcm!"!TTER0S$3%h!!)d!!!#)`)Vrci"13Vr2J!%#Q0QEf`0!6N!!@m
 | 
				
			||||||
 | 
					!!!)R!LVr23[r23!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0
 | 
				
			||||||
 | 
					-5@jME(9NC8C[E'4PFP"KG'J'!6J!!rmm!6Vr1`Vr2!!%#R4[)#!0!6S!!Qi!!!)
 | 
				
			||||||
 | 
					Z!Md"1`%m$3%l!!)d!!!#0J)prcS"23Vr1J!%#QCTE'80!6d!!@d!!!)j!M`"2J`
 | 
				
			||||||
 | 
					"2J!1!!KLG@CQCA)ZD!!#!!!0!6`!!M3!!!)Z!MEr13%r#[mj!!3+BfC[E!d"2`!
 | 
				
			||||||
 | 
					"E`!!!M)#0Imi#rmi!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rcX!!!)"-`!#!8!
 | 
				
			||||||
 | 
					"33d"3!!#E!!#!N3#42mhrcB"rcF!!!(r0J!!!J&"!!)"3J&$$3&#!!*b!!!#4!*
 | 
				
			||||||
 | 
					2!83"43d"4!!#BJ!!!N3#5`&'!8F0!8B!!@m!!!*%!NIr03[r03!N-!!3Bh*jF(4
 | 
				
			||||||
 | 
					[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"4`!"E3!!!NF#5J&)$!&)!!X
 | 
				
			||||||
 | 
					!"6TMBA0d!!)!!!d"43!"E`!!!!!!!2md#rmd!"3`!!KdC@e`F'&dD!!)G'9YF&"
 | 
				
			||||||
 | 
					KG'J#!8-!!J&*!8S0!8N!!dN!!J*3!RVr-rmb!8X+rc-!'#jMEh*PBh*PE#SU+LS
 | 
				
			||||||
 | 
					!!!!!!!#3!!"ZG@aX!Imb!!!'!8X!!rma!8`"63Vr-3!%#QY[Bf`0!8`!!@d!!!*
 | 
				
			||||||
 | 
					8!PIr-!Vr-!!%#Q&XD@%'!8d!!rm[!8i"6`Vr,`!%#QPZFfJ0!8i!!M3!!!*D!Q,
 | 
				
			||||||
 | 
					r,J&3#[mZ!!3+BfC[E!d"8!!"E`!!!Pi#BImY#rmY!$3`!"K[F'9ZFh0XD@jME(9
 | 
				
			||||||
 | 
					NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B"6`!$rb`"8Im
 | 
				
			||||||
 | 
					V#[mX!!3+G'mJ)!d"83!#EJ!!!Q8#G!&5!9-0!9)!!M3!!!*Y!R6r+J&8#[mU!!3
 | 
				
			||||||
 | 
					+CQPXC3d"9!!"E3!!!R!#F`&9$!&9!!`!"Q0KFh3ZD!!#!!!0!9-!!M3!!!*P!Qh
 | 
				
			||||||
 | 
					r+3&@#[mT!!3+BfC[E!d"9J!"E`!!!QN#E2mS#rmS!"3`!!KdC@e`F'&dD!!)G'9
 | 
				
			||||||
 | 
					YF&"KG'J'rbX!!!)"5J!#!9F"@!d"9`!#E!!#!RX#HrmRrbB"rbF!!!(r*J!!!J&
 | 
				
			||||||
 | 
					B!!)"@3&D$3&C!!*b!!!#H`+'!9X"A!d"@`!#BJ!!!RX#JJ&G!9i0!9d!!@m!!!*
 | 
				
			||||||
 | 
					l!Rlr*3[r*3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d
 | 
				
			||||||
 | 
					"AJ!"E3!!!Ri#J3&I$!&I!!X!"6TMEfe`!!)!!!d"A!!"E`!!!!!!!2mN#rmN!"3
 | 
				
			||||||
 | 
					`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!9S!!J&J!@%0!@!!!dN!!J+(!V(r)rmL!@)
 | 
				
			||||||
 | 
					+rb-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!ImL!!!'!@)!!rmK!@-"C!V
 | 
				
			||||||
 | 
					r)3!%#QY[Bf`0!@-!!@d!!!+,!Slr)!Vr)!!%#Q&XD@%'!@3!!rmI!@8"CJVr(`!
 | 
				
			||||||
 | 
					%#QPZFfJ0!@8!!M3!!!+4!TRr(J&R#[mH!!3+BfC[E!d"C`!"E`!!!T8#Q2mG#rm
 | 
				
			||||||
 | 
					G!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4Qp
 | 
				
			||||||
 | 
					XC'9b8'&dD!B"CJ!$ra`"D2mE#[mF!!3+G'mJ)!d"D!!#EJ!!!T`#U`&T!@S0!@N
 | 
				
			||||||
 | 
					!!M3!!!+N!U[r'J&V#[mD!!3+CQPXC3d"D`!"E3!!!UF#UJ&X$!&X!!`!"Q0[EA!
 | 
				
			||||||
 | 
					ZD!!#!!!0!@S!!M3!!!+F!U6r'3&Y#[mC!!3+BfC[E!d"E3!"E`!!!U!#SrmB#rm
 | 
				
			||||||
 | 
					B!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'raX!!!)"B3!#!@i"E`d"EJ!#E!!#!V)
 | 
				
			||||||
 | 
					#X[mAraB"raF!!!(r&J!!!J&[!!)"F!&a$3&`!!*b!!!#XJ+p!A)"F`d"FJ!#BJ!
 | 
				
			||||||
 | 
					!!V)#Z3&d!A80!A3!!@m!!!+b!VAr&3[r&3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!
 | 
				
			||||||
 | 
					3Bh*jF(4[4QpXC'9b8'&dD!d"G3!"E3!!!V8#Z!&f$!&f!!X!"6TMEfjQ!!)!!!d
 | 
				
			||||||
 | 
					"F`!"E`!!!!!!!2m8#rm8!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!A%!!J&h!AJ
 | 
				
			||||||
 | 
					0!AF!!dN!!J+q!ZMr%rm5!AN+ra-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@a
 | 
				
			||||||
 | 
					X!Im5!!!'!AN!!rm4!AS"H`Vr%3!%#QY[Bf`0!AS!!@d!!!,#!XAr%!Vr%!!%#Q&
 | 
				
			||||||
 | 
					XD@%'!AX!!rm2!A`"I3Vr$`!%#QPZFfJ0!A`!!M3!!!,)!Y$r$J&q#[m1!!3+BfC
 | 
				
			||||||
 | 
					[E!d"IJ!"E`!!!X`#crm0#rm0!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J
 | 
				
			||||||
 | 
					!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B"I3!$r``"Irm,#[m-!!3+G'mJ)!d
 | 
				
			||||||
 | 
					"I`!#EJ!!!Y-#iJ'!!B%0!B!!!M3!!!,E!Z,r#J'##[m+!!3+CQPXC3d"JJ!"E3!
 | 
				
			||||||
 | 
					!!Yi#i3'$$!'$!!`!"Q0[EQBZD!!#!!!0!B%!!M3!!!,6!Y[r#3'%#[m*!!3+BfC
 | 
				
			||||||
 | 
					[E!d"K!!"E`!!!YF#f[m)#rm)!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'r`X!!!)
 | 
				
			||||||
 | 
					"H!!#!B8"KJd"K3!#E!!#!ZN#kIm(r`B"r`F!!!(r"J!!!J''!!)"K`')$3'(!!*
 | 
				
			||||||
 | 
					b!!!#k3,d!BN"LJd"L3!#BJ!!!ZN#m!',!B`0!BX!!@m!!!,T!Zcr"3[r"3!N-!!
 | 
				
			||||||
 | 
					3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"M!!"E3!!!Z`#l`'
 | 
				
			||||||
 | 
					0$!'0!!S!"$TNCA-!!J!!$3'+!!&[!!!!!!!!r`3,r`3!&$!!#(4PEA"`BA4S!!K
 | 
				
			||||||
 | 
					dC@e`8'&dD!)"L!!#!Bi"M`d"MJ!$53!#![8$(rm$r`)"N!!+r`-!'#jMEh*PBh*
 | 
				
			||||||
 | 
					PE#SU+LS!!!!!!!#3!!"ZG@aX!Im#!!!'!C!!!!2r!3'4!C)+r`%!"!TVEf0X$3'
 | 
				
			||||||
 | 
					4!!&Y!!!#q3,mr`!+r`!!"!TKE'PK"J'5!!2qr`'6!C3+r[m!"!TTER0S$3'6!!)
 | 
				
			||||||
 | 
					d!!!#r`-(r[i"P3VqrJ!%#Q0QEf`0!C8!!@m!!!-$!`Eqr3[qr3!d-!!BEh"PER0
 | 
				
			||||||
 | 
					cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!C3
 | 
				
			||||||
 | 
					!!rlm!CEqq`Vqr!!%#R4[)#!0!CB!!Qi!!!-+!aN"P`'B$3'A!!)d!!!$%J-Cr[S
 | 
				
			||||||
 | 
					"Q3VqqJ!%#QCTE'80!CN!!@d!!!-9!aJ"QJ`"QJ!,!!9NCA-ZD!!#!!!0!CJ!!M3
 | 
				
			||||||
 | 
					!!!-+!a,qq3'E#[lj!!3+BfC[E!d"Q`!"E`!!!`i$%Ili#rli!"3`!!KdC@e`F'&
 | 
				
			||||||
 | 
					dD!!)G'9YF&"KG'J'r[X!!!)"M`!#!C`"R3d"R!!#E!!#!b!$)2lhr[B"r[F!!!(
 | 
				
			||||||
 | 
					qpJ!!!J'G!!)"RJ'I$3'H!!*b!!!$)!-V!D!"S3d"S!!#BJ!!!b!$*`'L!D-0!D)
 | 
				
			||||||
 | 
					!!@m!!!-J!b2qp3[qp3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9
 | 
				
			||||||
 | 
					b8'&dD!d"S`!"E3!!!b-$*J'N$!'N!!N!!cTND!!#!!!0!D%!!@m!!!!!!!$qp![
 | 
				
			||||||
 | 
					qp!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J'I!!)"T3'Q$3'P!!0*!!)$,!0@r[2
 | 
				
			||||||
 | 
					qmJ'R#[lc!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(qmJ!!"J'R!!2qm3'
 | 
				
			||||||
 | 
					S!DN+r[%!"!TVEf0X$3'S!!&Y!!!$-!-cr[!+r[!!"!TKE'PK"J'T!!2ql`'U!DX
 | 
				
			||||||
 | 
					+rZm!"!TTER0S$3'U!!)d!!!$0J-qrZi"V!VqlJ!%#Q0QEf`0!D`!!@m!!!-k!ch
 | 
				
			||||||
 | 
					ql3[ql3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
 | 
				
			||||||
 | 
					NC8C[E'4PFP"KG'J'!DX!!rlX!Dhqk`Vql!!%#R4[)#!0!Dd!!Qi!!!0"!e!"VJ'
 | 
				
			||||||
 | 
					[$3'Z!!)d!!!$5303rZS"X!VqkJ!%#QCTE'80!E!!!@d!!!0-!dm"X3`"X3!+!!4
 | 
				
			||||||
 | 
					ND#jS!!)!!!d"V`!#0!!!!d%$5IlT!E)+rZN!"!TMCQpX$3'b!!&[!!!$430)rZJ
 | 
				
			||||||
 | 
					,rZJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eqk`!!!J'Q!!)"X`'d$3'c!!*X!!)
 | 
				
			||||||
 | 
					$9`0ArZIqjJ(qj`!!!IlQ!!!#!E3!!J'e!EB0!E8!!R)!!!0A!f)"Y`'i$3'h!!*
 | 
				
			||||||
 | 
					L!!!$9`0H!EN"ZJd"Z3!"E`!!!eF$@[lP#rlP!#3`!""MFRP`G'pQEfaNCA*`BA4
 | 
				
			||||||
 | 
					S!""MFRP`G'p'EfaNCA*3BA4S$3'k!!&Y!!!$@J0G!EX-!EX!#J!%1Q4cB3!#!!!
 | 
				
			||||||
 | 
					0!EJ!!@m!!!!!!!$qj![qj!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J'f!!)"[!'
 | 
				
			||||||
 | 
					p$3'm!!0*!!)$B`10rZ2qiJ'q#[lM!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9
 | 
				
			||||||
 | 
					XE!(qiJ!!"J'q!!2qi3'r!F!+rZ%!"!TVEf0X$3'r!!&Y!!!$C`0UrZ!+rZ!!"!T
 | 
				
			||||||
 | 
					KE'PK"J(!!!2qh`("!F)+rYm!"!TTER0S$3("!!)d!!!$E30erYi"``VqhJ!%#Q0
 | 
				
			||||||
 | 
					QEf`0!F-!!@m!!!0a!h6qh3[qh3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4
 | 
				
			||||||
 | 
					S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!F)!!rlF!F6qf`Vqh!!%#R4[)#!
 | 
				
			||||||
 | 
					0!F3!!Qi!!!0i!iF"a3('$3(&!!)d!!!$J!1(rYS"a`VqfJ!%#QCTE'80!FF!!@d
 | 
				
			||||||
 | 
					!!!1$!iB"b!`"b!!,!!9NFf%ZD!!#!!!0!FB!!M3!!!0i!i$qf3(*#[lC!!3+BfC
 | 
				
			||||||
 | 
					[E!d"b3!"E`!!!h`$IrlB#rlB!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rYX!!!)
 | 
				
			||||||
 | 
					"[3!#!FS"b`d"bJ!#E!!#!ii$M[lArYB"rYF!!!(qeJ!!!J(,!!)"c!(0$3(-!!*
 | 
				
			||||||
 | 
					b!!!$MJ1C!Fi"c`d"cJ!#BJ!!!ii$P3(3!G%0!G!!!@m!!!11!j(qe3[qe3!N-!!
 | 
				
			||||||
 | 
					3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d"d3!"E3!!!j%$P!(
 | 
				
			||||||
 | 
					5$!(5!!S!"$TPFR)!!J!!$3(2!!&[!!!!!!!!rY3,rY3!&$!!#(4PEA"`BA4S!!K
 | 
				
			||||||
 | 
					dC@e`8'&dD!)"c3!#!G-"e!d"d`!$53!#!jS$a2l6rY)"e3Vqd`!B,Q0[FQ9MFQ9
 | 
				
			||||||
 | 
					X+LSU+J!!!!!!!*!!!'jeE'`"rY)!!!B"e3!$rY%"eJ(A#[l4!!3+DfpME!d"eJ!
 | 
				
			||||||
 | 
					"E3!!!ji$SIl3#[l3!!3+B@aTB3B"e`!$rXm"f!(C#[l2!!3+D@jcD!d"f!!#0!!
 | 
				
			||||||
 | 
					!!k3$V2l1!GS+rXi!"!TMCQpX$3(D!!&[!!!$U!1VrXd,rXd!0$!!''p`C@jcFfa
 | 
				
			||||||
 | 
					TEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J(C!!2
 | 
				
			||||||
 | 
					qc!(ErXX+rX`!"!TdEb!J$3(E!!*Z!!!$V`1q!G`"h3d"h!!#0!!!!lF$[[l+!Gi
 | 
				
			||||||
 | 
					+rXS!"!TQD@aP$3(H!!&Y!!!$ZJ1p!Gm-!Gm!#`!&CA*b,QJ!!J!!$3(G!!)d!!!
 | 
				
			||||||
 | 
					$V`1hrXN"i!Vqb3!%#Q0QEf`0!H!!!@m!!!1c!lEqb![qb!!8-!!)G'9YF("KG'J
 | 
				
			||||||
 | 
					!#(4PEA"3BA4S"[l,!!!#!G3!!J(K!H)0!H%!!Q`!!J2&!mAqarl'!Il(!!!"rXB
 | 
				
			||||||
 | 
					!!!)"iJ!#!H-"j!d"i`!#FJ!!!m8$d!(P!HB0!H8!!Q)!!!2&!m`"j`(S$3(R!!&
 | 
				
			||||||
 | 
					[!!!$a32)rX8,rX8!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC[E'4PFP"
 | 
				
			||||||
 | 
					KG'J0!HJ!!@d!!!2)!mX"k3`"k3!+!!3kCAC`!!)!!!d"jJ!"E`!!!!!!!2l%#rl
 | 
				
			||||||
 | 
					%!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!H3!!J(U!HX0!HS!!dN!!J24!r[q`rl
 | 
				
			||||||
 | 
					#!H`+rX-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Il#!!!'!H`!!rl"!Hd
 | 
				
			||||||
 | 
					"lJVq`3!%#QY[Bf`0!Hd!!@d!!!29!pMq`!Vq`!!%#Q&XD@%'!Hi!!rkr!Hm"m!V
 | 
				
			||||||
 | 
					q[`!%#QPZFfJ0!Hm!!M3!!!2E!q2q[J(a#[kq!!3+BfC[E!d"m3!"E`!!!pm$i[k
 | 
				
			||||||
 | 
					p#rkp!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4
 | 
				
			||||||
 | 
					P4QpXC'9b8'&dD!B"m!!$rV`"m[kl#[km!!3+G'mJ)!d"mJ!#EJ!!!qB$p3(c!I3
 | 
				
			||||||
 | 
					0!I-!!M3!!!2Z!rAqZJ(e#[kk!!3+CQPXC3d"p3!"E3!!!r%$p!(f$!(f!!X!"@9
 | 
				
			||||||
 | 
					fF#jS!!)!!!d"p!!#0!!!!qB$l[kj!IF+rVN!"!TMCQpX$3(h!!&[!!!$kJ2YrVJ
 | 
				
			||||||
 | 
					,rVJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!EqZ`!!!J(V!!)"q!(j$3(i!!*X!!)
 | 
				
			||||||
 | 
					$r!2mrVIqYJ(qY`!!!Ikf!!!#!IN!!J(k!IX0!IS!!R)!!!2m"!F"r!(p$3(m!!*
 | 
				
			||||||
 | 
					L!!!$r!3$!Ii"r`d"rJ!"E`!!!r`$rrke#rke!#3`!""MFRP`G'pQEfaNCA*`BA4
 | 
				
			||||||
 | 
					S!""MFRP`G'p'EfaNCA*3BA4S$3(r!!&Y!!!$r`3#!J!-!J!!#`!&1QKYB@-!!J!
 | 
				
			||||||
 | 
					!$3(p!!&[!!!!!!!!rV3,rV3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)"q`!#!J%
 | 
				
			||||||
 | 
					#!Jd#!3!$53!#"!J%-[kcrV)#!`VqX`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'j
 | 
				
			||||||
 | 
					eE'`"rV)!!!B#!`!$rV%#"!)&#[ka!!3+DfpME!d#"!!"E3!!"!`%$rk`#[k`!!3
 | 
				
			||||||
 | 
					+B@aTB3B#"3!$rUm#"J)(#[k[!!3+D@jcD!d#"J!#0!!!"")%'[kZ!JJ+rUi!"!T
 | 
				
			||||||
 | 
					MCQpX$3))!!&[!!!%&J3CrUd,rUd!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&
 | 
				
			||||||
 | 
					dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J)(!!2qV!)*rUX+rU`!"!TdEb!
 | 
				
			||||||
 | 
					J$3)*!!*Z!!!%(33X!JS##`d##J!#0!!!"#8%,2kU!J`+rUS!"!TQD@aP$3)-!!&
 | 
				
			||||||
 | 
					Y!!!%+!3V!Jd-!Jd!$!!'D'eKBbjS!!)!!!d##`!#0!!!""d%*IkT!Ji+rUN!"!T
 | 
				
			||||||
 | 
					MCQpX$3)1!!&[!!!%)33NrUJ,rUJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!EqU`!
 | 
				
			||||||
 | 
					!!J)#!!)#$`)3$3)2!!*X!!)%-`3crUIqTJ(qT`!!!IkQ!!!#!K!!!J)4!K)0!K%
 | 
				
			||||||
 | 
					!!R)!!!3c"$i#%`)8$3)6!!*L!!!%-`3k!K8#&Jd#&3!"E`!!"$-%0[kP#rkP!#3
 | 
				
			||||||
 | 
					`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3)@!!&Y!!!%0J3
 | 
				
			||||||
 | 
					j!KF-!KF!#`!&1QPNC@%!!J!!$3)8!!&[!!!!!!!!rU3,rU3!&$!!#(4PEA"`BA4
 | 
				
			||||||
 | 
					S!!KdC@e`8'&dD!)#%J!#!KJ#'3d#'!!$53!#"$m%DIkMrU)#'JVqS`!B,Q0[FQ9
 | 
				
			||||||
 | 
					MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rU)!!!B#'J!$rU%#'`)F#[kK!!3+DfpME!d
 | 
				
			||||||
 | 
					#'`!"E3!!"%-%4[kJ#[kJ!!3+B@aTB3B#(!!$rTm#(3)H#[kI!!3+D@jcD!d#(3!
 | 
				
			||||||
 | 
					#0!!!"%N%8IkH!Km+rTi!"!TMCQpX$3)I!!&[!!!%6343rTd,rTd!0$!!''p`C@j
 | 
				
			||||||
 | 
					cFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J)
 | 
				
			||||||
 | 
					H!!2qR!)JrTX+rT`!"!TdEb!J$3)J!!*Z!!!%9!4M!L%#)Jd#)3!#0!!!"&`%Brk
 | 
				
			||||||
 | 
					D!L-+rTS!"!TQD@aP$3)M!!&Y!!!%A`4L!L3-!L3!$!!'D@4PB5jS!!)!!!d#)J!
 | 
				
			||||||
 | 
					#0!!!"&3%A2kC!L8+rTN!"!TMCQpX$3)P!!&[!!!%@!4ErTJ,rTJ!&$!!#(4PEA"
 | 
				
			||||||
 | 
					`BA4S!!KdC@e`8'&dD!EqQ`!!!J)C!!)#*J)R$3)Q!!*X!!)%DJ4UrTIqPJ(qP`!
 | 
				
			||||||
 | 
					!!Ik@!!!#!LF!!J)S!LN0!LJ!!R)!!!4U"(8#+J)V$3)U!!*L!!!%DJ4a!L`#,3d
 | 
				
			||||||
 | 
					#,!!"E`!!"'S%EIk9#rk9!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'Efa
 | 
				
			||||||
 | 
					NCA*3BA4S$3)Y!!&Y!!!%E34`!Li-!Li!$!!'1QaSBA0S!!)!!!d#+`!"E`!!!!!
 | 
				
			||||||
 | 
					!!2k8#rk8!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!LN!!J)[!M!0!Lm!!dN!!J4
 | 
				
			||||||
 | 
					f"+$qNrk5!M%+rT-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ik5!!!'!M%
 | 
				
			||||||
 | 
					!!rk4!M)#-`VqN3!%#QY[Bf`0!M)!!@d!!!4k"(hqN!!+rT!!!!3+B@aTB3B#-`!
 | 
				
			||||||
 | 
					$rSm#0!)e#[k2!!3+D@jcD!d#0!!#0!!!")!%L2k1!MB+rSi!"!TMCQpX$3)f!!&
 | 
				
			||||||
 | 
					[!!!%K!5(rSd,rSd!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP0
 | 
				
			||||||
 | 
					66%PZBfaeC'9'EfaNCA*3BA4S"J)e!!2qM!)hrSX+rS`!"!TdEb!J$3)h!!*Z!!!
 | 
				
			||||||
 | 
					%L`5D!MJ#13d#1!!#0!!!"*-%Q[k+!MS+rSS!"!TQD@aP$3)k!!&Y!!!%PJ5C!MX
 | 
				
			||||||
 | 
					-!MX!$3!(E'KKFfJZD!!#!!!0!MN!!M3!!!5,"*2qL3)m#[k*!!3+BfC[E!d#2!!
 | 
				
			||||||
 | 
					"E`!!")m%N[k)#rk)!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rSX!!!)#-!!#!Md
 | 
				
			||||||
 | 
					#2Jd#23!#E!!#"+%%SIk(rSB"rSF!!!(qKJ!!!J)q!!)#2`*!$3)r!!*b!!!%S35
 | 
				
			||||||
 | 
					X!N%#3Jd#33!#BJ!!"+%%U!*$!N30!N-!!@m!!!5K"+6qK3[qK3!N-!!3Bh*jF(4
 | 
				
			||||||
 | 
					[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d#4!!"E3!!"+3%T`*&$!*&!!S
 | 
				
			||||||
 | 
					!"$TYC$)!!J!!$3*#!!&[!!!!!!!!rS3,rS3!&$!!#(4PEA"`BA4S!!KdC@e`8'&
 | 
				
			||||||
 | 
					dD!)#3!!#!NB#4`d#4J!$53!#"+d%erk$rS)#5!VqJ`!B,Q0[FQ9MFQ9X+LSU+J!
 | 
				
			||||||
 | 
					!!!!!!*!!!'jeE'`"rS)!!!B#5!!$rS%#53*+#[k"!!3+DfpME!d#53!"E3!!",%
 | 
				
			||||||
 | 
					%Y2k!#[k!!!3+B@aTB3B#5J!$rRm#5`*-#[jr!!3+D@jcD!d#5`!#0!!!",F%[rj
 | 
				
			||||||
 | 
					q!Nd+rRi!"!TMCQpX$3*0!!&[!!!%Z`5qrRd,rRd!0$!!''p`C@jcFfaTEQ0XG@4
 | 
				
			||||||
 | 
					PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J*-!!2qI!*1rRX
 | 
				
			||||||
 | 
					+rR`!"!TdEb!J$3*1!!*Z!!!%`J64!Nm#8!d#6`!#0!!!"-S%dIjk!P%+rRS!"!T
 | 
				
			||||||
 | 
					QD@aP$3*4!!&Y!!!%c363!P)-!P)!#`!&E@3b,QJ!!J!!$3*3!!)d!!!%`J6+rRN
 | 
				
			||||||
 | 
					#8`VqH3!%#Q0QEf`0!P-!!@m!!!6'"-RqH![qH!!8-!!)G'9YF("KG'J!#(4PEA"
 | 
				
			||||||
 | 
					3BA4S"[jl!!!#!NF!!J*8!P80!P3!!Q`!!J6B"0MqGrjf!Ijh!!!"rRB!!!)#93!
 | 
				
			||||||
 | 
					#!PB#9`d#9J!#FJ!!"0J%i`*B!PN0!PJ!!Q)!!!6B"0m#@J*E$3*D!!&[!!!%f!6
 | 
				
			||||||
 | 
					ErR8,rR8!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!PX
 | 
				
			||||||
 | 
					!!@d!!!6E"0i#A!`#A!!+!!3kE@3e!!)!!!d#@3!"E`!!!!!!!2jd#rjd!"3`!!K
 | 
				
			||||||
 | 
					dC@e`F'&dD!!)G'9YF&"KG'J#!PF!!J*G!Pi0!Pd!!dN!!J6N"3lqFrjb!Pm+rR-
 | 
				
			||||||
 | 
					!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ijb!!!'!Pm!!rja!Q!#B3VqF3!
 | 
				
			||||||
 | 
					%#QY[Bf`0!Q!!!@d!!!6S"1[qF!VqF!!%#Q&XD@%'!Q%!!rj[!Q)#B`VqE`!%#QP
 | 
				
			||||||
 | 
					ZFfJ0!Q)!!M3!!!6Z"2EqEJ*N#[jZ!!3+BfC[E!d#C!!"E`!!"2)%pIjY#rjY!$3
 | 
				
			||||||
 | 
					`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9
 | 
				
			||||||
 | 
					b8'&dD!B#B`!$rQ`#CIjV#[jX!!3+G'mJ)!d#C3!#EJ!!"2N&#!*Q!QF0!QB!!M3
 | 
				
			||||||
 | 
					!!!8""3MqDJ*S#[jU!!3+CQPXC3d#D!!"E3!!"33&"`*T$!*T!!X!"@eN05jS!!)
 | 
				
			||||||
 | 
					!!!d#C`!#0!!!"2N&!IjT!QS+rQN!"!TMCQpX$3*U!!&[!!!%r38!rQJ,rQJ!&$!
 | 
				
			||||||
 | 
					!#(4PEA"`BA4S!!KdC@e`8'&dD!EqD`!!!J*H!!)#D`*X$3*V!!*X!!)&$`82rQI
 | 
				
			||||||
 | 
					qCJ(qC`!!!IjQ!!!#!Q`!!J*Y!Qi0!Qd!!R)!!!82"4S#E`*`$3*[!!*L!!!&$`8
 | 
				
			||||||
 | 
					@!R%#FJd#F3!"E`!!"3m&%[jP#rjP!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP
 | 
				
			||||||
 | 
					`G'p'EfaNCA*3BA4S$3*b!!&Y!!!&%J89!R--!R-!#`!&1QeNBc)!!J!!$3*`!!&
 | 
				
			||||||
 | 
					[!!!!!!!!rQ3,rQ3!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)#EJ!#!R3#G3d#G!!
 | 
				
			||||||
 | 
					$53!#"4X&4IjMrQ)#GJVqB`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rQ)
 | 
				
			||||||
 | 
					!!!B#GJ!$rQ%#G`*i#[jK!!3+DfpME!d#G`!"E3!!"4m&)[jJ#[jJ!!3+B@aTB3B
 | 
				
			||||||
 | 
					#H!!$rPm#H3*k#[jI!!3+D@jcD!d#H3!#0!!!"58&,IjH!RX+rPi!"!TMCQpX$3*
 | 
				
			||||||
 | 
					l!!&[!!!&+38XrPd,rPd!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"
 | 
				
			||||||
 | 
					PEP066%PZBfaeC'9'EfaNCA*3BA4S"J*k!!2qA!*mrPX+rP`!"!TdEb!J$3*m!!*
 | 
				
			||||||
 | 
					Z!!!&-!8r!Rd#IJd#I3!#0!!!"6J&2rjD!Rm+rPS!"!TQD@aP$3*r!!&Y!!!&1`8
 | 
				
			||||||
 | 
					q!S!-!S!!$!!'E@4M-LjS!!)!!!d#IJ!#0!!!"6!&12jC!S%+rPN!"!TMCQpX$3+
 | 
				
			||||||
 | 
					"!!&[!!!&0!8hrPJ,rPJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eq@`!!!J*e!!)
 | 
				
			||||||
 | 
					#JJ+$$3+#!!*X!!)&4J9'rPIq9J(q9`!!!Ij@!!!#!S-!!J+%!S80!S3!!R)!!!9
 | 
				
			||||||
 | 
					'"9%#KJ+($3+'!!*L!!!&4J90!SJ#L3d#L!!"E`!!"8B&5Ij9#rj9!#3`!""MFRP
 | 
				
			||||||
 | 
					`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3+*!!&Y!!!&539-!SS-!SS
 | 
				
			||||||
 | 
					!$J!)1QpLDQ9MG(-!!J!!$3+(!!&[!!!!!!!!rP3,rP3!&$!!#(4PEA"`BA4S!!K
 | 
				
			||||||
 | 
					dC@e`8'&dD!)#K3!#!SX#M!d#L`!$53!#"9)&I2j6rP)#M3Vq8`!B,Q0[FQ9MFQ9
 | 
				
			||||||
 | 
					X+LSU+J!!!!!!!*!!!'jeE'`"rP)!!!B#M3!$rP%#MJ+2#[j4!!3+DfpME!d#MJ!
 | 
				
			||||||
 | 
					"E3!!"9B&@Ij3#[j3!!3+B@aTB3B#M`!$rNm#N!!#N3Vq6`!%#QPZFfJ0!T!!!!)
 | 
				
			||||||
 | 
					d!!!&A!9NrNi#NJVq6J!%#Q0QEf`0!T)!!@m!!!9J"@2q63[q63!d-!!BEh"PER0
 | 
				
			||||||
 | 
					cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!T%
 | 
				
			||||||
 | 
					!!rj-!T2q5`Vq6!!%#R4[)#!0!T-!!Qi!!!9R"AB#P!+9$3+8!!)d!!!&E`9frNS
 | 
				
			||||||
 | 
					#PJVq5J!%#QCTE'80!TB!!@d!!!9b"A8#P``#P`!2!!P[BQTPBh4c,QJ!!J!!$3+
 | 
				
			||||||
 | 
					9!!)d!!!&C`9[rNN#Q!Vq53!%#Q0QEf`0!TJ!!@m!!!9V"@lq5![q5!!8-!!)G'9
 | 
				
			||||||
 | 
					YF("KG'J!#(4PEA"3BA4S"[j,!!!#!S`!!J+C!TS0!TN!!Q`!!J9p"Ahq4rj'!Ij
 | 
				
			||||||
 | 
					(!!!"rNB!!!)#QJ!#!TX#R!d#Q`!#FJ!!"Ad&L!+G!Ti0!Td!!Q)!!!9p"B3#R`+
 | 
				
			||||||
 | 
					J$3+I!!&[!!!&I3@!rN8,rN8!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC
 | 
				
			||||||
 | 
					[E'4PFP"KG'J0!U!!!@d!!!@!"B-#S3`#S3!+!!3kF'9Y!!)!!!d#RJ!"E`!!!!!
 | 
				
			||||||
 | 
					!!2j%#rj%!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!T`!!J+L!U-0!U)!!dN!!J@
 | 
				
			||||||
 | 
					*"E2q3rj#!U3+rN-!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ij#!!!'!U3
 | 
				
			||||||
 | 
					!!rj"!U8#TJVq33!%#QY[Bf`0!U8!!@d!!!@0"C!!rN!+rN!!"!TKE'PK"J+Q!!2
 | 
				
			||||||
 | 
					q2`+R!UJ+rMm!"!TTER0S$3+R!!)d!!!&N`@ErMi#U3Vq2J!%#Q0QEf`0!UN!!@m
 | 
				
			||||||
 | 
					!!!@A"CVq23[q23!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0
 | 
				
			||||||
 | 
					-5@jME(9NC8C[E'4PFP"KG'J'!UJ!!rim!UVq1`Vq2!!%#R4[)#!0!US!!Qi!!!@
 | 
				
			||||||
 | 
					H"Dd#U`+X$3+V!!)d!!!&TJ@YrMS#V3Vq1J!%#QCTE'80!Ud!!@d!!!@T"D`#VJ`
 | 
				
			||||||
 | 
					#VJ!,!!9`C@dZD!!#!!!0!U`!!M3!!!@H"DEq13+[#[ij!!3+BfC[E!d#V`!"E`!
 | 
				
			||||||
 | 
					!"D)&TIii#rii!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'rMX!!!)#S`!#!V!#X3d
 | 
				
			||||||
 | 
					#X!!$53!#"E3&h[ihrMB#XJVq0`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`
 | 
				
			||||||
 | 
					"rMB!!!B#XJ!$rM8#X`+d#[ie!!3+DfpME!d#X`!"E3!!"EJ&Zrid#[id!!3+B@a
 | 
				
			||||||
 | 
					TB3B#Y!!$rM-#Y3+f#[ic!!3+D@jcD!d#Y3!#0!!!"Ei&a[ib!VF+rM)!"!TMCQp
 | 
				
			||||||
 | 
					X$3+h!!&[!!!&`JA&rM%,rM%!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!
 | 
				
			||||||
 | 
					BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J+f!!2q-!+irLm+rM!!"!TdEb!J$3+
 | 
				
			||||||
 | 
					i!!*Z!!!&b3AB!VN#ZJd#Z3!#0!!!"G%&f2iZ!VX+rLi!"!TQD@aP$3+l!!&Y!!!
 | 
				
			||||||
 | 
					&e!AA!V`-!V`!$!!'F'9Y-LjS!!)!!!d#ZJ!#0!!!"FN&dIiY!Vd+rLd!"!TMCQp
 | 
				
			||||||
 | 
					X$3+p!!&[!!!&c3A3rL`,rL`!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eq,`!!!J+
 | 
				
			||||||
 | 
					a!!)#[J+r$3+q!!*X!!)&h`AIrL[q+J(q+`!!!IiU!!!#!Vm!!J,!!X%0!X!!!R)
 | 
				
			||||||
 | 
					!!!AI"HS#`J,$$3,#!!*L!!!&h`AQ!X3#a3d#a!!"E`!!"Gm&i[iT#riT!#3`!""
 | 
				
			||||||
 | 
					MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3,&!!&Y!!!&iJAP!XB
 | 
				
			||||||
 | 
					-!XB!$3!(1R"VBh-a-J!#!!!0!X-!!@m!!!!!!!$q+![q+!!8-!!)G'9YF("KG'J
 | 
				
			||||||
 | 
					!#(4PEA"3BA4S!J,"!!)#a`,)$3,(!!0*!!)&k`B9rLIq*J,*#[iR!"JZBfpbC@0
 | 
				
			||||||
 | 
					bC@`U+LSU!!!!!!!!N!!!ER9XE!(q*J!!"J,*!!2q*3,+!XX+rL8!"!TVEf0X$3,
 | 
				
			||||||
 | 
					+!!&Y!!!&l`AbrL3+rL3!"!TKE'PK"J,,!!2q)`,-!Xd+rL-!"!TTER0S$3,-!!)
 | 
				
			||||||
 | 
					d!!!&p3AprL)#cJVq)J!%#Q0QEf`0!Xi!!@m!!!Aj"Icq)3[q)3!d-!!BEh"PER0
 | 
				
			||||||
 | 
					cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!Xd
 | 
				
			||||||
 | 
					!!riJ!Xrq(`Vq)!!%#R4[)#!0!Xm!!Qi!!!B!"Jm#d!,4$3,3!!)d!!!'#!B2rKi
 | 
				
			||||||
 | 
					#dJVq(J!%#QCTE'80!Y)!!@d!!!B,"Ji#d``#d`!1!!K`Df0c-6)ZD!!#!!!0!Y%
 | 
				
			||||||
 | 
					!!M3!!!B!"JMq(3,8#[iG!!3+BfC[E!d#e!!"E`!!"J3'"riF#riF!"3`!!KdC@e
 | 
				
			||||||
 | 
					`F'&dD!!)G'9YF&"KG'J'rKm!!!)#b!!#!Y8#eJd#e3!#E!!#"KB'&[iErKS"rKX
 | 
				
			||||||
 | 
					!!!(q'J!!!J,@!!)#e`,B$3,A!!*b!!!'&JBK!YN#fJd#f3!#BJ!!"KB'(3,E!Y`
 | 
				
			||||||
 | 
					0!YX!!@m!!!B@"KRq'3[q'3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4Qp
 | 
				
			||||||
 | 
					XC'9b8'&dD!d#h!!"E3!!"KN'(!,G$!,G!!`!"MT`Df0c0`!#!!!0!YS!!@m!!!!
 | 
				
			||||||
 | 
					!!!$q'![q'!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J,B!!)#hJ,I$3,H!!0*!!)
 | 
				
			||||||
 | 
					')JC-rKIq&J,J#[iA!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!(q&J!!"J,
 | 
				
			||||||
 | 
					J!!2q&3,K!Z)+rK8!"!TVEf0X$3,K!!&Y!!!'*JBTrK3+rK3!"!TKE'PK"J,L!!2
 | 
				
			||||||
 | 
					q%`,M!Z3+rK-!"!TTER0S$3,M!!)d!!!',!BdrK)#j3Vq%J!%#Q0QEf`0!Z8!!@m
 | 
				
			||||||
 | 
					!!!B`"M2q%3[q%3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0
 | 
				
			||||||
 | 
					-5@jME(9NC8C[E'4PFP"KG'J'!Z3!!ri3!ZEq$`Vq%!!%#R4[)#!0!ZB!!Qi!!!B
 | 
				
			||||||
 | 
					h"NB#j`,S$3,R!!)d!!!'2`C'rJi#k3Vq$J!%#QCTE'80!ZN!!@d!!!C#"N8#kJ`
 | 
				
			||||||
 | 
					#kJ!0!!G`Df0c0bjS!!)!!!d#k!!#0!!!"MF'2ri0!ZX+rJd!"!TMCQpX$3,V!!&
 | 
				
			||||||
 | 
					[!!!'1`BqrJ`,rJ`!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eq$`!!!J,I!!)#l!,
 | 
				
			||||||
 | 
					Y$3,X!!*X!!)'63C0rJ[q#J(q#`!!!Ii+!!!#!Zd!!J,Z!Zm0!Zi!!R)!!!C0"PJ
 | 
				
			||||||
 | 
					#m!,a$3,`!!*L!!!'63C8![)#m`d#mJ!"E`!!"Nd'82i*#ri*!#3`!""MFRP`G'p
 | 
				
			||||||
 | 
					QEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3,c!!&Y!!!'8!C6![3-![3!#`!
 | 
				
			||||||
 | 
					&1R*KEQ3!!J!!$3,a!!&[!!!!!!!!rJJ,rJJ!&$!!#(4PEA"`BA4S!!KdC@e`8'&
 | 
				
			||||||
 | 
					dD!)#l`!#![8#pJd#p3!$53!#"PN'Jri(rJB#p`Vq"`!B,Q0[FQ9MFQ9X+LSU+J!
 | 
				
			||||||
 | 
					!!!!!!*!!!'jeE'`"rJB!!!B#p`!$rJ8#q!,j#[i&!!3+DfpME!d#q!!"E3!!"Pd
 | 
				
			||||||
 | 
					'B2i%#[i%!!3+B@aTB3B#q3!$rJ-#qJ,l#[i$!!3+D@jcD!d#qJ!#0!!!"Q-'Dri
 | 
				
			||||||
 | 
					#![`+rJ)!"!TMCQpX$3,m!!&[!!!'C`CUrJ%,rJ%!0$!!''p`C@jcFfaTEQ0XG@4
 | 
				
			||||||
 | 
					PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J,l!!2q!!,prIm
 | 
				
			||||||
 | 
					+rJ!!"!TdEb!J$3,p!!*Z!!!'EJCp![i#r`d#rJ!#0!!!"RB'IIhq!`!+rIi!"!T
 | 
				
			||||||
 | 
					QD@aP$3-!!!&Y!!!'H3Cm!`%-!`%!$!!'FQ&ZC#jS!!)!!!d#r`!#0!!!"Qi'G[h
 | 
				
			||||||
 | 
					p!`)+rId!"!TMCQpX$3-#!!&[!!!'FJCerI`,rI`!&$!!#(4PEA"`BA4S!!KdC@e
 | 
				
			||||||
 | 
					`8'&dD!Epr`!!!J,f!!)$!`-%$3-$!!*X!!)'K!D%rI[pqJ(pq`!!!Ihk!!!#!`3
 | 
				
			||||||
 | 
					!!J-&!`B0!`8!!R)!!!D%"Sm$"`-)$3-(!!*L!!!'K!D,!`N$#Jd$#3!"E`!!"S3
 | 
				
			||||||
 | 
					'Krhj#rhj!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3-
 | 
				
			||||||
 | 
					+!!&Y!!!'K`D+!`X-!`X!#J!%1R*M-J!#!!!0!`J!!@m!!!!!!!$pq![pq!!8-!!
 | 
				
			||||||
 | 
					)G'9YF("KG'J!#(4PEA"3BA4S!J-'!!)$$!-0$3--!!0*!!)'N!!'Z[hhrIB$$JV
 | 
				
			||||||
 | 
					pp`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rIB!!!B$$J!$rI8$$`-3#[h
 | 
				
			||||||
 | 
					e!!3+DfpME!d$$`!"E3!!"T3'Prhd#[hd!!3+B@aTB3B$%!!$rI-$%3-5#[hc!!3
 | 
				
			||||||
 | 
					+D@jcD!d$%3!#0!!!"TS'S[hb!a-+rI)!"!TMCQpX$3-6!!&[!!!'RJDKrI%,rI%
 | 
				
			||||||
 | 
					!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'Efa
 | 
				
			||||||
 | 
					NCA*3BA4S"J-5!!2pm!-8rHm+rI!!"!TdEb!J$3-8!!*Z!!!'T3Dd!a8$&Jd$&3!
 | 
				
			||||||
 | 
					#0!!!"Ud'Y2hZ!aF+rHi!"!TQD@aP$3-A!!&Y!!!'X!Dc!aJ-!aJ!#`!&FQ-b,QJ
 | 
				
			||||||
 | 
					!!J!!$3-@!!)d!!!'T3DYrHd$'3Vpl3!%#Q0QEf`0!aN!!@m!!!DT"Ucpl![pl!!
 | 
				
			||||||
 | 
					8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[h[!!!#!`d!!J-D!aX0!aS!!Q`!!JDl"V[
 | 
				
			||||||
 | 
					pkrhU!IhV!!!"rHS!!!)$'`!#!a`$(3d$(!!#FJ!!"VX'aJ-H!am0!ai!!Q)!!!D
 | 
				
			||||||
 | 
					l"X)$)!-K$3-J!!&[!!!'Z`DqrHN,rHN!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0
 | 
				
			||||||
 | 
					bHA"dEdC[E'4PFP"KG'J0!b%!!@d!!!Dq"X%$)J`$)J!+!!3kFQ-d!!)!!!d$(`!
 | 
				
			||||||
 | 
					"E`!!!!!!!2hS#rhS!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!ad!!J-M!b30!b-
 | 
				
			||||||
 | 
					!!dN!!JE("[(pjrhQ!b8+rHF!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"ZG@aX!Ih
 | 
				
			||||||
 | 
					Q!!!'!b8!!rhP!bB$*`Vpj3!%#QY[Bf`0!bB!!@d!!!E,"Xlpj!Vpj!!%#Q&XD@%
 | 
				
			||||||
 | 
					'!bF!!rhM!bJ$+3Vpi`!%#QPZFfJ0!bJ!!M3!!!E4"YRpiJ-U#[hL!!3+BfC[E!d
 | 
				
			||||||
 | 
					$+J!"E`!!"Y8'f2hK#rhK!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p
 | 
				
			||||||
 | 
					`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B$+3!$rH!$+rhI#[hJ!!3+G'mJ)!d$+`!
 | 
				
			||||||
 | 
					#EJ!!"Y`'k`-X!bd0!b`!!M3!!!EN"Z[phJ-Z#[hH!!3+CQPXC3d$,J!"E3!!"ZF
 | 
				
			||||||
 | 
					'kJ-[$!-[!!X!"A*M0#jS!!)!!!d$,3!#0!!!"Y`'j2hG!c!+rGd!"!TMCQpX$3-
 | 
				
			||||||
 | 
					`!!&[!!!'i!EMrG`,rG`!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!Eph`!!!J-N!!)
 | 
				
			||||||
 | 
					$-3-b$3-a!!*X!!)'mJEbrG[pfJ(pf`!!!IhD!!!#!c)!!J-c!c30!c-!!R)!!!E
 | 
				
			||||||
 | 
					b"[d$03-f$3-e!!*L!!!'mJEj!cF$1!d$0`!"E`!!"[)'pIhC#rhC!#3`!""MFRP
 | 
				
			||||||
 | 
					`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$3-i!!&Y!!!'p3Ei!cN-!cN
 | 
				
			||||||
 | 
					!#J!%1R*M03!#!!!0!cB!!@m!!!!!!!$pf![pf!!8-!!)G'9YF("KG'J!#(4PEA"
 | 
				
			||||||
 | 
					3BA4S!J-d!!)$1J-l$3-k!!0*!!)'rJFSrGIpeJ-m#[hA!"JZBfpbC@0bC@`U+LS
 | 
				
			||||||
 | 
					U!!!!!!!!N!!!ER9XE!(peJ!!"J-m!!2pe3-p!ci+rG8!"!TVEf0X$3-p!!&Y!!!
 | 
				
			||||||
 | 
					(!JF&rG3+rG3!"!TKE'PK"J-q!!2pd`-r!d!+rG-!"!TTER0S$3-r!!)d!!!(#!F
 | 
				
			||||||
 | 
					3rG)$33VpdJ!%#Q0QEf`0!d%!!@m!!!F-"`rpd3[pd3!d-!!BEh"PER0cE'PZBfa
 | 
				
			||||||
 | 
					eC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!d!!!rh3!d,
 | 
				
			||||||
 | 
					pc`Vpd!!%#R4[)#!0!d)!!Qi!!!F6"b)$3`0%$30$!!)d!!!('`FLrFi$43VpcJ!
 | 
				
			||||||
 | 
					%#QCTE'80!d8!!@d!!!FH"b%$4J`$4J!,!!9bBc8ZD!!#!!!0!d3!!M3!!!F6"a[
 | 
				
			||||||
 | 
					pc30(#[h0!!3+BfC[E!d$4`!"E`!!"aF('[h-#rh-!"3`!!KdC@e`F'&dD!!)G'9
 | 
				
			||||||
 | 
					YF&"KG'J'rFm!!!)$1`!#!dJ$53d$5!!#E!!#"bN(+Ih,rFS"rFX!!!(pbJ!!!J0
 | 
				
			||||||
 | 
					*!!)$5J0,$30+!!*b!!!(+3Fd!d`$63d$6!!#BJ!!"bN(-!01!dm0!di!!@m!!!F
 | 
				
			||||||
 | 
					T"bcpb3[pb3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d
 | 
				
			||||||
 | 
					$6`!"E3!!"b`(,`03$!03!!d!"cTbDA"PE@3!!J!!$300!!&[!!!!!!!!rFJ,rFJ
 | 
				
			||||||
 | 
					!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)$5`!#!e%$8Jd$83!$53!#"c8(Arh(rFB
 | 
				
			||||||
 | 
					$8`Vpa`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rFB!!!B$8`!$rF8$9!0
 | 
				
			||||||
 | 
					9#[h&!!3+DfpME!d$9!!"E3!!"cN(22h%#[h%!!3+B@aTB3B$93!$rF-$9J0A#[h
 | 
				
			||||||
 | 
					$!!3+D@jcD!d$9J!#0!!!"cm(4rh#!eJ+rF)!"!TMCQpX$30B!!&[!!!(3`G'rF%
 | 
				
			||||||
 | 
					,rF%!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9
 | 
				
			||||||
 | 
					'EfaNCA*3BA4S"J0A!!2p`!0CrEm+rF!!"!TdEb!J$30C!!*Z!!!(5JGC!eS$@`d
 | 
				
			||||||
 | 
					$@J!#0!!!"e)(@Ifq!e`+rEi!"!TQD@aP$30F!!&Y!!!(93GB!ed-!ed!$J!)FQP
 | 
				
			||||||
 | 
					`C@eN,QJ!!J!!$30E!!)d!!!(5JG5rEd$AJVp[3!%#Q0QEf`0!ei!!@m!!!G1"e(
 | 
				
			||||||
 | 
					p[![p[!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[fr!!!#!e)!!J0I!f!0!em!!Q`
 | 
				
			||||||
 | 
					!!JGJ"f$pZrfk!Ifl!!!"rES!!!)$B!!#!f%$BJd$B3!#FJ!!"f!(D`0M!f30!f-
 | 
				
			||||||
 | 
					!!Q)!!!GJ"fF$C30Q$30P!!&[!!!(B!GMrEN,rEN!*$!!%'0bHA"dEfC[E'4PFR"
 | 
				
			||||||
 | 
					KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!fB!!@d!!!GM"fB$C``$C`!+!!3kFR0K!!)
 | 
				
			||||||
 | 
					!!!d$C!!"E`!!!!!!!2fi#rfi!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J#!f)!!J0
 | 
				
			||||||
 | 
					S!fN0!fJ!!dN!!JGX"jEpYrff!fS+rEF!'#jMEh*PBh*PE#SU+LS!!!!!!!#3!!"
 | 
				
			||||||
 | 
					ZG@aX!Iff!!!'!fS!!rfe!fX$E!VpY3!%#QY[Bf`0!fX!!@d!!!G`"h2pY!VpY!!
 | 
				
			||||||
 | 
					%#Q&XD@%'!f`!!rfc!fd$EJVpX`!%#QPZFfJ0!fd!!M3!!!Gf"hlpXJ0[#[fb!!3
 | 
				
			||||||
 | 
					+BfC[E!d$E`!"E`!!"hS(IIfa#rfa!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4PFR"
 | 
				
			||||||
 | 
					KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B$EJ!$rE!$F2f[#[f`!!3+G'm
 | 
				
			||||||
 | 
					J)!d$F!!#EJ!!"i%(N!!$F30b$30a!!)d!!!(L3H3!2fZ!h-+rDi!"!TQD@aP$30
 | 
				
			||||||
 | 
					c!!&Y!!!(M!H2!h3-!h3!#`!&FR0K,QJ!!J!!$30b!!)d!!!(J3H*rDd$G3VpV3!
 | 
				
			||||||
 | 
					%#Q0QEf`0!h8!!@m!!!H&"iMpV![pV!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[f
 | 
				
			||||||
 | 
					[!!!#!fN!!J0f!hF0!hB!!Q`!!JHA"jIpUrfU!IfV!!!"rDS!!!)$G`!#!hJ$H3d
 | 
				
			||||||
 | 
					$H!!#FJ!!"jF(SJ0k!hX0!hS!!Q)!!!HA"ji$I!0p$30m!!&[!!!(P`HDrDN,rDN
 | 
				
			||||||
 | 
					!*$!!%'0bHA"dEfC[E'4PFR"KG'J!%'0bHA"dEdC[E'4PFP"KG'J0!hd!!@d!!!H
 | 
				
			||||||
 | 
					D"jd$IJ`$IJ!-!!BkFh4KBfX!!J!!$30l!!&[!!!!!!!!rDJ,rDJ!&$!!#(4PEA"
 | 
				
			||||||
 | 
					`BA4S!!KdC@e`8'&dD!)$H3!#!hm$J!d$I`!$53!#"k-(cIfRrDB$J3VpT`!B,Q0
 | 
				
			||||||
 | 
					[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rDB!!!B$J3!$rD8$JJ1$#[fP!!3+Dfp
 | 
				
			||||||
 | 
					ME!d$JJ!"E3!!"kF(U[fN#[fN!!3+B@aTB3B$J`!$rD-$K!1&#[fM!!3+D@jcD!d
 | 
				
			||||||
 | 
					$K!!#0!!!"kd(YIfL!iB+rD)!"!TMCQpX$31'!!&[!!!(X3HdrD%,rD%!0$!!''p
 | 
				
			||||||
 | 
					`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4
 | 
				
			||||||
 | 
					S"J1&!!2pS!1(rCm+rD!!"!TdEb!J$31(!!*Z!!!(Z!I(!iJ$L3d$L!!#0!!!"m!
 | 
				
			||||||
 | 
					(arfH!iS+rCi!"!TQD@aP$31+!!&Y!!!(``I'!iX-!iX!$3!(Fh4KBfXZD!!#!!!
 | 
				
			||||||
 | 
					0!iN!!M3!!!Hi"m$pR31-#[fG!!3+BfC[E!d$M!!"E`!!"l`([rfF#rfF!"3`!!K
 | 
				
			||||||
 | 
					dC@e`F'&dD!!)G'9YF&"KG'J'rCm!!!)$J!!#!id$MJd$M3!$53!#"mi(q2fErCS
 | 
				
			||||||
 | 
					$M`VpQ`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rCS!!!B$M`!$rCN$N!!
 | 
				
			||||||
 | 
					$N3VpQ3!%#QY[Bf`0!j!!!!&Y!!!(dJI9rCJ+rCJ!"!TKE'PK"J14!!2pP`15!j-
 | 
				
			||||||
 | 
					+rCF!"!TTER0S$315!!)d!!!(f!IJrCB$P!VpPJ!%#Q0QEf`0!j3!!@m!!!IF"pr
 | 
				
			||||||
 | 
					pP3[pP3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
 | 
				
			||||||
 | 
					NC8C[E'4PFP"KG'J'!j-!!rf8!jApN`VpP!!%#R4[)#!0!j8!!Qi!!!IM"r)$PJ1
 | 
				
			||||||
 | 
					A$31@!!)d!!!(k`IbrC)$Q!VpNJ!%#QCTE'80!jJ!!@d!!!IZ"r%$Q3`$Q3!4!!Y
 | 
				
			||||||
 | 
					cB@CPFh4KBfXZD!!#!!!0!jF!!M3!!!IM"q[pN31D#[f4!!3+BfC[E!d$QJ!"E`!
 | 
				
			||||||
 | 
					!"qF(k[f3!![pN!!!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!EpN`!!!J11!!)$Q`1
 | 
				
			||||||
 | 
					F$31E!!*X!!)(q3IjrBrpMJ(pM`!!!If1!!!#!j`!!J1G!ji0!jd!!R)!!!Ij#!3
 | 
				
			||||||
 | 
					$R`1J$31I!!*L!!!(q3J!!k%$SJd$S3!"E`!!"rN(r2f0#rf0!#3`!""MFRP`G'p
 | 
				
			||||||
 | 
					QEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S$31L!!&Y!!!(r!Ir!k--!k-!#J!
 | 
				
			||||||
 | 
					%1R0SB3!#!!!0!k!!!@m!!!!!!!$pM![pM!!8-!!)G'9YF("KG'J!#(4PEA"3BA4
 | 
				
			||||||
 | 
					S!J1H!!)$T!1P$31N!!0*!!))"3J[rB[pLJ1Q#[f,!"JZBfpbC@0bC@`U+LSU!!!
 | 
				
			||||||
 | 
					!!!!!N!!!ER9XE!(pLJ!!"J1Q!!2pL31R!kJ+rBN!"!TVEf0X$31R!!&Y!!!)#3J
 | 
				
			||||||
 | 
					-rBJ+rBJ!"!TKE'PK"J1S!!2pK`1T!kS+rBF!"!TTER0S$31T!!)d!!!)$`JArBB
 | 
				
			||||||
 | 
					$U`VpKJ!%#Q0QEf`0!kX!!@m!!!J6#"EpK3[pK3!d-!!BEh"PER0cE'PZBfaeC'9
 | 
				
			||||||
 | 
					QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!kS!!rf%!kcpJ`V
 | 
				
			||||||
 | 
					pK!!%#R4[)#!0!k`!!Qi!!!JD##N$V31Z$31Y!!)d!!!))JJTrB)$V`VpJJ!%#QC
 | 
				
			||||||
 | 
					TE'80!km!!@d!!!JP##J$X!`$X!!,!!9cD'%ZD!!#!!!0!ki!!M3!!!JD##,pJ31
 | 
				
			||||||
 | 
					a#[f"!!3+BfC[E!d$X3!"E`!!#"i))If!#rf!!"3`!!KdC@e`F'&dD!!)G'9YF&"
 | 
				
			||||||
 | 
					KG'J'rB-!!!)$T3!#!l)$X`d$XJ!#E!!##$!)-2errAi"rAm!!!(pIJ!!!J1c!!)
 | 
				
			||||||
 | 
					$Y!1e$31d!!*b!!!)-!Jl!lB$Y`d$YJ!#BJ!!#$!)0`1i!lN0!lJ!!@m!!!J`#$2
 | 
				
			||||||
 | 
					pI3[pI3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD!d$Z3!
 | 
				
			||||||
 | 
					"E3!!#$-)0J1k$!1k!!d!"cTdH(4IC')!!J!!$31h!!&[!!!!!!!!rA`,rA`!&$!
 | 
				
			||||||
 | 
					!#(4PEA"`BA4S!!KdC@e`8'&dD!)$Y3!#!lX$[!d$Z`!$53!##$`)C[elrAS$[3V
 | 
				
			||||||
 | 
					pH`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"rAS!!!B$[3!$rAN$[J1r#[e
 | 
				
			||||||
 | 
					j!!3+DfpME!d$[J!"E3!!#%!)3rei#[ei!!3+B@aTB3B$[`!$rAF$`!2"#[eh!!3
 | 
				
			||||||
 | 
					+D@jcD!d$`!!#0!!!#%B)6[ef!m)+rAB!"!TMCQpX$32#!!&[!!!)5JK0rA8,rA8
 | 
				
			||||||
 | 
					!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'Efa
 | 
				
			||||||
 | 
					NCA*3BA4S"J2"!!2pG!2$rA-+rA3!"!TdEb!J$32$!!*Z!!!)83KJ!m3$a3d$a!!
 | 
				
			||||||
 | 
					#0!!!#&N)B2eb!mB+rA)!"!TQD@aP$32'!!&Y!!!)A!KI!mF-!mF!$J!)G(KdAf4
 | 
				
			||||||
 | 
					L,QJ!!J!!$32&!!)d!!!)83KCrA%$b!VpF3!%#Q0QEf`0!mJ!!@m!!!K9#&MpF![
 | 
				
			||||||
 | 
					pF!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[ec!!!#!l`!!J2*!mS0!mN!!Q`!!JK
 | 
				
			||||||
 | 
					R#'IpEreZ!Ie[!!!"r@i!!!)$bJ!#!mX$c!d$b`!#FJ!!#'F)FJ20!mi0!md!!Q)
 | 
				
			||||||
 | 
					!!!KR#'i$c`23$322!!&[!!!)C`KUr@d,r@d!*$!!%'0bHA"dEfC[E'4PFR"KG'J
 | 
				
			||||||
 | 
					!%'0bHA"dEdC[E'4PFP"KG'J0!p!!!@d!!!KU#'d$d3`$d3!,!!8kH$8`13!#!!!
 | 
				
			||||||
 | 
					0!mi!!@m!!!!!!!$pE![pE!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!J2-!!)$dJ2
 | 
				
			||||||
 | 
					6$325!!0*!!))F`LGr@[pDJ28#[eV!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9
 | 
				
			||||||
 | 
					XE!(pDJ!!"J28!!2pD329!pB+r@N!"!TVEf0X$329!!&Y!!!)G`Kkr@J+r@J!"!T
 | 
				
			||||||
 | 
					KE'PK"J2@!!2pC`2A!pJ+r@F!"!TTER0S$32A!!)d!!!)I3L&r@B$f3VpCJ!%#Q0
 | 
				
			||||||
 | 
					QEf`0!pN!!@m!!!L"#)6pC3[pC3!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4
 | 
				
			||||||
 | 
					S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'!pJ!!reN!pVpB`VpC!!%#R4[)#!
 | 
				
			||||||
 | 
					0!pS!!Qi!!!L)#*F$f`2F$32E!!)d!!!)N!!)PreL!pd+r@)!"!TQD@aP$32G!!&
 | 
				
			||||||
 | 
					Y!!!)N`L@!pi-!pi!$!!'H$8`15jS!!)!!!d$h!!#0!!!#)J)N!$pB32I#[eK!!3
 | 
				
			||||||
 | 
					+BfC[E!d$h`!"E`!!#)`)MreJ#reJ!"3`!!KdC@e`F'&dD!!)G'9YF&"KG'J'r@-
 | 
				
			||||||
 | 
					!!!)$d`!#!q!$i3d$i!!$53!##*i)b2eIr9i$iJVpA`!B,Q0[FQ9MFQ9X+LSU+J!
 | 
				
			||||||
 | 
					!!!!!!*!!!'jeE'`"r9i!!!B$iJ!$r9d$i`2N#[eG!!3+DfpME!d$i`!"E3!!#+)
 | 
				
			||||||
 | 
					)TIeF#[eF!!3+B@aTB3B$j!!$r9X$j32Q#[eE!!3+D@jcD!d$j3!#0!!!#+J)X2e
 | 
				
			||||||
 | 
					D!qF+r9S!"!TMCQpX$32R!!&[!!!)V!L[r9N,r9N!0$!!''p`C@jcFfaTEQ0XG@4
 | 
				
			||||||
 | 
					PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J2Q!!2p@!2Sr9F
 | 
				
			||||||
 | 
					+r9J!"!TdEb!J$32S!!*Z!!!)X`M#!qN$kJd$k3!#0!!!#,X)`[e@!qX+r9B!"!T
 | 
				
			||||||
 | 
					QD@aP$32V!!&Y!!!)[JM"!q`-!q`!%!!+H$8`19pfCRNZD!!#!!!0!qS!!M3!!!L
 | 
				
			||||||
 | 
					c#,[p932Y#[e9!!3+BfC[E!d$l3!"E`!!#,F)Z[e8#re8!"3`!!KdC@e`F'&dD!!
 | 
				
			||||||
 | 
					)G'9YF&"KG'J'r9F!!!)$i3!#!qi$l`d$lJ!#E!!##-N)bIe6r9)"r9-!!!(p8J!
 | 
				
			||||||
 | 
					!!J2[!!)$m!2a$32`!!*b!!!)b3M8!r)$m`d$mJ!#BJ!!#-N)d!2d!r80!r3!!@m
 | 
				
			||||||
 | 
					!!!M*#-cp83[p83!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&
 | 
				
			||||||
 | 
					dD!d$p3!"E3!!#-`)c`2f$!2f!!d!"cTi06!jGM-!!J!!$32c!!&[!!!!!!!!r9!
 | 
				
			||||||
 | 
					,r9!!&$!!#(4PEA"`BA4S!!KdC@e`8'&dD!)$m3!#!rF$q!d$p`!$53!##08)rre
 | 
				
			||||||
 | 
					2r8i$q3Vp6`!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r8i!!!B$q3!$r8d
 | 
				
			||||||
 | 
					$qJ2l#[e0!!3+DfpME!d$qJ!"E3!!#0N)h2e-#[e-!!3+B@aTB3B$q`!$r8X$r!2
 | 
				
			||||||
 | 
					p#[e,!!3+D@jcD!d$r!!#0!!!#0m)jre+!ri+r8S!"!TMCQpX$32q!!&[!!!)i`M
 | 
				
			||||||
 | 
					Qr8N,r8N!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfa
 | 
				
			||||||
 | 
					eC'9'EfaNCA*3BA4S"J2p!!2p5!2rr8F+r8J!"!TdEb!J$32r!!*Z!!!)kJMj"!!
 | 
				
			||||||
 | 
					%!3d%!!!#0!!!#2))qIe'"!)+r8B!"!TQD@aP$33#!!&Y!!!)p3Mi"!--"!-!$J!
 | 
				
			||||||
 | 
					)H$8`1ABc,QJ!!J!!$33"!!)d!!!)kJMbr88%"!Vp43!%#Q0QEf`0"!3!!@m!!!M
 | 
				
			||||||
 | 
					Z#2(p4![p4!!8-!!)G'9YF("KG'J!#(4PEA"3BA4S"[e(!!!#!rJ!!J3&"!B0"!8
 | 
				
			||||||
 | 
					!!Q`!!JN!#3$p3re#!Ie$!!!"r8)!!!)%"J!#"!F%#!d%"`!$53!##3!*+[e"r8!
 | 
				
			||||||
 | 
					%#3Vp33!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r8!!!!B%#3!$r6m%#J3
 | 
				
			||||||
 | 
					,#[dr!!3+DfpME!d%#J!"E3!!#33*"rdq#[dq!!3+B@aTB3B%#`!$r6d%$!30#[d
 | 
				
			||||||
 | 
					p!!3+D@jcD!d%$!!#0!!!#3S*%[dm"!i+r6`!"!TMCQpX$331!!&[!!!*$JN4r6X
 | 
				
			||||||
 | 
					,r6X!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9
 | 
				
			||||||
 | 
					'EfaNCA*3BA4S"J30!!2p1J32r6N+r6S!"!TdEb!J$332!!*Z!!!*&3NN""!%%3d
 | 
				
			||||||
 | 
					%%!!#0!!!#4d**2di"")+r6J!"!TQD@aP$335!!&Y!!!*)!NM""--""-!#`!&Fh0
 | 
				
			||||||
 | 
					X,QJ!!J!!$334!!)d!!!*&3NGr6F%&!Vp0`!%#Q0QEf`0""3!!@m!!!NC#4cp0J[
 | 
				
			||||||
 | 
					p0J!H-!!0Fh0XCQpXC'9bF'&dD!!0Fh0X4QpXC'9b8'&dD!Ep13!!!J3)!!)%&33
 | 
				
			||||||
 | 
					@$339!!0*!!)*+`P9r6Ap0!3A#[de!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9
 | 
				
			||||||
 | 
					XE!(p0!!!"J3A!!2p-`3B""N+r6-!"!TVEf0X$33B!!&Y!!!*,`Nbr6)+r6)!"!T
 | 
				
			||||||
 | 
					KE'PK"J3C!!2p-33D""X+r6%!"!TTER0S$33D!!)d!!!*03Npr6!%(!Vp-!!%#Q0
 | 
				
			||||||
 | 
					QEf`0""`!!@m!!!Nj#6cp,`[p,`!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4
 | 
				
			||||||
 | 
					S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'""X!!rdZ""hp,3Vp,J!%#R4[)#!
 | 
				
			||||||
 | 
					0""d!!Qi!!!P!#8m%(J3I$33H!!)d!!!*5!P2r5`%)!Vp,!!%#QCTE'80"#!!!@d
 | 
				
			||||||
 | 
					!!!P,#8i%)3`%)3!-!!CcFf`b,QJ!!J!!$33I!!)d!!!*3!P)r5X%)JVp+`!%#Q0
 | 
				
			||||||
 | 
					QEf`0"#)!!@m!!!P%#8Ip+J[p+J!H-!!0Fh0XCQpXC'9bF'&dD!!0Fh0X4QpXC'9
 | 
				
			||||||
 | 
					b8'&dD!Ep,3!!!J3@!!)%)`3N$33M!!0*!!)*9JQ!r5Rp+!3P#[dT!"JZBfpbC@0
 | 
				
			||||||
 | 
					bC@`U+LSU!!!!!!!!N!!!ER9XE!(p+!!!"J3P!!2p*`3Q"#F+r5F!"!TVEf0X$33
 | 
				
			||||||
 | 
					Q!!&Y!!!*@JPGr5B+r5B!"!TKE'PK"J3R!!2p*33S"#N+r58!"!TTER0S$33S!!)
 | 
				
			||||||
 | 
					d!!!*B!PSr53%+JVp*!!%#Q0QEf`0"#S!!@m!!!PN#@Ip)`[p)`!d-!!BEh"PER0
 | 
				
			||||||
 | 
					cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'"#N
 | 
				
			||||||
 | 
					!!rdL"#[p)3Vp)J!%#R4[)#!0"#X!!Qi!!!PV#AS%,!3Y$33X!!)d!!!*F`Pkr5!
 | 
				
			||||||
 | 
					%,JVp)!!%#QCTE'80"#i!!@d!!!Pf#AN%,``%,`!0!!GcFf`b-bjS!!)!!!d%,3!
 | 
				
			||||||
 | 
					#0!!!#@X*FrdI"$!+r4m!"!TMCQpX$33`!!&[!!!*E`Pbr4i,r4i!(M!!$A0cE'C
 | 
				
			||||||
 | 
					[E'4PFR"KG'J!$A0cE%C[E'4PFP"KG'J'r5%!!!)%*!!#"$%%-Jd%-3!$53!##B%
 | 
				
			||||||
 | 
					*UrdGr4`%-`Vp(3!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r4`!!!B%-`!
 | 
				
			||||||
 | 
					$r4X%0!3e#[dE!!3+DfpME!d%0!!"E3!!#B8*L2dD#[dD!!3+B@aTB3B%03!$r4N
 | 
				
			||||||
 | 
					%0J3h#[dC!!3+D@jcD!d%0J!#0!!!#BX*NrdB"$J+r4J!"!TMCQpX$33i!!&[!!!
 | 
				
			||||||
 | 
					*M`Q5r4F,r4F!0$!!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%P
 | 
				
			||||||
 | 
					ZBfaeC'9'EfaNCA*3BA4S"J3h!!2p&J3jr48+r4B!"!TdEb!J$33j!!*Z!!!*PJQ
 | 
				
			||||||
 | 
					P"$S%1`d%1J!#0!!!#Ci*TId8"$`+r43!"!TQD@aP$33m!!&Y!!!*S3QN"$d-"$d
 | 
				
			||||||
 | 
					!$!!'Fh0X-bjS!!)!!!d%1`!#0!!!#CB*R[d6"$i+r4-!"!TMCQpX$33q!!&[!!!
 | 
				
			||||||
 | 
					*QJQGr4),r4)!(M!!$A0cE'C[E'4PFR"KG'J!$A0cE%C[E'4PFP"KG'J'r48!!!)
 | 
				
			||||||
 | 
					%-J!#"$m%3!d%2`!$53!##D`*e[d4r4!%33Vp%3!B,Q0[FQ9MFQ9X+LSU+J!!!!!
 | 
				
			||||||
 | 
					!!*!!!'jeE'`"r4!!!!B%33!$r3m%3J4$#[d2!!3+DfpME!d%3J!"E3!!#E!*Xrd
 | 
				
			||||||
 | 
					1#[d1!!3+B@aTB3B%3`!$r3d%4!4&#[d0!!3+D@jcD!d%4!!#0!!!#EB*[[d-"%B
 | 
				
			||||||
 | 
					+r3`!"!TMCQpX$34'!!&[!!!*ZJQpr3X,r3X!0$!!''p`C@jcFfaTEQ0XG@4PCQp
 | 
				
			||||||
 | 
					XC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*3BA4S"J4&!!2p#J4(r3N+r3S
 | 
				
			||||||
 | 
					!"!TdEb!J$34(!!*Z!!!*`3R3"%J%53d%5!!#0!!!#FN*d2d)"%S+r3J!"!TQD@a
 | 
				
			||||||
 | 
					P$34+!!&Y!!!*c!R2"%X-"%X!$!!'G'ac-5jS!!)!!!d%53!#0!!!#F%*bId("%`
 | 
				
			||||||
 | 
					+r3F!"!TMCQpX$34-!!&[!!!*a3R)r3B,r3B!(M!!$A0cE'C[E'4PFR"KG'J!$A0
 | 
				
			||||||
 | 
					cE%C[E'4PFP"KG'J'r3N!!!)%3!!#"%d%6Jd%63!#E!!##GF*erd&r33"r38!!!(
 | 
				
			||||||
 | 
					p"!!!!J41!!)%6`43$342!!0*!!)*e`S"r32p!J44#[d$!"JZBfpbC@0bC@`U+LS
 | 
				
			||||||
 | 
					U!!!!!!!!N!!!ER9XE!(p!J!!"J44!!2p!345"&-+r3%!"!TVEf0X$345!!&Y!!!
 | 
				
			||||||
 | 
					*f`RHr3!+r3!!"!TKE'PK"J46!!2mr`48"&8+r2m!"!TTER0S$348!!)d!!!*i3R
 | 
				
			||||||
 | 
					Tr2i%9JVmrJ!%#Q0QEf`0"&B!!@m!!!RP#HMmr3[mr3!d-!!BEh"PER0cE'PZBfa
 | 
				
			||||||
 | 
					eC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9NC8C[E'4PFP"KG'J'"&8!!rcm"&I
 | 
				
			||||||
 | 
					mq`Vmr!!%#R4[)#!0"&F!!Qi!!!RX#IX%@!4C$34B!!)d!!!*p!Rlr2S%@JVmqJ!
 | 
				
			||||||
 | 
					%#QCTE'80"&S!!@d!!!Rh#IS%@``%@`!1!!KMFRP`G'mZD!!#!!!0"&N!!M3!!!R
 | 
				
			||||||
 | 
					X#I6mq34F#[cj!!3+BfC[E!d%A!!"E`!!#I!*mrci#rci!#3`!""MFRP`G'pQEfa
 | 
				
			||||||
 | 
					NCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S"[cl!!!#"&!!!J4G"&i0"&d!!Q`!!JS
 | 
				
			||||||
 | 
					##J,mprcf!Ich!!!"r2B!!!)%AJ!#"&m%B!d%A`!$53!##J)+,2cer23%B3Vmp3!
 | 
				
			||||||
 | 
					B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r23!!!B%B3!$r2-%BJ4M#[cc!!3
 | 
				
			||||||
 | 
					+DfpME!d%BJ!"E3!!#JB+#Icb#[cb!!3+B@aTB3B%B`!$r2%%C!4P#[ca!!3+D@j
 | 
				
			||||||
 | 
					cD!d%C!!#0!!!#J`+&2c`"'B+r2!!"!TMCQpX$34Q!!&[!!!+%!S6r1m,r1m!0$!
 | 
				
			||||||
 | 
					!''p`C@jcFfaTEQ0XG@4PCQpXC'9bF'&dD!!BEh"PEP066%PZBfaeC'9'EfaNCA*
 | 
				
			||||||
 | 
					3BA4S"J4P!!2mlJ4Rr1d+r1i!"!TdEb!J$34R!!*Z!!!+&`SQ"'J%D3d%D!!#0!!
 | 
				
			||||||
 | 
					!#Km+*[cX"'S+r1`!"!TQD@aP$34U!!&Y!!!+)JSP"'X-"'X!%!!+Eh"PER0cE(B
 | 
				
			||||||
 | 
					ZD!!#!!!0"'N!!M3!!!SA#Krmk`4X#[cV!!3+BfC[E!d%E!!"E`!!#KX+([cU#rc
 | 
				
			||||||
 | 
					U!#3`!""MFRP`G'pQEfaNCA*`BA4S!""MFRP`G'p'EfaNCA*3BA4S"[cY!!!#"'!
 | 
				
			||||||
 | 
					!!J4Y"'i0"'d!!dN!!JSY#PImkIcS"'m+r1N!'#jMEh*PBh*PE#SU+LS!!!!!!!#
 | 
				
			||||||
 | 
					3!!"ZG@aX!IcS!!!'"'m!!rcR"(!%F3Vmj`!%#QY[Bf`0"(!!!@d!!!Sa#M6mjJV
 | 
				
			||||||
 | 
					mjJ!%#Q&XD@%'"(%!!rcP"()%F`Vmj3!%#QPZFfJ0"()!!M3!!!Sh#Mrmj!4d#[c
 | 
				
			||||||
 | 
					N!!3+BfC[E!d%G!!"E`!!#MX+2[cM#rcM!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4
 | 
				
			||||||
 | 
					PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B%F`!$r1)%GIcK#[cL!!3
 | 
				
			||||||
 | 
					+G'mJ)!d%G3!#EJ!!#N)+834f"(F0"(B!!M3!!!T+#P(mi!4i#[cJ!!3+CQPXC3d
 | 
				
			||||||
 | 
					%H!!"E3!!#Nd+8!4j$!4j!!i!#(4YC'PQCLjS!!)!!!d%G`!#0!!!#N)+5[cI"(S
 | 
				
			||||||
 | 
					+r0m!"!TMCQpX$34k!!&[!!!+4JT*r0i,r0i!*$!!%'0bHA"dEfC[E'4PFR"KG'J
 | 
				
			||||||
 | 
					!%'0bHA"dEdC[E'4PFP"KG'J'r1%!!!)%EJ!#"(X%I!d%H`!#E!!##PJ+@2cGr0`
 | 
				
			||||||
 | 
					"r0d!!!(mh!!!!J4m!!)%I34q$34p!!*X!!)+@!TBr0[mfJ(mf`!!!IcD!!!#"(i
 | 
				
			||||||
 | 
					!!J4r")!0"(m!!dN!!JTB#S,mfIcB")%+r0N!'#jMEh*PBh*PE#SU+LS!!!!!!!#
 | 
				
			||||||
 | 
					3!!"ZG@aX!IcB!!!'")%!!rcA"))%J`Vme`!%#QY[Bf`0"))!!@d!!!TF#PrmeJV
 | 
				
			||||||
 | 
					meJ!%#Q&XD@%'")-!!rc9")3%K3Vme3!%#QPZFfJ0")3!!M3!!!TL#QVme!5'#[c
 | 
				
			||||||
 | 
					8!!3+BfC[E!d%KJ!"E`!!#QB+DIc6#rc6!$3`!"K[F'9ZFh0XD@jME(9NC@C[E'4
 | 
				
			||||||
 | 
					PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD!B%K3!$r0)%Krc4#[c5!!3
 | 
				
			||||||
 | 
					+G'mJ)!d%K`!#EJ!!#Qd+I!5)")N0")J!!M3!!!Te#Rcmd!5+#[c3!!3+CQPXC3d
 | 
				
			||||||
 | 
					%LJ!"E3!!#RJ+H`5,$!5,!!`!"Q9IEh-ZD!!#!!!0")N!!M3!!!TY#RAmc`5-#[c
 | 
				
			||||||
 | 
					2!!3+BfC[E!d%M!!"E`!!#R%+G2c1#rc1!#B`!"&[F'9ZFh0XCQpXC'9bF'&dD!!
 | 
				
			||||||
 | 
					4Eh"PER0cE%C[E'4PFP"KG'J'r0%!!!)%J!!#")d%MJd%M3!$53!##S-+VIc0r-`
 | 
				
			||||||
 | 
					%M`Vmc3!B,Q0[FQ9MFQ9X+LSU+J!!!!!!!*!!!'jeE'`"r-`!!!B%M`!$r-X%N!!
 | 
				
			||||||
 | 
					%N3Vmb`!%#QY[Bf`0"*!!!!&Y!!!+K`U+r-S+r-S!"!TKE'PK"J54!!2mb355"*-
 | 
				
			||||||
 | 
					+r-N!"!TTER0S$355!!)d!!!+M3U9r-J%P!Vmb!!%#Q0QEf`0"*3!!@m!!!U4#T6
 | 
				
			||||||
 | 
					ma`[ma`!d-!!BEh"PER0cE'PZBfaeC'9QEfaNCA*`BA4S!"K[F'9Z8e0-5@jME(9
 | 
				
			||||||
 | 
					NC8C[E'4PFP"KG'J'"*-!!rc'"*Ama3VmaJ!%#R4[)#!0"*8!!Qi!!!UB#UF%PJ5
 | 
				
			||||||
 | 
					A$35@!!)d!!!+S!URr-3%Q!Vma!!%#QCTE'80"*J!!@d!!!UM#UB%Q3`%Q3!0!!G
 | 
				
			||||||
 | 
					PAfpc-LjS!!)!!!d%P`!#0!!!#TJ+S2c$"*S+r--!"!TMCQpX$35D!!&[!!!+R!U
 | 
				
			||||||
 | 
					Ir-),r-)!*M!!%@p`C@jcFfaQEfaNCA*`BA4S!"&[F'9ZFh0X4QpXC'9b8'&dD!E
 | 
				
			||||||
 | 
					ma3!!!J51!!)%Qrc"$35E!!*X!!)+VJUZr-$m[`(m`!!!!Ibr!!!#r-%!!!d!#3!
 | 
				
			||||||
 | 
					"E3!!!!!!!3!I!Irq!!!#!!B!!J5F"*d0"*`!!Q`!!J!!!!$m[[bp!Ibq!!!"r,d
 | 
				
			||||||
 | 
					!!!)%R3!#"*i%R`d%RJ!#E!!##V%+b!5Jr,`0"+!!!dN!!JUa#XMmZ`5K"+)+r,X
 | 
				
			||||||
 | 
					!'#jcHA0[C'a[Cf&cDh)!!!!!!!!!!&4&@&30"+%!!@d!!!Ua#V3%S``%S`!'!!!
 | 
				
			||||||
 | 
					!!J!!"J5L!!2mZJ5N"+8+r,S!"!TLG'jc$35N!!&+!!!+Y`Um"+B#"+B!!J5Rr,N
 | 
				
			||||||
 | 
					0"+F!!@d!!!Uh#VS%U!`%U!!+!!4%EfjP!!)!!!,mZ3!!"J5P!!2mZ!5Tr,F+r,J
 | 
				
			||||||
 | 
					!"!TRDACe$35T!!&Y!!!+[`V#r,B$r,B!"3EmY`!!!Ibm!!!#"*m!!J5Ur,80"+S
 | 
				
			||||||
 | 
					!!Q`!!J!!!!$mY2bc!Ibd!!!"r,-!!!,mY3!!$J!#!!!2%!!$!",mXJ5V"+`%V35
 | 
				
			||||||
 | 
					Z"+m%X!5a",)%X`5d",8%YJ5hr,(mX2b[r+i"r,)!!"!%U`!3r+hmV2bVr+VmUIb
 | 
				
			||||||
 | 
					Sr+ImT[bPr+6mSrbLr+(mS2bIr*i+r+d!'#jKCACdEf&`F'jeE'`!!)!!!!#3!!!
 | 
				
			||||||
 | 
					U+LSU#rbX!")`!!GdD'9`BA4S!!GdD'93BA4S#rbV!"``!!adD'9[E'4NC@aTEA-
 | 
				
			||||||
 | 
					!$(4SC8pXC%4PE'PYF`[mUJ!J-!!1G'KPF(*[DQ9MG("KG'J!$R4SC9"bEfTPBh4
 | 
				
			||||||
 | 
					3BA4S#rbT!"B`!!PdD'9YCA"KG'J!#A4SC8eP8'&dD![mU!!Q-!!4D@jME(9NC@C
 | 
				
			||||||
 | 
					[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S#rbR!$3`!"K[F'9ZFh0XD@jME(9
 | 
				
			||||||
 | 
					NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&dD![mTJ!N-!!3Bh*
 | 
				
			||||||
 | 
					jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD![mT3!H-!!0Fh0XCQpXC'9
 | 
				
			||||||
 | 
					bF'&dD!!0Fh0X4QpXC'9b8'&dD![mT!!Q-!!4Eh"PER0cE'C[E'4PFR"KG'J!%@p
 | 
				
			||||||
 | 
					`C@jcFfa'EfaNCA*3BA4S#rbM!#i`!"9dD'9ZCAGQEfaNCA*bC@CPFQ9ZBf8!&A4
 | 
				
			||||||
 | 
					SC8jPGdC[E'4PFP*PCQ9bC@jMC3[mSJ!8-!!)G'9YF("KG'J!#(4PEA"3BA4S!Ib
 | 
				
			||||||
 | 
					K!!!"r+!!!!(mR`!!!IbH!!!1"+`!"a$mR35ir*cmQ`5j",VmQJVmR3!B,Q&PGR4
 | 
				
			||||||
 | 
					[BA"`ER9XE!!!J!!!!*!!!#SU+LS0",J!!@X!!!!!#XJ%Z`)%Z`!#!!8%[!)%[!!
 | 
				
			||||||
 | 
					#"*lmQ3,mQ3!!!IbF!!!#r*X!!"!%Z3!!%!5k!)B!(rbBr*ImP[b9r*6mNrb5!#c
 | 
				
			||||||
 | 
					mNIb3!2b2r)lmMIb-!%rmL`"D!&[mLJ"Nr)N!EIb)r)ImKJ#2r)AmK2b$r),mJIb
 | 
				
			||||||
 | 
					!r(rmI[apr(cmH`#Tr(VmHIair(F![Iaf!-ImG3$8!1)!l!$j!3-"%!%D!5F"-3%
 | 
				
			||||||
 | 
					q!8J"93&I!@`"GJ'$!Bd"QJ'N!E%"Z`()!G)"h`(T!IB#!!)0!KF#*!)Z!MX#43*
 | 
				
			||||||
 | 
					5!P`#D3*c!S!#LJ+A!U%#VJ+m!XB#d`,G!ZS#p!-"!`X$'!-L!bm$130'!e!$A30
 | 
				
			||||||
 | 
					R!h3$IJ1,!jN$S`1`!lS$a`24!pi$l!2f"!-%%`3K"#m%234,"&X%D`4j")X%Q35
 | 
				
			||||||
 | 
					Mr(3%U2acr(,mF3VmQ!!%#Q0[BQS+r*F!'#jPBA*cCQCNFQ&XDA-!!!!!!!!J!'&
 | 
				
			||||||
 | 
					QC()+r*B!"!TMG(Kd#rb9!")`!!GdD'9`BA4S!!GdD'93BA4S#[b8!!3+BA0MFJV
 | 
				
			||||||
 | 
					mN`!%#R4iC'`,r*)!($!!$(4SC@pXC'4PE'PYF`!-G'KP6faN4'9XD@ec#[b4!!3
 | 
				
			||||||
 | 
					+BfPdE32mN!$rr3[mM`!J-!!1G'KPF(*[DQ9MG("KG'J!$R4SC9"bEfTPBh43BA4
 | 
				
			||||||
 | 
					S!rb1rri+r)d!"!T849K8#rb-!"B`!!PdD'9YCA"KG'J!#A4SC8eP8'&dD![mL`!
 | 
				
			||||||
 | 
					Q-!!4D@jME(9NC@C[E'4PFR"KG'J!%@PZBfaeC'9'EfaNCA*3BA4S#rb+!$3`!"K
 | 
				
			||||||
 | 
					[F'9ZFh0XD@jME(9NC@C[E'4PFR"KG'J!''p`C@j68da*EQ0XG@4P4QpXC'9b8'&
 | 
				
			||||||
 | 
					dD![mL3!N-!!3Bh*jF(4[CQpXC'9bF'&dD!!3Bh*jF(4[4QpXC'9b8'&dD![mL!!
 | 
				
			||||||
 | 
					H-!!0Fh0XCQpXC'9bF'&dD!!0Fh0X4QpXC'9b8'&dD![mK`!Q-!!4Eh"PER0cE'C
 | 
				
			||||||
 | 
					[E'4PFR"KG'J!%@p`C@jcFfa'EfaNCA*3BA4S#[b'!!3+BfC[E!VmK3!B,QeTFf0
 | 
				
			||||||
 | 
					cE'0d+LSU+J!!!!!!!*!!!#SU+LS+r)3!"!TcC@aP#[b$!"JZBfpbC@4PE'mU+LS
 | 
				
			||||||
 | 
					U!!!!!!!!N!!!+LSU+J(mJJ!!![b"!!!+r)!!"!TVEf0X#[ar!!3+D@jcD!2mIJ!
 | 
				
			||||||
 | 
					%#[ap!"JZBfpbC@0bC@`U+LSU!!!!!!!!N!!!ER9XE!VmI!!%#R*cE(3,r(X!,M!
 | 
				
			||||||
 | 
					!&A4SC@jPGfC[E'4PFR*PCQ9bC@jMC3!9G'KP6Q9h4QpXC'9b8Q9QCA*PEQ0P#[a
 | 
				
			||||||
 | 
					k!!3+F'jKE3VmH3!%#Q&XD@%+r(J!"!TdEb!J#[ah!!3+CQPXC32mGJ!'#rae!"3
 | 
				
			||||||
 | 
					`!!KdC@e`F'&dD!!)G'9YF&"KG'J+r(3!"!TLG'jc#[ac!!3+CfPfG32mFJ!&#[a
 | 
				
			||||||
 | 
					a!"JZFhPcEf4XEfGKFfYb!!!!!!!!!!"849K8%IbD#XRJ%JUYi1%TDJ`!!LrM*N9
 | 
				
			||||||
 | 
					4e%r&jLa&edrSaHBX4Nr%@qPF@eTVA&VU-NAE6m4Ek9aE@QYF@Z`bl5C&hNr,lbA
 | 
				
			||||||
 | 
					Y*N9J!""2bf%!%59K!")Pl5C&B!!66mYK!"3Pl5C&B!!96mYK!"BPl5C&B!!A6m[
 | 
				
			||||||
 | 
					Y*N9J!"K2amAQ,%C2&!!L+Q%!'9m!%#pK!"PK!"S[DJ`!'dmUB3!F,'S-!"eA!!K
 | 
				
			||||||
 | 
					B!"i!(fK2+Q%!)'%!'@%!)5TK!"PI!"![B3!L$!!M6em!*%9J!#92A`!PDJ`!'dp
 | 
				
			||||||
 | 
					K!#BUB3!F,'%!*ba'6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"R1,f%!+Q%!+bp
 | 
				
			||||||
 | 
					K!#`-!#02A`!9B3!Y*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,Lp
 | 
				
			||||||
 | 
					K!#TK!#m[B3!X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3!
 | 
				
			||||||
 | 
					`,f%!,!`!)dpI!"9K!$%P4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!
 | 
				
			||||||
 | 
					Z,f%!+Q%!-LpK!#`-!#02A`!9B3!c*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!
 | 
				
			||||||
 | 
					T+Q%!'9m!,LpK!#TK!$3[B3!X$!!M6em!&@%!059&B!!Z6bTK!#"K!#KK!#%UB3!
 | 
				
			||||||
 | 
					CA`!6,f%!+5TK!"PI!#i[B3!UB3!f,f%!,!`!)dpI!"9K!$FP4@!!,NmUB3!JB3!
 | 
				
			||||||
 | 
					SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!1#pK!#`-!#02A`!9B3!j*89J!#j
 | 
				
			||||||
 | 
					2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!$S[B3!X$!!M6em!&@%
 | 
				
			||||||
 | 
					!1b9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3!m,f%!,!`
 | 
				
			||||||
 | 
					!)dpI!"9K!$dP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%
 | 
				
			||||||
 | 
					!2LpK!#`-!#02A`!9B3!r*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m
 | 
				
			||||||
 | 
					!,LpK!#TK!%![B3!X$!!M6em!&@%!359&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%
 | 
				
			||||||
 | 
					!+5TK!"PI!#i[B3!UB3"#,f%!,!`!)dpI!"9K!%-P4@!!,NmUB3!JB3!SB3!K+Q%
 | 
				
			||||||
 | 
					!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!4#pK!#`-!#02A`!9B3"&*89J!#j2+Q%!)'%
 | 
				
			||||||
 | 
					!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!%B[B3!X$!!M6em!&@%!4b9&B!!
 | 
				
			||||||
 | 
					Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"),f%!,!`!)dpI!"9
 | 
				
			||||||
 | 
					K!%NP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!5LpK!#`
 | 
				
			||||||
 | 
					-!#02A`!9B3",*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#T
 | 
				
			||||||
 | 
					K!%`[B3!X$!!M6em!&@%!659&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"P
 | 
				
			||||||
 | 
					I!#i[B3!UB3"1,f%!,!`!)dpI!"9K!%mP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bp
 | 
				
			||||||
 | 
					K!#NUB3!CA`!Z,f%!+Q%!8#pK!#`-!#02A`!9B3"4*89J!#j2+Q%!)'%!+'%!)5T
 | 
				
			||||||
 | 
					K!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!&)[B3!X$!!M6em!&@%!8b9&B!!Z6bTK!#"
 | 
				
			||||||
 | 
					K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"8,f%!,!`!)dpI!"9K!&8P4@!
 | 
				
			||||||
 | 
					!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!9LpK!#`-!#02A`!
 | 
				
			||||||
 | 
					9B3"A*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!&J[B3!
 | 
				
			||||||
 | 
					X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"C,f%!,!`!)dp
 | 
				
			||||||
 | 
					I!"9K!&SP4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!@bp
 | 
				
			||||||
 | 
					K!#`-!#02A`!9B3"F*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,Lp
 | 
				
			||||||
 | 
					K!#TK!&d[B3!X$!!M6em!&@%!AL9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5T
 | 
				
			||||||
 | 
					K!"PI!#i[B3!UB3"I,f%!,!`!)dpI!"9K!'!P4@!!,NmUB3!JB3!SB3!K+Q%!'9m
 | 
				
			||||||
 | 
					!%bpK!#NUB3!CA`!Z,f%!+Q%!B5pK!#`-!#02A`!9B3"L*89J!#j2+Q%!)'%!+'%
 | 
				
			||||||
 | 
					!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!'-[B3!X$!!M6em!&@%!C#9&B!!Z6bT
 | 
				
			||||||
 | 
					K!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"P,f%!,!`!)dpI!"9K!'B
 | 
				
			||||||
 | 
					P4@!!,NmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!CbpK!#`-!#0
 | 
				
			||||||
 | 
					2A`!9B3"S*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!,LpK!#TK!'N
 | 
				
			||||||
 | 
					[B3!X$!!M6em!&@%!DL9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!#i
 | 
				
			||||||
 | 
					[B3!UB3"V,f%!,!`!)dmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%
 | 
				
			||||||
 | 
					!E#pK!#`-!#02A`!9B3"Y*89J!#j2+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m
 | 
				
			||||||
 | 
					!,LpK!#TK!'i[B3!X$!!M6em!&@%!Eb9&B!!Z6bTK!#"K!#KK!#%UB3!CA`!6,f%
 | 
				
			||||||
 | 
					!+5TK!"PI!#i[B3!UB3"`,f%!,!`!)dpI!"9K!(%P4@!!,NmUB3!JB3!SB3!K+Q%
 | 
				
			||||||
 | 
					!'9m!%bpK!#NUB3!CA`!Z,f%!+Q%!FLpK!#`-!#02+Q%!)'%!+'%!)5TK!"PI!"-
 | 
				
			||||||
 | 
					[B3!T+Q%!'9m!,LpK!#TK!(-[B3!X$!!M6em!&@%!G#9&B!!Z6bTK!#"K!#KK!#%
 | 
				
			||||||
 | 
					UB3!CA`!6,f%!+5TK!"PI!#i[B3!UB3"e,f%!,!`!)dmUB3!JB3!SB3!K+Q%!'9m
 | 
				
			||||||
 | 
					!%bpK!#NUB3!CA`!A,f%!+Q%!GLpK!#`-!#02+Q%!)'%!+'%!)5TK!"PI!"-[B3!
 | 
				
			||||||
 | 
					T+Q%!'9m!&bpK!#TK!(F[B3!X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"P
 | 
				
			||||||
 | 
					I!"F[B3!UB3"i,f%!,!`!)dmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!A,f%
 | 
				
			||||||
 | 
					!+Q%!H5pK!#`-!#02+Q%!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!&bpK!#TK!(S
 | 
				
			||||||
 | 
					[B3!X$!!M6bTK!#"K!#KK!#%UB3!CA`!6,f%!+5TK!"PI!"8[B3!UB3"l,f%!,!`
 | 
				
			||||||
 | 
					!)dmUB3!JB3!SB3!K+Q%!'9m!%bpK!#NUB3!CA`!9,f%!+Q%!I#pK!#`-!#02+Q%
 | 
				
			||||||
 | 
					!)'%!+'%!)5TK!"PI!"-[B3!T+Q%!'9m!&5pK!#TK!(d[B3!X$!!M6bTK!#"K!#K
 | 
				
			||||||
 | 
					K!#%UB3!CA`!6,f%!+5TK!"PI!"J[B3!UB3"q,f%!,!`!)dmUB3!JB3!SB3!K+Q%
 | 
				
			||||||
 | 
					!'9m!%bpK!#NUB3!CA`!B,f%!+Q%!IbpK!#`-!#028&92B3#!B3#"B3##DhCK!)0
 | 
				
			||||||
 | 
					K!)4K!#)-!)82$!5Y!&%!5deKBfPZG'pcD#")4$T%CA0VG'p`)%C[E'4PFMT*EQ0
 | 
				
			||||||
 | 
					[E@PZCcT[F'9ZFh0X,90139!Y-6Nj16%b-6%k6@&M6e-kE@YXD@jVFbjKF`!#!!!
 | 
				
			||||||
 | 
					1"+i!!J6mF!5p!ra`!!%1",d!!3!%[J`%[J!'!!!!!J!!$J5[!!)%r'm%[`2mE`!
 | 
				
			||||||
 | 
					%$J5r!!3!"-!%`36#"---"-!!%J!-6@&MD@jdEh0S)%K%!!)!!!`%`3!8!!j%CA0
 | 
				
			||||||
 | 
					VG'p`)%C[E'4PFJ!#!!!-"-)!$J!)5@jMEfeTEQF!!J!!$!6$!"X!&@p`C@jcFf`
 | 
				
			||||||
 | 
					Y8dj"8#da16Nj-6)a-3!#!!!-",!!4J"!6@&MD@jdEh0S)%K%1N4PFfYdEh!J4Qp
 | 
				
			||||||
 | 
					XC'9b1NPZBfpYD@jR1Qp`C@jcFf`Y8dj"8#da16Nj-6)a-6T0B@028`!#!!!-",%
 | 
				
			||||||
 | 
					!5!"#6@&MD@jdEh0S)%K%1N4PFfYdEh!J4QpXC'9b1NPZBfpYD@jR1Qp`C@jcFf`
 | 
				
			||||||
 | 
					Y8dj"8#da16Nj-6)a-6TTEQ0XG@4P!!)!!!`%XJ"3!%T0B@0TER4[FfJJ5%3k4'9
 | 
				
			||||||
 | 
					cDh4[F#"'EfaNCA)k5@jMEfeTEQFkEh"PER0cE#e66N&3,6%j16Na-M%a1QPZBfa
 | 
				
			||||||
 | 
					eC'8kEh"PER0cE!!#!!!-",-!4`""6@&MD@jdEh0S)%K%1N4PFfYdEh!J4QpXC'9
 | 
				
			||||||
 | 
					b1NPZBfpYD@jR1Qp`C@jcFf`Y8dj"8#da16Nj-6)a-6TMFRP`G'm!!J!!$!5d!%3
 | 
				
			||||||
 | 
					!2NeKBfPZG'pcD#")4$T%CA0VG'p`)%C[E'4PFMT*EQ0[E@PZCcT[F'9ZFh0X,90
 | 
				
			||||||
 | 
					139!Y-6Nj16%b-6%kFh0X!!)!!!`%Y3"!!$T0B@0TER4[FfJJ5%3k4'9cDh4[F#"
 | 
				
			||||||
 | 
					'EfaNCA)k5@jMEfeTEQFkEh"PER0cE#e66N&3,6%j16Na-M%a!!)!!!i%YJ!"&!6
 | 
				
			||||||
 | 
					%$J6%!!-B"-AmEJ6'$J6&!!-B"-ImE36)$J6(!!-B"-RmE!6+$J6*!!-B!"rmD`6
 | 
				
			||||||
 | 
					,#[aV!!3+BfC[E!`%b`!1!!K*EQ0[E@PZC`!#!!!+r'`!"!TMCQpX$!6+!"X!&@p
 | 
				
			||||||
 | 
					`C@jcFf`Y8dj"8#da16Nj-6)a-3!#!!!+r'd!"!TMCQpX$!6)!!d!"fPZBfaeC'8
 | 
				
			||||||
 | 
					!!J!!#[aZ!!3+BfC[E!`%aJ!9!!peER4TG'aPC#"QEfaNCA)!!J!!$!5h!%i!5%e
 | 
				
			||||||
 | 
					KBfPZG'pcD#")4$T%CA0VG'p`)%C[E'4PFMT*EQ0[E@PZCcT[F'9ZFh0X,90139!
 | 
				
			||||||
 | 
					Y-6Nj16%b-6%kBh*jF(4[1RJe-$Pf-`!#!!!"r,%!!!(mX!!!!Ib[!!!"r+i!!'&
 | 
				
			||||||
 | 
					cBh)!!3!-qYlHV3!!!3!!!*G#!!#@3J!!!AB!!$-8-0J!!!!F!AB!$h0MFhS!!!#
 | 
				
			||||||
 | 
					#6Np853!!!)jcBh"d!!!!QP4&@&3!!3#QFh4jE!!!!,j$6d4&!!%!bN*14%`!!!$
 | 
				
			||||||
 | 
					LBA"XG!!!!1j'8N9'!!!!qNP$6L-!!!%'D@0X0!!!!4*TBh-M!!!"(QPMFc3!!!%
 | 
				
			||||||
 | 
					UD'CNFJ!!!6C659T&!!!"3PG3Eh-!!!&1!!$rr`!!!!!!!!!!!)$rre!!!"i!!!!
 | 
				
			||||||
 | 
					!!)$rr`!!"cJ#DH#m"'Mrr`!!!*S!!!!!%iRrr`!!"Pi!!!!!"'Mrr`!!!53!!!!
 | 
				
			||||||
 | 
					!!!$rrb!!!9)!!!!!!!(rra3!!@i#DG`%!)$rr`!!!Pi#DH"X!!$rr`!!!Ri!!!!
 | 
				
			||||||
 | 
					!!)$rr`!!!S-#DH"d!*Err`!!!Si!!!!!!*Err`!!!j)!!!!!!*Err`!!"CB#DH%
 | 
				
			||||||
 | 
					i!*Err`!!"GS#DH%dkF$rr`!!"[`!!!!!rrrrr`!!"a)!!!!!!)$rr`!!"b!!!!!
 | 
				
			||||||
 | 
					!*4S:
 | 
				
			||||||
							
								
								
									
										116
									
								
								MacOS/opensslconf.h
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										116
									
								
								MacOS/opensslconf.h
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,116 @@
 | 
				
			|||||||
 | 
					/* MacOS/opensslconf.h */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if !(defined(VMS) || defined(__VMS)) /* VMS uses logical names instead */
 | 
				
			||||||
 | 
					#if defined(HEADER_CRYPTLIB_H) && !defined(OPENSSLDIR)
 | 
				
			||||||
 | 
					#define OPENSSLDIR "/usr/local/ssl"
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(HEADER_IDEA_H) && !defined(IDEA_INT)
 | 
				
			||||||
 | 
					#define IDEA_INT unsigned int
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(HEADER_MD2_H) && !defined(MD2_INT)
 | 
				
			||||||
 | 
					#define MD2_INT unsigned int
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(HEADER_RC2_H) && !defined(RC2_INT)
 | 
				
			||||||
 | 
					/* I need to put in a mod for the alpha - eay */
 | 
				
			||||||
 | 
					#define RC2_INT unsigned int
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(HEADER_RC4_H)
 | 
				
			||||||
 | 
					#if !defined(RC4_INT)
 | 
				
			||||||
 | 
					/* using int types make the structure larger but make the code faster
 | 
				
			||||||
 | 
					 * on most boxes I have tested - up to %20 faster. */
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * I don't know what does "most" mean, but declaring "int" is a must on:
 | 
				
			||||||
 | 
					 * - Intel P6 because partial register stalls are very expensive;
 | 
				
			||||||
 | 
					 * - elder Alpha because it lacks byte load/store instructions;
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define RC4_INT unsigned char
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#if !defined(RC4_CHUNK)
 | 
				
			||||||
 | 
					/*
 | 
				
			||||||
 | 
					 * This enables code handling data aligned at natural CPU word
 | 
				
			||||||
 | 
					 * boundary. See crypto/rc4/rc4_enc.c for further details.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#define RC4_CHUNK unsigned long
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(HEADER_DES_H) && !defined(DES_LONG)
 | 
				
			||||||
 | 
					/* If this is set to 'unsigned int' on a DEC Alpha, this gives about a
 | 
				
			||||||
 | 
					 * %20 speed up (longs are 8 bytes, int's are 4). */
 | 
				
			||||||
 | 
					#ifndef DES_LONG
 | 
				
			||||||
 | 
					#define DES_LONG unsigned long
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(HEADER_BN_H) && !defined(CONFIG_HEADER_BN_H)
 | 
				
			||||||
 | 
					#define CONFIG_HEADER_BN_H
 | 
				
			||||||
 | 
					#if __option(longlong)
 | 
				
			||||||
 | 
					#  define BN_LLONG
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
					#  undef BN_LLONG
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Should we define BN_DIV2W here? */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Only one for the following should be defined */
 | 
				
			||||||
 | 
					/* The prime number generation stuff may not work when
 | 
				
			||||||
 | 
					 * EIGHT_BIT but I don't care since I've only used this mode
 | 
				
			||||||
 | 
					 * for debuging the bignum libraries */
 | 
				
			||||||
 | 
					#undef SIXTY_FOUR_BIT_LONG
 | 
				
			||||||
 | 
					#undef SIXTY_FOUR_BIT
 | 
				
			||||||
 | 
					#define THIRTY_TWO_BIT
 | 
				
			||||||
 | 
					#undef SIXTEEN_BIT
 | 
				
			||||||
 | 
					#undef EIGHT_BIT
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(HEADER_RC4_LOCL_H) && !defined(CONFIG_HEADER_RC4_LOCL_H)
 | 
				
			||||||
 | 
					#define CONFIG_HEADER_RC4_LOCL_H
 | 
				
			||||||
 | 
					/* if this is defined data[i] is used instead of *data, this is a %20
 | 
				
			||||||
 | 
					 * speedup on x86 */
 | 
				
			||||||
 | 
					#undef RC4_INDEX
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(HEADER_BF_LOCL_H) && !defined(CONFIG_HEADER_BF_LOCL_H)
 | 
				
			||||||
 | 
					#define CONFIG_HEADER_BF_LOCL_H
 | 
				
			||||||
 | 
					#define BF_PTR
 | 
				
			||||||
 | 
					#endif /* HEADER_BF_LOCL_H */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(HEADER_DES_LOCL_H) && !defined(CONFIG_HEADER_DES_LOCL_H)
 | 
				
			||||||
 | 
					#define CONFIG_HEADER_DES_LOCL_H
 | 
				
			||||||
 | 
					/* the following is tweaked from a config script, that is why it is a
 | 
				
			||||||
 | 
					 * protected undef/define */
 | 
				
			||||||
 | 
					#ifndef DES_PTR
 | 
				
			||||||
 | 
					#define DES_PTR
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* This helps C compiler generate the correct code for multiple functional
 | 
				
			||||||
 | 
					 * units.  It reduces register dependancies at the expense of 2 more
 | 
				
			||||||
 | 
					 * registers */
 | 
				
			||||||
 | 
					#ifndef DES_RISC1
 | 
				
			||||||
 | 
					#define DES_RISC1
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef DES_RISC2
 | 
				
			||||||
 | 
					#undef DES_RISC2
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined(DES_RISC1) && defined(DES_RISC2)
 | 
				
			||||||
 | 
					YOU SHOULD NOT HAVE BOTH DES_RISC1 AND DES_RISC2 DEFINED!!!!!
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Unroll the inner loop, this sometimes helps, sometimes hinders.
 | 
				
			||||||
 | 
					 * Very mucy CPU dependant */
 | 
				
			||||||
 | 
					#ifndef DES_UNROLL
 | 
				
			||||||
 | 
					#define DES_UNROLL
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif /* HEADER_DES_LOCL_H */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef __POWERPC__
 | 
				
			||||||
 | 
					#define MD32_XARRAY
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
							
								
								
									
										288
									
								
								Makefile.org
									
									
									
									
									
								
							
							
						
						
									
										288
									
								
								Makefile.org
									
									
									
									
									
								
							@@ -5,8 +5,16 @@
 | 
				
			|||||||
VERSION=
 | 
					VERSION=
 | 
				
			||||||
MAJOR=
 | 
					MAJOR=
 | 
				
			||||||
MINOR=
 | 
					MINOR=
 | 
				
			||||||
 | 
					SHLIB_VERSION_NUMBER=
 | 
				
			||||||
 | 
					SHLIB_VERSION_HISTORY=
 | 
				
			||||||
 | 
					SHLIB_MAJOR=
 | 
				
			||||||
 | 
					SHLIB_MINOR=
 | 
				
			||||||
 | 
					SHLIB_EXT=
 | 
				
			||||||
PLATFORM=dist
 | 
					PLATFORM=dist
 | 
				
			||||||
OPTIONS=
 | 
					OPTIONS=
 | 
				
			||||||
 | 
					CONFIGURE_ARGS=
 | 
				
			||||||
 | 
					SHLIB_TARGET=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# INSTALL_PREFIX is for package builders so that they can configure
 | 
					# INSTALL_PREFIX is for package builders so that they can configure
 | 
				
			||||||
# for, say, /usr/ and yet have everything installed to /tmp/somedir/usr/.
 | 
					# for, say, /usr/ and yet have everything installed to /tmp/somedir/usr/.
 | 
				
			||||||
# Normally it is left empty.
 | 
					# Normally it is left empty.
 | 
				
			||||||
@@ -28,8 +36,6 @@ OPENSSLDIR=/usr/local/ssl
 | 
				
			|||||||
# DEVRANDOM - Give this the value of the 'random device' if your OS supports
 | 
					# DEVRANDOM - Give this the value of the 'random device' if your OS supports
 | 
				
			||||||
#           one.  32 bytes will be read from this when the random
 | 
					#           one.  32 bytes will be read from this when the random
 | 
				
			||||||
#           number generator is initalised.
 | 
					#           number generator is initalised.
 | 
				
			||||||
# SSL_ALLOW_ADH - define if you want the server to be able to use the
 | 
					 | 
				
			||||||
#           SSLv3 anon-DH ciphers.
 | 
					 | 
				
			||||||
# SSL_FORBID_ENULL - define if you want the server to be not able to use the
 | 
					# SSL_FORBID_ENULL - define if you want the server to be not able to use the
 | 
				
			||||||
#           NULL encryption ciphers.
 | 
					#           NULL encryption ciphers.
 | 
				
			||||||
#
 | 
					#
 | 
				
			||||||
@@ -56,6 +62,8 @@ EX_LIBS=
 | 
				
			|||||||
AR=ar r
 | 
					AR=ar r
 | 
				
			||||||
RANLIB= ranlib
 | 
					RANLIB= ranlib
 | 
				
			||||||
PERL= perl
 | 
					PERL= perl
 | 
				
			||||||
 | 
					TAR= tar
 | 
				
			||||||
 | 
					TARFLAGS= --no-recursion
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# Set BN_ASM to bn_asm.o if you want to use the C version
 | 
					# Set BN_ASM to bn_asm.o if you want to use the C version
 | 
				
			||||||
BN_ASM= bn_asm.o
 | 
					BN_ASM= bn_asm.o
 | 
				
			||||||
@@ -142,20 +150,25 @@ RMD160_ASM_OBJ= asm/rm86-out.o
 | 
				
			|||||||
#RMD160_ASM_OBJ= asm/rm86-out.o       # a.out, FreeBSD
 | 
					#RMD160_ASM_OBJ= asm/rm86-out.o       # a.out, FreeBSD
 | 
				
			||||||
#RMD160_ASM_OBJ= asm/rm86bsdi.o       # bsdi
 | 
					#RMD160_ASM_OBJ= asm/rm86bsdi.o       # bsdi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
DIRS=   crypto ssl rsaref apps test tools
 | 
					# When we're prepared to use shared libraries in the programs we link here
 | 
				
			||||||
 | 
					# we might set SHLIB_MARK to '$(SHARED_LIBS)'.
 | 
				
			||||||
 | 
					SHLIB_MARK=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					DIRS=   crypto ssl rsaref $(SHLIB_MARK) apps test tools
 | 
				
			||||||
SHLIBDIRS= crypto ssl
 | 
					SHLIBDIRS= crypto ssl
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# dirs in crypto to build
 | 
					# dirs in crypto to build
 | 
				
			||||||
SDIRS=  \
 | 
					SDIRS=  \
 | 
				
			||||||
	md2 md5 sha mdc2 hmac ripemd \
 | 
						md2 md4 md5 sha mdc2 hmac ripemd \
 | 
				
			||||||
	des rc2 rc4 rc5 idea bf cast \
 | 
						des rc2 rc4 rc5 idea bf cast \
 | 
				
			||||||
	bn rsa dsa dh \
 | 
						bn rsa dsa dh dso engine \
 | 
				
			||||||
	buffer bio stack lhash rand err objects \
 | 
						buffer bio stack lhash rand err objects \
 | 
				
			||||||
	evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp
 | 
						evp asn1 pem x509 x509v3 conf txt_db pkcs7 pkcs12 comp
 | 
				
			||||||
 | 
					
 | 
				
			||||||
MAKEFILE= Makefile.ssl
 | 
					MAKEFILE= Makefile.ssl
 | 
				
			||||||
MAKE=     make -f Makefile.ssl
 | 
					MAKE=     make -f Makefile.ssl
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					MANDIR=$(OPENSSLDIR)/man
 | 
				
			||||||
MAN1=1
 | 
					MAN1=1
 | 
				
			||||||
MAN3=3
 | 
					MAN3=3
 | 
				
			||||||
SHELL=/bin/sh
 | 
					SHELL=/bin/sh
 | 
				
			||||||
@@ -165,6 +178,10 @@ ONEDIRS=out tmp
 | 
				
			|||||||
EDIRS=  times doc bugs util include certs ms shlib mt demos perl sf dep VMS
 | 
					EDIRS=  times doc bugs util include certs ms shlib mt demos perl sf dep VMS
 | 
				
			||||||
WDIRS=  windows
 | 
					WDIRS=  windows
 | 
				
			||||||
LIBS=   libcrypto.a libssl.a
 | 
					LIBS=   libcrypto.a libssl.a
 | 
				
			||||||
 | 
					SHARED_CRYPTO=libcrypto$(SHLIB_EXT)
 | 
				
			||||||
 | 
					SHARED_SSL=libssl$(SHLIB_EXT)
 | 
				
			||||||
 | 
					SHARED_LIBS=
 | 
				
			||||||
 | 
					SHARED_LIBS_LINK_EXTS=
 | 
				
			||||||
 | 
					
 | 
				
			||||||
GENERAL=        Makefile
 | 
					GENERAL=        Makefile
 | 
				
			||||||
BASENAME=       openssl
 | 
					BASENAME=       openssl
 | 
				
			||||||
@@ -174,53 +191,110 @@ WTARFILE=       $(NAME)-win.tar
 | 
				
			|||||||
EXHEADER=       e_os.h e_os2.h
 | 
					EXHEADER=       e_os.h e_os2.h
 | 
				
			||||||
HEADER=         e_os.h
 | 
					HEADER=         e_os.h
 | 
				
			||||||
 | 
					
 | 
				
			||||||
all: Makefile.ssl
 | 
					# When we're prepared to use shared libraries in the programs we link here
 | 
				
			||||||
	@for i in $(DIRS) ;\
 | 
					# we might remove 'clean-shared' from the targets to perform at this stage
 | 
				
			||||||
	do \
 | 
					
 | 
				
			||||||
	(cd $$i && echo "making all in $$i..." && \
 | 
					all: clean-shared Makefile.ssl sub_all
 | 
				
			||||||
	$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' SDIRS='${SDIRS}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' all ) || exit 1; \
 | 
					 | 
				
			||||||
	done;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
sub_all:
 | 
					sub_all:
 | 
				
			||||||
	@for i in $(DIRS) ;\
 | 
						@for i in $(DIRS); \
 | 
				
			||||||
	do \
 | 
						do \
 | 
				
			||||||
	(cd $$i && echo "making all in $$i..." && \
 | 
						if [ -d "$$i" ]; then \
 | 
				
			||||||
	$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' all ) || exit 1; \
 | 
							(cd $$i && echo "making all in $$i..." && \
 | 
				
			||||||
	done;
 | 
							$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PROCESSOR='${PROCESSOR}' PERL='${PERL}' RANLIB='${RANLIB}' all ) || exit 1; \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							$(MAKE) $$i; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
 | 
						done; \
 | 
				
			||||||
 | 
						if echo "$(DIRS)" | \
 | 
				
			||||||
 | 
						    grep '\(^\| \)\(crypto\|ssl\)\( \|$$\)' > /dev/null 2>&1 && \
 | 
				
			||||||
 | 
						   [ -n "$(SHARED_LIBS)" ]; then \
 | 
				
			||||||
 | 
							$(MAKE) $(SHARED_LIBS); \
 | 
				
			||||||
 | 
						fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
linux-shared:
 | 
					libcrypto$(SHLIB_EXT): libcrypto.a
 | 
				
			||||||
	for i in ${SHLIBDIRS}; do \
 | 
						@if [ "$(SHLIB_TARGET)" != "" ]; then \
 | 
				
			||||||
	rm -f lib$$i.a lib$$i.so \
 | 
							$(MAKE) SHLIBDIRS=crypto build-shared; \
 | 
				
			||||||
		lib$$i.so.${MAJOR} lib$$i.so.${MAJOR}.${MINOR}; \
 | 
						else \
 | 
				
			||||||
	${MAKE} CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='-fPIC ${CFLAG}' SDIRS='${SDIRS}' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' DIRS=$$i clean all || exit 1; \
 | 
							echo "There's no support for shared libraries on this platform" >&2; \
 | 
				
			||||||
	( set -x; ${CC}  -shared -o lib$$i.so.${MAJOR}.${MINOR} \
 | 
						fi
 | 
				
			||||||
		-Wl,-S,-soname=lib$$i.so.${MAJOR} \
 | 
					libssl$(SHLIB_EXT): libcrypto$(SHLIB_EXT) libssl.a
 | 
				
			||||||
 | 
						@if [ "$(SHLIB_TARGET)" != "" ]; then \
 | 
				
			||||||
 | 
							$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \
 | 
				
			||||||
 | 
						else \
 | 
				
			||||||
 | 
							echo "There's no support for shared libraries on this platform" >&2; \
 | 
				
			||||||
 | 
						fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					clean-shared:
 | 
				
			||||||
 | 
						@for i in $(SHLIBDIRS); do \
 | 
				
			||||||
 | 
							if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
 | 
				
			||||||
 | 
								tmp="$(SHARED_LIBS_LINK_EXTS)"; \
 | 
				
			||||||
 | 
								for j in $${tmp:-x}; do \
 | 
				
			||||||
 | 
									( set -x; rm -f lib$$i$$j ); \
 | 
				
			||||||
 | 
								done; \
 | 
				
			||||||
 | 
							fi; \
 | 
				
			||||||
 | 
							( set -x; rm -f lib$$i$(SHLIB_EXT) ); \
 | 
				
			||||||
 | 
						done
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					link-shared:
 | 
				
			||||||
 | 
						@for i in $(SHLIBDIRS); do \
 | 
				
			||||||
 | 
							prev=lib$$i$(SHLIB_EXT); \
 | 
				
			||||||
 | 
							if [ -n "$(SHARED_LIBS_LINK_EXTS)" ]; then \
 | 
				
			||||||
 | 
								tmp="$(SHARED_LIBS_LINK_EXTS)"; \
 | 
				
			||||||
 | 
								for j in $${tmp:-x}; do \
 | 
				
			||||||
 | 
									( set -x; ln -s -f $$prev lib$$i$$j ); \
 | 
				
			||||||
 | 
									prev=lib$$i$$j; \
 | 
				
			||||||
 | 
								done; \
 | 
				
			||||||
 | 
							fi; \
 | 
				
			||||||
 | 
						done
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					build-shared: clean-shared do_$(SHLIB_TARGET) link-shared
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					do_bsd-gcc-shared: linux-shared
 | 
				
			||||||
 | 
					do_linux-shared:
 | 
				
			||||||
 | 
						libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
				
			||||||
 | 
						( set -x; ${CC}  -shared -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
				
			||||||
 | 
							-Wl,-S,-soname=lib$$i.so.${SHLIB_MAJOR} \
 | 
				
			||||||
		-Wl,--whole-archive lib$$i.a \
 | 
							-Wl,--whole-archive lib$$i.a \
 | 
				
			||||||
		-Wl,--no-whole-archive -lc ) || exit 1; \
 | 
							-Wl,--no-whole-archive $$libs ${EX_LIBS} -lc ) || exit 1; \
 | 
				
			||||||
	rm -f lib$$i.a; make -C $$i clean || exit 1 ;\
 | 
						libs="$$libs -l$$i"; \
 | 
				
			||||||
	done;
 | 
						done
 | 
				
			||||||
	@set -x; \
 | 
					
 | 
				
			||||||
	for i in ${SHLIBDIRS}; do \
 | 
					# This assumes that GNU utilities are *not* used
 | 
				
			||||||
	ln -s lib$$i.so.${MAJOR}.${MINOR} lib$$i.so.${MAJOR}; \
 | 
					do_true64-shared:
 | 
				
			||||||
	ln -s lib$$i.so.${MAJOR} lib$$i.so; \
 | 
						libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
				
			||||||
	done;
 | 
						( set -x; ${CC}  -shared -no_archive -o lib$$i.so \
 | 
				
			||||||
 | 
							-set_version "${SHLIB_VERSION_HISTORY}${SHLIB_VERSION_NUMBER}" \
 | 
				
			||||||
 | 
							-all lib$$i.a -none $$libs ${EX_LIBS} -lc ) || exit 1; \
 | 
				
			||||||
 | 
						libs="$$libs -l$$i"; \
 | 
				
			||||||
 | 
						done
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# This assumes that GNU utilities are *not* used
 | 
				
			||||||
 | 
					do_solaris-shared:
 | 
				
			||||||
 | 
						libs='-L. ${SHLIBDEPS}'; for i in ${SHLIBDIRS}; do \
 | 
				
			||||||
 | 
						( set -x; ${CC}  -G -o lib$$i.so.${SHLIB_MAJOR}.${SHLIB_MINOR} \
 | 
				
			||||||
 | 
							-h lib$$i.so.${SHLIB_MAJOR} \
 | 
				
			||||||
 | 
							-z allextract lib$$i.a $$libs ${EX_LIBS} -lc ) || exit 1; \
 | 
				
			||||||
 | 
						libs="$$libs -l$$i"; \
 | 
				
			||||||
 | 
						done
 | 
				
			||||||
 | 
					
 | 
				
			||||||
Makefile.ssl: Makefile.org
 | 
					Makefile.ssl: Makefile.org
 | 
				
			||||||
	@echo "Makefile.ssl is older than Makefile.org."
 | 
						@echo "Makefile.ssl is older than Makefile.org."
 | 
				
			||||||
	@echo "Reconfigure the source tree (via 'perl Configure' or 'sh config')"
 | 
						@echo "Reconfigure the source tree (via './config' or 'perl Configure'), please."
 | 
				
			||||||
	@echo "and update the error lists (via 'make errors'), please."
 | 
					 | 
				
			||||||
	@false
 | 
						@false
 | 
				
			||||||
 | 
					
 | 
				
			||||||
libclean:
 | 
					libclean:
 | 
				
			||||||
	rm -f *.a */lib */*/lib
 | 
						rm -f *.a */lib */*/lib
 | 
				
			||||||
 | 
					
 | 
				
			||||||
clean:
 | 
					clean:
 | 
				
			||||||
	rm -f shlib/*.o *.o core a.out fluff *.map
 | 
						rm -f shlib/*.o *.o core a.out fluff *.map rehash.time testlog make.log cctest cctest.c
 | 
				
			||||||
	@for i in $(DIRS) ;\
 | 
						@for i in $(DIRS) ;\
 | 
				
			||||||
	do \
 | 
						do \
 | 
				
			||||||
	(cd $$i && echo "making clean in $$i..." && \
 | 
						if [ -d "$$i" ]; then \
 | 
				
			||||||
	$(MAKE) SDIRS='${SDIRS}' clean ) || exit 1; \
 | 
							(cd $$i && echo "making clean in $$i..." && \
 | 
				
			||||||
	rm -f $(LIBS); \
 | 
							$(MAKE) SDIRS='${SDIRS}' clean ) || exit 1; \
 | 
				
			||||||
 | 
							rm -f $(LIBS); \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
	done;
 | 
						done;
 | 
				
			||||||
	rm -f *.a *.o speed.* *.map *.so .pure core
 | 
						rm -f *.a *.o speed.* *.map *.so .pure core
 | 
				
			||||||
	rm -f $(TARFILE)
 | 
						rm -f $(TARFILE)
 | 
				
			||||||
@@ -237,29 +311,37 @@ files:
 | 
				
			|||||||
	$(PERL) $(TOP)/util/files.pl Makefile.ssl > $(TOP)/MINFO
 | 
						$(PERL) $(TOP)/util/files.pl Makefile.ssl > $(TOP)/MINFO
 | 
				
			||||||
	@for i in $(DIRS) ;\
 | 
						@for i in $(DIRS) ;\
 | 
				
			||||||
	do \
 | 
						do \
 | 
				
			||||||
	(cd $$i && echo "making 'files' in $$i..." && \
 | 
						if [ -d "$$i" ]; then \
 | 
				
			||||||
	$(MAKE) SDIRS='${SDIRS}' PERL='${PERL}' files ) || exit 1; \
 | 
							(cd $$i && echo "making 'files' in $$i..." && \
 | 
				
			||||||
 | 
							$(MAKE) SDIRS='${SDIRS}' PERL='${PERL}' files ) || exit 1; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
	done;
 | 
						done;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
links:
 | 
					links:
 | 
				
			||||||
	@$(TOP)/util/point.sh Makefile.ssl Makefile
 | 
						@$(TOP)/util/point.sh Makefile.ssl Makefile
 | 
				
			||||||
	@-mkdir -p include/openssl 2>/dev/null
 | 
						@$(PERL) $(TOP)/util/mkdir-p.pl include/openssl
 | 
				
			||||||
	@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
 | 
						@$(PERL) $(TOP)/util/mklink.pl include/openssl $(EXHEADER)
 | 
				
			||||||
	@for i in $(DIRS); do \
 | 
						@for i in $(DIRS); do \
 | 
				
			||||||
	(cd $$i && echo "making links in $$i..." && \
 | 
						if [ -d "$$i" ]; then \
 | 
				
			||||||
	$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PERL='${PERL}' links ) || exit 1; \
 | 
							(cd $$i && echo "making links in $$i..." && \
 | 
				
			||||||
 | 
							$(MAKE) CC='${CC}' PLATFORM='${PLATFORM}' CFLAG='${CFLAG}' SDIRS='$(SDIRS)' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' PERL='${PERL}' links ) || exit 1; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
	done;
 | 
						done;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
dclean:
 | 
					dclean:
 | 
				
			||||||
	rm -f *.bak
 | 
						rm -f *.bak
 | 
				
			||||||
	@for i in $(DIRS) ;\
 | 
						@for i in $(DIRS) ;\
 | 
				
			||||||
	do \
 | 
						do \
 | 
				
			||||||
	(cd $$i && echo "making dclean in $$i..." && \
 | 
						if [ -d "$$i" ]; then \
 | 
				
			||||||
	$(MAKE) SDIRS='${SDIRS}' PERL='${PERL}' dclean ) || exit 1; \
 | 
							(cd $$i && echo "making dclean in $$i..." && \
 | 
				
			||||||
 | 
							$(MAKE) SDIRS='${SDIRS}' PERL='${PERL}' dclean ) || exit 1; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
	done;
 | 
						done;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
rehash:
 | 
					rehash: rehash.time
 | 
				
			||||||
	@(OPENSSL="`pwd`/apps/openssl"; export OPENSSL; sh tools/c_rehash certs)
 | 
					rehash.time: certs
 | 
				
			||||||
 | 
						@(OPENSSL="`pwd`/apps/openssl"; export OPENSSL; $(PERL) tools/c_rehash certs)
 | 
				
			||||||
 | 
						touch rehash.time
 | 
				
			||||||
 | 
					
 | 
				
			||||||
test:   tests
 | 
					test:   tests
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -268,33 +350,62 @@ tests: rehash
 | 
				
			|||||||
	$(MAKE) CC='${CC}' CFLAG='${CFLAG}' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SDIRS='${SDIRS}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' tests );
 | 
						$(MAKE) CC='${CC}' CFLAG='${CFLAG}' INSTALLTOP='${INSTALLTOP}' PEX_LIBS='${PEX_LIBS}' EX_LIBS='${EX_LIBS}' BN_ASM='${BN_ASM}' DES_ENC='${DES_ENC}' BF_ENC='${BF_ENC}' CAST_ENC='${CAST_ENC}' RC4_ENC='${RC4_ENC}' RC5_ENC='${RC5_ENC}' SDIRS='${SDIRS}' SHA1_ASM_OBJ='${SHA1_ASM_OBJ}' MD5_ASM_OBJ='${MD5_ASM_OBJ}' RMD160_ASM_OBJ='${RMD160_ASM_OBJ}' AR='${AR}' tests );
 | 
				
			||||||
	@apps/openssl version -a
 | 
						@apps/openssl version -a
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					report:
 | 
				
			||||||
 | 
						@$(PERL) util/selftest.pl
 | 
				
			||||||
 | 
					
 | 
				
			||||||
depend:
 | 
					depend:
 | 
				
			||||||
	@for i in $(DIRS) ;\
 | 
						@for i in $(DIRS) ;\
 | 
				
			||||||
	do \
 | 
						do \
 | 
				
			||||||
	(cd $$i && echo "making dependancies $$i..." && \
 | 
						if [ -d "$$i" ]; then \
 | 
				
			||||||
	$(MAKE) SDIRS='${SDIRS}' DEPFLAG='${DEPFLAG}' depend ) || exit 1; \
 | 
							(cd $$i && echo "making dependencies $$i..." && \
 | 
				
			||||||
 | 
							$(MAKE) SDIRS='${SDIRS}' DEPFLAG='${DEPFLAG}' depend ) || exit 1; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
	done;
 | 
						done;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
lint:
 | 
					lint:
 | 
				
			||||||
	@for i in $(DIRS) ;\
 | 
						@for i in $(DIRS) ;\
 | 
				
			||||||
	do \
 | 
						do \
 | 
				
			||||||
	(cd $$i && echo "making lint $$i..." && \
 | 
						if [ -d "$$i" ]; then \
 | 
				
			||||||
	$(MAKE) SDIRS='${SDIRS}' lint ) || exit 1; \
 | 
							(cd $$i && echo "making lint $$i..." && \
 | 
				
			||||||
 | 
							$(MAKE) SDIRS='${SDIRS}' lint ) || exit 1; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
	done;
 | 
						done;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
tags:
 | 
					tags:
 | 
				
			||||||
	@for i in $(DIRS) ;\
 | 
						@for i in $(DIRS) ;\
 | 
				
			||||||
	do \
 | 
						do \
 | 
				
			||||||
	(cd $$i && echo "making tags $$i..." && \
 | 
						if [ -d "$$i" ]; then \
 | 
				
			||||||
	$(MAKE) SDIRS='${SDIRS}' tags ) || exit 1; \
 | 
							(cd $$i && echo "making tags $$i..." && \
 | 
				
			||||||
 | 
							$(MAKE) SDIRS='${SDIRS}' tags ) || exit 1; \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
	done;
 | 
						done;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
errors:
 | 
					errors:
 | 
				
			||||||
	perl util/mkerr.pl -recurse -write
 | 
						perl util/mkerr.pl -recurse -write
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					stacks:
 | 
				
			||||||
 | 
						perl util/mkstack.pl -write
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					util/libeay.num::
 | 
				
			||||||
 | 
						perl util/mkdef.pl crypto update
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					util/ssleay.num::
 | 
				
			||||||
 | 
						perl util/mkdef.pl ssl update
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					crypto/objects/obj_dat.h: crypto/objects/obj_mac.h crypto/objects/obj_dat.pl
 | 
				
			||||||
 | 
						perl crypto/objects/obj_dat.pl crypto/objects/obj_mac.h crypto/objects/obj_dat.h
 | 
				
			||||||
 | 
					crypto/objects/obj_mac.h: crypto/objects/objects.pl crypto/objects/objects.txt 
 | 
				
			||||||
 | 
						perl crypto/objects/objects.pl crypto/objects/objects.txt crypto/objects/obj_mac.num crypto/objects/obj_mac.h
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					TABLE: Configure
 | 
				
			||||||
 | 
						(echo 'Output of `Configure TABLE'"':"; \
 | 
				
			||||||
 | 
						perl Configure TABLE) > TABLE
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					update: depend errors stacks util/libeay.num util/ssleay.num crypto/objects/obj_dat.h TABLE
 | 
				
			||||||
 | 
					
 | 
				
			||||||
tar:
 | 
					tar:
 | 
				
			||||||
	@tar --norecurse -cvf - \
 | 
						@$(TAR) $(TARFLAGS) -cvf - \
 | 
				
			||||||
		`find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS | sort` |\
 | 
							`find * \! -path CVS/\* \! -path \*/CVS/\* \! -name CVS \! -name .cvsignore \! -name STATUS \! -name TABLE | sort` |\
 | 
				
			||||||
	tardy --user_number=0  --user_name=openssl \
 | 
						tardy --user_number=0  --user_name=openssl \
 | 
				
			||||||
	      --group_number=0 --group_name=openssl \
 | 
						      --group_number=0 --group_name=openssl \
 | 
				
			||||||
	      --prefix=openssl-$(VERSION) - |\
 | 
						      --prefix=openssl-$(VERSION) - |\
 | 
				
			||||||
@@ -310,14 +421,14 @@ dist:
 | 
				
			|||||||
dist_pem_h:
 | 
					dist_pem_h:
 | 
				
			||||||
	(cd crypto/pem; $(MAKE) CC='${CC}' SDIRS='${SDIRS}' CFLAG='${CFLAG}' pem.h; $(MAKE) clean)
 | 
						(cd crypto/pem; $(MAKE) CC='${CC}' SDIRS='${SDIRS}' CFLAG='${CFLAG}' pem.h; $(MAKE) clean)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
install: all
 | 
					install: all install_docs
 | 
				
			||||||
	@-mkdir -p $(INSTALL_PREFIX)$(INSTALLTOP)/bin 2>/dev/null
 | 
						@$(PERL) $(TOP)/util/mkdir-p.pl $(INSTALL_PREFIX)$(INSTALLTOP)/bin \
 | 
				
			||||||
	@-mkdir -p $(INSTALL_PREFIX)$(INSTALLTOP)/lib 2>/dev/null
 | 
							$(INSTALL_PREFIX)$(INSTALLTOP)/lib \
 | 
				
			||||||
	@-mkdir -p $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl 2>/dev/null
 | 
							$(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl \
 | 
				
			||||||
	@-mkdir -p $(INSTALL_PREFIX)$(OPENSSLDIR)/misc 2>/dev/null
 | 
							$(INSTALL_PREFIX)$(OPENSSLDIR)/misc \
 | 
				
			||||||
	@-mkdir -p $(INSTALL_PREFIX)$(OPENSSLDIR)/certs 2>/dev/null
 | 
							$(INSTALL_PREFIX)$(OPENSSLDIR)/certs \
 | 
				
			||||||
	@-mkdir -p $(INSTALL_PREFIX)$(OPENSSLDIR)/private 2>/dev/null
 | 
							$(INSTALL_PREFIX)$(OPENSSLDIR)/private \
 | 
				
			||||||
	@-mkdir -p $(INSTALL_PREFIX)$(OPENSSLDIR)/lib 2>/dev/null
 | 
							$(INSTALL_PREFIX)$(OPENSSLDIR)/lib
 | 
				
			||||||
	@for i in $(EXHEADER) ;\
 | 
						@for i in $(EXHEADER) ;\
 | 
				
			||||||
	do \
 | 
						do \
 | 
				
			||||||
	(cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \
 | 
						(cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \
 | 
				
			||||||
@@ -325,15 +436,58 @@ install: all
 | 
				
			|||||||
	done;
 | 
						done;
 | 
				
			||||||
	@for i in $(DIRS) ;\
 | 
						@for i in $(DIRS) ;\
 | 
				
			||||||
	do \
 | 
						do \
 | 
				
			||||||
	(cd $$i; echo "installing $$i..."; \
 | 
						if [ -d "$$i" ]; then \
 | 
				
			||||||
	$(MAKE) CC='${CC}' CFLAG='${CFLAG}' INSTALL_PREFIX='${INSTALL_PREFIX}' INSTALLTOP='${INSTALLTOP}' OPENSSLDIR='${OPENSSLDIR}' EX_LIBS='${EX_LIBS}' SDIRS='${SDIRS}' install ); \
 | 
							(cd $$i; echo "installing $$i..."; \
 | 
				
			||||||
 | 
							$(MAKE) CC='${CC}' CFLAG='${CFLAG}' INSTALL_PREFIX='${INSTALL_PREFIX}' INSTALLTOP='${INSTALLTOP}' OPENSSLDIR='${OPENSSLDIR}' EX_LIBS='${EX_LIBS}' SDIRS='${SDIRS}' RANLIB='${RANLIB}' install ); \
 | 
				
			||||||
 | 
						fi; \
 | 
				
			||||||
	done
 | 
						done
 | 
				
			||||||
	@for i in $(LIBS) ;\
 | 
						@for i in $(LIBS) ;\
 | 
				
			||||||
	do \
 | 
						do \
 | 
				
			||||||
	(       echo installing $$i; \
 | 
							if [ -f "$$i" ]; then \
 | 
				
			||||||
		cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
 | 
							(       echo installing $$i; \
 | 
				
			||||||
		$(RANLIB) $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
 | 
								cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
 | 
				
			||||||
		chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i ); \
 | 
								$(RANLIB) $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i; \
 | 
				
			||||||
 | 
								chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i ); \
 | 
				
			||||||
 | 
							fi \
 | 
				
			||||||
 | 
						done
 | 
				
			||||||
 | 
						@if [ -n "$(SHARED_LIBS)" ]; then \
 | 
				
			||||||
 | 
							tmp="$(SHARED_LIBS)"; \
 | 
				
			||||||
 | 
							for i in $${tmp:-x}; \
 | 
				
			||||||
 | 
							do \
 | 
				
			||||||
 | 
								if [ -f "$$i" ]; then \
 | 
				
			||||||
 | 
								(       echo installing $$i; \
 | 
				
			||||||
 | 
									cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
 | 
				
			||||||
 | 
									chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/lib/$$i ); \
 | 
				
			||||||
 | 
								fi \
 | 
				
			||||||
 | 
							done; \
 | 
				
			||||||
 | 
							(	here="`pwd`"; \
 | 
				
			||||||
 | 
								cd $(INSTALL_PREFIX)$(INSTALLTOP)/lib; \
 | 
				
			||||||
 | 
								make -f $$here/Makefile link-shared ); \
 | 
				
			||||||
 | 
						fi
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					install_docs:
 | 
				
			||||||
 | 
						@$(PERL) $(TOP)/util/mkdir-p.pl \
 | 
				
			||||||
 | 
							$(INSTALL_PREFIX)$(MANDIR)/man1 \
 | 
				
			||||||
 | 
							$(INSTALL_PREFIX)$(MANDIR)/man3 \
 | 
				
			||||||
 | 
							$(INSTALL_PREFIX)$(MANDIR)/man5 \
 | 
				
			||||||
 | 
							$(INSTALL_PREFIX)$(MANDIR)/man7
 | 
				
			||||||
 | 
						@echo installing man 1 and man 5
 | 
				
			||||||
 | 
						@for i in doc/apps/*.pod; do \
 | 
				
			||||||
 | 
							fn=`basename $$i .pod`; \
 | 
				
			||||||
 | 
							sec=`[ "$$fn" = "config" ] && echo 5 || echo 1`; \
 | 
				
			||||||
 | 
							(cd `dirname $$i`; \
 | 
				
			||||||
 | 
							$(PERL) ../../util/pod2man.pl --section=$$sec --center=OpenSSL \
 | 
				
			||||||
 | 
								 --release=$(VERSION) `basename $$i`) \
 | 
				
			||||||
 | 
								>  $(INSTALL_PREFIX)$(MANDIR)/man$$sec/`basename $$i .pod`.$$sec; \
 | 
				
			||||||
 | 
						done
 | 
				
			||||||
 | 
						@echo installing man 3 and man 7
 | 
				
			||||||
 | 
						@for i in doc/crypto/*.pod doc/ssl/*.pod; do \
 | 
				
			||||||
 | 
							fn=`basename $$i .pod`; \
 | 
				
			||||||
 | 
							sec=`[ "$$fn" = "des_modes" ] && echo 7 || echo 3`; \
 | 
				
			||||||
 | 
							(cd `dirname $$i`; \
 | 
				
			||||||
 | 
							$(PERL) ../../util/pod2man.pl --section=$$sec --center=OpenSSL \
 | 
				
			||||||
 | 
								--release=$(VERSION) `basename $$i`) \
 | 
				
			||||||
 | 
								>  $(INSTALL_PREFIX)$(MANDIR)/man$$sec/`basename $$i .pod`.$$sec; \
 | 
				
			||||||
	done
 | 
						done
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# DO NOT DELETE THIS LINE -- make depend depends on it.
 | 
					# DO NOT DELETE THIS LINE -- make depend depends on it.
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										71
									
								
								NEWS
									
									
									
									
									
								
							
							
						
						
									
										71
									
								
								NEWS
									
									
									
									
									
								
							@@ -5,6 +5,77 @@
 | 
				
			|||||||
  This file gives a brief overview of the major changes between each OpenSSL
 | 
					  This file gives a brief overview of the major changes between each OpenSSL
 | 
				
			||||||
  release. For more details please read the CHANGES file.
 | 
					  release. For more details please read the CHANGES file.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.5a and OpenSSL 0.9.6:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Some documentation for BIO and SSL libraries.
 | 
				
			||||||
 | 
					      o Enhanced chain verification using key identifiers.
 | 
				
			||||||
 | 
					      o New sign and verify options to 'dgst' application.
 | 
				
			||||||
 | 
					      o Support for DER and PEM encoded messages in 'smime' application.
 | 
				
			||||||
 | 
					      o New 'rsautl' application, low level RSA utility.
 | 
				
			||||||
 | 
					      o MD4 now included.
 | 
				
			||||||
 | 
					      o Bugfix for SSL rollback padding check.
 | 
				
			||||||
 | 
					      o Support for external crypto devices [1].
 | 
				
			||||||
 | 
					      o Enhanced EVP interface.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    [1] The support for external crypto devices is currently a separate
 | 
				
			||||||
 | 
					        distribution.  See the file README.ENGINE.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.5 and OpenSSL 0.9.5a:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Bug fixes for Win32, SuSE Linux, NeXTSTEP and FreeBSD 2.2.8 
 | 
				
			||||||
 | 
					      o Shared library support for HPUX and Solaris-gcc
 | 
				
			||||||
 | 
					      o Support of Linux/IA64
 | 
				
			||||||
 | 
					      o Assembler support for Mingw32
 | 
				
			||||||
 | 
					      o New 'rand' application
 | 
				
			||||||
 | 
					      o New way to check for existence of algorithms from scripts
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.4 and OpenSSL 0.9.5:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o S/MIME support in new 'smime' command
 | 
				
			||||||
 | 
					      o Documentation for the OpenSSL command line application
 | 
				
			||||||
 | 
					      o Automation of 'req' application
 | 
				
			||||||
 | 
					      o Fixes to make s_client, s_server work under Windows
 | 
				
			||||||
 | 
					      o Support for multiple fieldnames in SPKACs
 | 
				
			||||||
 | 
					      o New SPKAC command line utilty and associated library functions
 | 
				
			||||||
 | 
					      o Options to allow passwords to be obtained from various sources
 | 
				
			||||||
 | 
					      o New public key PEM format and options to handle it
 | 
				
			||||||
 | 
					      o Many other fixes and enhancements to command line utilities
 | 
				
			||||||
 | 
					      o Usable certificate chain verification
 | 
				
			||||||
 | 
					      o Certificate purpose checking
 | 
				
			||||||
 | 
					      o Certificate trust settings
 | 
				
			||||||
 | 
					      o Support of authority information access extension
 | 
				
			||||||
 | 
					      o Extensions in certificate requests
 | 
				
			||||||
 | 
					      o Simplified X509 name and attribute routines
 | 
				
			||||||
 | 
					      o Initial (incomplete) support for international character sets
 | 
				
			||||||
 | 
					      o New DH_METHOD, DSA_METHOD and enhanced RSA_METHOD
 | 
				
			||||||
 | 
					      o Read only memory BIOs and simplified creation function
 | 
				
			||||||
 | 
					      o TLS/SSL protocol bugfixes: Accept TLS 'client hello' in SSL 3.0
 | 
				
			||||||
 | 
					        record; allow fragmentation and interleaving of handshake and other
 | 
				
			||||||
 | 
					        data
 | 
				
			||||||
 | 
					      o TLS/SSL code now "tolerates" MS SGC
 | 
				
			||||||
 | 
					      o Work around for Netscape client certificate hang bug
 | 
				
			||||||
 | 
					      o RSA_NULL option that removes RSA patent code but keeps other
 | 
				
			||||||
 | 
					        RSA functionality
 | 
				
			||||||
 | 
					      o Memory leak detection now allows applications to add extra information
 | 
				
			||||||
 | 
					        via a per-thread stack
 | 
				
			||||||
 | 
					      o PRNG robustness improved
 | 
				
			||||||
 | 
					      o EGD support
 | 
				
			||||||
 | 
					      o BIGNUM library bug fixes
 | 
				
			||||||
 | 
					      o Faster DSA parameter generation
 | 
				
			||||||
 | 
					      o Enhanced support for Alpha Linux
 | 
				
			||||||
 | 
					      o Experimental MacOS support
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Major changes between OpenSSL 0.9.3 and OpenSSL 0.9.4:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o Transparent support for PKCS#8 format private keys: these are used
 | 
				
			||||||
 | 
					        by several software packages and are more secure than the standard
 | 
				
			||||||
 | 
					        form
 | 
				
			||||||
 | 
					      o PKCS#5 v2.0 implementation
 | 
				
			||||||
 | 
					      o Password callbacks have a new void * argument for application data
 | 
				
			||||||
 | 
					      o Avoid various memory leaks
 | 
				
			||||||
 | 
					      o New pipe-like BIO that allows using the SSL library when actual I/O
 | 
				
			||||||
 | 
					        must be handled by the application (BIO pair)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3:
 | 
					  Major changes between OpenSSL 0.9.2b and OpenSSL 0.9.3:
 | 
				
			||||||
      o Lots of enhancements and cleanups to the Configuration mechanism
 | 
					      o Lots of enhancements and cleanups to the Configuration mechanism
 | 
				
			||||||
      o RSA OEAP related fixes
 | 
					      o RSA OEAP related fixes
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										109
									
								
								README
									
									
									
									
									
								
							
							
						
						
									
										109
									
								
								README
									
									
									
									
									
								
							@@ -1,7 +1,7 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 OpenSSL 0.9.3 24 May 1999
 | 
					 OpenSSL 0.9.6a-beta2 [engine] 21 Mar 2001
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Copyright (c) 1998-1999 The OpenSSL Project
 | 
					 Copyright (c) 1998-2000 The OpenSSL Project
 | 
				
			||||||
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 | 
					 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 | 
				
			||||||
 All rights reserved.
 | 
					 All rights reserved.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -11,9 +11,10 @@
 | 
				
			|||||||
 The OpenSSL Project is a collaborative effort to develop a robust,
 | 
					 The OpenSSL Project is a collaborative effort to develop a robust,
 | 
				
			||||||
 commercial-grade, fully featured, and Open Source toolkit implementing the
 | 
					 commercial-grade, fully featured, and Open Source toolkit implementing the
 | 
				
			||||||
 Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1)
 | 
					 Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1)
 | 
				
			||||||
 protocols with full-strength cryptography world-wide. The project is managed
 | 
					 protocols as well as a full-strength general purpose cryptography library.
 | 
				
			||||||
 by a worldwide community of volunteers that use the Internet to communicate,
 | 
					 The project is managed by a worldwide community of volunteers that use the
 | 
				
			||||||
 plan, and develop the OpenSSL toolkit and its related documentation. 
 | 
					 Internet to communicate, plan, and develop the OpenSSL toolkit and its
 | 
				
			||||||
 | 
					 related documentation. 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 OpenSSL is based on the excellent SSLeay library developed from Eric A. Young
 | 
					 OpenSSL is based on the excellent SSLeay library developed from Eric A. Young
 | 
				
			||||||
 and Tim J. Hudson.  The OpenSSL toolkit is licensed under a dual-license (the
 | 
					 and Tim J. Hudson.  The OpenSSL toolkit is licensed under a dual-license (the
 | 
				
			||||||
@@ -80,40 +81,14 @@
 | 
				
			|||||||
        A Configuration loader that uses a format similar to MS .ini files.
 | 
					        A Configuration loader that uses a format similar to MS .ini files.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 openssl: 
 | 
					 openssl: 
 | 
				
			||||||
     A command line tool which provides the following functions:
 | 
					     A command line tool that can be used for:
 | 
				
			||||||
 | 
					        Creation of RSA, DH and DSA key parameters
 | 
				
			||||||
 | 
					        Creation of X.509 certificates, CSRs and CRLs 
 | 
				
			||||||
 | 
					        Calculation of Message Digests
 | 
				
			||||||
 | 
					        Encryption and Decryption with Ciphers
 | 
				
			||||||
 | 
					        SSL/TLS Client and Server Tests
 | 
				
			||||||
 | 
					        Handling of S/MIME signed or encrypted mail
 | 
				
			||||||
 | 
					
 | 
				
			||||||
     enc     - a general encryption program that can encrypt/decrypt using
 | 
					 | 
				
			||||||
               one of 17 different cipher/mode combinations.  The
 | 
					 | 
				
			||||||
               input/output can also be converted to/from base64
 | 
					 | 
				
			||||||
               ascii encoding.
 | 
					 | 
				
			||||||
     dgst    - a generate message digesting program that will generate
 | 
					 | 
				
			||||||
               message digests for any of md2, md5, sha (sha-0 or sha-1)
 | 
					 | 
				
			||||||
               or mdc2.
 | 
					 | 
				
			||||||
     asn1parse - parse and display the structure of an asn1 encoded
 | 
					 | 
				
			||||||
               binary file.
 | 
					 | 
				
			||||||
     rsa     - Manipulate RSA private keys.
 | 
					 | 
				
			||||||
     dsa     - Manipulate DSA private keys.
 | 
					 | 
				
			||||||
     dh      - Manipulate Diffie-Hellman parameter files.
 | 
					 | 
				
			||||||
     dsaparam- Manipulate and generate DSA parameter files.
 | 
					 | 
				
			||||||
     crl     - Manipulate certificate revocation lists.
 | 
					 | 
				
			||||||
     crt2pkcs7- Generate a pkcs7 object containing a crl and a certificate.
 | 
					 | 
				
			||||||
     x509    - Manipulate x509 certificates, self-sign certificates.
 | 
					 | 
				
			||||||
     req     - Manipulate PKCS#10 certificate requests and also
 | 
					 | 
				
			||||||
               generate certificate requests.
 | 
					 | 
				
			||||||
     genrsa  - Generates an arbitrary sized RSA private key.
 | 
					 | 
				
			||||||
     gendsa  - Generates DSA parameters.
 | 
					 | 
				
			||||||
     gendh   - Generates a set of Diffie-Hellman parameters, the prime
 | 
					 | 
				
			||||||
               will be a strong prime.
 | 
					 | 
				
			||||||
     ca      - Create certificates from PKCS#10 certificate requests.
 | 
					 | 
				
			||||||
               This program also maintains a database of certificates
 | 
					 | 
				
			||||||
               issued.
 | 
					 | 
				
			||||||
     verify  - Check x509 certificate signatures.
 | 
					 | 
				
			||||||
     speed   - Benchmark OpenSSL's ciphers.
 | 
					 | 
				
			||||||
     s_server- A test SSL server.
 | 
					 | 
				
			||||||
     s_client- A test SSL client.
 | 
					 | 
				
			||||||
     s_time  - Benchmark SSL performance of SSL server programs.
 | 
					 | 
				
			||||||
     errstr  - Convert from OpenSSL hex error codes to a readable form.
 | 
					 | 
				
			||||||
     nseq    - Netscape certificate sequence utility
 | 
					 | 
				
			||||||
        
 | 
					        
 | 
				
			||||||
 PATENTS
 | 
					 PATENTS
 | 
				
			||||||
 -------
 | 
					 -------
 | 
				
			||||||
@@ -124,13 +99,12 @@
 | 
				
			|||||||
 country.  The file contains some of the patents that we know about or are
 | 
					 country.  The file contains some of the patents that we know about or are
 | 
				
			||||||
 rumoured to exist. This is not a definitive list.
 | 
					 rumoured to exist. This is not a definitive list.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 RSA Data Security holds software patents on the RSA and RC5 algorithms.  If
 | 
					 RSA Security holds software patents on the RC5 algorithm.  If you
 | 
				
			||||||
 their ciphers are used used inside the USA (and Japan?), you must contact RSA
 | 
					 intend to use this cipher, you must contact RSA Security for
 | 
				
			||||||
 Data Security for licensing conditions. Their web page is
 | 
					 licensing conditions. Their web page is http://www.rsasecurity.com/.
 | 
				
			||||||
 http://www.rsa.com/.
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
 RC4 is a trademark of RSA Data Security, so use of this label should perhaps
 | 
					 RC4 is a trademark of RSA Security, so use of this label should perhaps
 | 
				
			||||||
 only be used with RSA Data Security's permission. 
 | 
					 only be used with RSA Security's permission. 
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 The IDEA algorithm is patented by Ascom in Austria, France, Germany, Italy,
 | 
					 The IDEA algorithm is patented by Ascom in Austria, France, Germany, Italy,
 | 
				
			||||||
 Japan, Netherlands, Spain, Sweden, Switzerland, UK and the USA.  They should
 | 
					 Japan, Netherlands, Spain, Sweden, Switzerland, UK and the USA.  They should
 | 
				
			||||||
@@ -144,9 +118,6 @@
 | 
				
			|||||||
 a Win32 platform, read the INSTALL.W32 file.  For OpenVMS systems, read
 | 
					 a Win32 platform, read the INSTALL.W32 file.  For OpenVMS systems, read
 | 
				
			||||||
 INSTALL.VMS.
 | 
					 INSTALL.VMS.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 For people in the USA, it is possible to compile OpenSSL to use RSA Inc.'s
 | 
					 | 
				
			||||||
 public key library, RSAREF, by configuring OpenSSL with the option "rsaref".
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 Read the documentation in the doc/ directory.  It is quite rough, but it
 | 
					 Read the documentation in the doc/ directory.  It is quite rough, but it
 | 
				
			||||||
 lists the functions, you will probably have to look at the code to work out
 | 
					 lists the functions, you will probably have to look at the code to work out
 | 
				
			||||||
 how to used them. Look at the example programs.
 | 
					 how to used them. Look at the example programs.
 | 
				
			||||||
@@ -157,43 +128,43 @@
 | 
				
			|||||||
 If you have any problems with OpenSSL then please take the following steps
 | 
					 If you have any problems with OpenSSL then please take the following steps
 | 
				
			||||||
 first:
 | 
					 first:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    - Download the current snapshot from ftp://ftp.openssl.org/snapshot/
 | 
				
			||||||
 | 
					      to see if the problem has already been addressed
 | 
				
			||||||
    - Remove ASM versions of libraries
 | 
					    - Remove ASM versions of libraries
 | 
				
			||||||
    - Remove compiler optimisation flags 
 | 
					    - Remove compiler optimisation flags 
 | 
				
			||||||
    - Add compiler debug flags (if using gcc then remove -fomit-frame-pointer
 | 
					 | 
				
			||||||
      before you try to debug things)
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
 If you wish to report a bug then please include the following information in
 | 
					 If you wish to report a bug then please include the following information in
 | 
				
			||||||
 any bug report:
 | 
					 any bug report:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    OpenSSL Details
 | 
					    - On Unix systems:
 | 
				
			||||||
    - Version, most of these details can be got from the
 | 
					        Self-test report generated by 'make report'
 | 
				
			||||||
      'openssl version -a' command.
 | 
					    - On other systems:
 | 
				
			||||||
    Operating System Details
 | 
					        OpenSSL version: output of 'openssl version -a'
 | 
				
			||||||
    - On Unix systems: Output of './config -t'
 | 
					        OS Name, Version, Hardware platform
 | 
				
			||||||
    - OS Name, Version
 | 
					        Compiler Details (name, version)
 | 
				
			||||||
    - Hardware platform
 | 
					    - Application Details (name, version)
 | 
				
			||||||
    Compiler Details
 | 
					    - Problem Description (steps that will reproduce the problem, if known)
 | 
				
			||||||
    - Name
 | 
					    - Stack Traceback (if the application dumps core)
 | 
				
			||||||
    - Version
 | 
					 | 
				
			||||||
    Application Details 
 | 
					 | 
				
			||||||
    - Name 
 | 
					 | 
				
			||||||
    - Version 
 | 
					 | 
				
			||||||
    Problem Description
 | 
					 | 
				
			||||||
    - include steps that will reproduce the problem (if known)
 | 
					 | 
				
			||||||
    Stack Traceback (if the application dumps core)
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Report the bug to the OpenSSL project at:
 | 
					 Report the bug to the OpenSSL project at:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    openssl-bugs@openssl.org
 | 
					    openssl-bugs@openssl.org
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Note that mail to openssl-bugs@openssl.org is forwarded to a public
 | 
				
			||||||
 | 
					 mailing list. Confidential mail may be sent to openssl-security@openssl.org
 | 
				
			||||||
 | 
					 (PGP key available from the key servers).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 HOW TO CONTRIBUTE TO OpenSSL
 | 
					 HOW TO CONTRIBUTE TO OpenSSL
 | 
				
			||||||
 ----------------------------
 | 
					 ----------------------------
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 Development is coordinated on the openssl-dev mailing list (see
 | 
					 Development is coordinated on the openssl-dev mailing list (see
 | 
				
			||||||
 http://www.openssl.org for information on subscribing). If you
 | 
					 http://www.openssl.org for information on subscribing). If you
 | 
				
			||||||
 would like to submit a patch, send it to openssl-dev@openssl.org.
 | 
					 would like to submit a patch, send it to openssl-dev@openssl.org with
 | 
				
			||||||
 Please be sure to include a textual explanation of what your patch
 | 
					 the string "[PATCH]" in the subject. Please be sure to include a
 | 
				
			||||||
 does.
 | 
					 textual explanation of what your patch does.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 Note: For legal reasons, contributions from the US can be accepted only
 | 
				
			||||||
 | 
					 if a copy of the patch is sent to crypt@bxa.doc.gov
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 The preferred format for changes is "diff -u" output. You might
 | 
					 The preferred format for changes is "diff -u" output. You might
 | 
				
			||||||
 generate it like this:
 | 
					 generate it like this:
 | 
				
			||||||
@@ -202,4 +173,4 @@
 | 
				
			|||||||
 # [your changes]
 | 
					 # [your changes]
 | 
				
			||||||
 # ./Configure dist; make clean
 | 
					 # ./Configure dist; make clean
 | 
				
			||||||
 # cd ..
 | 
					 # cd ..
 | 
				
			||||||
 # diff -urN openssl-orig openssl-work > mydiffs.patch
 | 
					 # diff -ur openssl-orig openssl-work > mydiffs.patch
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										63
									
								
								README.ENGINE
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										63
									
								
								README.ENGINE
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,63 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
 | 
					  ENGINE
 | 
				
			||||||
 | 
					  ======
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  With OpenSSL 0.9.6, a new component has been added to support external 
 | 
				
			||||||
 | 
					  crypto devices, for example accelerator cards.  The component is called
 | 
				
			||||||
 | 
					  ENGINE, and has still a pretty experimental status and almost no
 | 
				
			||||||
 | 
					  documentation.  It's designed to be faily easily extensible by the
 | 
				
			||||||
 | 
					  calling programs.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  There's currently built-in support for the following crypto devices:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o CryptoSwift
 | 
				
			||||||
 | 
					      o Compaq Atalla
 | 
				
			||||||
 | 
					      o nCipher CHIL
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  A number of things are still needed and are being worked on:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      o An openssl utility command to handle or at least check available
 | 
				
			||||||
 | 
					        engines.
 | 
				
			||||||
 | 
					      o A better way of handling the methods that are handled by the
 | 
				
			||||||
 | 
					        engines.
 | 
				
			||||||
 | 
					      o Documentation!
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  What already exists is fairly stable as far as it has been tested, but
 | 
				
			||||||
 | 
					  the test base has been a bit small most of the time.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  Because of this experimental status and what's lacking, the ENGINE
 | 
				
			||||||
 | 
					  component is not yet part of the default OpenSSL distribution.  However,
 | 
				
			||||||
 | 
					  we have made a separate kit for those who want to try this out, to be
 | 
				
			||||||
 | 
					  found in the same places as the default OpenSSL distribution, but with
 | 
				
			||||||
 | 
					  "-engine-" being part of the kit file name.  For example, version 0.9.6
 | 
				
			||||||
 | 
					  is distributed in the following two files:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					      openssl-0.9.6.tar.gz
 | 
				
			||||||
 | 
					      openssl-engine-0.9.6.tar.gz
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  NOTES
 | 
				
			||||||
 | 
					  =====
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  openssl-engine-0.9.6.tar.gz does not depend on openssl-0.9.6.tar, you do
 | 
				
			||||||
 | 
					  not need to download both.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  openssl-engine-0.9.6.tar.gz is usable even if you don't have an external
 | 
				
			||||||
 | 
					  crypto device.  The internal OpenSSL functions are contained in the
 | 
				
			||||||
 | 
					  engine "openssl", and will be used by default.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  No external crypto device is chosen unless you say so.  You have actively
 | 
				
			||||||
 | 
					  tell the openssl utility commands to use it through a new command line
 | 
				
			||||||
 | 
					  switch called "-engine".  And if you want to use the ENGINE library to
 | 
				
			||||||
 | 
					  do something similar, you must also explicitely choose an external crypto
 | 
				
			||||||
 | 
					  device, or the built-in crypto routines will be used, just as in the
 | 
				
			||||||
 | 
					  default OpenSSL distribution.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  PROBLEMS
 | 
				
			||||||
 | 
					  ========
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					  It seems like the ENGINE part doesn't work too well with Cryptoswift on
 | 
				
			||||||
 | 
					  Win32.  A quick test done right before the release showed that trying
 | 
				
			||||||
 | 
					  "openssl speed -engine cswift" generated errors.  If the DSO gets enabled,
 | 
				
			||||||
 | 
					  an attempt is made to write at memory address 0x00000002.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
							
								
								
									
										139
									
								
								STATUS
									
									
									
									
									
								
							
							
						
						
									
										139
									
								
								STATUS
									
									
									
									
									
								
							@@ -1,81 +1,84 @@
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
  OpenSSL STATUS                           Last modified at
 | 
					  OpenSSL STATUS                           Last modified at
 | 
				
			||||||
  ______________                           $Date: 1999/05/20 01:42:57 $
 | 
					  ______________                           $Date: 2001/03/21 18:18:51 $
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  DEVELOPMENT STATE
 | 
					  DEVELOPMENT STATE
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    o  OpenSSL 0.9.3:  Freezed... only bugfixes and cleanups allowed!
 | 
					    o  OpenSSL 0.9.6a: In development...
 | 
				
			||||||
                       Proposed release date: Mon May 24th, 1999
 | 
					                       Beta 1 released on March 13th, 2001
 | 
				
			||||||
                       Release manager: Ben Laurie <ben@openssl.org>
 | 
						HP-UX 10.20 (hpux-parisc-cc)		- PASSED [normal+engine]
 | 
				
			||||||
                       !! Important: Any non-bugfix, non-cleanup
 | 
						HP-UX 10.20 (hpux-parisc-gcc)		- PASSED [normal+engine]
 | 
				
			||||||
                       !! and non-documentation commits should
 | 
						HP-UX 11.00 32bit (hpux-parisc-gcc)	- FAILED [engine]
 | 
				
			||||||
                       !! be approved by Ben, first.
 | 
							"openssl speed rsa1024 -engine cswift" fails unless
 | 
				
			||||||
 | 
							libswift.sl is renamed to libswift.so.
 | 
				
			||||||
    o  OpenSSL 0.9.2b: Released on March    22th, 1999
 | 
							[CORRECTED]
 | 
				
			||||||
    o  OpenSSL 0.9.1c: Released on December 23th, 1998
 | 
						HP MPE/iX				- PASSED [presumed normal]
 | 
				
			||||||
 | 
						Linux 2.2.17 SMP (linux-elf)		- PASSED [normal+engine]
 | 
				
			||||||
 | 
						Windows (VC-WIN32)			- FAILED [presumed normal]
 | 
				
			||||||
 | 
							Missing line in ms/32all.bat:
 | 
				
			||||||
 | 
								perl util\mkfiles.pl >MINFO
 | 
				
			||||||
 | 
							[CORRECTED]
 | 
				
			||||||
 | 
							In randfile.c, line 214, signed and unsigned int are mixed.
 | 
				
			||||||
 | 
							[CORRECTED]
 | 
				
			||||||
 | 
							In s_client.c and s_server.c, RAND_status() needs to get
 | 
				
			||||||
 | 
							declared (#include <openssl/rand.h>)
 | 
				
			||||||
 | 
							[CORRECTED]
 | 
				
			||||||
 | 
						OpenVMS (any version)			- FAILED [normal+engine]
 | 
				
			||||||
 | 
							Missing instructions in building script.
 | 
				
			||||||
 | 
							[CORRECTED]
 | 
				
			||||||
 | 
						AIX 4.3					- FAILED [engine]
 | 
				
			||||||
 | 
							Needs -DDSO_DLFCN and -DHAVE_DLFCN_H to work.
 | 
				
			||||||
 | 
							[CORRECTED] (but will not be automagically configured)
 | 
				
			||||||
 | 
						Irix 6.5.11				- FAILED [presumed normal]
 | 
				
			||||||
 | 
							BN_sqr test fails.
 | 
				
			||||||
 | 
					        solaris64-sparcv9-cc (SunOS 5.8)        - PASSED [normal+engine]
 | 
				
			||||||
 | 
						BSDI 4.0.1 (bsdi-elf-gcc)		- FAILED [engine]
 | 
				
			||||||
 | 
							Needs -DDSO_DLFCN, -DHAVE_DLFCN_H and -ldl to work.
 | 
				
			||||||
 | 
							[CORRECTED]
 | 
				
			||||||
 | 
						mingw32 w/ gcc 2.95.2			- PASSED [presumed normal]
 | 
				
			||||||
 | 
					    o  OpenSSL 0.9.6:  Released on September 24th, 2000
 | 
				
			||||||
 | 
					    o  OpenSSL 0.9.5a: Released on April      1st, 2000
 | 
				
			||||||
 | 
					    o  OpenSSL 0.9.5:  Released on February  28th, 2000
 | 
				
			||||||
 | 
					    o  OpenSSL 0.9.4:  Released on August    09th, 1999
 | 
				
			||||||
 | 
					    o  OpenSSL 0.9.3a: Released on May       29th, 1999
 | 
				
			||||||
 | 
					    o  OpenSSL 0.9.3:  Released on May       25th, 1999
 | 
				
			||||||
 | 
					    o  OpenSSL 0.9.2b: Released on March     22th, 1999
 | 
				
			||||||
 | 
					    o  OpenSSL 0.9.1c: Released on December  23th, 1998
 | 
				
			||||||
 | 
					
 | 
				
			||||||
  RELEASE SHOWSTOPPERS
 | 
					  RELEASE SHOWSTOPPERS
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    o BSD/OS: assembler functions must not have leading underscores
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  AVAILABLE PATCHES
 | 
					  AVAILABLE PATCHES
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    o OCSP (titchenert@certco.com) 
 | 
					    o CA.pl patch (Damien Miller)
 | 
				
			||||||
    o getenv in ca.c and x509_def.c (jaltman@watsun.cc.columbia.edu)
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
  IN PROGRESS
 | 
					  IN PROGRESS
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    o Steve is currently working on (in no particular order):
 | 
					    o Steve is currently working on (in no particular order):
 | 
				
			||||||
 | 
					        ASN1 code redesign, butchery, replacement.
 | 
				
			||||||
 | 
					        EVP cipher enhancement.
 | 
				
			||||||
        Proper (or at least usable) certificate chain verification.
 | 
					        Proper (or at least usable) certificate chain verification.
 | 
				
			||||||
        Documentation on X509 V3 extension code.
 | 
					 | 
				
			||||||
	PKCS #8 and PKCS#5 v2.0 support.
 | 
					 | 
				
			||||||
	Private key, certificate and CRL API and implementation.
 | 
						Private key, certificate and CRL API and implementation.
 | 
				
			||||||
	Checking and bugfixing PKCS#7 (S/MIME code).
 | 
						Developing and bugfixing PKCS#7 (S/MIME code).
 | 
				
			||||||
 | 
					        Various X509 issues: character sets, certificate request extensions.
 | 
				
			||||||
    o Mark is currently working on:
 | 
					    o Geoff and Richard are currently working on:
 | 
				
			||||||
        Folding in any changes that are in the C2Net code base that were
 | 
						ENGINE (the new code that gives hardware support among others).
 | 
				
			||||||
        not in the original SSLeay-0.9.1.b release.  Plus other minor
 | 
					    o Richard is currently working on:
 | 
				
			||||||
        tidying.
 | 
						UTIL (a new set of library functions to support some higher level
 | 
				
			||||||
 | 
						      functionality that is currently missing).
 | 
				
			||||||
    o Ralf is currently working on:
 | 
						Dynamic thread-lock support.
 | 
				
			||||||
        1. Support for SSL_set_default_verify_paths(),
 | 
						Shared library support for VMS.
 | 
				
			||||||
           SSL_load_verify_locations(), SSL_get_cert_store() and
 | 
					 | 
				
			||||||
           SSL_set_cert_store() functions which work like their existing
 | 
					 | 
				
			||||||
           SSL_CTX_xxx() variants but on a per connection basis. That's needed
 | 
					 | 
				
			||||||
           to let us provide full-featured per-URL client verification in
 | 
					 | 
				
			||||||
           mod_ssl or Apache-SSL.
 | 
					 | 
				
			||||||
           => It still dumps core, so I suspend this and investigate
 | 
					 | 
				
			||||||
              again for OpenSSL 0.9.3.
 | 
					 | 
				
			||||||
        2. The perl/ stuff to make it really work the first time ;-)
 | 
					 | 
				
			||||||
           => I'll investigate a few more hours for OpenSSL 0.9.2
 | 
					 | 
				
			||||||
        3. The new documentation set in POD format under doc/
 | 
					 | 
				
			||||||
           => I'll investigate a few more hours for OpenSSL 0.9.2
 | 
					 | 
				
			||||||
        4. More cleanups to get rid of obsolete/old/ugly files in the
 | 
					 | 
				
			||||||
           source tree which are not really needed.
 | 
					 | 
				
			||||||
           => Done all which were possible with my personal knowledge
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o Ben is currently working on:
 | 
					 | 
				
			||||||
	1. Function Prototype Thought Police issues.
 | 
					 | 
				
			||||||
	2. Integrated documentation.
 | 
					 | 
				
			||||||
	3. New TLS Ciphersuites.
 | 
					 | 
				
			||||||
	4. Anything else that takes his fancy.
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
  NEEDS PATCH
 | 
					  NEEDS PATCH
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    o  broken demos
 | 
					    o  non-blocking socket on AIX
 | 
				
			||||||
    o  salzr@certco.com (Rich Salz): Bug in X509_name_print
 | 
					 | 
				
			||||||
       <29E0A6D39ABED111A36000A0C99609CA2C2BA4@macertco-srv1.ma.certco.com>
 | 
					 | 
				
			||||||
    o  [ Compilation warnings: ctype-related int vs. char ]
 | 
					 | 
				
			||||||
       => now casts (unsigned char), maybe those arrays should have
 | 
					 | 
				
			||||||
          members of that type rather than plain char (i.e.
 | 
					 | 
				
			||||||
          unsigned char *p; ....; if (isspace(*p)) ...; where it's now
 | 
					 | 
				
			||||||
          char *p; ....; if (isspace((unsigned char)*p)) ...;)
 | 
					 | 
				
			||||||
    o  $(PERL) in */Makefile.ssl
 | 
					    o  $(PERL) in */Makefile.ssl
 | 
				
			||||||
    o  "Sign the certificate?" - "n" creates empty certificate file
 | 
					    o  "Sign the certificate?" - "n" creates empty certificate file
 | 
				
			||||||
    o  dubious declaration of crypt() in des.h
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
  OPEN ISSUES
 | 
					  OPEN ISSUES
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    o internal_verify doesn't know about X509.v3 (basicConstraints
 | 
				
			||||||
 | 
					      CA flag ...)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    o  The Makefile hierarchy and build mechanism is still not a round thing:
 | 
					    o  The Makefile hierarchy and build mechanism is still not a round thing:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
       1. The config vs. Configure scripts
 | 
					       1. The config vs. Configure scripts
 | 
				
			||||||
@@ -96,6 +99,11 @@
 | 
				
			|||||||
               compiler PIC and linker DSO flags from Apache
 | 
					               compiler PIC and linker DSO flags from Apache
 | 
				
			||||||
               into the OpenSSL Configure script.
 | 
					               into the OpenSSL Configure script.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					               Ulf: +1 for using GNU autoconf and libtool (but not automake,
 | 
				
			||||||
 | 
					                    which apparently is not flexible enough to generate
 | 
				
			||||||
 | 
					                    libcrypto)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    o  The perl/ stuff needs a major overhaul. Currently it's
 | 
					    o  The perl/ stuff needs a major overhaul. Currently it's
 | 
				
			||||||
       totally obsolete. Either we clean it up and enhance it to be up-to-date
 | 
					       totally obsolete. Either we clean it up and enhance it to be up-to-date
 | 
				
			||||||
       with the C code or we also could replace it with the really nice
 | 
					       with the C code or we also could replace it with the really nice
 | 
				
			||||||
@@ -111,27 +119,6 @@
 | 
				
			|||||||
               to date.
 | 
					               to date.
 | 
				
			||||||
               Paul +1
 | 
					               Paul +1
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    o The EVP and ASN1 stuff is a mess. Currently you have one EVP_CIPHER
 | 
					 | 
				
			||||||
      structure for each cipher. This may make sense for things like DES but
 | 
					 | 
				
			||||||
      for variable length ciphers like RC2 and RC4 it is NBG. Need a way to
 | 
					 | 
				
			||||||
      use the EVP interface and set up the cipher parameters. The ASN1 stuff
 | 
					 | 
				
			||||||
      is also foo wrt ciphers whose AlgorithmIdentifier has more than just
 | 
					 | 
				
			||||||
      an IV in it (e.g. RC2, RC5). This also means that EVP_Seal and EVP_Open
 | 
					 | 
				
			||||||
      don't work unless the key length matches the fixed value (some vendors
 | 
					 | 
				
			||||||
      use a key length decided by the size of the RSA encrypted key and expect
 | 
					 | 
				
			||||||
      RC2 to adapt).
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o Properly initialize the PRNG in the absence of /dev/random.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
    o ERR_error_string(..., buf) does not know how large buf is,
 | 
					 | 
				
			||||||
      there should be ERR_error_string_n(..., buf, bufsize)
 | 
					 | 
				
			||||||
      or similar.
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
  WISHES
 | 
					  WISHES
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    o  Mats Nilsson <mats.nilsson@xware.se>:
 | 
					    o 
 | 
				
			||||||
       "Add reference counting to all substructures of X509 etc. For instance,
 | 
					 | 
				
			||||||
       X509_NAME lacks a reference counter, while EVP_PKEY has one.  I'm
 | 
					 | 
				
			||||||
       making COM-wrappers for selected parts of SSLeay for a project of ours,
 | 
					 | 
				
			||||||
       and has found this inconsistency in copy semantics annoying."
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										18
									
								
								VMS/TODO
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								VMS/TODO
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,18 @@
 | 
				
			|||||||
 | 
					TODO:
 | 
				
			||||||
 | 
					=====
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					There are a few things that need to be worked out in the VMS version of
 | 
				
			||||||
 | 
					OpenSSL, still:
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					- Description files. ("Makefile's" :-))
 | 
				
			||||||
 | 
					- Script code to link an already compiled build tree.
 | 
				
			||||||
 | 
					- A VMSINSTALlable version (way in the future, unless someone else hacks).
 | 
				
			||||||
 | 
					- shareable images (DLL for you Windows folks).
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					There may be other things that I have missed and that may be desirable.
 | 
				
			||||||
 | 
					Please send mail to <openssl-users@openssl.org> or to me directly if you
 | 
				
			||||||
 | 
					have any ideas.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					--
 | 
				
			||||||
 | 
					Richard Levitte <richard@levitte.org>
 | 
				
			||||||
 | 
					1999-05-24
 | 
				
			||||||
@@ -29,9 +29,14 @@ $	DEFINE/NOLOG WRK_SSLPRIVATE WRK_SSLROOT:[PRIVATE]
 | 
				
			|||||||
$
 | 
					$
 | 
				
			||||||
$	IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
 | 
					$	IF F$PARSE("WRK_SSLROOT:[000000]") .EQS. "" THEN -
 | 
				
			||||||
	   CREATE/DIR/LOG WRK_SSLROOT:[000000]
 | 
						   CREATE/DIR/LOG WRK_SSLROOT:[000000]
 | 
				
			||||||
 | 
					$	IF F$PARSE("WRK_SSLINCLUDE:") .EQS. "" THEN -
 | 
				
			||||||
 | 
						   CREATE/DIR/LOG WRK_SSLINCLUDE:
 | 
				
			||||||
$	IF F$PARSE("WRK_SSLROOT:[VMS]") .EQS. "" THEN -
 | 
					$	IF F$PARSE("WRK_SSLROOT:[VMS]") .EQS. "" THEN -
 | 
				
			||||||
	   CREATE/DIR/LOG WRK_SSLROOT:[VMS]
 | 
						   CREATE/DIR/LOG WRK_SSLROOT:[VMS]
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
 | 
					$	IF F$SEARCH("WRK_SSLINCLUDE:vms_idhacks.h") .NES. "" THEN -
 | 
				
			||||||
 | 
						   DELETE WRK_SSLINCLUDE:vms_idhacks.h;*
 | 
				
			||||||
 | 
					$
 | 
				
			||||||
$	OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
 | 
					$	OPEN/WRITE SF WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
 | 
				
			||||||
$	WRITE SYS$OUTPUT "%OPEN-I-CREATED,  ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
 | 
					$	WRITE SYS$OUTPUT "%OPEN-I-CREATED,  ",F$SEARCH("WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM")," created."
 | 
				
			||||||
$	WRITE SF "$! Startup file for Openssl 0.9.2-RL 15-Mar-1999"
 | 
					$	WRITE SF "$! Startup file for Openssl 0.9.2-RL 15-Mar-1999"
 | 
				
			||||||
@@ -59,7 +64,9 @@ $	WRITE SF "	   @SSLROOT:[VMS]OPENSSL_SYSTARTUP.COM"
 | 
				
			|||||||
$	WRITE SF "$"
 | 
					$	WRITE SF "$"
 | 
				
			||||||
$	WRITE SF "$	EXIT"
 | 
					$	WRITE SF "$	EXIT"
 | 
				
			||||||
$	CLOSE SF
 | 
					$	CLOSE SF
 | 
				
			||||||
 | 
					$	SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_STARTUP.COM
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$	COPY OPENSSL_UTILS.COM WRK_SSLROOT:[VMS]/LOG
 | 
					$	COPY OPENSSL_UTILS.COM WRK_SSLROOT:[VMS]/LOG
 | 
				
			||||||
 | 
					$	SET FILE/PROT=WORLD:RE WRK_SSLROOT:[VMS]OPENSSL_UTILS.COM
 | 
				
			||||||
$
 | 
					$
 | 
				
			||||||
$	EXIT
 | 
					$	EXIT
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										28
									
								
								VMS/test-includes.com
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										28
									
								
								VMS/test-includes.com
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,28 @@
 | 
				
			|||||||
 | 
					$! Quick script to check how well including individual header files works
 | 
				
			||||||
 | 
					$! on VMS, even when the VMS macro isn't defined.
 | 
				
			||||||
 | 
					$
 | 
				
			||||||
 | 
					$	sav_def = f$env("DEFAULT")
 | 
				
			||||||
 | 
					$	here = f$parse("A.;0",f$ENV("PROCEDURE")) - "A.;0"
 | 
				
			||||||
 | 
					$	set default 'here'
 | 
				
			||||||
 | 
					$	set default [-.include.openssl]
 | 
				
			||||||
 | 
					$	define openssl 'f$env("DEFAULT")'
 | 
				
			||||||
 | 
					$	set default [--]
 | 
				
			||||||
 | 
					$
 | 
				
			||||||
 | 
					$ loop:
 | 
				
			||||||
 | 
					$	f = f$search("openssl:*.h")
 | 
				
			||||||
 | 
					$	if f .eqs. "" then goto loop_end
 | 
				
			||||||
 | 
					$	write sys$output "Checking ",f
 | 
				
			||||||
 | 
					$	open/write foo foo.c
 | 
				
			||||||
 | 
					$	write foo "#undef VMS"
 | 
				
			||||||
 | 
					$	write foo "#include <stdio.h>"
 | 
				
			||||||
 | 
					$	write foo "#include <openssl/",f$parse(f,,,"NAME"),".h>"
 | 
				
			||||||
 | 
					$	write foo "main()"
 | 
				
			||||||
 | 
					$	write foo "{printf(""foo\n"");}"
 | 
				
			||||||
 | 
					$	close foo
 | 
				
			||||||
 | 
					$	cc/STANDARD=ANSI89/NOLIST/PREFIX=ALL foo.c
 | 
				
			||||||
 | 
					$	delete foo.c;
 | 
				
			||||||
 | 
					$	goto loop
 | 
				
			||||||
 | 
					$ loop_end:
 | 
				
			||||||
 | 
					$	set default 'save_def'
 | 
				
			||||||
 | 
					$	exit
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -2,3 +2,4 @@ openssl
 | 
				
			|||||||
Makefile.save
 | 
					Makefile.save
 | 
				
			||||||
der_chop
 | 
					der_chop
 | 
				
			||||||
der_chop.bak
 | 
					der_chop.bak
 | 
				
			||||||
 | 
					CA.pl
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										20
									
								
								apps/CA.com
									
									
									
									
									
								
							
							
						
						
									
										20
									
								
								apps/CA.com
									
									
									
									
									
								
							@@ -35,6 +35,7 @@ $ REQ    = openssl + " req " + SSLEAY_CONFIG
 | 
				
			|||||||
$ CA     = openssl + " ca " + SSLEAY_CONFIG
 | 
					$ CA     = openssl + " ca " + SSLEAY_CONFIG
 | 
				
			||||||
$ VERIFY = openssl + " verify"
 | 
					$ VERIFY = openssl + " verify"
 | 
				
			||||||
$ X509   = openssl + " x509"
 | 
					$ X509   = openssl + " x509"
 | 
				
			||||||
 | 
					$ PKCS12 = openssl + " pkcs12"
 | 
				
			||||||
$ echo   = "write sys$Output"
 | 
					$ echo   = "write sys$Output"
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ s = F$PARSE(F$ENVIRONMENT("DEFAULT"),"[]") - "].;"
 | 
					$ s = F$PARSE(F$ENVIRONMENT("DEFAULT"),"[]") - "].;"
 | 
				
			||||||
@@ -96,10 +97,18 @@ $     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.certs]
 | 
				
			|||||||
$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.crl]
 | 
					$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.crl]
 | 
				
			||||||
$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.newcerts]
 | 
					$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.newcerts]
 | 
				
			||||||
$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.private]
 | 
					$     CREATE /DIR /PROTECTION=OWNER:RWED 'CATOP'.private]
 | 
				
			||||||
 | 
					$
 | 
				
			||||||
$     OPEN   /WRITE ser_file 'CATOP']serial. 
 | 
					$     OPEN   /WRITE ser_file 'CATOP']serial. 
 | 
				
			||||||
$     WRITE ser_file "01"
 | 
					$     WRITE ser_file "01"
 | 
				
			||||||
$     CLOSE ser_file
 | 
					$     CLOSE ser_file
 | 
				
			||||||
$     APPEND/NEW NL: 'CATOP']index.txt
 | 
					$     APPEND/NEW NL: 'CATOP']index.txt
 | 
				
			||||||
 | 
					$
 | 
				
			||||||
 | 
					$     ! The following is to make sure access() doesn't get confused.  It
 | 
				
			||||||
 | 
					$     ! really needs one file in the directory to give correct answers...
 | 
				
			||||||
 | 
					$     COPY NLA0: 'CATOP'.certs].;
 | 
				
			||||||
 | 
					$     COPY NLA0: 'CATOP'.crl].;
 | 
				
			||||||
 | 
					$     COPY NLA0: 'CATOP'.newcerts].;
 | 
				
			||||||
 | 
					$     COPY NLA0: 'CATOP'.private].;
 | 
				
			||||||
$   ENDIF
 | 
					$   ENDIF
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$   IF F$SEARCH(CATOP+".private"+CAKEY) .EQS. ""
 | 
					$   IF F$SEARCH(CATOP+".private"+CAKEY) .EQS. ""
 | 
				
			||||||
@@ -121,6 +130,17 @@ $   ENDIF
 | 
				
			|||||||
$   GOTO opt_loop_continue
 | 
					$   GOTO opt_loop_continue
 | 
				
			||||||
$ ENDIF
 | 
					$ ENDIF
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
 | 
					$ IF (prog_opt .EQS. "-pkcs12")
 | 
				
			||||||
 | 
					$ THEN
 | 
				
			||||||
 | 
					$   i = i + 1
 | 
				
			||||||
 | 
					$   cname = P'i'
 | 
				
			||||||
 | 
					$   IF cname .EQS. "" THEN cname = "My certificate"
 | 
				
			||||||
 | 
					$   PKCS12 -in newcert.pem -inkey newreq.pem -certfile 'CATOP''CACERT -
 | 
				
			||||||
 | 
						   -out newcert.p12 -export -name "''cname'"
 | 
				
			||||||
 | 
					$   RET=$STATUS
 | 
				
			||||||
 | 
					$   exit RET
 | 
				
			||||||
 | 
					$ ENDIF
 | 
				
			||||||
 | 
					$!
 | 
				
			||||||
$ IF (prog_opt .EQS. "-xsign")
 | 
					$ IF (prog_opt .EQS. "-xsign")
 | 
				
			||||||
$ THEN
 | 
					$ THEN
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										17
									
								
								apps/CA.pl → apps/CA.pl.in
									
									
									
									
									
										
										
										Executable file → Normal file
									
								
							
							
						
						
									
										17
									
								
								apps/CA.pl → apps/CA.pl.in
									
									
									
									
									
										
										
										Executable file → Normal file
									
								
							@@ -36,11 +36,13 @@
 | 
				
			|||||||
# default openssl.cnf file has setup as per the following
 | 
					# default openssl.cnf file has setup as per the following
 | 
				
			||||||
# demoCA ... where everything is stored
 | 
					# demoCA ... where everything is stored
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					$SSLEAY_CONFIG=$ENV{"SSLEAY_CONFIG"};
 | 
				
			||||||
$DAYS="-days 365";
 | 
					$DAYS="-days 365";
 | 
				
			||||||
$REQ="openssl req $SSLEAY_CONFIG";
 | 
					$REQ="openssl req $SSLEAY_CONFIG";
 | 
				
			||||||
$CA="openssl ca $SSLEAY_CONFIG";
 | 
					$CA="openssl ca $SSLEAY_CONFIG";
 | 
				
			||||||
$VERIFY="openssl verify";
 | 
					$VERIFY="openssl verify";
 | 
				
			||||||
$X509="openssl x509";
 | 
					$X509="openssl x509";
 | 
				
			||||||
 | 
					$PKCS12="openssl pkcs12";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
$CATOP="./demoCA";
 | 
					$CATOP="./demoCA";
 | 
				
			||||||
$CAKEY="cakey.pem";
 | 
					$CAKEY="cakey.pem";
 | 
				
			||||||
@@ -65,7 +67,7 @@ foreach (@ARGV) {
 | 
				
			|||||||
	    $RET=$?;
 | 
						    $RET=$?;
 | 
				
			||||||
	    print "Request (and private key) is in newreq.pem\n";
 | 
						    print "Request (and private key) is in newreq.pem\n";
 | 
				
			||||||
	} elsif (/^-newca$/) {
 | 
						} elsif (/^-newca$/) {
 | 
				
			||||||
		# if explictly asked for or it doesn't exist then setup the
 | 
							# if explicitly asked for or it doesn't exist then setup the
 | 
				
			||||||
		# directory structure that Eric likes to manage things 
 | 
							# directory structure that Eric likes to manage things 
 | 
				
			||||||
	    $NEW="1";
 | 
						    $NEW="1";
 | 
				
			||||||
	    if ( "$NEW" || ! -f "${CATOP}/serial" ) {
 | 
						    if ( "$NEW" || ! -f "${CATOP}/serial" ) {
 | 
				
			||||||
@@ -99,6 +101,14 @@ foreach (@ARGV) {
 | 
				
			|||||||
		    $RET=$?;
 | 
							    $RET=$?;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	    }
 | 
						    }
 | 
				
			||||||
 | 
						} elsif (/^-pkcs12$/) {
 | 
				
			||||||
 | 
						    my $cname = $ARGV[1];
 | 
				
			||||||
 | 
						    $cname = "My Certificate" unless defined $cname;
 | 
				
			||||||
 | 
						    system ("$PKCS12 -in newcert.pem -inkey newreq.pem " .
 | 
				
			||||||
 | 
								"-certfile ${CATOP}/$CACERT -out newcert.p12 " .
 | 
				
			||||||
 | 
								"-export -name \"$cname\"");
 | 
				
			||||||
 | 
						    $RET=$?;
 | 
				
			||||||
 | 
						    exit $RET;
 | 
				
			||||||
	} elsif (/^-xsign$/) {
 | 
						} elsif (/^-xsign$/) {
 | 
				
			||||||
	    system ("$CA -policy policy_anything -infiles newreq.pem");
 | 
						    system ("$CA -policy policy_anything -infiles newreq.pem");
 | 
				
			||||||
	    $RET=$?;
 | 
						    $RET=$?;
 | 
				
			||||||
@@ -107,6 +117,11 @@ foreach (@ARGV) {
 | 
				
			|||||||
							"-infiles newreq.pem");
 | 
												"-infiles newreq.pem");
 | 
				
			||||||
	    $RET=$?;
 | 
						    $RET=$?;
 | 
				
			||||||
	    print "Signed certificate is in newcert.pem\n";
 | 
						    print "Signed certificate is in newcert.pem\n";
 | 
				
			||||||
 | 
						} elsif (/^(-signCA)$/) {
 | 
				
			||||||
 | 
						    system ("$CA -policy policy_anything -out newcert.pem " .
 | 
				
			||||||
 | 
										"-extensions v3_ca -infiles newreq.pem");
 | 
				
			||||||
 | 
						    $RET=$?;
 | 
				
			||||||
 | 
						    print "Signed CA certificate is in newcert.pem\n";
 | 
				
			||||||
	} elsif (/^-signcert$/) {
 | 
						} elsif (/^-signcert$/) {
 | 
				
			||||||
	    system ("$X509 -x509toreq -in newreq.pem -signkey newreq.pem " .
 | 
						    system ("$X509 -x509toreq -in newreq.pem -signkey newreq.pem " .
 | 
				
			||||||
								"-out tmp.pem");
 | 
													"-out tmp.pem");
 | 
				
			||||||
@@ -60,7 +60,7 @@ case $i in
 | 
				
			|||||||
    echo "Request (and private key) is in newreq.pem"
 | 
					    echo "Request (and private key) is in newreq.pem"
 | 
				
			||||||
    ;;
 | 
					    ;;
 | 
				
			||||||
-newca)     
 | 
					-newca)     
 | 
				
			||||||
    # if explictly asked for or it doesn't exist then setup the directory
 | 
					    # if explicitly asked for or it doesn't exist then setup the directory
 | 
				
			||||||
    # structure that Eric likes to manage things 
 | 
					    # structure that Eric likes to manage things 
 | 
				
			||||||
    NEW="1"
 | 
					    NEW="1"
 | 
				
			||||||
    if [ "$NEW" -o ! -f ${CATOP}/serial ]; then
 | 
					    if [ "$NEW" -o ! -f ${CATOP}/serial ]; then
 | 
				
			||||||
 
 | 
				
			|||||||
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										215
									
								
								apps/app_rand.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										215
									
								
								apps/app_rand.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,215 @@
 | 
				
			|||||||
 | 
					/* apps/app_rand.c */
 | 
				
			||||||
 | 
					/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
				
			||||||
 | 
					 * All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This package is an SSL implementation written
 | 
				
			||||||
 | 
					 * by Eric Young (eay@cryptsoft.com).
 | 
				
			||||||
 | 
					 * The implementation was written so as to conform with Netscapes SSL.
 | 
				
			||||||
 | 
					 * 
 | 
				
			||||||
 | 
					 * This library is free for commercial and non-commercial use as long as
 | 
				
			||||||
 | 
					 * the following conditions are aheared to.  The following conditions
 | 
				
			||||||
 | 
					 * apply to all code found in this distribution, be it the RC4, RSA,
 | 
				
			||||||
 | 
					 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
 | 
				
			||||||
 | 
					 * included with this distribution is covered by the same copyright terms
 | 
				
			||||||
 | 
					 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 * 
 | 
				
			||||||
 | 
					 * Copyright remains Eric Young's, and as such any Copyright notices in
 | 
				
			||||||
 | 
					 * the code are not to be removed.
 | 
				
			||||||
 | 
					 * If this package is used in a product, Eric Young should be given attribution
 | 
				
			||||||
 | 
					 * as the author of the parts of the library used.
 | 
				
			||||||
 | 
					 * This can be in the form of a textual message at program startup or
 | 
				
			||||||
 | 
					 * in documentation (online or textual) provided with the package.
 | 
				
			||||||
 | 
					 * 
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer.
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in the
 | 
				
			||||||
 | 
					 *    documentation and/or other materials provided with the distribution.
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this software
 | 
				
			||||||
 | 
					 *    must display the following acknowledgement:
 | 
				
			||||||
 | 
					 *    "This product includes cryptographic software written by
 | 
				
			||||||
 | 
					 *     Eric Young (eay@cryptsoft.com)"
 | 
				
			||||||
 | 
					 *    The word 'cryptographic' can be left out if the rouines from the library
 | 
				
			||||||
 | 
					 *    being used are not cryptographic related :-).
 | 
				
			||||||
 | 
					 * 4. If you include any Windows specific code (or a derivative thereof) from 
 | 
				
			||||||
 | 
					 *    the apps directory (application code) you must include an acknowledgement:
 | 
				
			||||||
 | 
					 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
 | 
				
			||||||
 | 
					 * 
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
 | 
				
			||||||
 | 
					 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | 
				
			||||||
 | 
					 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 | 
				
			||||||
 | 
					 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | 
				
			||||||
 | 
					 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | 
				
			||||||
 | 
					 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | 
				
			||||||
 | 
					 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | 
				
			||||||
 | 
					 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | 
				
			||||||
 | 
					 * SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * 
 | 
				
			||||||
 | 
					 * The licence and distribution terms for any publically available version or
 | 
				
			||||||
 | 
					 * derivative of this code cannot be changed.  i.e. this code cannot simply be
 | 
				
			||||||
 | 
					 * copied and put under another distribution licence
 | 
				
			||||||
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright (c) 1998-2000 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer. 
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in
 | 
				
			||||||
 | 
					 *    the documentation and/or other materials provided with the
 | 
				
			||||||
 | 
					 *    distribution.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this
 | 
				
			||||||
 | 
					 *    software must display the following acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
				
			||||||
 | 
					 *    endorse or promote products derived from this software without
 | 
				
			||||||
 | 
					 *    prior written permission. For written permission, please contact
 | 
				
			||||||
 | 
					 *    openssl-core@openssl.org.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 5. Products derived from this software may not be called "OpenSSL"
 | 
				
			||||||
 | 
					 *    nor may "OpenSSL" appear in their names without prior written
 | 
				
			||||||
 | 
					 *    permission of the OpenSSL Project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 6. Redistributions of any form whatsoever must retain the following
 | 
				
			||||||
 | 
					 *    acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
				
			||||||
 | 
					 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
				
			||||||
 | 
					 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
				
			||||||
 | 
					 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
				
			||||||
 | 
					 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
				
			||||||
 | 
					 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
				
			||||||
 | 
					 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
				
			||||||
 | 
					 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
				
			||||||
 | 
					 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
				
			||||||
 | 
					 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * ====================================================================
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This product includes cryptographic software written by Eric Young
 | 
				
			||||||
 | 
					 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
				
			||||||
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define NON_MAIN
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#undef NON_MAIN
 | 
				
			||||||
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
 | 
					#include <openssl/rand.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int seeded = 0;
 | 
				
			||||||
 | 
					static int egdsocket = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						int consider_randfile = (file == NULL);
 | 
				
			||||||
 | 
						char buffer[200];
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
						BIO_printf(bio_e,"Loading 'screen' into random state -");
 | 
				
			||||||
 | 
						BIO_flush(bio_e);
 | 
				
			||||||
 | 
						RAND_screen();
 | 
				
			||||||
 | 
						BIO_printf(bio_e," done\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (file == NULL)
 | 
				
			||||||
 | 
							file = RAND_file_name(buffer, sizeof buffer);
 | 
				
			||||||
 | 
						else if (RAND_egd(file) > 0)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							/* we try if the given filename is an EGD socket.
 | 
				
			||||||
 | 
							   if it is, we don't write anything back to the file. */
 | 
				
			||||||
 | 
							egdsocket = 1;
 | 
				
			||||||
 | 
							return 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (file == NULL || !RAND_load_file(file, -1))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (RAND_status() == 0 && !dont_warn)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_e,"unable to load 'random state'\n");
 | 
				
			||||||
 | 
								BIO_printf(bio_e,"This means that the random number generator has not been seeded\n");
 | 
				
			||||||
 | 
								BIO_printf(bio_e,"with much random data.\n");
 | 
				
			||||||
 | 
								if (consider_randfile) /* explanation does not apply when a file is explicitly named */
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(bio_e,"Consider setting the RANDFILE environment variable to point at a file that\n");
 | 
				
			||||||
 | 
									BIO_printf(bio_e,"'random' data can be kept in (the file will be overwritten).\n");
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						seeded = 1;
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					long app_RAND_load_files(char *name)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						char *p,*n;
 | 
				
			||||||
 | 
						int last;
 | 
				
			||||||
 | 
						long tot=0;
 | 
				
			||||||
 | 
						int egd;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						for (;;)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							last=0;
 | 
				
			||||||
 | 
							for (p=name; ((*p != '\0') && (*p != LIST_SEPARATOR_CHAR)); p++);
 | 
				
			||||||
 | 
							if (*p == '\0') last=1;
 | 
				
			||||||
 | 
							*p='\0';
 | 
				
			||||||
 | 
							n=name;
 | 
				
			||||||
 | 
							name=p+1;
 | 
				
			||||||
 | 
							if (*n == '\0') break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							egd=RAND_egd(n);
 | 
				
			||||||
 | 
							if (egd > 0)
 | 
				
			||||||
 | 
								tot+=egd;
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								tot+=RAND_load_file(n,-1);
 | 
				
			||||||
 | 
							if (last) break;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (tot > 512)
 | 
				
			||||||
 | 
							app_RAND_allow_write_file();
 | 
				
			||||||
 | 
						return(tot);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int app_RAND_write_file(const char *file, BIO *bio_e)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						char buffer[200];
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (egdsocket || !seeded)
 | 
				
			||||||
 | 
							/* If we did not manage to read the seed file,
 | 
				
			||||||
 | 
							 * we should not write a low-entropy seed file back --
 | 
				
			||||||
 | 
							 * it would suppress a crucial warning the next time
 | 
				
			||||||
 | 
							 * we want to use it. */
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (file == NULL)
 | 
				
			||||||
 | 
							file = RAND_file_name(buffer, sizeof buffer);
 | 
				
			||||||
 | 
						if (file == NULL || !RAND_write_file(file))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_e,"unable to write 'random state'\n");
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void app_RAND_allow_write_file(void)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						seeded = 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
							
								
								
									
										468
									
								
								apps/apps.c
									
									
									
									
									
								
							
							
						
						
									
										468
									
								
								apps/apps.c
									
									
									
									
									
								
							@@ -64,6 +64,11 @@
 | 
				
			|||||||
#define NON_MAIN
 | 
					#define NON_MAIN
 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
#undef NON_MAIN
 | 
					#undef NON_MAIN
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/pkcs12.h>
 | 
				
			||||||
 | 
					#include <openssl/safestack.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef WINDOWS
 | 
					#ifdef WINDOWS
 | 
				
			||||||
#  include "bss_file.c"
 | 
					#  include "bss_file.c"
 | 
				
			||||||
@@ -91,8 +96,8 @@ int args_from_file(char *file, int *argc, char **argv[])
 | 
				
			|||||||
	*argv=NULL;
 | 
						*argv=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	len=(unsigned int)stbuf.st_size;
 | 
						len=(unsigned int)stbuf.st_size;
 | 
				
			||||||
	if (buf != NULL) Free(buf);
 | 
						if (buf != NULL) OPENSSL_free(buf);
 | 
				
			||||||
	buf=(char *)Malloc(len+1);
 | 
						buf=(char *)OPENSSL_malloc(len+1);
 | 
				
			||||||
	if (buf == NULL) return(0);
 | 
						if (buf == NULL) return(0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	len=fread(buf,1,len,fp);
 | 
						len=fread(buf,1,len,fp);
 | 
				
			||||||
@@ -102,8 +107,8 @@ int args_from_file(char *file, int *argc, char **argv[])
 | 
				
			|||||||
	i=0;
 | 
						i=0;
 | 
				
			||||||
	for (p=buf; *p; p++)
 | 
						for (p=buf; *p; p++)
 | 
				
			||||||
		if (*p == '\n') i++;
 | 
							if (*p == '\n') i++;
 | 
				
			||||||
	if (arg != NULL) Free(arg);
 | 
						if (arg != NULL) OPENSSL_free(arg);
 | 
				
			||||||
	arg=(char **)Malloc(sizeof(char *)*(i*2));
 | 
						arg=(char **)OPENSSL_malloc(sizeof(char *)*(i*2));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	*argv=arg;
 | 
						*argv=arg;
 | 
				
			||||||
	num=0;
 | 
						num=0;
 | 
				
			||||||
@@ -159,6 +164,14 @@ int str2fmt(char *s)
 | 
				
			|||||||
		return(FORMAT_PEM);
 | 
							return(FORMAT_PEM);
 | 
				
			||||||
	else if ((*s == 'N') || (*s == 'n'))
 | 
						else if ((*s == 'N') || (*s == 'n'))
 | 
				
			||||||
		return(FORMAT_NETSCAPE);
 | 
							return(FORMAT_NETSCAPE);
 | 
				
			||||||
 | 
						else if ((*s == 'S') || (*s == 's'))
 | 
				
			||||||
 | 
							return(FORMAT_SMIME);
 | 
				
			||||||
 | 
						else if ((*s == '1')
 | 
				
			||||||
 | 
							|| (strcmp(s,"PKCS12") == 0) || (strcmp(s,"pkcs12") == 0)
 | 
				
			||||||
 | 
							|| (strcmp(s,"P12") == 0) || (strcmp(s,"p12") == 0))
 | 
				
			||||||
 | 
							return(FORMAT_PKCS12);
 | 
				
			||||||
 | 
						else if ((*s == 'E') || (*s == 'e'))
 | 
				
			||||||
 | 
							return(FORMAT_ENGINE);
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		return(FORMAT_UNDEF);
 | 
							return(FORMAT_UNDEF);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -247,8 +260,8 @@ int WIN32_rename(char *from, char *to)
 | 
				
			|||||||
	ret=MoveFileEx(from,to,MOVEFILE_REPLACE_EXISTING|MOVEFILE_COPY_ALLOWED);
 | 
						ret=MoveFileEx(from,to,MOVEFILE_REPLACE_EXISTING|MOVEFILE_COPY_ALLOWED);
 | 
				
			||||||
	return(ret?0:-1);
 | 
						return(ret?0:-1);
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
        unlink(to);
 | 
						unlink(to);
 | 
				
			||||||
        return MoveFile(from, to);
 | 
						return MoveFile(from, to);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -266,7 +279,7 @@ int chopup_args(ARGS *arg, char *buf, int *argc, char **argv[])
 | 
				
			|||||||
	if (arg->count == 0)
 | 
						if (arg->count == 0)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		arg->count=20;
 | 
							arg->count=20;
 | 
				
			||||||
		arg->data=(char **)Malloc(sizeof(char *)*arg->count);
 | 
							arg->data=(char **)OPENSSL_malloc(sizeof(char *)*arg->count);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	for (i=0; i<arg->count; i++)
 | 
						for (i=0; i<arg->count; i++)
 | 
				
			||||||
		arg->data[i]=NULL;
 | 
							arg->data[i]=NULL;
 | 
				
			||||||
@@ -285,7 +298,7 @@ int chopup_args(ARGS *arg, char *buf, int *argc, char **argv[])
 | 
				
			|||||||
		if (num >= arg->count)
 | 
							if (num >= arg->count)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			arg->count+=20;
 | 
								arg->count+=20;
 | 
				
			||||||
			arg->data=(char **)Realloc(arg->data,
 | 
								arg->data=(char **)OPENSSL_realloc(arg->data,
 | 
				
			||||||
				sizeof(char *)*arg->count);
 | 
									sizeof(char *)*arg->count);
 | 
				
			||||||
			if (argc == 0) return(0);
 | 
								if (argc == 0) return(0);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -324,3 +337,442 @@ int app_init(long mesgwin)
 | 
				
			|||||||
	return(1);
 | 
						return(1);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int dump_cert_text (BIO *out, X509 *x)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						char buf[256];
 | 
				
			||||||
 | 
						X509_NAME_oneline(X509_get_subject_name(x),buf,256);
 | 
				
			||||||
 | 
						BIO_puts(out,"subject=");
 | 
				
			||||||
 | 
						BIO_puts(out,buf);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						X509_NAME_oneline(X509_get_issuer_name(x),buf,256);
 | 
				
			||||||
 | 
						BIO_puts(out,"\nissuer= ");
 | 
				
			||||||
 | 
						BIO_puts(out,buf);
 | 
				
			||||||
 | 
						BIO_puts(out,"\n");
 | 
				
			||||||
 | 
					        return 0;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static char *app_get_pass(BIO *err, char *arg, int keepbio);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						int same;
 | 
				
			||||||
 | 
						if(!arg2 || !arg1 || strcmp(arg1, arg2)) same = 0;
 | 
				
			||||||
 | 
						else same = 1;
 | 
				
			||||||
 | 
						if(arg1) {
 | 
				
			||||||
 | 
							*pass1 = app_get_pass(err, arg1, same);
 | 
				
			||||||
 | 
							if(!*pass1) return 0;
 | 
				
			||||||
 | 
						} else if(pass1) *pass1 = NULL;
 | 
				
			||||||
 | 
						if(arg2) {
 | 
				
			||||||
 | 
							*pass2 = app_get_pass(err, arg2, same ? 2 : 0);
 | 
				
			||||||
 | 
							if(!*pass2) return 0;
 | 
				
			||||||
 | 
						} else if(pass2) *pass2 = NULL;
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static char *app_get_pass(BIO *err, char *arg, int keepbio)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						char *tmp, tpass[APP_PASS_LEN];
 | 
				
			||||||
 | 
						static BIO *pwdbio = NULL;
 | 
				
			||||||
 | 
						int i;
 | 
				
			||||||
 | 
						if(!strncmp(arg, "pass:", 5)) return BUF_strdup(arg + 5);
 | 
				
			||||||
 | 
						if(!strncmp(arg, "env:", 4)) {
 | 
				
			||||||
 | 
							tmp = getenv(arg + 4);
 | 
				
			||||||
 | 
							if(!tmp) {
 | 
				
			||||||
 | 
								BIO_printf(err, "Can't read environment variable %s\n", arg + 4);
 | 
				
			||||||
 | 
								return NULL;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							return BUF_strdup(tmp);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if(!keepbio || !pwdbio) {
 | 
				
			||||||
 | 
							if(!strncmp(arg, "file:", 5)) {
 | 
				
			||||||
 | 
								pwdbio = BIO_new_file(arg + 5, "r");
 | 
				
			||||||
 | 
								if(!pwdbio) {
 | 
				
			||||||
 | 
									BIO_printf(err, "Can't open file %s\n", arg + 5);
 | 
				
			||||||
 | 
									return NULL;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							} else if(!strncmp(arg, "fd:", 3)) {
 | 
				
			||||||
 | 
								BIO *btmp;
 | 
				
			||||||
 | 
								i = atoi(arg + 3);
 | 
				
			||||||
 | 
								if(i >= 0) pwdbio = BIO_new_fd(i, BIO_NOCLOSE);
 | 
				
			||||||
 | 
								if((i < 0) || !pwdbio) {
 | 
				
			||||||
 | 
									BIO_printf(err, "Can't access file descriptor %s\n", arg + 3);
 | 
				
			||||||
 | 
									return NULL;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								/* Can't do BIO_gets on an fd BIO so add a buffering BIO */
 | 
				
			||||||
 | 
								btmp = BIO_new(BIO_f_buffer());
 | 
				
			||||||
 | 
								pwdbio = BIO_push(btmp, pwdbio);
 | 
				
			||||||
 | 
							} else if(!strcmp(arg, "stdin")) {
 | 
				
			||||||
 | 
								pwdbio = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
				
			||||||
 | 
								if(!pwdbio) {
 | 
				
			||||||
 | 
									BIO_printf(err, "Can't open BIO for stdin\n");
 | 
				
			||||||
 | 
									return NULL;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							} else {
 | 
				
			||||||
 | 
								BIO_printf(err, "Invalid password argument \"%s\"\n", arg);
 | 
				
			||||||
 | 
								return NULL;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						i = BIO_gets(pwdbio, tpass, APP_PASS_LEN);
 | 
				
			||||||
 | 
						if(keepbio != 1) {
 | 
				
			||||||
 | 
							BIO_free_all(pwdbio);
 | 
				
			||||||
 | 
							pwdbio = NULL;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if(i <= 0) {
 | 
				
			||||||
 | 
							BIO_printf(err, "Error reading password from BIO\n");
 | 
				
			||||||
 | 
							return NULL;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						tmp = strchr(tpass, '\n');
 | 
				
			||||||
 | 
						if(tmp) *tmp = 0;
 | 
				
			||||||
 | 
						return BUF_strdup(tpass);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int add_oid_section(BIO *err, LHASH *conf)
 | 
				
			||||||
 | 
					{	
 | 
				
			||||||
 | 
						char *p;
 | 
				
			||||||
 | 
						STACK_OF(CONF_VALUE) *sktmp;
 | 
				
			||||||
 | 
						CONF_VALUE *cnf;
 | 
				
			||||||
 | 
						int i;
 | 
				
			||||||
 | 
						if(!(p=CONF_get_string(conf,NULL,"oid_section"))) return 1;
 | 
				
			||||||
 | 
						if(!(sktmp = CONF_get_section(conf, p))) {
 | 
				
			||||||
 | 
							BIO_printf(err, "problem loading oid section %s\n", p);
 | 
				
			||||||
 | 
							return 0;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						for(i = 0; i < sk_CONF_VALUE_num(sktmp); i++) {
 | 
				
			||||||
 | 
							cnf = sk_CONF_VALUE_value(sktmp, i);
 | 
				
			||||||
 | 
							if(OBJ_create(cnf->value, cnf->name, cnf->name) == NID_undef) {
 | 
				
			||||||
 | 
								BIO_printf(err, "problem creating object %s=%s\n",
 | 
				
			||||||
 | 
												 cnf->name, cnf->value);
 | 
				
			||||||
 | 
								return 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					X509 *load_cert(BIO *err, char *file, int format)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						ASN1_HEADER *ah=NULL;
 | 
				
			||||||
 | 
						BUF_MEM *buf=NULL;
 | 
				
			||||||
 | 
						X509 *x=NULL;
 | 
				
			||||||
 | 
						BIO *cert;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if ((cert=BIO_new(BIO_s_file())) == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (file == NULL)
 | 
				
			||||||
 | 
							BIO_set_fp(cert,stdin,BIO_NOCLOSE);
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (BIO_read_filename(cert,file) <= 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror(file);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if 	(format == FORMAT_ASN1)
 | 
				
			||||||
 | 
							x=d2i_X509_bio(cert,NULL);
 | 
				
			||||||
 | 
						else if (format == FORMAT_NETSCAPE)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							unsigned char *p,*op;
 | 
				
			||||||
 | 
							int size=0,i;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							/* We sort of have to do it this way because it is sort of nice
 | 
				
			||||||
 | 
							 * to read the header first and check it, then
 | 
				
			||||||
 | 
							 * try to read the certificate */
 | 
				
			||||||
 | 
							buf=BUF_MEM_new();
 | 
				
			||||||
 | 
							for (;;)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if ((buf == NULL) || (!BUF_MEM_grow(buf,size+1024*10)))
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
								i=BIO_read(cert,&(buf->data[size]),1024*10);
 | 
				
			||||||
 | 
								size+=i;
 | 
				
			||||||
 | 
								if (i == 0) break;
 | 
				
			||||||
 | 
								if (i < 0)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									perror("reading certificate");
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							p=(unsigned char *)buf->data;
 | 
				
			||||||
 | 
							op=p;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							/* First load the header */
 | 
				
			||||||
 | 
							if ((ah=d2i_ASN1_HEADER(NULL,&p,(long)size)) == NULL)
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							if ((ah->header == NULL) || (ah->header->data == NULL) ||
 | 
				
			||||||
 | 
								(strncmp(NETSCAPE_CERT_HDR,(char *)ah->header->data,
 | 
				
			||||||
 | 
								ah->header->length) != 0))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(err,"Error reading header on certificate\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							/* header is ok, so now read the object */
 | 
				
			||||||
 | 
							p=op;
 | 
				
			||||||
 | 
							ah->meth=X509_asn1_meth();
 | 
				
			||||||
 | 
							if ((ah=d2i_ASN1_HEADER(&ah,&p,(long)size)) == NULL)
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							x=(X509 *)ah->data;
 | 
				
			||||||
 | 
							ah->data=NULL;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else if (format == FORMAT_PEM)
 | 
				
			||||||
 | 
							x=PEM_read_bio_X509_AUX(cert,NULL,NULL,NULL);
 | 
				
			||||||
 | 
						else if (format == FORMAT_PKCS12)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							PKCS12 *p12 = d2i_PKCS12_bio(cert, NULL);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							PKCS12_parse(p12, NULL, NULL, &x, NULL);
 | 
				
			||||||
 | 
							PKCS12_free(p12);
 | 
				
			||||||
 | 
							p12 = NULL;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else	{
 | 
				
			||||||
 | 
							BIO_printf(err,"bad input format specified for input cert\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					end:
 | 
				
			||||||
 | 
						if (x == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(err,"unable to load certificate\n");
 | 
				
			||||||
 | 
							ERR_print_errors(err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (ah != NULL) ASN1_HEADER_free(ah);
 | 
				
			||||||
 | 
						if (cert != NULL) BIO_free(cert);
 | 
				
			||||||
 | 
						if (buf != NULL) BUF_MEM_free(buf);
 | 
				
			||||||
 | 
						return(x);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					EVP_PKEY *load_key(BIO *err, char *file, int format, char *pass)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIO *key=NULL;
 | 
				
			||||||
 | 
						EVP_PKEY *pkey=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (file == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(err,"no keyfile specified\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						key=BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
						if (key == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (BIO_read_filename(key,file) <= 0)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							perror(file);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (format == FORMAT_ASN1)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							pkey=d2i_PrivateKey_bio(key, NULL);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else if (format == FORMAT_PEM)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							pkey=PEM_read_bio_PrivateKey(key,NULL,NULL,pass);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else if (format == FORMAT_PKCS12)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							PKCS12 *p12 = d2i_PKCS12_bio(key, NULL);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							PKCS12_parse(p12, pass, &pkey, NULL, NULL);
 | 
				
			||||||
 | 
							PKCS12_free(p12);
 | 
				
			||||||
 | 
							p12 = NULL;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(err,"bad input format specified for key\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					 end:
 | 
				
			||||||
 | 
						if (key != NULL) BIO_free(key);
 | 
				
			||||||
 | 
						if (pkey == NULL)
 | 
				
			||||||
 | 
							BIO_printf(err,"unable to load Private Key\n");
 | 
				
			||||||
 | 
						return(pkey);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					EVP_PKEY *load_pubkey(BIO *err, char *file, int format)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIO *key=NULL;
 | 
				
			||||||
 | 
						EVP_PKEY *pkey=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (file == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(err,"no keyfile specified\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						key=BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
						if (key == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (BIO_read_filename(key,file) <= 0)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							perror(file);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (format == FORMAT_ASN1)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							pkey=d2i_PUBKEY_bio(key, NULL);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else if (format == FORMAT_PEM)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							pkey=PEM_read_bio_PUBKEY(key,NULL,NULL,NULL);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(err,"bad input format specified for key\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					 end:
 | 
				
			||||||
 | 
						if (key != NULL) BIO_free(key);
 | 
				
			||||||
 | 
						if (pkey == NULL)
 | 
				
			||||||
 | 
							BIO_printf(err,"unable to load Public Key\n");
 | 
				
			||||||
 | 
						return(pkey);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					STACK_OF(X509) *load_certs(BIO *err, char *file, int format)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIO *certs;
 | 
				
			||||||
 | 
						int i;
 | 
				
			||||||
 | 
						STACK_OF(X509) *othercerts = NULL;
 | 
				
			||||||
 | 
						STACK_OF(X509_INFO) *allcerts = NULL;
 | 
				
			||||||
 | 
						X509_INFO *xi;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if((certs = BIO_new(BIO_s_file())) == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (file == NULL)
 | 
				
			||||||
 | 
							BIO_set_fp(certs,stdin,BIO_NOCLOSE);
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (BIO_read_filename(certs,file) <= 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror(file);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if      (format == FORMAT_PEM)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							othercerts = sk_X509_new_null();
 | 
				
			||||||
 | 
							if(!othercerts)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								sk_X509_free(othercerts);
 | 
				
			||||||
 | 
								othercerts = NULL;
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							allcerts = PEM_X509_INFO_read_bio(certs, NULL, NULL, NULL);
 | 
				
			||||||
 | 
							for(i = 0; i < sk_X509_INFO_num(allcerts); i++)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								xi = sk_X509_INFO_value (allcerts, i);
 | 
				
			||||||
 | 
								if (xi->x509)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									sk_X509_push(othercerts, xi->x509);
 | 
				
			||||||
 | 
									xi->x509 = NULL;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else	{
 | 
				
			||||||
 | 
							BIO_printf(err,"bad input format specified for input cert\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					end:
 | 
				
			||||||
 | 
						if (othercerts == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(err,"unable to load certificates\n");
 | 
				
			||||||
 | 
							ERR_print_errors(err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (allcerts) sk_X509_INFO_pop_free(allcerts, X509_INFO_free);
 | 
				
			||||||
 | 
						if (certs != NULL) BIO_free(certs);
 | 
				
			||||||
 | 
						return(othercerts);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					typedef struct {
 | 
				
			||||||
 | 
						char *name;
 | 
				
			||||||
 | 
						unsigned long flag;
 | 
				
			||||||
 | 
						unsigned long mask;
 | 
				
			||||||
 | 
					} NAME_EX_TBL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int set_name_ex(unsigned long *flags, const char *arg)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						char c;
 | 
				
			||||||
 | 
						const NAME_EX_TBL *ptbl, ex_tbl[] = {
 | 
				
			||||||
 | 
							{ "esc_2253", ASN1_STRFLGS_ESC_2253, 0},
 | 
				
			||||||
 | 
							{ "esc_ctrl", ASN1_STRFLGS_ESC_CTRL, 0},
 | 
				
			||||||
 | 
							{ "esc_msb", ASN1_STRFLGS_ESC_MSB, 0},
 | 
				
			||||||
 | 
							{ "use_quote", ASN1_STRFLGS_ESC_QUOTE, 0},
 | 
				
			||||||
 | 
							{ "utf8", ASN1_STRFLGS_UTF8_CONVERT, 0},
 | 
				
			||||||
 | 
							{ "ignore_type", ASN1_STRFLGS_IGNORE_TYPE, 0},
 | 
				
			||||||
 | 
							{ "show_type", ASN1_STRFLGS_SHOW_TYPE, 0},
 | 
				
			||||||
 | 
							{ "dump_all", ASN1_STRFLGS_DUMP_ALL, 0},
 | 
				
			||||||
 | 
							{ "dump_nostr", ASN1_STRFLGS_DUMP_UNKNOWN, 0},
 | 
				
			||||||
 | 
							{ "dump_der", ASN1_STRFLGS_DUMP_DER, 0},
 | 
				
			||||||
 | 
							{ "compat", XN_FLAG_COMPAT, 0xffffffffL},
 | 
				
			||||||
 | 
							{ "sep_comma_plus", XN_FLAG_SEP_COMMA_PLUS, XN_FLAG_SEP_MASK},
 | 
				
			||||||
 | 
							{ "sep_comma_plus_space", XN_FLAG_SEP_CPLUS_SPC, XN_FLAG_SEP_MASK},
 | 
				
			||||||
 | 
							{ "sep_semi_plus_space", XN_FLAG_SEP_SPLUS_SPC, XN_FLAG_SEP_MASK},
 | 
				
			||||||
 | 
							{ "sep_multiline", XN_FLAG_SEP_MULTILINE, XN_FLAG_SEP_MASK},
 | 
				
			||||||
 | 
							{ "dn_rev", XN_FLAG_DN_REV, 0},
 | 
				
			||||||
 | 
							{ "nofname", XN_FLAG_FN_NONE, XN_FLAG_FN_MASK},
 | 
				
			||||||
 | 
							{ "sname", XN_FLAG_FN_SN, XN_FLAG_FN_MASK},
 | 
				
			||||||
 | 
							{ "lname", XN_FLAG_FN_LN, XN_FLAG_FN_MASK},
 | 
				
			||||||
 | 
							{ "oid", XN_FLAG_FN_OID, XN_FLAG_FN_MASK},
 | 
				
			||||||
 | 
							{ "space_eq", XN_FLAG_SPC_EQ, 0},
 | 
				
			||||||
 | 
							{ "dump_unknown", XN_FLAG_DUMP_UNKNOWN_FIELDS, 0},
 | 
				
			||||||
 | 
							{ "RFC2253", XN_FLAG_RFC2253, 0xffffffffL},
 | 
				
			||||||
 | 
							{ "oneline", XN_FLAG_ONELINE, 0xffffffffL},
 | 
				
			||||||
 | 
							{ "multiline", XN_FLAG_MULTILINE, 0xffffffffL},
 | 
				
			||||||
 | 
							{ NULL, 0, 0}
 | 
				
			||||||
 | 
						};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						c = arg[0];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(c == '-') {
 | 
				
			||||||
 | 
							c = 0;
 | 
				
			||||||
 | 
							arg++;
 | 
				
			||||||
 | 
						} else if (c == '+') {
 | 
				
			||||||
 | 
							c = 1;
 | 
				
			||||||
 | 
							arg++;
 | 
				
			||||||
 | 
						} else c = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for(ptbl = ex_tbl; ptbl->name; ptbl++) {
 | 
				
			||||||
 | 
							if(!strcmp(arg, ptbl->name)) {
 | 
				
			||||||
 | 
								*flags &= ~ptbl->mask;
 | 
				
			||||||
 | 
								if(c) *flags |= ptbl->flag;
 | 
				
			||||||
 | 
								else *flags &= ~ptbl->flag;
 | 
				
			||||||
 | 
								return 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return 0;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					void print_name(BIO *out, char *title, X509_NAME *nm, unsigned long lflags)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						char buf[256];
 | 
				
			||||||
 | 
						char mline = 0;
 | 
				
			||||||
 | 
						int indent = 0;
 | 
				
			||||||
 | 
						if(title) BIO_puts(out, title);
 | 
				
			||||||
 | 
						if((lflags & XN_FLAG_SEP_MASK) == XN_FLAG_SEP_MULTILINE) {
 | 
				
			||||||
 | 
							mline = 1;
 | 
				
			||||||
 | 
							indent = 4;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if(lflags == XN_FLAG_COMPAT) {
 | 
				
			||||||
 | 
							X509_NAME_oneline(nm,buf,256);
 | 
				
			||||||
 | 
							BIO_puts(out,buf);
 | 
				
			||||||
 | 
							BIO_puts(out, "\n");
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							if(mline) BIO_puts(out, "\n");
 | 
				
			||||||
 | 
							X509_NAME_print_ex(out, nm, indent, lflags);
 | 
				
			||||||
 | 
							BIO_puts(out, "\n");
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										43
									
								
								apps/apps.h
									
									
									
									
									
								
							
							
						
						
									
										43
									
								
								apps/apps.h
									
									
									
									
									
								
							@@ -64,7 +64,19 @@
 | 
				
			|||||||
#include <openssl/buffer.h>
 | 
					#include <openssl/buffer.h>
 | 
				
			||||||
#include <openssl/bio.h>
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
#include <openssl/crypto.h>
 | 
					#include <openssl/crypto.h>
 | 
				
			||||||
#include "progs.h"
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
 | 
					#include <openssl/lhash.h>
 | 
				
			||||||
 | 
					#include <openssl/conf.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int app_RAND_load_file(const char *file, BIO *bio_e, int dont_warn);
 | 
				
			||||||
 | 
					int app_RAND_write_file(const char *file, BIO *bio_e);
 | 
				
			||||||
 | 
					/* When `file' is NULL, use defaults.
 | 
				
			||||||
 | 
					 * `bio_e' is for error messages. */
 | 
				
			||||||
 | 
					void app_RAND_allow_write_file(void);
 | 
				
			||||||
 | 
					long app_RAND_load_files(char *file); /* `file' is a list of files to read,
 | 
				
			||||||
 | 
					                                       * separated by LIST_SEPARATOR_CHAR
 | 
				
			||||||
 | 
					                                       * (see e_os.h).  The string is
 | 
				
			||||||
 | 
					                                       * destroyed! */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef NO_STDIO
 | 
					#ifdef NO_STDIO
 | 
				
			||||||
BIO_METHOD *BIO_s_file();
 | 
					BIO_METHOD *BIO_s_file();
 | 
				
			||||||
@@ -88,7 +100,6 @@ extern BIO *bio_err;
 | 
				
			|||||||
#else
 | 
					#else
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define MAIN(a,v)	PROG(a,v)
 | 
					#define MAIN(a,v)	PROG(a,v)
 | 
				
			||||||
#include <openssl/conf.h>
 | 
					 | 
				
			||||||
extern LHASH *config;
 | 
					extern LHASH *config;
 | 
				
			||||||
extern char *default_config_file;
 | 
					extern char *default_config_file;
 | 
				
			||||||
extern BIO *bio_err;
 | 
					extern BIO *bio_err;
 | 
				
			||||||
@@ -103,7 +114,7 @@ extern BIO *bio_err;
 | 
				
			|||||||
#define do_pipe_sig()
 | 
					#define do_pipe_sig()
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(MONOLITH) && !defined(SSLEAY)
 | 
					#if defined(MONOLITH) && !defined(OPENSSL_C)
 | 
				
			||||||
#  define apps_startup()	do_pipe_sig()
 | 
					#  define apps_startup()	do_pipe_sig()
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
#  if defined(MSDOS) || defined(WIN16) || defined(WIN32)
 | 
					#  if defined(MSDOS) || defined(WIN16) || defined(WIN32)
 | 
				
			||||||
@@ -122,20 +133,40 @@ extern BIO *bio_err;
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
typedef struct args_st
 | 
					typedef struct args_st
 | 
				
			||||||
        {
 | 
						{
 | 
				
			||||||
        char **data;
 | 
						char **data;
 | 
				
			||||||
	int count;
 | 
						int count;
 | 
				
			||||||
        } ARGS;
 | 
						} ARGS;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int should_retry(int i);
 | 
					int should_retry(int i);
 | 
				
			||||||
int args_from_file(char *file, int *argc, char **argv[]);
 | 
					int args_from_file(char *file, int *argc, char **argv[]);
 | 
				
			||||||
int str2fmt(char *s);
 | 
					int str2fmt(char *s);
 | 
				
			||||||
void program_name(char *in,char *out,int size);
 | 
					void program_name(char *in,char *out,int size);
 | 
				
			||||||
int chopup_args(ARGS *arg,char *buf, int *argc, char **argv[]);
 | 
					int chopup_args(ARGS *arg,char *buf, int *argc, char **argv[]);
 | 
				
			||||||
 | 
					#ifdef HEADER_X509_H
 | 
				
			||||||
 | 
					int dump_cert_text(BIO *out, X509 *x);
 | 
				
			||||||
 | 
					void print_name(BIO *out, char *title, X509_NAME *nm, unsigned long lflags);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					int set_name_ex(unsigned long *flags, const char *arg);
 | 
				
			||||||
 | 
					int app_passwd(BIO *err, char *arg1, char *arg2, char **pass1, char **pass2);
 | 
				
			||||||
 | 
					int add_oid_section(BIO *err, LHASH *conf);
 | 
				
			||||||
 | 
					X509 *load_cert(BIO *err, char *file, int format);
 | 
				
			||||||
 | 
					EVP_PKEY *load_key(BIO *err, char *file, int format, char *pass);
 | 
				
			||||||
 | 
					EVP_PKEY *load_pubkey(BIO *err, char *file, int format);
 | 
				
			||||||
 | 
					STACK_OF(X509) *load_certs(BIO *err, char *file, int format);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define FORMAT_UNDEF    0
 | 
					#define FORMAT_UNDEF    0
 | 
				
			||||||
#define FORMAT_ASN1     1
 | 
					#define FORMAT_ASN1     1
 | 
				
			||||||
#define FORMAT_TEXT     2
 | 
					#define FORMAT_TEXT     2
 | 
				
			||||||
#define FORMAT_PEM      3
 | 
					#define FORMAT_PEM      3
 | 
				
			||||||
#define FORMAT_NETSCAPE 4
 | 
					#define FORMAT_NETSCAPE 4
 | 
				
			||||||
 | 
					#define FORMAT_PKCS12   5
 | 
				
			||||||
 | 
					#define FORMAT_SMIME    6
 | 
				
			||||||
 | 
					/* Since this is currently inofficial, let's give it a high number */
 | 
				
			||||||
 | 
					#define FORMAT_ENGINE   127
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define NETSCAPE_CERT_HDR	"certificate"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define APP_PASS_LEN	1024
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -74,19 +74,21 @@
 | 
				
			|||||||
 * -i		- indent the details by depth
 | 
					 * -i		- indent the details by depth
 | 
				
			||||||
 * -offset	- where in the file to start
 | 
					 * -offset	- where in the file to start
 | 
				
			||||||
 * -length	- how many bytes to use
 | 
					 * -length	- how many bytes to use
 | 
				
			||||||
 * -oid file	- extra oid decription file
 | 
					 * -oid file	- extra oid description file
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	asn1parse_main
 | 
					#define PROG	asn1parse_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int i,badops=0,offset=0,ret=1,j;
 | 
						int i,badops=0,offset=0,ret=1,j;
 | 
				
			||||||
	unsigned int length=0;
 | 
						unsigned int length=0;
 | 
				
			||||||
	long num,tmplen;
 | 
						long num,tmplen;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL,*b64=NULL, *derout = NULL;
 | 
						BIO *in=NULL,*out=NULL,*b64=NULL, *derout = NULL;
 | 
				
			||||||
	int informat,indent=0;
 | 
						int informat,indent=0, noout = 0, dump = 0;
 | 
				
			||||||
	char *infile=NULL,*str=NULL,*prog,*oidfile=NULL, *derfile=NULL;
 | 
						char *infile=NULL,*str=NULL,*prog,*oidfile=NULL, *derfile=NULL;
 | 
				
			||||||
	unsigned char *tmpbuf;
 | 
						unsigned char *tmpbuf;
 | 
				
			||||||
	BUF_MEM *buf=NULL;
 | 
						BUF_MEM *buf=NULL;
 | 
				
			||||||
@@ -106,7 +108,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	argv++;
 | 
						argv++;
 | 
				
			||||||
	if ((osk=sk_new_null()) == NULL)
 | 
						if ((osk=sk_new_null()) == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"Malloc failure\n");
 | 
							BIO_printf(bio_err,"Memory allocation failure\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	while (argc >= 1)
 | 
						while (argc >= 1)
 | 
				
			||||||
@@ -130,6 +132,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			{
 | 
								{
 | 
				
			||||||
			indent=1;
 | 
								indent=1;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-noout") == 0) noout = 1;
 | 
				
			||||||
		else if (strcmp(*argv,"-oid") == 0)
 | 
							else if (strcmp(*argv,"-oid") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -146,6 +149,16 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			length= atoi(*(++argv));
 | 
								length= atoi(*(++argv));
 | 
				
			||||||
			if (length == 0) goto bad;
 | 
								if (length == 0) goto bad;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-dump") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								dump= -1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-dlimit") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								dump= atoi(*(++argv));
 | 
				
			||||||
 | 
								if (dump <= 0) goto bad;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-strparse") == 0)
 | 
							else if (strcmp(*argv,"-strparse") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -168,9 +181,13 @@ bad:
 | 
				
			|||||||
		BIO_printf(bio_err,"where options are\n");
 | 
							BIO_printf(bio_err,"where options are\n");
 | 
				
			||||||
		BIO_printf(bio_err," -inform arg   input format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -inform arg   input format - one of DER TXT PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -in arg       input file\n");
 | 
							BIO_printf(bio_err," -in arg       input file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -out arg      output file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -noout arg    don't produce any output\n");
 | 
				
			||||||
		BIO_printf(bio_err," -offset arg   offset into file\n");
 | 
							BIO_printf(bio_err," -offset arg   offset into file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -length arg   lenth of section in file\n");
 | 
							BIO_printf(bio_err," -length arg   length of section in file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -i            indent entries\n");
 | 
							BIO_printf(bio_err," -i            indent entries\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -dump         dump unknown data in hex form\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -dlimit arg   dump the first arg bytes of unknown data in hex form\n");
 | 
				
			||||||
		BIO_printf(bio_err," -oid file     file of extra oid definitions\n");
 | 
							BIO_printf(bio_err," -oid file     file of extra oid definitions\n");
 | 
				
			||||||
		BIO_printf(bio_err," -strparse offset\n");
 | 
							BIO_printf(bio_err," -strparse offset\n");
 | 
				
			||||||
		BIO_printf(bio_err,"               a series of these can be used to 'dig' into multiple\n");
 | 
							BIO_printf(bio_err,"               a series of these can be used to 'dig' into multiple\n");
 | 
				
			||||||
@@ -189,6 +206,12 @@ bad:
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	BIO_set_fp(out,stdout,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
						BIO_set_fp(out,stdout,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
						out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (oidfile != NULL)
 | 
						if (oidfile != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -287,7 +310,9 @@ bad:
 | 
				
			|||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	if (!ASN1_parse(out,(unsigned char *)&(str[offset]),length,indent))
 | 
						if (!noout &&
 | 
				
			||||||
 | 
						    !ASN1_parse_dump(out,(unsigned char *)&(str[offset]),length,
 | 
				
			||||||
 | 
							    indent,dump))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
@@ -296,7 +321,7 @@ bad:
 | 
				
			|||||||
end:
 | 
					end:
 | 
				
			||||||
	BIO_free(derout);
 | 
						BIO_free(derout);
 | 
				
			||||||
	if (in != NULL) BIO_free(in);
 | 
						if (in != NULL) BIO_free(in);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
	if (b64 != NULL) BIO_free(b64);
 | 
						if (b64 != NULL) BIO_free(b64);
 | 
				
			||||||
	if (ret != 0)
 | 
						if (ret != 0)
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1 +1 @@
 | 
				
			|||||||
05
 | 
					07
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -66,10 +66,6 @@
 | 
				
			|||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/ssl.h>
 | 
					#include <openssl/ssl.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(NO_RSA) && !defined(NO_SSL2)
 | 
					 | 
				
			||||||
#define NO_SSL2
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	ciphers_main
 | 
					#define PROG	ciphers_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -78,9 +74,12 @@ static char *ciphers_usage[]={
 | 
				
			|||||||
" -v          - verbose mode, a textual listing of the ciphers in SSLeay\n",
 | 
					" -v          - verbose mode, a textual listing of the ciphers in SSLeay\n",
 | 
				
			||||||
" -ssl2       - SSL2 mode\n",
 | 
					" -ssl2       - SSL2 mode\n",
 | 
				
			||||||
" -ssl3       - SSL3 mode\n",
 | 
					" -ssl3       - SSL3 mode\n",
 | 
				
			||||||
 | 
					" -tls1       - TLS1 mode\n",
 | 
				
			||||||
NULL
 | 
					NULL
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int ret=1,i;
 | 
						int ret=1,i;
 | 
				
			||||||
@@ -109,6 +108,12 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	if (bio_err == NULL)
 | 
						if (bio_err == NULL)
 | 
				
			||||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
							bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
				
			||||||
	STDout=BIO_new_fp(stdout,BIO_NOCLOSE);
 | 
						STDout=BIO_new_fp(stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
						STDout = BIO_push(tmpbio, STDout);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	argc--;
 | 
						argc--;
 | 
				
			||||||
	argv++;
 | 
						argv++;
 | 
				
			||||||
@@ -123,6 +128,10 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
#ifndef NO_SSL3
 | 
					#ifndef NO_SSL3
 | 
				
			||||||
		else if (strcmp(*argv,"-ssl3") == 0)
 | 
							else if (strcmp(*argv,"-ssl3") == 0)
 | 
				
			||||||
			meth=SSLv3_client_method();
 | 
								meth=SSLv3_client_method();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_TLS1
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-tls1") == 0)
 | 
				
			||||||
 | 
								meth=TLSv1_client_method();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		else if ((strncmp(*argv,"-h",2) == 0) ||
 | 
							else if ((strncmp(*argv,"-h",2) == 0) ||
 | 
				
			||||||
			 (strcmp(*argv,"-?") == 0))
 | 
								 (strcmp(*argv,"-?") == 0))
 | 
				
			||||||
@@ -145,12 +154,16 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	SSLeay_add_ssl_algorithms();
 | 
						OpenSSL_add_ssl_algorithms();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ctx=SSL_CTX_new(meth);
 | 
						ctx=SSL_CTX_new(meth);
 | 
				
			||||||
	if (ctx == NULL) goto err;
 | 
						if (ctx == NULL) goto err;
 | 
				
			||||||
	if (ciphers != NULL)
 | 
						if (ciphers != NULL) {
 | 
				
			||||||
		SSL_CTX_set_cipher_list(ctx,ciphers);
 | 
							if(!SSL_CTX_set_cipher_list(ctx,ciphers)) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error in cipher list\n");
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
	ssl=SSL_new(ctx);
 | 
						ssl=SSL_new(ctx);
 | 
				
			||||||
	if (ssl == NULL) goto err;
 | 
						if (ssl == NULL) goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -188,7 +201,7 @@ err:
 | 
				
			|||||||
end:
 | 
					end:
 | 
				
			||||||
	if (ctx != NULL) SSL_CTX_free(ctx);
 | 
						if (ctx != NULL) SSL_CTX_free(ctx);
 | 
				
			||||||
	if (ssl != NULL) SSL_free(ssl);
 | 
						if (ssl != NULL) SSL_free(ssl);
 | 
				
			||||||
	if (STDout != NULL) BIO_free(STDout);
 | 
						if (STDout != NULL) BIO_free_all(STDout);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										134
									
								
								apps/crl.c
									
									
									
									
									
								
							
							
						
						
									
										134
									
								
								apps/crl.c
									
									
									
									
									
								
							@@ -75,7 +75,7 @@
 | 
				
			|||||||
static char *crl_usage[]={
 | 
					static char *crl_usage[]={
 | 
				
			||||||
"usage: crl args\n",
 | 
					"usage: crl args\n",
 | 
				
			||||||
"\n",
 | 
					"\n",
 | 
				
			||||||
" -inform arg     - input format - default PEM (one of DER, TXT or PEM)\n",
 | 
					" -inform arg     - input format - default PEM (DER or PEM)\n",
 | 
				
			||||||
" -outform arg    - output format - default PEM\n",
 | 
					" -outform arg    - output format - default PEM\n",
 | 
				
			||||||
" -text           - print out a text format version\n",
 | 
					" -text           - print out a text format version\n",
 | 
				
			||||||
" -in arg         - input file - default stdin\n",
 | 
					" -in arg         - input file - default stdin\n",
 | 
				
			||||||
@@ -85,21 +85,34 @@ static char *crl_usage[]={
 | 
				
			|||||||
" -lastupdate     - lastUpdate field\n",
 | 
					" -lastupdate     - lastUpdate field\n",
 | 
				
			||||||
" -nextupdate     - nextUpdate field\n",
 | 
					" -nextupdate     - nextUpdate field\n",
 | 
				
			||||||
" -noout          - no CRL output\n",
 | 
					" -noout          - no CRL output\n",
 | 
				
			||||||
 | 
					" -CAfile  name   - verify CRL using certificates in file \"name\"\n",
 | 
				
			||||||
 | 
					" -CApath  dir    - verify CRL using certificates in \"dir\"\n",
 | 
				
			||||||
NULL
 | 
					NULL
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static X509_CRL *load_crl(char *file, int format);
 | 
					static X509_CRL *load_crl(char *file, int format);
 | 
				
			||||||
static BIO *bio_out=NULL;
 | 
					static BIO *bio_out=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	X509_CRL *x=NULL;
 | 
						X509_CRL *x=NULL;
 | 
				
			||||||
 | 
						char *CAfile = NULL, *CApath = NULL;
 | 
				
			||||||
	int ret=1,i,num,badops=0;
 | 
						int ret=1,i,num,badops=0;
 | 
				
			||||||
	BIO *out=NULL;
 | 
						BIO *out=NULL;
 | 
				
			||||||
	int informat,outformat;
 | 
						int informat,outformat;
 | 
				
			||||||
	char *infile=NULL,*outfile=NULL;
 | 
						char *infile=NULL,*outfile=NULL;
 | 
				
			||||||
	int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
 | 
						int hash=0,issuer=0,lastupdate=0,nextupdate=0,noout=0,text=0;
 | 
				
			||||||
 | 
						int fingerprint = 0;
 | 
				
			||||||
	char **pp,buf[256];
 | 
						char **pp,buf[256];
 | 
				
			||||||
 | 
						X509_STORE *store = NULL;
 | 
				
			||||||
 | 
						X509_STORE_CTX ctx;
 | 
				
			||||||
 | 
						X509_LOOKUP *lookup = NULL;
 | 
				
			||||||
 | 
						X509_OBJECT xobj;
 | 
				
			||||||
 | 
						EVP_PKEY *pkey;
 | 
				
			||||||
 | 
						int do_ver = 0;
 | 
				
			||||||
 | 
						const EVP_MD *md_alg,*digest=EVP_md5();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -109,7 +122,15 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (bio_out == NULL)
 | 
						if (bio_out == NULL)
 | 
				
			||||||
		if ((bio_out=BIO_new(BIO_s_file())) != NULL)
 | 
							if ((bio_out=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_set_fp(bio_out,stdout,BIO_NOCLOSE);
 | 
								BIO_set_fp(bio_out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
								bio_out = BIO_push(tmpbio, bio_out);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	informat=FORMAT_PEM;
 | 
						informat=FORMAT_PEM;
 | 
				
			||||||
	outformat=FORMAT_PEM;
 | 
						outformat=FORMAT_PEM;
 | 
				
			||||||
@@ -146,6 +167,20 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			outfile= *(++argv);
 | 
								outfile= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-CApath") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								CApath = *(++argv);
 | 
				
			||||||
 | 
								do_ver = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-CAfile") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								CAfile = *(++argv);
 | 
				
			||||||
 | 
								do_ver = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-verify") == 0)
 | 
				
			||||||
 | 
								do_ver = 1;
 | 
				
			||||||
		else if (strcmp(*argv,"-text") == 0)
 | 
							else if (strcmp(*argv,"-text") == 0)
 | 
				
			||||||
			text = 1;
 | 
								text = 1;
 | 
				
			||||||
		else if (strcmp(*argv,"-hash") == 0)
 | 
							else if (strcmp(*argv,"-hash") == 0)
 | 
				
			||||||
@@ -158,6 +193,13 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			nextupdate= ++num;
 | 
								nextupdate= ++num;
 | 
				
			||||||
		else if (strcmp(*argv,"-noout") == 0)
 | 
							else if (strcmp(*argv,"-noout") == 0)
 | 
				
			||||||
			noout= ++num;
 | 
								noout= ++num;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-fingerprint") == 0)
 | 
				
			||||||
 | 
								fingerprint= ++num;
 | 
				
			||||||
 | 
							else if ((md_alg=EVP_get_digestbyname(*argv + 1)))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								/* ok */
 | 
				
			||||||
 | 
								digest=md_alg;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
								BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
				
			||||||
@@ -177,40 +219,98 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
	X509V3_add_standard_extensions();
 | 
					 | 
				
			||||||
	x=load_crl(infile,informat);
 | 
						x=load_crl(infile,informat);
 | 
				
			||||||
	if (x == NULL) { goto end; }
 | 
						if (x == NULL) { goto end; }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(do_ver) {
 | 
				
			||||||
 | 
							store = X509_STORE_new();
 | 
				
			||||||
 | 
							lookup=X509_STORE_add_lookup(store,X509_LOOKUP_file());
 | 
				
			||||||
 | 
							if (lookup == NULL) goto end;
 | 
				
			||||||
 | 
							if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
 | 
				
			||||||
 | 
								X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
							lookup=X509_STORE_add_lookup(store,X509_LOOKUP_hash_dir());
 | 
				
			||||||
 | 
							if (lookup == NULL) goto end;
 | 
				
			||||||
 | 
							if (!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM))
 | 
				
			||||||
 | 
								X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
				
			||||||
 | 
							ERR_clear_error();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							X509_STORE_CTX_init(&ctx, store, NULL, NULL);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							i = X509_STORE_get_by_subject(&ctx, X509_LU_X509, 
 | 
				
			||||||
 | 
										X509_CRL_get_issuer(x), &xobj);
 | 
				
			||||||
 | 
							if(i <= 0) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err,
 | 
				
			||||||
 | 
									"Error getting CRL issuer certificate\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							pkey = X509_get_pubkey(xobj.data.x509);
 | 
				
			||||||
 | 
							X509_OBJECT_free_contents(&xobj);
 | 
				
			||||||
 | 
							if(!pkey) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err,
 | 
				
			||||||
 | 
									"Error getting CRL issuer public key\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							i = X509_CRL_verify(x, pkey);
 | 
				
			||||||
 | 
							EVP_PKEY_free(pkey);
 | 
				
			||||||
 | 
							if(i < 0) goto end;
 | 
				
			||||||
 | 
							if(i == 0) BIO_printf(bio_err, "verify failure\n");
 | 
				
			||||||
 | 
							else BIO_printf(bio_err, "verify OK\n");
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (num)
 | 
						if (num)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		for (i=1; i<=num; i++)
 | 
							for (i=1; i<=num; i++)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (issuer == i)
 | 
								if (issuer == i)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				X509_NAME_oneline(x->crl->issuer,buf,256);
 | 
									X509_NAME_oneline(X509_CRL_get_issuer(x),
 | 
				
			||||||
 | 
													buf,256);
 | 
				
			||||||
				BIO_printf(bio_out,"issuer= %s\n",buf);
 | 
									BIO_printf(bio_out,"issuer= %s\n",buf);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if (hash == i)
 | 
								if (hash == i)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(bio_out,"%08lx\n",
 | 
									BIO_printf(bio_out,"%08lx\n",
 | 
				
			||||||
					X509_NAME_hash(x->crl->issuer));
 | 
										X509_NAME_hash(X509_CRL_get_issuer(x)));
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			if (lastupdate == i)
 | 
								if (lastupdate == i)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(bio_out,"lastUpdate=");
 | 
									BIO_printf(bio_out,"lastUpdate=");
 | 
				
			||||||
				ASN1_TIME_print(bio_out,x->crl->lastUpdate);
 | 
									ASN1_TIME_print(bio_out,
 | 
				
			||||||
 | 
											X509_CRL_get_lastUpdate(x));
 | 
				
			||||||
				BIO_printf(bio_out,"\n");
 | 
									BIO_printf(bio_out,"\n");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			if (nextupdate == i)
 | 
								if (nextupdate == i)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(bio_out,"nextUpdate=");
 | 
									BIO_printf(bio_out,"nextUpdate=");
 | 
				
			||||||
				if (x->crl->nextUpdate != NULL)
 | 
									if (X509_CRL_get_nextUpdate(x)) 
 | 
				
			||||||
					ASN1_TIME_print(bio_out,x->crl->nextUpdate);
 | 
										ASN1_TIME_print(bio_out,
 | 
				
			||||||
 | 
											X509_CRL_get_nextUpdate(x));
 | 
				
			||||||
				else
 | 
									else
 | 
				
			||||||
					BIO_printf(bio_out,"NONE");
 | 
										BIO_printf(bio_out,"NONE");
 | 
				
			||||||
				BIO_printf(bio_out,"\n");
 | 
									BIO_printf(bio_out,"\n");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
								if (fingerprint == i)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									int j;
 | 
				
			||||||
 | 
									unsigned int n;
 | 
				
			||||||
 | 
									unsigned char md[EVP_MAX_MD_SIZE];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									if (!X509_CRL_digest(x,digest,md,&n))
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										BIO_printf(bio_err,"out of memory\n");
 | 
				
			||||||
 | 
										goto end;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									BIO_printf(bio_out,"%s Fingerprint=",
 | 
				
			||||||
 | 
											OBJ_nid2sn(EVP_MD_type(digest)));
 | 
				
			||||||
 | 
									for (j=0; j<(int)n; j++)
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										BIO_printf(bio_out,"%02X%c",md[j],
 | 
				
			||||||
 | 
											(j+1 == (int)n)
 | 
				
			||||||
 | 
											?'\n':':');
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -222,7 +322,15 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_write_filename(out,outfile) <= 0)
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -248,10 +356,14 @@ bad:
 | 
				
			|||||||
	if (!i) { BIO_printf(bio_err,"unable to write CRL\n"); goto end; }
 | 
						if (!i) { BIO_printf(bio_err,"unable to write CRL\n"); goto end; }
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	BIO_free(out);
 | 
						BIO_free_all(out);
 | 
				
			||||||
	BIO_free(bio_out);
 | 
						BIO_free_all(bio_out);
 | 
				
			||||||
 | 
						bio_out=NULL;
 | 
				
			||||||
	X509_CRL_free(x);
 | 
						X509_CRL_free(x);
 | 
				
			||||||
	X509V3_EXT_cleanup();
 | 
						if(store) {
 | 
				
			||||||
 | 
							X509_STORE_CTX_cleanup(&ctx);
 | 
				
			||||||
 | 
							X509_STORE_free(store);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -280,7 +392,7 @@ static X509_CRL *load_crl(char *infile, int format)
 | 
				
			|||||||
	if 	(format == FORMAT_ASN1)
 | 
						if 	(format == FORMAT_ASN1)
 | 
				
			||||||
		x=d2i_X509_CRL_bio(in,NULL);
 | 
							x=d2i_X509_CRL_bio(in,NULL);
 | 
				
			||||||
	else if (format == FORMAT_PEM)
 | 
						else if (format == FORMAT_PEM)
 | 
				
			||||||
		x=PEM_read_bio_X509_CRL(in,NULL,NULL);
 | 
							x=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL);
 | 
				
			||||||
	else	{
 | 
						else	{
 | 
				
			||||||
		BIO_printf(bio_err,"bad input format specified for input crl\n");
 | 
							BIO_printf(bio_err,"bad input format specified for input crl\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -76,12 +76,14 @@ static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile);
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	crl2pkcs7_main
 | 
					#define PROG	crl2pkcs7_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* -inform arg	- input format - default PEM (one of DER, TXT or PEM)
 | 
					/* -inform arg	- input format - default PEM (DER or PEM)
 | 
				
			||||||
 * -outform arg - output format - default PEM
 | 
					 * -outform arg - output format - default PEM
 | 
				
			||||||
 * -in arg	- input file - default stdin
 | 
					 * -in arg	- input file - default stdin
 | 
				
			||||||
 * -out arg	- output file - default stdout
 | 
					 * -out arg	- output file - default stdout
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int i,badops=0;
 | 
						int i,badops=0;
 | 
				
			||||||
@@ -92,7 +94,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	PKCS7_SIGNED *p7s = NULL;
 | 
						PKCS7_SIGNED *p7s = NULL;
 | 
				
			||||||
	X509_CRL *crl=NULL;
 | 
						X509_CRL *crl=NULL;
 | 
				
			||||||
	STACK *certflst=NULL;
 | 
						STACK *certflst=NULL;
 | 
				
			||||||
	STACK *crl_stack=NULL;
 | 
						STACK_OF(X509_CRL) *crl_stack=NULL;
 | 
				
			||||||
	STACK_OF(X509) *cert_stack=NULL;
 | 
						STACK_OF(X509) *cert_stack=NULL;
 | 
				
			||||||
	int ret=1,nocrl=0;
 | 
						int ret=1,nocrl=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -139,7 +141,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		else if (strcmp(*argv,"-certfile") == 0)
 | 
							else if (strcmp(*argv,"-certfile") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			if(!certflst) certflst = sk_new(NULL);
 | 
								if(!certflst) certflst = sk_new_null();
 | 
				
			||||||
			sk_push(certflst,*(++argv));
 | 
								sk_push(certflst,*(++argv));
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
@@ -157,8 +159,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
bad:
 | 
					bad:
 | 
				
			||||||
		BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
							BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
				
			||||||
		BIO_printf(bio_err,"where options are\n");
 | 
							BIO_printf(bio_err,"where options are\n");
 | 
				
			||||||
		BIO_printf(bio_err," -inform arg    input format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -inform arg    input format - DER or PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -outform arg   output format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -outform arg   output format - DER or PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -in arg        input file\n");
 | 
							BIO_printf(bio_err," -in arg        input file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -out arg       output file\n");
 | 
							BIO_printf(bio_err," -out arg       output file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -certfile arg  certificates file of chain to a trusted CA\n");
 | 
							BIO_printf(bio_err," -certfile arg  certificates file of chain to a trusted CA\n");
 | 
				
			||||||
@@ -193,7 +195,7 @@ bad:
 | 
				
			|||||||
		if 	(informat == FORMAT_ASN1)
 | 
							if 	(informat == FORMAT_ASN1)
 | 
				
			||||||
			crl=d2i_X509_CRL_bio(in,NULL);
 | 
								crl=d2i_X509_CRL_bio(in,NULL);
 | 
				
			||||||
		else if (informat == FORMAT_PEM)
 | 
							else if (informat == FORMAT_PEM)
 | 
				
			||||||
			crl=PEM_read_bio_X509_CRL(in,NULL,NULL);
 | 
								crl=PEM_read_bio_X509_CRL(in,NULL,NULL,NULL);
 | 
				
			||||||
		else	{
 | 
							else	{
 | 
				
			||||||
			BIO_printf(bio_err,"bad input format specified for input crl\n");
 | 
								BIO_printf(bio_err,"bad input format specified for input crl\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
@@ -213,15 +215,15 @@ bad:
 | 
				
			|||||||
	p7s->contents->type=OBJ_nid2obj(NID_pkcs7_data);
 | 
						p7s->contents->type=OBJ_nid2obj(NID_pkcs7_data);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!ASN1_INTEGER_set(p7s->version,1)) goto end;
 | 
						if (!ASN1_INTEGER_set(p7s->version,1)) goto end;
 | 
				
			||||||
	if ((crl_stack=sk_new(NULL)) == NULL) goto end;
 | 
						if ((crl_stack=sk_X509_CRL_new_null()) == NULL) goto end;
 | 
				
			||||||
	p7s->crl=crl_stack;
 | 
						p7s->crl=crl_stack;
 | 
				
			||||||
	if (crl != NULL)
 | 
						if (crl != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		sk_push(crl_stack,(char *)crl);
 | 
							sk_X509_CRL_push(crl_stack,crl);
 | 
				
			||||||
		crl=NULL; /* now part of p7 for Freeing */
 | 
							crl=NULL; /* now part of p7 for OPENSSL_freeing */
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((cert_stack=sk_X509_new(NULL)) == NULL) goto end;
 | 
						if ((cert_stack=sk_X509_new_null()) == NULL) goto end;
 | 
				
			||||||
	p7s->cert=cert_stack;
 | 
						p7s->cert=cert_stack;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(certflst) for(i = 0; i < sk_num(certflst); i++) {
 | 
						if(certflst) for(i = 0; i < sk_num(certflst); i++) {
 | 
				
			||||||
@@ -237,7 +239,15 @@ bad:
 | 
				
			|||||||
	sk_free(certflst);
 | 
						sk_free(certflst);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_write_filename(out,outfile) <= 0)
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -264,7 +274,7 @@ bad:
 | 
				
			|||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (in != NULL) BIO_free(in);
 | 
						if (in != NULL) BIO_free(in);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
	if (p7 != NULL) PKCS7_free(p7);
 | 
						if (p7 != NULL) PKCS7_free(p7);
 | 
				
			||||||
	if (crl != NULL) X509_CRL_free(crl);
 | 
						if (crl != NULL) X509_CRL_free(crl);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -304,7 +314,7 @@ static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* This loads from a file, a stack of x509/crl/pkey sets */
 | 
						/* This loads from a file, a stack of x509/crl/pkey sets */
 | 
				
			||||||
	sk=PEM_X509_INFO_read_bio(in,NULL,NULL);
 | 
						sk=PEM_X509_INFO_read_bio(in,NULL,NULL,NULL);
 | 
				
			||||||
	if (sk == NULL) {
 | 
						if (sk == NULL) {
 | 
				
			||||||
		BIO_printf(bio_err,"error reading the file, %s\n",certfile);
 | 
							BIO_printf(bio_err,"error reading the file, %s\n",certfile);
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
@@ -325,7 +335,7 @@ static int add_certs_from_file(STACK_OF(X509) *stack, char *certfile)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	ret=count;
 | 
						ret=count;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
 	/* never need to Free x */
 | 
					 	/* never need to OPENSSL_free x */
 | 
				
			||||||
	if (in != NULL) BIO_free(in);
 | 
						if (in != NULL) BIO_free(in);
 | 
				
			||||||
	if (sk != NULL) sk_X509_INFO_free(sk);
 | 
						if (sk != NULL) sk_X509_INFO_free(sk);
 | 
				
			||||||
	return(ret);
 | 
						return(ret);
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										238
									
								
								apps/dgst.c
									
									
									
									
									
								
							
							
						
						
									
										238
									
								
								apps/dgst.c
									
									
									
									
									
								
							@@ -66,6 +66,7 @@
 | 
				
			|||||||
#include <openssl/objects.h>
 | 
					#include <openssl/objects.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef BUFSIZE
 | 
					#undef BUFSIZE
 | 
				
			||||||
#define BUFSIZE	1024*8
 | 
					#define BUFSIZE	1024*8
 | 
				
			||||||
@@ -73,23 +74,36 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	dgst_main
 | 
					#define PROG	dgst_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
void do_fp(unsigned char *buf,BIO *f,int sep);
 | 
					void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, char binout,
 | 
				
			||||||
 | 
							EVP_PKEY *key, unsigned char *sigin, int siglen);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	unsigned char *buf=NULL;
 | 
						unsigned char *buf=NULL;
 | 
				
			||||||
	int i,err=0;
 | 
						int i,err=0;
 | 
				
			||||||
	const EVP_MD *md=NULL,*m;
 | 
						const EVP_MD *md=NULL,*m;
 | 
				
			||||||
	BIO *in=NULL,*inp;
 | 
						BIO *in=NULL,*inp;
 | 
				
			||||||
	BIO *bmd=NULL;
 | 
						BIO *bmd=NULL;
 | 
				
			||||||
 | 
						BIO *out = NULL;
 | 
				
			||||||
	const char *name;
 | 
						const char *name;
 | 
				
			||||||
#define PROG_NAME_SIZE  16
 | 
					#define PROG_NAME_SIZE  16
 | 
				
			||||||
        char pname[PROG_NAME_SIZE];
 | 
						char pname[PROG_NAME_SIZE];
 | 
				
			||||||
	int separator=0;
 | 
						int separator=0;
 | 
				
			||||||
	int debug=0;
 | 
						int debug=0;
 | 
				
			||||||
 | 
						const char *outfile = NULL, *keyfile = NULL;
 | 
				
			||||||
 | 
						const char *sigfile = NULL, *randfile = NULL;
 | 
				
			||||||
 | 
						char out_bin = -1, want_pub = 0, do_verify = 0;
 | 
				
			||||||
 | 
						EVP_PKEY *sigkey = NULL;
 | 
				
			||||||
 | 
						unsigned char *sigbuf = NULL;
 | 
				
			||||||
 | 
						int siglen = 0;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((buf=(unsigned char *)Malloc(BUFSIZE)) == NULL)
 | 
						if ((buf=(unsigned char *)OPENSSL_malloc(BUFSIZE)) == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"out of memory\n");
 | 
							BIO_printf(bio_err,"out of memory\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
@@ -99,7 +113,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* first check the program name */
 | 
						/* first check the program name */
 | 
				
			||||||
        program_name(argv[0],pname,PROG_NAME_SIZE);
 | 
						program_name(argv[0],pname,PROG_NAME_SIZE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	md=EVP_get_digestbyname(pname);
 | 
						md=EVP_get_digestbyname(pname);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -110,6 +124,48 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		if ((*argv)[0] != '-') break;
 | 
							if ((*argv)[0] != '-') break;
 | 
				
			||||||
		if (strcmp(*argv,"-c") == 0)
 | 
							if (strcmp(*argv,"-c") == 0)
 | 
				
			||||||
			separator=1;
 | 
								separator=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-rand") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) break;
 | 
				
			||||||
 | 
								randfile=*(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-out") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) break;
 | 
				
			||||||
 | 
								outfile=*(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-sign") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) break;
 | 
				
			||||||
 | 
								keyfile=*(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-verify") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) break;
 | 
				
			||||||
 | 
								keyfile=*(++argv);
 | 
				
			||||||
 | 
								want_pub = 1;
 | 
				
			||||||
 | 
								do_verify = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-prverify") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) break;
 | 
				
			||||||
 | 
								keyfile=*(++argv);
 | 
				
			||||||
 | 
								do_verify = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-signature") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) break;
 | 
				
			||||||
 | 
								sigfile=*(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) break;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-hex") == 0)
 | 
				
			||||||
 | 
								out_bin = 0;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-binary") == 0)
 | 
				
			||||||
 | 
								out_bin = 1;
 | 
				
			||||||
		else if (strcmp(*argv,"-d") == 0)
 | 
							else if (strcmp(*argv,"-d") == 0)
 | 
				
			||||||
			debug=1;
 | 
								debug=1;
 | 
				
			||||||
		else if ((m=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
 | 
							else if ((m=EVP_get_digestbyname(&((*argv)[1]))) != NULL)
 | 
				
			||||||
@@ -123,14 +179,31 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	if (md == NULL)
 | 
						if (md == NULL)
 | 
				
			||||||
		md=EVP_md5();
 | 
							md=EVP_md5();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(do_verify && !sigfile) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "No signature to verify: use the -signature option\n");
 | 
				
			||||||
 | 
							err = 1; 
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((argc > 0) && (argv[0][0] == '-')) /* bad option */
 | 
						if ((argc > 0) && (argv[0][0] == '-')) /* bad option */
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"unknown option '%s'\n",*argv);
 | 
							BIO_printf(bio_err,"unknown option '%s'\n",*argv);
 | 
				
			||||||
		BIO_printf(bio_err,"options are\n");
 | 
							BIO_printf(bio_err,"options are\n");
 | 
				
			||||||
		BIO_printf(bio_err,"-c   to output the digest with separating colons\n");
 | 
							BIO_printf(bio_err,"-c              to output the digest with separating colons\n");
 | 
				
			||||||
		BIO_printf(bio_err,"-d   to output debug info\n");
 | 
							BIO_printf(bio_err,"-d              to output debug info\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-hex            output as hex dump\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-binary         output in binary form\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-sign   file    sign digest using private key in file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-verify file    verify a signature using public key in file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-prverify file  verify a signature using private key in file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-signature file signature to verify\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-binary         output in binary form\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-engine e       use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm (default)\n",
 | 
							BIO_printf(bio_err,"-%3s to use the %s message digest algorithm (default)\n",
 | 
				
			||||||
			LN_md5,LN_md5);
 | 
								LN_md5,LN_md5);
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
				
			||||||
 | 
								LN_md4,LN_md4);
 | 
				
			||||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
							BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
				
			||||||
			LN_md2,LN_md2);
 | 
								LN_md2,LN_md2);
 | 
				
			||||||
		BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
							BIO_printf(bio_err,"-%3s to use the %s message digest algorithm\n",
 | 
				
			||||||
@@ -145,6 +218,24 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
	bmd=BIO_new(BIO_f_md());
 | 
						bmd=BIO_new(BIO_f_md());
 | 
				
			||||||
	if (debug)
 | 
						if (debug)
 | 
				
			||||||
@@ -160,6 +251,80 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(out_bin == -1) {
 | 
				
			||||||
 | 
							if(keyfile) out_bin = 1;
 | 
				
			||||||
 | 
							else out_bin = 0;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(randfile)
 | 
				
			||||||
 | 
							app_RAND_load_file(randfile, bio_err, 0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(outfile) {
 | 
				
			||||||
 | 
							if(out_bin)
 | 
				
			||||||
 | 
								out = BIO_new_file(outfile, "wb");
 | 
				
			||||||
 | 
							else    out = BIO_new_file(outfile, "w");
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!out) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error opening output file %s\n", 
 | 
				
			||||||
 | 
										outfile ? outfile : "(stdout)");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(keyfile) {
 | 
				
			||||||
 | 
							BIO *keybio;
 | 
				
			||||||
 | 
							keybio = BIO_new_file(keyfile, "r");
 | 
				
			||||||
 | 
							if(!keybio) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error opening key file %s\n",
 | 
				
			||||||
 | 
													keyfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							if(want_pub) 
 | 
				
			||||||
 | 
								sigkey = PEM_read_bio_PUBKEY(keybio, NULL, NULL, NULL);
 | 
				
			||||||
 | 
							else sigkey = PEM_read_bio_PrivateKey(keybio, NULL, NULL, NULL);
 | 
				
			||||||
 | 
							BIO_free(keybio);
 | 
				
			||||||
 | 
							if(!sigkey) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error reading key file %s\n",
 | 
				
			||||||
 | 
													keyfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(sigfile && sigkey) {
 | 
				
			||||||
 | 
							BIO *sigbio;
 | 
				
			||||||
 | 
							sigbio = BIO_new_file(sigfile, "rb");
 | 
				
			||||||
 | 
							siglen = EVP_PKEY_size(sigkey);
 | 
				
			||||||
 | 
							sigbuf = OPENSSL_malloc(siglen);
 | 
				
			||||||
 | 
							if(!sigbio) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error opening signature file %s\n",
 | 
				
			||||||
 | 
													sigfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							siglen = BIO_read(sigbio, sigbuf, siglen);
 | 
				
			||||||
 | 
							BIO_free(sigbio);
 | 
				
			||||||
 | 
							if(siglen <= 0) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error reading signature file %s\n",
 | 
				
			||||||
 | 
													sigfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* we use md as a filter, reading from 'in' */
 | 
						/* we use md as a filter, reading from 'in' */
 | 
				
			||||||
	BIO_set_md(bmd,md);
 | 
						BIO_set_md(bmd,md);
 | 
				
			||||||
	inp=BIO_push(bmd,in);
 | 
						inp=BIO_push(bmd,in);
 | 
				
			||||||
@@ -167,7 +332,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	if (argc == 0)
 | 
						if (argc == 0)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
							BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
				
			||||||
		do_fp(buf,inp,separator);
 | 
							do_fp(out, buf,inp,separator, out_bin, sigkey, sigbuf, siglen);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -180,23 +345,28 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
				err++;
 | 
									err++;
 | 
				
			||||||
				continue;
 | 
									continue;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			printf("%s(%s)= ",name,argv[i]);
 | 
								if(!out_bin) BIO_printf(out, "%s(%s)= ",name,argv[i]);
 | 
				
			||||||
			do_fp(buf,inp,separator);
 | 
								do_fp(out, buf,inp,separator, out_bin, sigkey, 
 | 
				
			||||||
			BIO_reset(bmd);
 | 
													sigbuf, siglen);
 | 
				
			||||||
 | 
								(void)BIO_reset(bmd);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (buf != NULL)
 | 
						if (buf != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		memset(buf,0,BUFSIZE);
 | 
							memset(buf,0,BUFSIZE);
 | 
				
			||||||
		Free(buf);
 | 
							OPENSSL_free(buf);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (in != NULL) BIO_free(in);
 | 
						if (in != NULL) BIO_free(in);
 | 
				
			||||||
 | 
						BIO_free_all(out);
 | 
				
			||||||
 | 
						EVP_PKEY_free(sigkey);
 | 
				
			||||||
 | 
						if(sigbuf) OPENSSL_free(sigbuf);
 | 
				
			||||||
	if (bmd != NULL) BIO_free(bmd);
 | 
						if (bmd != NULL) BIO_free(bmd);
 | 
				
			||||||
	EXIT(err);
 | 
						EXIT(err);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
void do_fp(unsigned char *buf, BIO *bp, int sep)
 | 
					void do_fp(BIO *out, unsigned char *buf, BIO *bp, int sep, char binout,
 | 
				
			||||||
 | 
								EVP_PKEY *key, unsigned char *sigin, int siglen)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int len;
 | 
						int len;
 | 
				
			||||||
	int i;
 | 
						int i;
 | 
				
			||||||
@@ -206,14 +376,44 @@ void do_fp(unsigned char *buf, BIO *bp, int sep)
 | 
				
			|||||||
		i=BIO_read(bp,(char *)buf,BUFSIZE);
 | 
							i=BIO_read(bp,(char *)buf,BUFSIZE);
 | 
				
			||||||
		if (i <= 0) break;
 | 
							if (i <= 0) break;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	len=BIO_gets(bp,(char *)buf,BUFSIZE);
 | 
						if(sigin)
 | 
				
			||||||
 | 
					 | 
				
			||||||
	for (i=0; i<len; i++)
 | 
					 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (sep && (i != 0))
 | 
							EVP_MD_CTX *ctx;
 | 
				
			||||||
			putc(':',stdout);
 | 
							BIO_get_md_ctx(bp, &ctx);
 | 
				
			||||||
		printf("%02x",buf[i]);
 | 
							i = EVP_VerifyFinal(ctx, sigin, (unsigned int)siglen, key); 
 | 
				
			||||||
 | 
							if(i > 0) BIO_printf(out, "Verified OK\n");
 | 
				
			||||||
 | 
							else if(i == 0) BIO_printf(out, "Verification Failure\n");
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error Verifying Data\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							return;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if(key)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							EVP_MD_CTX *ctx;
 | 
				
			||||||
 | 
							BIO_get_md_ctx(bp, &ctx);
 | 
				
			||||||
 | 
							if(!EVP_SignFinal(ctx, buf, (unsigned int *)&len, key)) 
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error Signing Data\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								return;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							len=BIO_gets(bp,(char *)buf,BUFSIZE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(binout) BIO_write(out, buf, len);
 | 
				
			||||||
 | 
						else 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							for (i=0; i<len; i++)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (sep && (i != 0))
 | 
				
			||||||
 | 
									BIO_printf(out, ":");
 | 
				
			||||||
 | 
								BIO_printf(out, "%02x",buf[i]);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(out, "\n");
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	printf("\n");
 | 
					 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										63
									
								
								apps/dh.c
									
									
									
									
									
								
							
							
						
						
									
										63
									
								
								apps/dh.c
									
									
									
									
									
								
							@@ -1,4 +1,5 @@
 | 
				
			|||||||
/* apps/dh.c */
 | 
					/* apps/dh.c */
 | 
				
			||||||
 | 
					/* obsoleted by dhparam.c */
 | 
				
			||||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
					/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
				
			||||||
 * All rights reserved.
 | 
					 * All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
@@ -68,11 +69,12 @@
 | 
				
			|||||||
#include <openssl/dh.h>
 | 
					#include <openssl/dh.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	dh_main
 | 
					#define PROG	dh_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* -inform arg	- input format - default PEM (one of DER, TXT or PEM)
 | 
					/* -inform arg	- input format - default PEM (DER or PEM)
 | 
				
			||||||
 * -outform arg - output format - default PEM
 | 
					 * -outform arg - output format - default PEM
 | 
				
			||||||
 * -in arg	- input file - default stdin
 | 
					 * -in arg	- input file - default stdin
 | 
				
			||||||
 * -out arg	- output file - default stdout
 | 
					 * -out arg	- output file - default stdout
 | 
				
			||||||
@@ -82,13 +84,16 @@
 | 
				
			|||||||
 * -C
 | 
					 * -C
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	DH *dh=NULL;
 | 
						DH *dh=NULL;
 | 
				
			||||||
	int i,badops=0,text=0;
 | 
						int i,badops=0,text=0;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL;
 | 
						BIO *in=NULL,*out=NULL;
 | 
				
			||||||
	int informat,outformat,check=0,noout=0,C=0,ret=1;
 | 
						int informat,outformat,check=0,noout=0,C=0,ret=1;
 | 
				
			||||||
	char *infile,*outfile,*prog;
 | 
						char *infile,*outfile,*prog,*engine;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -96,6 +101,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
							if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						engine=NULL;
 | 
				
			||||||
	infile=NULL;
 | 
						infile=NULL;
 | 
				
			||||||
	outfile=NULL;
 | 
						outfile=NULL;
 | 
				
			||||||
	informat=FORMAT_PEM;
 | 
						informat=FORMAT_PEM;
 | 
				
			||||||
@@ -126,6 +132,11 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			outfile= *(++argv);
 | 
								outfile= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-check") == 0)
 | 
							else if (strcmp(*argv,"-check") == 0)
 | 
				
			||||||
			check=1;
 | 
								check=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-text") == 0)
 | 
							else if (strcmp(*argv,"-text") == 0)
 | 
				
			||||||
@@ -149,19 +160,38 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
bad:
 | 
					bad:
 | 
				
			||||||
		BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
							BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
				
			||||||
		BIO_printf(bio_err,"where options are\n");
 | 
							BIO_printf(bio_err,"where options are\n");
 | 
				
			||||||
		BIO_printf(bio_err," -inform arg   input format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -inform arg   input format - one of DER PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -outform arg  output format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -outform arg  output format - one of DER PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -in arg       input file\n");
 | 
							BIO_printf(bio_err," -in arg       input file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -out arg      output file\n");
 | 
							BIO_printf(bio_err," -out arg      output file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -check        check the DH parameters\n");
 | 
							BIO_printf(bio_err," -check        check the DH parameters\n");
 | 
				
			||||||
		BIO_printf(bio_err," -text         print a text form of the DH parameters\n");
 | 
							BIO_printf(bio_err," -text         print a text form of the DH parameters\n");
 | 
				
			||||||
		BIO_printf(bio_err," -C            Output C code\n");
 | 
							BIO_printf(bio_err," -C            Output C code\n");
 | 
				
			||||||
		BIO_printf(bio_err," -noout        no output\n");
 | 
							BIO_printf(bio_err," -noout        no output\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -engine e     use engine e, possibly a hardware device.\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
	out=BIO_new(BIO_s_file());
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
	if ((in == NULL) || (out == NULL))
 | 
						if ((in == NULL) || (out == NULL))
 | 
				
			||||||
@@ -181,7 +211,15 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_write_filename(out,outfile) <= 0)
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -194,7 +232,7 @@ bad:
 | 
				
			|||||||
	if	(informat == FORMAT_ASN1)
 | 
						if	(informat == FORMAT_ASN1)
 | 
				
			||||||
		dh=d2i_DHparams_bio(in,NULL);
 | 
							dh=d2i_DHparams_bio(in,NULL);
 | 
				
			||||||
	else if (informat == FORMAT_PEM)
 | 
						else if (informat == FORMAT_PEM)
 | 
				
			||||||
		dh=PEM_read_bio_DHparams(in,NULL,NULL);
 | 
							dh=PEM_read_bio_DHparams(in,NULL,NULL,NULL);
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"bad input format specified\n");
 | 
							BIO_printf(bio_err,"bad input format specified\n");
 | 
				
			||||||
@@ -219,7 +257,7 @@ bad:
 | 
				
			|||||||
		BN_print(stdout,dh->g);
 | 
							BN_print(stdout,dh->g);
 | 
				
			||||||
		printf("\n");
 | 
							printf("\n");
 | 
				
			||||||
		if (dh->length != 0)
 | 
							if (dh->length != 0)
 | 
				
			||||||
			printf("recomented private length=%ld\n",dh->length);
 | 
								printf("recommended private length=%ld\n",dh->length);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	
 | 
						
 | 
				
			||||||
@@ -232,8 +270,8 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		if (i & DH_CHECK_P_NOT_PRIME)
 | 
							if (i & DH_CHECK_P_NOT_PRIME)
 | 
				
			||||||
			printf("p value is not prime\n");
 | 
								printf("p value is not prime\n");
 | 
				
			||||||
		if (i & DH_CHECK_P_NOT_STRONG_PRIME)
 | 
							if (i & DH_CHECK_P_NOT_SAFE_PRIME)
 | 
				
			||||||
			printf("p value is not a strong prime\n");
 | 
								printf("p value is not a safe prime\n");
 | 
				
			||||||
		if (i & DH_UNABLE_TO_CHECK_GENERATOR)
 | 
							if (i & DH_UNABLE_TO_CHECK_GENERATOR)
 | 
				
			||||||
			printf("unable to check the generator value\n");
 | 
								printf("unable to check the generator value\n");
 | 
				
			||||||
		if (i & DH_NOT_SUITABLE_GENERATOR)
 | 
							if (i & DH_NOT_SUITABLE_GENERATOR)
 | 
				
			||||||
@@ -248,10 +286,10 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		len=BN_num_bytes(dh->p);
 | 
							len=BN_num_bytes(dh->p);
 | 
				
			||||||
		bits=BN_num_bits(dh->p);
 | 
							bits=BN_num_bits(dh->p);
 | 
				
			||||||
		data=(unsigned char *)Malloc(len);
 | 
							data=(unsigned char *)OPENSSL_malloc(len);
 | 
				
			||||||
		if (data == NULL)
 | 
							if (data == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			perror("Malloc");
 | 
								perror("OPENSSL_malloc");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		l=BN_bn2bin(dh->p,data);
 | 
							l=BN_bn2bin(dh->p,data);
 | 
				
			||||||
@@ -282,6 +320,7 @@ bad:
 | 
				
			|||||||
		printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
 | 
							printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
 | 
				
			||||||
		printf("\t\treturn(NULL);\n");
 | 
							printf("\t\treturn(NULL);\n");
 | 
				
			||||||
		printf("\treturn(dh);\n\t}\n");
 | 
							printf("\treturn(dh);\n\t}\n");
 | 
				
			||||||
 | 
							OPENSSL_free(data);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -297,7 +336,7 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		if (!i)
 | 
							if (!i)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unable to write DH paramaters\n");
 | 
								BIO_printf(bio_err,"unable to write DH parameters\n");
 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -305,7 +344,7 @@ bad:
 | 
				
			|||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (in != NULL) BIO_free(in);
 | 
						if (in != NULL) BIO_free(in);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
	if (dh != NULL) DH_free(dh);
 | 
						if (dh != NULL) DH_free(dh);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,5 +1,10 @@
 | 
				
			|||||||
-----BEGIN DH PARAMETERS-----
 | 
					-----BEGIN DH PARAMETERS-----
 | 
				
			||||||
MIGHAoGBAJf2QmHKtQXdKCjhPx1ottPb0PMTBH9A6FbaWMsTuKG/K3g6TG1Z1fkq
 | 
					MIGHAoGBAPSI/VhOSdvNILSd5JEHNmszbDgNRR0PfIizHHxbLY7288kjwEPwpVsY
 | 
				
			||||||
/Gz/PWk/eLI9TzFgqVAuPvr3q14a1aZeVUMTgo2oO5/y2UHe6VaJ+trqCTat3xlx
 | 
					jY67VYy4XTjTNP18F1dDox0YbN4zISy1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6
 | 
				
			||||||
/mNbIK9HA2RgPC3gWfVLZQrY+gz3ASHHR5nXWHEyvpuZm7m3h+irAgEC
 | 
					ypUM2Zafq9AKUJsCRtMIPWakXUGfnHy9iUsiGSa6q6Jew1XpL3jHAgEC
 | 
				
			||||||
-----END DH PARAMETERS-----
 | 
					-----END DH PARAMETERS-----
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					These are the 1024 bit DH parameters from "Assigned Number for SKIP Protocols"
 | 
				
			||||||
 | 
					(http://www.skip-vpn.org/spec/numbers.html).
 | 
				
			||||||
 | 
					See there for how they were generated.
 | 
				
			||||||
 | 
					Note that g is not a generator, but this is not a problem since p is a safe prime.
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										12
									
								
								apps/dh2048.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										12
									
								
								apps/dh2048.pem
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,12 @@
 | 
				
			|||||||
 | 
					-----BEGIN DH PARAMETERS-----
 | 
				
			||||||
 | 
					MIIBCAKCAQEA9kJXtwh/CBdyorrWqULzBej5UxE5T7bxbrlLOCDaAadWoxTpj0BV
 | 
				
			||||||
 | 
					89AHxstDqZSt90xkhkn4DIO9ZekX1KHTUPj1WV/cdlJPPT2N286Z4VeSWc39uK50
 | 
				
			||||||
 | 
					T8X8dryDxUcwYc58yWb/Ffm7/ZFexwGq01uejaClcjrUGvC/RgBYK+X0iP1YTknb
 | 
				
			||||||
 | 
					zSC0neSRBzZrM2w4DUUdD3yIsxx8Wy2O9vPJI8BD8KVbGI2Ou1WMuF040zT9fBdX
 | 
				
			||||||
 | 
					Q6MdGGzeMyEstSr/POGxKUAYEY18hKcKctaGxAMZyAcpesqVDNmWn6vQClCbAkbT
 | 
				
			||||||
 | 
					CD1mpF1Bn5x8vYlLIhkmuquiXsNV6TILOwIBAg==
 | 
				
			||||||
 | 
					-----END DH PARAMETERS-----
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					These are the 2048 bit DH parameters from "Assigned Number for SKIP Protocols"
 | 
				
			||||||
 | 
					(http://www.skip-vpn.org/spec/numbers.html).
 | 
				
			||||||
 | 
					See there for how they were generated.
 | 
				
			||||||
							
								
								
									
										18
									
								
								apps/dh4096.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								apps/dh4096.pem
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,18 @@
 | 
				
			|||||||
 | 
					-----BEGIN DH PARAMETERS-----
 | 
				
			||||||
 | 
					MIICCAKCAgEA+hRyUsFN4VpJ1O8JLcCo/VWr19k3BCgJ4uk+d+KhehjdRqNDNyOQ
 | 
				
			||||||
 | 
					l/MOyQNQfWXPeGKmOmIig6Ev/nm6Nf9Z2B1h3R4hExf+zTiHnvVPeRBhjdQi81rt
 | 
				
			||||||
 | 
					Xeoh6TNrSBIKIHfUJWBh3va0TxxjQIs6IZOLeVNRLMqzeylWqMf49HsIXqbcokUS
 | 
				
			||||||
 | 
					Vt1BkvLdW48j8PPv5DsKRN3tloTxqDJGo9tKvj1Fuk74A+Xda1kNhB7KFlqMyN98
 | 
				
			||||||
 | 
					VETEJ6c7KpfOo30mnK30wqw3S8OtaIR/maYX72tGOno2ehFDkq3pnPtEbD2CScxc
 | 
				
			||||||
 | 
					alJC+EL7RPk5c/tgeTvCngvc1KZn92Y//EI7G9tPZtylj2b56sHtMftIoYJ9+ODM
 | 
				
			||||||
 | 
					sccD5Piz/rejE3Ome8EOOceUSCYAhXn8b3qvxVI1ddd1pED6FHRhFvLrZxFvBEM9
 | 
				
			||||||
 | 
					ERRMp5QqOaHJkM+Dxv8Cj6MqrCbfC4u+ZErxodzuusgDgvZiLF22uxMZbobFWyte
 | 
				
			||||||
 | 
					OvOzKGtwcTqO/1wV5gKkzu1ZVswVUQd5Gg8lJicwqRWyyNRczDDoG9jVDxmogKTH
 | 
				
			||||||
 | 
					AaqLulO7R8Ifa1SwF2DteSGVtgWEN8gDpN3RBmmPTDngyF2DHb5qmpnznwtFKdTL
 | 
				
			||||||
 | 
					KWbuHn491xNO25CQWMtem80uKw+pTnisBRF/454n1Jnhub144YRBoN8CAQI=
 | 
				
			||||||
 | 
					-----END DH PARAMETERS-----
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					These are the 4096 bit DH parameters from "Assigned Number for SKIP Protocols"
 | 
				
			||||||
 | 
					(http://www.skip-vpn.org/spec/numbers.html).
 | 
				
			||||||
 | 
					See there for how they were generated.
 | 
				
			||||||
 | 
					Note that g is not a generator, but this is not a problem since p is a safe prime.
 | 
				
			||||||
							
								
								
									
										9
									
								
								apps/dh512.pem
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										9
									
								
								apps/dh512.pem
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,9 @@
 | 
				
			|||||||
 | 
					-----BEGIN DH PARAMETERS-----
 | 
				
			||||||
 | 
					MEYCQQD1Kv884bEpQBgRjXyEpwpy1obEAxnIByl6ypUM2Zafq9AKUJsCRtMIPWak
 | 
				
			||||||
 | 
					XUGfnHy9iUsiGSa6q6Jew1XpKgVfAgEC
 | 
				
			||||||
 | 
					-----END DH PARAMETERS-----
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					These are the 512 bit DH parameters from "Assigned Number for SKIP Protocols"
 | 
				
			||||||
 | 
					(http://www.skip-vpn.org/spec/numbers.html).
 | 
				
			||||||
 | 
					See there for how they were generated.
 | 
				
			||||||
 | 
					Note that g is not a generator, but this is not a problem since p is a safe prime.
 | 
				
			||||||
							
								
								
									
										554
									
								
								apps/dhparam.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										554
									
								
								apps/dhparam.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,554 @@
 | 
				
			|||||||
 | 
					/* apps/dhparam.c */
 | 
				
			||||||
 | 
					/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
				
			||||||
 | 
					 * All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This package is an SSL implementation written
 | 
				
			||||||
 | 
					 * by Eric Young (eay@cryptsoft.com).
 | 
				
			||||||
 | 
					 * The implementation was written so as to conform with Netscapes SSL.
 | 
				
			||||||
 | 
					 * 
 | 
				
			||||||
 | 
					 * This library is free for commercial and non-commercial use as long as
 | 
				
			||||||
 | 
					 * the following conditions are aheared to.  The following conditions
 | 
				
			||||||
 | 
					 * apply to all code found in this distribution, be it the RC4, RSA,
 | 
				
			||||||
 | 
					 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
 | 
				
			||||||
 | 
					 * included with this distribution is covered by the same copyright terms
 | 
				
			||||||
 | 
					 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 * 
 | 
				
			||||||
 | 
					 * Copyright remains Eric Young's, and as such any Copyright notices in
 | 
				
			||||||
 | 
					 * the code are not to be removed.
 | 
				
			||||||
 | 
					 * If this package is used in a product, Eric Young should be given attribution
 | 
				
			||||||
 | 
					 * as the author of the parts of the library used.
 | 
				
			||||||
 | 
					 * This can be in the form of a textual message at program startup or
 | 
				
			||||||
 | 
					 * in documentation (online or textual) provided with the package.
 | 
				
			||||||
 | 
					 * 
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer.
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in the
 | 
				
			||||||
 | 
					 *    documentation and/or other materials provided with the distribution.
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this software
 | 
				
			||||||
 | 
					 *    must display the following acknowledgement:
 | 
				
			||||||
 | 
					 *    "This product includes cryptographic software written by
 | 
				
			||||||
 | 
					 *     Eric Young (eay@cryptsoft.com)"
 | 
				
			||||||
 | 
					 *    The word 'cryptographic' can be left out if the rouines from the library
 | 
				
			||||||
 | 
					 *    being used are not cryptographic related :-).
 | 
				
			||||||
 | 
					 * 4. If you include any Windows specific code (or a derivative thereof) from 
 | 
				
			||||||
 | 
					 *    the apps directory (application code) you must include an acknowledgement:
 | 
				
			||||||
 | 
					 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
 | 
				
			||||||
 | 
					 * 
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
 | 
				
			||||||
 | 
					 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | 
				
			||||||
 | 
					 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 | 
				
			||||||
 | 
					 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | 
				
			||||||
 | 
					 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | 
				
			||||||
 | 
					 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | 
				
			||||||
 | 
					 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | 
				
			||||||
 | 
					 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | 
				
			||||||
 | 
					 * SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * 
 | 
				
			||||||
 | 
					 * The licence and distribution terms for any publically available version or
 | 
				
			||||||
 | 
					 * derivative of this code cannot be changed.  i.e. this code cannot simply be
 | 
				
			||||||
 | 
					 * copied and put under another distribution licence
 | 
				
			||||||
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright (c) 1998-2000 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer. 
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in
 | 
				
			||||||
 | 
					 *    the documentation and/or other materials provided with the
 | 
				
			||||||
 | 
					 *    distribution.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this
 | 
				
			||||||
 | 
					 *    software must display the following acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
				
			||||||
 | 
					 *    endorse or promote products derived from this software without
 | 
				
			||||||
 | 
					 *    prior written permission. For written permission, please contact
 | 
				
			||||||
 | 
					 *    openssl-core@openssl.org.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 5. Products derived from this software may not be called "OpenSSL"
 | 
				
			||||||
 | 
					 *    nor may "OpenSSL" appear in their names without prior written
 | 
				
			||||||
 | 
					 *    permission of the OpenSSL Project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 6. Redistributions of any form whatsoever must retain the following
 | 
				
			||||||
 | 
					 *    acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit (http://www.openssl.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
				
			||||||
 | 
					 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
				
			||||||
 | 
					 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
				
			||||||
 | 
					 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
				
			||||||
 | 
					 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
				
			||||||
 | 
					 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
				
			||||||
 | 
					 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
				
			||||||
 | 
					 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
				
			||||||
 | 
					 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
				
			||||||
 | 
					 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * ====================================================================
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This product includes cryptographic software written by Eric Young
 | 
				
			||||||
 | 
					 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
				
			||||||
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef NO_DH
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <stdlib.h>
 | 
				
			||||||
 | 
					#include <time.h>
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
 | 
					#include <openssl/dh.h>
 | 
				
			||||||
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef NO_DSA
 | 
				
			||||||
 | 
					#include <openssl/dsa.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#undef PROG
 | 
				
			||||||
 | 
					#define PROG	dhparam_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define DEFBITS	512
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* -inform arg	- input format - default PEM (DER or PEM)
 | 
				
			||||||
 | 
					 * -outform arg - output format - default PEM
 | 
				
			||||||
 | 
					 * -in arg	- input file - default stdin
 | 
				
			||||||
 | 
					 * -out arg	- output file - default stdout
 | 
				
			||||||
 | 
					 * -dsaparam  - read or generate DSA parameters, convert to DH
 | 
				
			||||||
 | 
					 * -check	- check the parameters are ok
 | 
				
			||||||
 | 
					 * -noout
 | 
				
			||||||
 | 
					 * -text
 | 
				
			||||||
 | 
					 * -C
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void MS_CALLBACK dh_cb(int p, int n, void *arg);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
 | 
						DH *dh=NULL;
 | 
				
			||||||
 | 
						int i,badops=0,text=0;
 | 
				
			||||||
 | 
					#ifndef NO_DSA
 | 
				
			||||||
 | 
						int dsaparam=0;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						BIO *in=NULL,*out=NULL;
 | 
				
			||||||
 | 
						int informat,outformat,check=0,noout=0,C=0,ret=1;
 | 
				
			||||||
 | 
						char *infile,*outfile,*prog;
 | 
				
			||||||
 | 
						char *inrand=NULL,*engine=NULL;
 | 
				
			||||||
 | 
						int num = 0, g = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (bio_err == NULL)
 | 
				
			||||||
 | 
							if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						infile=NULL;
 | 
				
			||||||
 | 
						outfile=NULL;
 | 
				
			||||||
 | 
						informat=FORMAT_PEM;
 | 
				
			||||||
 | 
						outformat=FORMAT_PEM;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						prog=argv[0];
 | 
				
			||||||
 | 
						argc--;
 | 
				
			||||||
 | 
						argv++;
 | 
				
			||||||
 | 
						while (argc >= 1)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if 	(strcmp(*argv,"-inform") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								informat=str2fmt(*(++argv));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-outform") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								outformat=str2fmt(*(++argv));
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-in") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								infile= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-out") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								outfile= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-check") == 0)
 | 
				
			||||||
 | 
								check=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-text") == 0)
 | 
				
			||||||
 | 
								text=1;
 | 
				
			||||||
 | 
					#ifndef NO_DSA
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-dsaparam") == 0)
 | 
				
			||||||
 | 
								dsaparam=1;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-C") == 0)
 | 
				
			||||||
 | 
								C=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-noout") == 0)
 | 
				
			||||||
 | 
								noout=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-2") == 0)
 | 
				
			||||||
 | 
								g=2;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-5") == 0)
 | 
				
			||||||
 | 
								g=5;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-rand") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								inrand= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (((sscanf(*argv,"%d",&num) == 0) || (num <= 0)))
 | 
				
			||||||
 | 
								goto bad;
 | 
				
			||||||
 | 
							argv++;
 | 
				
			||||||
 | 
							argc--;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (badops)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
					bad:
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"%s [options] [numbits]\n",prog);
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"where options are\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -inform arg   input format - one of DER PEM\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -outform arg  output format - one of DER PEM\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -in arg       input file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -out arg      output file\n");
 | 
				
			||||||
 | 
					#ifndef NO_DSA
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -dsaparam     read or generate DSA parameters, convert to DH\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -check        check the DH parameters\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -text         print a text form of the DH parameters\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -C            Output C code\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -2            generate parameters using  2 as the generator value\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -5            generate parameters using  5 as the generator value\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," numbits       number of bits in to generate (default 512)\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -engine e     use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"               - load the file (or the files in the directory) into\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"               the random number generator\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -noout        no output\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (g && !num)
 | 
				
			||||||
 | 
							num = DEFBITS;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef NO_DSA
 | 
				
			||||||
 | 
						if (dsaparam)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (g)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "generator may not be chosen for DSA parameters\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							/* DH parameters */
 | 
				
			||||||
 | 
							if (num && !g)
 | 
				
			||||||
 | 
								g = 2;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(num) {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (inrand != NULL)
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
 | 
									app_RAND_load_files(inrand));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef NO_DSA
 | 
				
			||||||
 | 
							if (dsaparam)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								DSA *dsa;
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
 | 
				
			||||||
 | 
								dsa = DSA_generate_parameters(num, NULL, 0, NULL, NULL, dh_cb, bio_err);
 | 
				
			||||||
 | 
								if (dsa == NULL)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								dh = DSA_dup_DH(dsa);
 | 
				
			||||||
 | 
								DSA_free(dsa);
 | 
				
			||||||
 | 
								if (dh == NULL)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"Generating DH parameters, %d bit long safe prime, generator %d\n",num,g);
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"This is going to take a long time\n");
 | 
				
			||||||
 | 
								dh=DH_generate_parameters(num,g,dh_cb,bio_err);
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
								if (dh == NULL)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							in=BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
							if (in == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (infile == NULL)
 | 
				
			||||||
 | 
								BIO_set_fp(in,stdin,BIO_NOCLOSE);
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (BIO_read_filename(in,infile) <= 0)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									perror(infile);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if	(informat != FORMAT_ASN1 && informat != FORMAT_PEM)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"bad input format specified\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef NO_DSA
 | 
				
			||||||
 | 
							if (dsaparam)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								DSA *dsa;
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
								if (informat == FORMAT_ASN1)
 | 
				
			||||||
 | 
									dsa=d2i_DSAparams_bio(in,NULL);
 | 
				
			||||||
 | 
								else /* informat == FORMAT_PEM */
 | 
				
			||||||
 | 
									dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL);
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
								if (dsa == NULL)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(bio_err,"unable to load DSA parameters\n");
 | 
				
			||||||
 | 
									ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
								dh = DSA_dup_DH(dsa);
 | 
				
			||||||
 | 
								DSA_free(dsa);
 | 
				
			||||||
 | 
								if (dh == NULL)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (informat == FORMAT_ASN1)
 | 
				
			||||||
 | 
									dh=d2i_DHparams_bio(in,NULL);
 | 
				
			||||||
 | 
								else /* informat == FORMAT_PEM */
 | 
				
			||||||
 | 
									dh=PEM_read_bio_DHparams(in,NULL,NULL,NULL);
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
								if (dh == NULL)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(bio_err,"unable to load DH parameters\n");
 | 
				
			||||||
 | 
									ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							/* dh != NULL */
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
						if (out == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror(outfile);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (text)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							DHparams_print(out,dh);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (check)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!DH_check(dh,&i))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (i & DH_CHECK_P_NOT_PRIME)
 | 
				
			||||||
 | 
								printf("p value is not prime\n");
 | 
				
			||||||
 | 
							if (i & DH_CHECK_P_NOT_SAFE_PRIME)
 | 
				
			||||||
 | 
								printf("p value is not a safe prime\n");
 | 
				
			||||||
 | 
							if (i & DH_UNABLE_TO_CHECK_GENERATOR)
 | 
				
			||||||
 | 
								printf("unable to check the generator value\n");
 | 
				
			||||||
 | 
							if (i & DH_NOT_SUITABLE_GENERATOR)
 | 
				
			||||||
 | 
								printf("the g value is not a generator\n");
 | 
				
			||||||
 | 
							if (i == 0)
 | 
				
			||||||
 | 
								printf("DH parameters appear to be ok.\n");
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (C)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							unsigned char *data;
 | 
				
			||||||
 | 
							int len,l,bits;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							len=BN_num_bytes(dh->p);
 | 
				
			||||||
 | 
							bits=BN_num_bits(dh->p);
 | 
				
			||||||
 | 
							data=(unsigned char *)OPENSSL_malloc(len);
 | 
				
			||||||
 | 
							if (data == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror("OPENSSL_malloc");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							printf("#ifndef HEADER_DH_H\n"
 | 
				
			||||||
 | 
							       "#include <openssl/dh.h>\n"
 | 
				
			||||||
 | 
							       "#endif\n");
 | 
				
			||||||
 | 
							printf("DH *get_dh%d()\n\t{\n",bits);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							l=BN_bn2bin(dh->p,data);
 | 
				
			||||||
 | 
							printf("\tstatic unsigned char dh%d_p[]={",bits);
 | 
				
			||||||
 | 
							for (i=0; i<l; i++)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if ((i%12) == 0) printf("\n\t\t");
 | 
				
			||||||
 | 
								printf("0x%02X,",data[i]);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							printf("\n\t\t};\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							l=BN_bn2bin(dh->g,data);
 | 
				
			||||||
 | 
							printf("\tstatic unsigned char dh%d_g[]={",bits);
 | 
				
			||||||
 | 
							for (i=0; i<l; i++)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if ((i%12) == 0) printf("\n\t\t");
 | 
				
			||||||
 | 
								printf("0x%02X,",data[i]);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							printf("\n\t\t};\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							printf("\tDH *dh;\n\n");
 | 
				
			||||||
 | 
							printf("\tif ((dh=DH_new()) == NULL) return(NULL);\n");
 | 
				
			||||||
 | 
							printf("\tdh->p=BN_bin2bn(dh%d_p,sizeof(dh%d_p),NULL);\n",
 | 
				
			||||||
 | 
								bits,bits);
 | 
				
			||||||
 | 
							printf("\tdh->g=BN_bin2bn(dh%d_g,sizeof(dh%d_g),NULL);\n",
 | 
				
			||||||
 | 
								bits,bits);
 | 
				
			||||||
 | 
							printf("\tif ((dh->p == NULL) || (dh->g == NULL))\n");
 | 
				
			||||||
 | 
							printf("\t\t{ DH_free(dh); return(NULL); }\n");
 | 
				
			||||||
 | 
							if (dh->length)
 | 
				
			||||||
 | 
								printf("\tdh->length = %d;\n", dh->length);
 | 
				
			||||||
 | 
							printf("\treturn(dh);\n\t}\n");
 | 
				
			||||||
 | 
							OPENSSL_free(data);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!noout)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if 	(outformat == FORMAT_ASN1)
 | 
				
			||||||
 | 
								i=i2d_DHparams_bio(out,dh);
 | 
				
			||||||
 | 
							else if (outformat == FORMAT_PEM)
 | 
				
			||||||
 | 
								i=PEM_write_bio_DHparams(out,dh);
 | 
				
			||||||
 | 
							else	{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (!i)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"unable to write DH parameters\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						ret=0;
 | 
				
			||||||
 | 
					end:
 | 
				
			||||||
 | 
						if (in != NULL) BIO_free(in);
 | 
				
			||||||
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
 | 
						if (dh != NULL) DH_free(dh);
 | 
				
			||||||
 | 
						EXIT(ret);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* dh_cb is identical to dsa_cb in apps/dsaparam.c */
 | 
				
			||||||
 | 
					static void MS_CALLBACK dh_cb(int p, int n, void *arg)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						char c='*';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (p == 0) c='.';
 | 
				
			||||||
 | 
						if (p == 1) c='+';
 | 
				
			||||||
 | 
						if (p == 2) c='*';
 | 
				
			||||||
 | 
						if (p == 3) c='\n';
 | 
				
			||||||
 | 
						BIO_write((BIO *)arg,&c,1);
 | 
				
			||||||
 | 
						(void)BIO_flush((BIO *)arg);
 | 
				
			||||||
 | 
					#ifdef LINT
 | 
				
			||||||
 | 
						p=n;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
							
								
								
									
										123
									
								
								apps/dsa.c
									
									
									
									
									
								
							
							
						
						
									
										123
									
								
								apps/dsa.c
									
									
									
									
									
								
							@@ -68,6 +68,7 @@
 | 
				
			|||||||
#include <openssl/evp.h>
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	dsa_main
 | 
					#define PROG	dsa_main
 | 
				
			||||||
@@ -83,15 +84,21 @@
 | 
				
			|||||||
 * -modulus	- print the DSA public key
 | 
					 * -modulus	- print the DSA public key
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	int ret=1;
 | 
						int ret=1;
 | 
				
			||||||
	DSA *dsa=NULL;
 | 
						DSA *dsa=NULL;
 | 
				
			||||||
	int i,badops=0;
 | 
						int i,badops=0;
 | 
				
			||||||
	const EVP_CIPHER *enc=NULL;
 | 
						const EVP_CIPHER *enc=NULL;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL;
 | 
						BIO *in=NULL,*out=NULL;
 | 
				
			||||||
	int informat,outformat,text=0,noout=0;
 | 
						int informat,outformat,text=0,noout=0;
 | 
				
			||||||
	char *infile,*outfile,*prog;
 | 
						int pubin = 0, pubout = 0;
 | 
				
			||||||
 | 
						char *infile,*outfile,*prog,*engine;
 | 
				
			||||||
 | 
						char *passargin = NULL, *passargout = NULL;
 | 
				
			||||||
 | 
						char *passin = NULL, *passout = NULL;
 | 
				
			||||||
	int modulus=0;
 | 
						int modulus=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
@@ -100,6 +107,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
							if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						engine=NULL;
 | 
				
			||||||
	infile=NULL;
 | 
						infile=NULL;
 | 
				
			||||||
	outfile=NULL;
 | 
						outfile=NULL;
 | 
				
			||||||
	informat=FORMAT_PEM;
 | 
						informat=FORMAT_PEM;
 | 
				
			||||||
@@ -130,12 +138,31 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			outfile= *(++argv);
 | 
								outfile= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passin") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargin= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passout") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargout= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-noout") == 0)
 | 
							else if (strcmp(*argv,"-noout") == 0)
 | 
				
			||||||
			noout=1;
 | 
								noout=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-text") == 0)
 | 
							else if (strcmp(*argv,"-text") == 0)
 | 
				
			||||||
			text=1;
 | 
								text=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-modulus") == 0)
 | 
							else if (strcmp(*argv,"-modulus") == 0)
 | 
				
			||||||
			modulus=1;
 | 
								modulus=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-pubin") == 0)
 | 
				
			||||||
 | 
								pubin=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-pubout") == 0)
 | 
				
			||||||
 | 
								pubout=1;
 | 
				
			||||||
		else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
 | 
							else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
								BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
				
			||||||
@@ -151,23 +178,49 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
bad:
 | 
					bad:
 | 
				
			||||||
		BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
							BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
				
			||||||
		BIO_printf(bio_err,"where options are\n");
 | 
							BIO_printf(bio_err,"where options are\n");
 | 
				
			||||||
		BIO_printf(bio_err," -inform arg   input format - one of DER NET PEM\n");
 | 
							BIO_printf(bio_err," -inform arg     input format - DER or PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -outform arg  output format - one of DER NET PEM\n");
 | 
							BIO_printf(bio_err," -outform arg    output format - DER or PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -in arg       input file\n");
 | 
							BIO_printf(bio_err," -in arg         input file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -out arg      output file\n");
 | 
							BIO_printf(bio_err," -passin arg     input file pass phrase source\n");
 | 
				
			||||||
		BIO_printf(bio_err," -des          encrypt PEM output with cbc des\n");
 | 
							BIO_printf(bio_err," -out arg        output file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -des3         encrypt PEM output with ede cbc des using 168 bit key\n");
 | 
							BIO_printf(bio_err," -passout arg    output file pass phrase source\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -engine e       use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -des            encrypt PEM output with cbc des\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -des3           encrypt PEM output with ede cbc des using 168 bit key\n");
 | 
				
			||||||
#ifndef NO_IDEA
 | 
					#ifndef NO_IDEA
 | 
				
			||||||
		BIO_printf(bio_err," -idea         encrypt PEM output with cbc idea\n");
 | 
							BIO_printf(bio_err," -idea           encrypt PEM output with cbc idea\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		BIO_printf(bio_err," -text         print the key in text\n");
 | 
							BIO_printf(bio_err," -text           print the key in text\n");
 | 
				
			||||||
		BIO_printf(bio_err," -noout        don't print key out\n");
 | 
							BIO_printf(bio_err," -noout          don't print key out\n");
 | 
				
			||||||
		BIO_printf(bio_err," -modulus      print the DSA public value\n");
 | 
							BIO_printf(bio_err," -modulus        print the DSA public value\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting passwords\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
	out=BIO_new(BIO_s_file());
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
	if ((in == NULL) || (out == NULL))
 | 
						if ((in == NULL) || (out == NULL))
 | 
				
			||||||
@@ -187,25 +240,35 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_err,"read DSA private key\n");
 | 
						BIO_printf(bio_err,"read DSA key\n");
 | 
				
			||||||
	if	(informat == FORMAT_ASN1)
 | 
						if	(informat == FORMAT_ASN1) {
 | 
				
			||||||
		dsa=d2i_DSAPrivateKey_bio(in,NULL);
 | 
							if(pubin) dsa=d2i_DSA_PUBKEY_bio(in,NULL);
 | 
				
			||||||
	else if (informat == FORMAT_PEM)
 | 
							else dsa=d2i_DSAPrivateKey_bio(in,NULL);
 | 
				
			||||||
		dsa=PEM_read_bio_DSAPrivateKey(in,NULL,NULL);
 | 
						} else if (informat == FORMAT_PEM) {
 | 
				
			||||||
	else
 | 
							if(pubin) dsa=PEM_read_bio_DSA_PUBKEY(in,NULL, NULL, NULL);
 | 
				
			||||||
 | 
							else dsa=PEM_read_bio_DSAPrivateKey(in,NULL,NULL,passin);
 | 
				
			||||||
 | 
						} else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"bad input format specified for key\n");
 | 
							BIO_printf(bio_err,"bad input format specified for key\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (dsa == NULL)
 | 
						if (dsa == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"unable to load Private Key\n");
 | 
							BIO_printf(bio_err,"unable to load Key\n");
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_write_filename(out,outfile) <= 0)
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -231,12 +294,16 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (noout) goto end;
 | 
						if (noout) goto end;
 | 
				
			||||||
	BIO_printf(bio_err,"writing DSA private key\n");
 | 
						BIO_printf(bio_err,"writing DSA key\n");
 | 
				
			||||||
	if 	(outformat == FORMAT_ASN1)
 | 
						if 	(outformat == FORMAT_ASN1) {
 | 
				
			||||||
		i=i2d_DSAPrivateKey_bio(out,dsa);
 | 
							if(pubin || pubout) i=i2d_DSA_PUBKEY_bio(out,dsa);
 | 
				
			||||||
	else if (outformat == FORMAT_PEM)
 | 
							else i=i2d_DSAPrivateKey_bio(out,dsa);
 | 
				
			||||||
		i=PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL);
 | 
						} else if (outformat == FORMAT_PEM) {
 | 
				
			||||||
	else	{
 | 
							if(pubin || pubout)
 | 
				
			||||||
 | 
								i=PEM_write_bio_DSA_PUBKEY(out,dsa);
 | 
				
			||||||
 | 
							else i=PEM_write_bio_DSAPrivateKey(out,dsa,enc,
 | 
				
			||||||
 | 
												NULL,0,NULL, passout);
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
		BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
							BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -248,9 +315,11 @@ bad:
 | 
				
			|||||||
	else
 | 
						else
 | 
				
			||||||
		ret=0;
 | 
							ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (in != NULL) BIO_free(in);
 | 
						if(in != NULL) BIO_free(in);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if(out != NULL) BIO_free_all(out);
 | 
				
			||||||
	if (dsa != NULL) DSA_free(dsa);
 | 
						if(dsa != NULL) DSA_free(dsa);
 | 
				
			||||||
 | 
						if(passin) OPENSSL_free(passin);
 | 
				
			||||||
 | 
						if(passout) OPENSSL_free(passout);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -57,6 +57,7 @@
 | 
				
			|||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef NO_DSA
 | 
					#ifndef NO_DSA
 | 
				
			||||||
 | 
					#include <assert.h>
 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
#include <time.h>
 | 
					#include <time.h>
 | 
				
			||||||
@@ -65,15 +66,15 @@
 | 
				
			|||||||
#include <openssl/bio.h>
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/bn.h>
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
#include <openssl/rand.h>
 | 
					 | 
				
			||||||
#include <openssl/dsa.h>
 | 
					#include <openssl/dsa.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	dsaparam_main
 | 
					#define PROG	dsaparam_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* -inform arg	- input format - default PEM (one of DER, TXT or PEM)
 | 
					/* -inform arg	- input format - default PEM (DER or PEM)
 | 
				
			||||||
 * -outform arg - output format - default PEM
 | 
					 * -outform arg - output format - default PEM
 | 
				
			||||||
 * -in arg	- input file - default stdin
 | 
					 * -in arg	- input file - default stdin
 | 
				
			||||||
 * -out arg	- output file - default stdout
 | 
					 * -out arg	- output file - default stdout
 | 
				
			||||||
@@ -84,16 +85,20 @@
 | 
				
			|||||||
 * -genkey
 | 
					 * -genkey
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK dsa_cb(int p, int n, char *arg);
 | 
					static void MS_CALLBACK dsa_cb(int p, int n, void *arg);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	DSA *dsa=NULL;
 | 
						DSA *dsa=NULL;
 | 
				
			||||||
	int i,badops=0,text=0;
 | 
						int i,badops=0,text=0;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL;
 | 
						BIO *in=NULL,*out=NULL;
 | 
				
			||||||
	int informat,outformat,noout=0,C=0,ret=1;
 | 
						int informat,outformat,noout=0,C=0,ret=1;
 | 
				
			||||||
	char *infile,*outfile,*prog,*inrand=NULL;
 | 
						char *infile,*outfile,*prog,*inrand=NULL,*engine=NULL;
 | 
				
			||||||
	int numbits= -1,num,genkey=0;
 | 
						int numbits= -1,num,genkey=0;
 | 
				
			||||||
	char buffer[200],*randfile=NULL;
 | 
						int need_rand=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -136,11 +141,15 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		else if (strcmp(*argv,"-C") == 0)
 | 
							else if (strcmp(*argv,"-C") == 0)
 | 
				
			||||||
			C=1;
 | 
								C=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-genkey") == 0)
 | 
							else if (strcmp(*argv,"-genkey") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			genkey=1;
 | 
								genkey=1;
 | 
				
			||||||
 | 
								need_rand=1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-rand") == 0)
 | 
							else if (strcmp(*argv,"-rand") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			inrand= *(++argv);
 | 
								inrand= *(++argv);
 | 
				
			||||||
 | 
								need_rand=1;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-noout") == 0)
 | 
							else if (strcmp(*argv,"-noout") == 0)
 | 
				
			||||||
			noout=1;
 | 
								noout=1;
 | 
				
			||||||
@@ -148,6 +157,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			{
 | 
								{
 | 
				
			||||||
			/* generate a key */
 | 
								/* generate a key */
 | 
				
			||||||
			numbits=num;
 | 
								numbits=num;
 | 
				
			||||||
 | 
								need_rand=1;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -164,11 +174,11 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
bad:
 | 
					bad:
 | 
				
			||||||
		BIO_printf(bio_err,"%s [options] [bits] <infile >outfile\n",prog);
 | 
							BIO_printf(bio_err,"%s [options] [bits] <infile >outfile\n",prog);
 | 
				
			||||||
		BIO_printf(bio_err,"where options are\n");
 | 
							BIO_printf(bio_err,"where options are\n");
 | 
				
			||||||
		BIO_printf(bio_err," -inform arg   input format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -inform arg   input format - DER or PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -outform arg  output format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -outform arg  output format - DER or PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -in arg       input file\n");
 | 
							BIO_printf(bio_err," -in arg       input file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -out arg      output file\n");
 | 
							BIO_printf(bio_err," -out arg      output file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -text         check the DSA parameters\n");
 | 
							BIO_printf(bio_err," -text         print the key in text\n");
 | 
				
			||||||
		BIO_printf(bio_err," -C            Output C code\n");
 | 
							BIO_printf(bio_err," -C            Output C code\n");
 | 
				
			||||||
		BIO_printf(bio_err," -noout        no output\n");
 | 
							BIO_printf(bio_err," -noout        no output\n");
 | 
				
			||||||
		BIO_printf(bio_err," -rand         files to use for random number input\n");
 | 
							BIO_printf(bio_err," -rand         files to use for random number input\n");
 | 
				
			||||||
@@ -197,7 +207,15 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_write_filename(out,outfile) <= 0)
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -207,20 +225,25 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (need_rand)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
				
			||||||
 | 
							if (inrand != NULL)
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
 | 
									app_RAND_load_files(inrand));
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (numbits > 0)
 | 
						if (numbits > 0)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		randfile=RAND_file_name(buffer,200);
 | 
							assert(need_rand);
 | 
				
			||||||
		RAND_load_file(randfile,1024L*1024L);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
 | 
							BIO_printf(bio_err,"Generating DSA parameters, %d bit long prime\n",num);
 | 
				
			||||||
	        BIO_printf(bio_err,"This could take some time\n");
 | 
						        BIO_printf(bio_err,"This could take some time\n");
 | 
				
			||||||
	        dsa=DSA_generate_parameters(num,NULL,0,NULL,NULL,
 | 
						        dsa=DSA_generate_parameters(num,NULL,0,NULL,NULL, dsa_cb,bio_err);
 | 
				
			||||||
			dsa_cb,(char *)bio_err);
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else if	(informat == FORMAT_ASN1)
 | 
						else if	(informat == FORMAT_ASN1)
 | 
				
			||||||
		dsa=d2i_DSAparams_bio(in,NULL);
 | 
							dsa=d2i_DSAparams_bio(in,NULL);
 | 
				
			||||||
	else if (informat == FORMAT_PEM)
 | 
						else if (informat == FORMAT_PEM)
 | 
				
			||||||
		dsa=PEM_read_bio_DSAparams(in,NULL,NULL);
 | 
							dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL);
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"bad input format specified\n");
 | 
							BIO_printf(bio_err,"bad input format specified\n");
 | 
				
			||||||
@@ -247,10 +270,10 @@ bad:
 | 
				
			|||||||
		bits_p=BN_num_bits(dsa->p);
 | 
							bits_p=BN_num_bits(dsa->p);
 | 
				
			||||||
		bits_q=BN_num_bits(dsa->q);
 | 
							bits_q=BN_num_bits(dsa->q);
 | 
				
			||||||
		bits_g=BN_num_bits(dsa->g);
 | 
							bits_g=BN_num_bits(dsa->g);
 | 
				
			||||||
		data=(unsigned char *)Malloc(len+20);
 | 
							data=(unsigned char *)OPENSSL_malloc(len+20);
 | 
				
			||||||
		if (data == NULL)
 | 
							if (data == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			perror("Malloc");
 | 
								perror("OPENSSL_malloc");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		l=BN_bn2bin(dsa->p,data);
 | 
							l=BN_bn2bin(dsa->p,data);
 | 
				
			||||||
@@ -290,7 +313,7 @@ bad:
 | 
				
			|||||||
		printf("\tdsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);\n",
 | 
							printf("\tdsa->g=BN_bin2bn(dsa%d_g,sizeof(dsa%d_g),NULL);\n",
 | 
				
			||||||
			bits_p,bits_p);
 | 
								bits_p,bits_p);
 | 
				
			||||||
		printf("\tif ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))\n");
 | 
							printf("\tif ((dsa->p == NULL) || (dsa->q == NULL) || (dsa->g == NULL))\n");
 | 
				
			||||||
		printf("\t\treturn(NULL);\n");
 | 
							printf("\t\t{ DSA_free(dsa); return(NULL); }\n");
 | 
				
			||||||
		printf("\treturn(dsa);\n\t}\n");
 | 
							printf("\treturn(dsa);\n\t}\n");
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -307,7 +330,7 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		if (!i)
 | 
							if (!i)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unable to write DSA paramaters\n");
 | 
								BIO_printf(bio_err,"unable to write DSA parameters\n");
 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -316,27 +339,30 @@ bad:
 | 
				
			|||||||
		{
 | 
							{
 | 
				
			||||||
		DSA *dsakey;
 | 
							DSA *dsakey;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							assert(need_rand);
 | 
				
			||||||
		if ((dsakey=DSAparams_dup(dsa)) == NULL) goto end;
 | 
							if ((dsakey=DSAparams_dup(dsa)) == NULL) goto end;
 | 
				
			||||||
		if (!DSA_generate_key(dsakey)) goto end;
 | 
							if (!DSA_generate_key(dsakey)) goto end;
 | 
				
			||||||
		if 	(outformat == FORMAT_ASN1)
 | 
							if 	(outformat == FORMAT_ASN1)
 | 
				
			||||||
			i=i2d_DSAPrivateKey_bio(out,dsakey);
 | 
								i=i2d_DSAPrivateKey_bio(out,dsakey);
 | 
				
			||||||
		else if (outformat == FORMAT_PEM)
 | 
							else if (outformat == FORMAT_PEM)
 | 
				
			||||||
			i=PEM_write_bio_DSAPrivateKey(out,dsakey,NULL,NULL,0,NULL);
 | 
								i=PEM_write_bio_DSAPrivateKey(out,dsakey,NULL,NULL,0,NULL,NULL);
 | 
				
			||||||
		else	{
 | 
							else	{
 | 
				
			||||||
			BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
								BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		DSA_free(dsakey);
 | 
							DSA_free(dsakey);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
						if (need_rand)
 | 
				
			||||||
 | 
							app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (in != NULL) BIO_free(in);
 | 
						if (in != NULL) BIO_free(in);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
	if (dsa != NULL) DSA_free(dsa);
 | 
						if (dsa != NULL) DSA_free(dsa);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK dsa_cb(int p, int n, char *arg)
 | 
					static void MS_CALLBACK dsa_cb(int p, int n, void *arg)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char c='*';
 | 
						char c='*';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -344,8 +370,8 @@ static void MS_CALLBACK dsa_cb(int p, int n, char *arg)
 | 
				
			|||||||
	if (p == 1) c='+';
 | 
						if (p == 1) c='+';
 | 
				
			||||||
	if (p == 2) c='*';
 | 
						if (p == 2) c='*';
 | 
				
			||||||
	if (p == 3) c='\n';
 | 
						if (p == 3) c='\n';
 | 
				
			||||||
	BIO_write((BIO *)arg,&c,1);
 | 
						BIO_write(arg,&c,1);
 | 
				
			||||||
	BIO_flush((BIO *)arg);
 | 
						(void)BIO_flush(arg);
 | 
				
			||||||
#ifdef LINT
 | 
					#ifdef LINT
 | 
				
			||||||
	p=n;
 | 
						p=n;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										208
									
								
								apps/enc.c
									
									
									
									
									
								
							
							
						
						
									
										208
									
								
								apps/enc.c
									
									
									
									
									
								
							@@ -65,10 +65,12 @@
 | 
				
			|||||||
#include <openssl/evp.h>
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
#include <openssl/objects.h>
 | 
					#include <openssl/objects.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
 | 
					#include <openssl/rand.h>
 | 
				
			||||||
#ifndef NO_MD5
 | 
					#ifndef NO_MD5
 | 
				
			||||||
#include <openssl/md5.h>
 | 
					#include <openssl/md5.h>
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int set_hex(char *in,unsigned char *out,int size);
 | 
					int set_hex(char *in,unsigned char *out,int size);
 | 
				
			||||||
#undef SIZE
 | 
					#undef SIZE
 | 
				
			||||||
@@ -79,22 +81,29 @@ int set_hex(char *in,unsigned char *out,int size);
 | 
				
			|||||||
#define BSIZE	(8*1024)
 | 
					#define BSIZE	(8*1024)
 | 
				
			||||||
#define	PROG	enc_main
 | 
					#define	PROG	enc_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
 | 
						static const char magic[]="Salted__";
 | 
				
			||||||
 | 
						char mbuf[8];	/* should be 1 smaller than magic */
 | 
				
			||||||
	char *strbuf=NULL;
 | 
						char *strbuf=NULL;
 | 
				
			||||||
	unsigned char *buff=NULL,*bufsize=NULL;
 | 
						unsigned char *buff=NULL,*bufsize=NULL;
 | 
				
			||||||
	int bsize=BSIZE,verbose=0;
 | 
						int bsize=BSIZE,verbose=0;
 | 
				
			||||||
	int ret=1,inl;
 | 
						int ret=1,inl;
 | 
				
			||||||
	unsigned char key[24],iv[MD5_DIGEST_LENGTH];
 | 
						unsigned char key[24],iv[MD5_DIGEST_LENGTH];
 | 
				
			||||||
	char *str=NULL;
 | 
						unsigned char salt[PKCS5_SALT_LEN];
 | 
				
			||||||
	char *hkey=NULL,*hiv=NULL;
 | 
						char *str=NULL, *passarg = NULL, *pass = NULL;
 | 
				
			||||||
 | 
						char *hkey=NULL,*hiv=NULL,*hsalt = NULL;
 | 
				
			||||||
	int enc=1,printkey=0,i,base64=0;
 | 
						int enc=1,printkey=0,i,base64=0;
 | 
				
			||||||
	int debug=0,olb64=0;
 | 
						int debug=0,olb64=0,nosalt=0;
 | 
				
			||||||
	const EVP_CIPHER *cipher=NULL,*c;
 | 
						const EVP_CIPHER *cipher=NULL,*c;
 | 
				
			||||||
	char *inf=NULL,*outf=NULL;
 | 
						char *inf=NULL,*outf=NULL;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL,*b64=NULL,*benc=NULL,*rbio=NULL,*wbio=NULL;
 | 
						BIO *in=NULL,*out=NULL,*b64=NULL,*benc=NULL,*rbio=NULL,*wbio=NULL;
 | 
				
			||||||
#define PROG_NAME_SIZE  16
 | 
					#define PROG_NAME_SIZE  16
 | 
				
			||||||
        char pname[PROG_NAME_SIZE];
 | 
						char pname[PROG_NAME_SIZE];
 | 
				
			||||||
 | 
						char *engine = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -103,7 +112,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* first check the program name */
 | 
						/* first check the program name */
 | 
				
			||||||
        program_name(argv[0],pname,PROG_NAME_SIZE);
 | 
						program_name(argv[0],pname,PROG_NAME_SIZE);
 | 
				
			||||||
	if (strcmp(pname,"base64") == 0)
 | 
						if (strcmp(pname,"base64") == 0)
 | 
				
			||||||
		base64=1;
 | 
							base64=1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -130,14 +139,27 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			outf= *(++argv);
 | 
								outf= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-pass") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passarg= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if	(strcmp(*argv,"-d") == 0)
 | 
							else if	(strcmp(*argv,"-d") == 0)
 | 
				
			||||||
			enc=0;
 | 
								enc=0;
 | 
				
			||||||
		else if	(strcmp(*argv,"-p") == 0)
 | 
							else if	(strcmp(*argv,"-p") == 0)
 | 
				
			||||||
			printkey=1;
 | 
								printkey=1;
 | 
				
			||||||
		else if	(strcmp(*argv,"-v") == 0)
 | 
							else if	(strcmp(*argv,"-v") == 0)
 | 
				
			||||||
			verbose=1;
 | 
								verbose=1;
 | 
				
			||||||
		else if	((strcmp(*argv,"-debug") == 0) ||
 | 
							else if	(strcmp(*argv,"-salt") == 0)
 | 
				
			||||||
			 (strcmp(*argv,"-d") == 0))
 | 
								nosalt=0;
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-nosalt") == 0)
 | 
				
			||||||
 | 
								nosalt=1;
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-debug") == 0)
 | 
				
			||||||
			debug=1;
 | 
								debug=1;
 | 
				
			||||||
		else if	(strcmp(*argv,"-P") == 0)
 | 
							else if	(strcmp(*argv,"-P") == 0)
 | 
				
			||||||
			printkey=2;
 | 
								printkey=2;
 | 
				
			||||||
@@ -194,6 +216,11 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			hkey= *(++argv);
 | 
								hkey= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-S") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								hsalt= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-iv") == 0)
 | 
							else if (strcmp(*argv,"-iv") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -212,7 +239,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
bad:
 | 
					bad:
 | 
				
			||||||
			BIO_printf(bio_err,"options are\n");
 | 
								BIO_printf(bio_err,"options are\n");
 | 
				
			||||||
			BIO_printf(bio_err,"%-14s input file\n","-in <file>");
 | 
								BIO_printf(bio_err,"%-14s input file\n","-in <file>");
 | 
				
			||||||
			BIO_printf(bio_err,"%-14s output fileencrypt\n","-out <file>");
 | 
								BIO_printf(bio_err,"%-14s output file\n","-out <file>");
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"%-14s pass phrase source\n","-pass <arg>");
 | 
				
			||||||
			BIO_printf(bio_err,"%-14s encrypt\n","-e");
 | 
								BIO_printf(bio_err,"%-14s encrypt\n","-e");
 | 
				
			||||||
			BIO_printf(bio_err,"%-14s decrypt\n","-d");
 | 
								BIO_printf(bio_err,"%-14s decrypt\n","-d");
 | 
				
			||||||
			BIO_printf(bio_err,"%-14s base64 encode/decode, depending on encryption flag\n","-a/-base64");
 | 
								BIO_printf(bio_err,"%-14s base64 encode/decode, depending on encryption flag\n","-a/-base64");
 | 
				
			||||||
@@ -221,6 +249,7 @@ bad:
 | 
				
			|||||||
			BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
 | 
								BIO_printf(bio_err,"%-14s key/iv in hex is the next argument\n","-K/-iv");
 | 
				
			||||||
			BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
 | 
								BIO_printf(bio_err,"%-14s print the iv/key (then exit if -P)\n","-[pP]");
 | 
				
			||||||
			BIO_printf(bio_err,"%-14s buffer size\n","-bufsize <n>");
 | 
								BIO_printf(bio_err,"%-14s buffer size\n","-bufsize <n>");
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"%-14s use engine e, possibly a hardware device.\n","-engine e");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			BIO_printf(bio_err,"Cipher Types\n");
 | 
								BIO_printf(bio_err,"Cipher Types\n");
 | 
				
			||||||
			BIO_printf(bio_err,"des     : 56 bit key DES encryption\n");
 | 
								BIO_printf(bio_err,"des     : 56 bit key DES encryption\n");
 | 
				
			||||||
@@ -233,7 +262,7 @@ bad:
 | 
				
			|||||||
			BIO_printf(bio_err,"rc2     :128 bit key RC2 encryption\n");
 | 
								BIO_printf(bio_err,"rc2     :128 bit key RC2 encryption\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
#ifndef NO_BF
 | 
					#ifndef NO_BF
 | 
				
			||||||
			BIO_printf(bio_err,"bf      :128 bit key BlowFish encryption\n");
 | 
								BIO_printf(bio_err,"bf      :128 bit key Blowfish encryption\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
#ifndef NO_RC4
 | 
					#ifndef NO_RC4
 | 
				
			||||||
			BIO_printf(bio_err," -%-5s :128 bit key RC4 encryption\n",
 | 
								BIO_printf(bio_err," -%-5s :128 bit key RC4 encryption\n",
 | 
				
			||||||
@@ -294,6 +323,24 @@ bad:
 | 
				
			|||||||
		argv++;
 | 
							argv++;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bufsize != NULL)
 | 
						if (bufsize != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		unsigned long n;
 | 
							unsigned long n;
 | 
				
			||||||
@@ -323,11 +370,11 @@ bad:
 | 
				
			|||||||
		if (verbose) BIO_printf(bio_err,"bufsize=%d\n",bsize);
 | 
							if (verbose) BIO_printf(bio_err,"bufsize=%d\n",bsize);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	strbuf=Malloc(SIZE);
 | 
						strbuf=OPENSSL_malloc(SIZE);
 | 
				
			||||||
	buff=(unsigned char *)Malloc(EVP_ENCODE_LENGTH(bsize));
 | 
						buff=(unsigned char *)OPENSSL_malloc(EVP_ENCODE_LENGTH(bsize));
 | 
				
			||||||
	if ((buff == NULL) || (strbuf == NULL))
 | 
						if ((buff == NULL) || (strbuf == NULL))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"Malloc failure %ld\n",(long)EVP_ENCODE_LENGTH(bsize));
 | 
							BIO_printf(bio_err,"OPENSSL_malloc failure %ld\n",(long)EVP_ENCODE_LENGTH(bsize));
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -357,6 +404,14 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!str && passarg) {
 | 
				
			||||||
 | 
							if(!app_passwd(bio_err, passarg, NULL, &pass, NULL)) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error getting password\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							str = pass;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((str == NULL) && (cipher != NULL) && (hkey == NULL))
 | 
						if ((str == NULL) && (cipher != NULL) && (hkey == NULL))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		for (;;)
 | 
							for (;;)
 | 
				
			||||||
@@ -386,11 +441,91 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (outf == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (BIO_write_filename(out,outf) <= 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								perror(outf);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						rbio=in;
 | 
				
			||||||
 | 
						wbio=out;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (base64)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if ((b64=BIO_new(BIO_f_base64())) == NULL)
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							if (debug)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_set_callback(b64,BIO_debug_callback);
 | 
				
			||||||
 | 
								BIO_set_callback_arg(b64,bio_err);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (olb64)
 | 
				
			||||||
 | 
								BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL);
 | 
				
			||||||
 | 
							if (enc)
 | 
				
			||||||
 | 
								wbio=BIO_push(b64,wbio);
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								rbio=BIO_push(b64,rbio);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (cipher != NULL)
 | 
						if (cipher != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (str != NULL)
 | 
							if (str != NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			EVP_BytesToKey(cipher,EVP_md5(),NULL,
 | 
								/* Salt handling: if encrypting generate a salt and
 | 
				
			||||||
 | 
								 * write to output BIO. If decrypting read salt from
 | 
				
			||||||
 | 
								 * input BIO.
 | 
				
			||||||
 | 
								 */
 | 
				
			||||||
 | 
								unsigned char *sptr;
 | 
				
			||||||
 | 
								if(nosalt) sptr = NULL;
 | 
				
			||||||
 | 
								else {
 | 
				
			||||||
 | 
									if(enc) {
 | 
				
			||||||
 | 
										if(hsalt) {
 | 
				
			||||||
 | 
											if(!set_hex(hsalt,salt,PKCS5_SALT_LEN)) {
 | 
				
			||||||
 | 
												BIO_printf(bio_err,
 | 
				
			||||||
 | 
													"invalid hex salt value\n");
 | 
				
			||||||
 | 
												goto end;
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
										} else if (RAND_pseudo_bytes(salt, PKCS5_SALT_LEN) < 0)
 | 
				
			||||||
 | 
											goto end;
 | 
				
			||||||
 | 
										/* If -P option then don't bother writing */
 | 
				
			||||||
 | 
										if((printkey != 2)
 | 
				
			||||||
 | 
										   && (BIO_write(wbio,magic,
 | 
				
			||||||
 | 
												 sizeof magic-1) != sizeof magic-1
 | 
				
			||||||
 | 
										       || BIO_write(wbio,
 | 
				
			||||||
 | 
												    (char *)salt,
 | 
				
			||||||
 | 
												    PKCS5_SALT_LEN) != PKCS5_SALT_LEN)) {
 | 
				
			||||||
 | 
											BIO_printf(bio_err,"error writing output file\n");
 | 
				
			||||||
 | 
											goto end;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									} else if(BIO_read(rbio,mbuf,sizeof mbuf) != sizeof mbuf
 | 
				
			||||||
 | 
										  || BIO_read(rbio,
 | 
				
			||||||
 | 
											      (unsigned char *)salt,
 | 
				
			||||||
 | 
									    PKCS5_SALT_LEN) != PKCS5_SALT_LEN) {
 | 
				
			||||||
 | 
										BIO_printf(bio_err,"error reading input file\n");
 | 
				
			||||||
 | 
										goto end;
 | 
				
			||||||
 | 
									} else if(memcmp(mbuf,magic,sizeof magic-1)) {
 | 
				
			||||||
 | 
									    BIO_printf(bio_err,"bad magic number\n");
 | 
				
			||||||
 | 
									    goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									sptr = salt;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								EVP_BytesToKey(cipher,EVP_md5(),sptr,
 | 
				
			||||||
				(unsigned char *)str,
 | 
									(unsigned char *)str,
 | 
				
			||||||
				strlen(str),1,key,iv);
 | 
									strlen(str),1,key,iv);
 | 
				
			||||||
			/* zero the complete buffer or the string
 | 
								/* zero the complete buffer or the string
 | 
				
			||||||
@@ -424,6 +559,13 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
		if (printkey)
 | 
							if (printkey)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
 | 
								if (!nosalt)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									printf("salt=");
 | 
				
			||||||
 | 
									for (i=0; i<PKCS5_SALT_LEN; i++)
 | 
				
			||||||
 | 
										printf("%02X",salt[i]);
 | 
				
			||||||
 | 
									printf("\n");
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			if (cipher->key_len > 0)
 | 
								if (cipher->key_len > 0)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				printf("key=");
 | 
									printf("key=");
 | 
				
			||||||
@@ -446,38 +588,6 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (outf == NULL)
 | 
					 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		if (BIO_write_filename(out,outf) <= 0)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			perror(outf);
 | 
					 | 
				
			||||||
			goto end;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	rbio=in;
 | 
					 | 
				
			||||||
	wbio=out;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (base64)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		if ((b64=BIO_new(BIO_f_base64())) == NULL)
 | 
					 | 
				
			||||||
			goto end;
 | 
					 | 
				
			||||||
		if (debug)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_set_callback(b64,BIO_debug_callback);
 | 
					 | 
				
			||||||
			BIO_set_callback_arg(b64,bio_err);
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		if (olb64)
 | 
					 | 
				
			||||||
			BIO_set_flags(b64,BIO_FLAGS_BASE64_NO_NL);
 | 
					 | 
				
			||||||
		if (enc)
 | 
					 | 
				
			||||||
			wbio=BIO_push(b64,wbio);
 | 
					 | 
				
			||||||
		else
 | 
					 | 
				
			||||||
			rbio=BIO_push(b64,rbio);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/* Only encrypt/decrypt as we write the file */
 | 
						/* Only encrypt/decrypt as we write the file */
 | 
				
			||||||
	if (benc != NULL)
 | 
						if (benc != NULL)
 | 
				
			||||||
		wbio=BIO_push(benc,wbio);
 | 
							wbio=BIO_push(benc,wbio);
 | 
				
			||||||
@@ -505,12 +615,14 @@ bad:
 | 
				
			|||||||
		BIO_printf(bio_err,"bytes written:%8ld\n",BIO_number_written(out));
 | 
							BIO_printf(bio_err,"bytes written:%8ld\n",BIO_number_written(out));
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (strbuf != NULL) Free(strbuf);
 | 
						ERR_print_errors(bio_err);
 | 
				
			||||||
	if (buff != NULL) Free(buff);
 | 
						if (strbuf != NULL) OPENSSL_free(strbuf);
 | 
				
			||||||
 | 
						if (buff != NULL) OPENSSL_free(buff);
 | 
				
			||||||
	if (in != NULL) BIO_free(in);
 | 
						if (in != NULL) BIO_free(in);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
	if (benc != NULL) BIO_free(benc);
 | 
						if (benc != NULL) BIO_free(benc);
 | 
				
			||||||
	if (b64 != NULL) BIO_free(b64);
 | 
						if (b64 != NULL) BIO_free(b64);
 | 
				
			||||||
 | 
						if(pass) OPENSSL_free(pass);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -68,6 +68,8 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	errstr_main
 | 
					#define PROG	errstr_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int i,ret=0;
 | 
						int i,ret=0;
 | 
				
			||||||
@@ -89,12 +91,18 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		out=BIO_new(BIO_s_file());
 | 
							out=BIO_new(BIO_s_file());
 | 
				
			||||||
		if ((out != NULL) && BIO_set_fp(out,stdout,BIO_NOCLOSE))
 | 
							if ((out != NULL) && BIO_set_fp(out,stdout,BIO_NOCLOSE))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
								out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
			lh_node_stats_bio((LHASH *)ERR_get_string_table(),out);
 | 
								lh_node_stats_bio((LHASH *)ERR_get_string_table(),out);
 | 
				
			||||||
			lh_stats_bio((LHASH *)ERR_get_string_table(),out);
 | 
								lh_stats_bio((LHASH *)ERR_get_string_table(),out);
 | 
				
			||||||
			lh_node_usage_stats_bio((LHASH *)
 | 
								lh_node_usage_stats_bio((LHASH *)
 | 
				
			||||||
				ERR_get_string_table(),out);
 | 
									ERR_get_string_table(),out);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		if (out != NULL) BIO_free(out);
 | 
							if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
		argc--;
 | 
							argc--;
 | 
				
			||||||
		argv++;
 | 
							argv++;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -102,7 +110,10 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	for (i=1; i<argc; i++)
 | 
						for (i=1; i<argc; i++)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (sscanf(argv[i],"%lx",&l))
 | 
							if (sscanf(argv[i],"%lx",&l))
 | 
				
			||||||
			printf("%s\n",ERR_error_string(l,buf));
 | 
								{
 | 
				
			||||||
 | 
								ERR_error_string_n(l, buf, sizeof buf);
 | 
				
			||||||
 | 
								printf("%s\n",buf);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			printf("%s: bad error code\n",argv[i]);
 | 
								printf("%s: bad error code\n",argv[i]);
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										104
									
								
								apps/gendh.c
									
									
									
									
									
								
							
							
						
						
									
										104
									
								
								apps/gendh.c
									
									
									
									
									
								
							@@ -1,4 +1,5 @@
 | 
				
			|||||||
/* apps/gendh.c */
 | 
					/* apps/gendh.c */
 | 
				
			||||||
 | 
					/* obsoleted by dhparam.c */
 | 
				
			||||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
					/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
				
			||||||
 * All rights reserved.
 | 
					 * All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
@@ -69,21 +70,25 @@
 | 
				
			|||||||
#include <openssl/dh.h>
 | 
					#include <openssl/dh.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define DEFBITS	512
 | 
					#define DEFBITS	512
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG gendh_main
 | 
					#define PROG gendh_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK dh_cb(int p, int n, char *arg);
 | 
					static void MS_CALLBACK dh_cb(int p, int n, void *arg);
 | 
				
			||||||
static long dh_load_rand(char *names);
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char buffer[200];
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	DH *dh=NULL;
 | 
						DH *dh=NULL;
 | 
				
			||||||
	int ret=1,num=DEFBITS;
 | 
						int ret=1,num=DEFBITS;
 | 
				
			||||||
	int g=2;
 | 
						int g=2;
 | 
				
			||||||
	char *outfile=NULL;
 | 
						char *outfile=NULL;
 | 
				
			||||||
	char *inrand=NULL,*randfile;
 | 
						char *inrand=NULL;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
	BIO *out=NULL;
 | 
						BIO *out=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
@@ -108,6 +113,11 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			g=3; */
 | 
								g=3; */
 | 
				
			||||||
		else if (strcmp(*argv,"-5") == 0)
 | 
							else if (strcmp(*argv,"-5") == 0)
 | 
				
			||||||
			g=5;
 | 
								g=5;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-rand") == 0)
 | 
							else if (strcmp(*argv,"-rand") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -123,15 +133,34 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
bad:
 | 
					bad:
 | 
				
			||||||
		BIO_printf(bio_err,"usage: gendh [args] [numbits]\n");
 | 
							BIO_printf(bio_err,"usage: gendh [args] [numbits]\n");
 | 
				
			||||||
		BIO_printf(bio_err," -out file - output the key to 'file\n");
 | 
							BIO_printf(bio_err," -out file - output the key to 'file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -2    use 2 as the generator value\n");
 | 
							BIO_printf(bio_err," -2        - use 2 as the generator value\n");
 | 
				
			||||||
	/*	BIO_printf(bio_err," -3    use 3 as the generator value\n"); */
 | 
						/*	BIO_printf(bio_err," -3        - use 3 as the generator value\n"); */
 | 
				
			||||||
		BIO_printf(bio_err," -5    use 5 as the generator value\n");
 | 
							BIO_printf(bio_err," -5        - use 5 as the generator value\n");
 | 
				
			||||||
		BIO_printf(bio_err," -rand file:file:...\n");
 | 
							BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
		BIO_printf(bio_err,"           - load the file (or the files in the directory) into\n");
 | 
							BIO_printf(bio_err,"           - load the file (or the files in the directory) into\n");
 | 
				
			||||||
		BIO_printf(bio_err,"             the random number generator\n");
 | 
							BIO_printf(bio_err,"             the random number generator\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		
 | 
							
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	out=BIO_new(BIO_s_file());
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
	if (out == NULL)
 | 
						if (out == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -140,7 +169,15 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_write_filename(out,outfile) <= 0)
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -150,28 +187,21 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	randfile=RAND_file_name(buffer,200);
 | 
						if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
 | 
				
			||||||
	if ((randfile == NULL)|| !RAND_load_file(randfile,1024L*1024L))
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"unable to load 'random state'\n");
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (inrand == NULL)
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
							BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
				
			||||||
			dh_load_rand(inrand));
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
						if (inrand != NULL)
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
 | 
								app_RAND_load_files(inrand));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_err,"Generating DH parameters, %d bit long strong prime, generator of %d\n",num,g);
 | 
						BIO_printf(bio_err,"Generating DH parameters, %d bit long safe prime, generator %d\n",num,g);
 | 
				
			||||||
	BIO_printf(bio_err,"This is going to take a long time\n");
 | 
						BIO_printf(bio_err,"This is going to take a long time\n");
 | 
				
			||||||
	dh=DH_generate_parameters(num,g,dh_cb,(char *)bio_err);
 | 
						dh=DH_generate_parameters(num,g,dh_cb,bio_err);
 | 
				
			||||||
		
 | 
							
 | 
				
			||||||
	if (dh == NULL) goto end;
 | 
						if (dh == NULL) goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (randfile == NULL)
 | 
						app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
		BIO_printf(bio_err,"unable to write 'random state'\n");
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		RAND_write_file(randfile);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!PEM_write_bio_DHparams(out,dh))
 | 
						if (!PEM_write_bio_DHparams(out,dh))
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
@@ -179,12 +209,12 @@ bad:
 | 
				
			|||||||
end:
 | 
					end:
 | 
				
			||||||
	if (ret != 0)
 | 
						if (ret != 0)
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
	if (dh != NULL) DH_free(dh);
 | 
						if (dh != NULL) DH_free(dh);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK dh_cb(int p, int n, char *arg)
 | 
					static void MS_CALLBACK dh_cb(int p, int n, void *arg)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char c='*';
 | 
						char c='*';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -193,31 +223,9 @@ static void MS_CALLBACK dh_cb(int p, int n, char *arg)
 | 
				
			|||||||
	if (p == 2) c='*';
 | 
						if (p == 2) c='*';
 | 
				
			||||||
	if (p == 3) c='\n';
 | 
						if (p == 3) c='\n';
 | 
				
			||||||
	BIO_write((BIO *)arg,&c,1);
 | 
						BIO_write((BIO *)arg,&c,1);
 | 
				
			||||||
	BIO_flush((BIO *)arg);
 | 
						(void)BIO_flush((BIO *)arg);
 | 
				
			||||||
#ifdef LINT
 | 
					#ifdef LINT
 | 
				
			||||||
	p=n;
 | 
						p=n;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					 | 
				
			||||||
static long dh_load_rand(char *name)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	char *p,*n;
 | 
					 | 
				
			||||||
	int last;
 | 
					 | 
				
			||||||
	long tot=0;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	for (;;)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		last=0;
 | 
					 | 
				
			||||||
		for (p=name; ((*p != '\0') && (*p != LIST_SEPARATOR_CHAR)); p++);
 | 
					 | 
				
			||||||
		if (*p == '\0') last=1;
 | 
					 | 
				
			||||||
		*p='\0';
 | 
					 | 
				
			||||||
		n=name;
 | 
					 | 
				
			||||||
		name=p+1;
 | 
					 | 
				
			||||||
		if (*n == '\0') break;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		tot+=RAND_load_file(n,1);
 | 
					 | 
				
			||||||
		if (last) break;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	return(tot);
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										114
									
								
								apps/gendsa.c
									
									
									
									
									
								
							
							
						
						
									
										114
									
								
								apps/gendsa.c
									
									
									
									
									
								
							@@ -63,27 +63,30 @@
 | 
				
			|||||||
#include <sys/stat.h>
 | 
					#include <sys/stat.h>
 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
#include <openssl/bio.h>
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
#include <openssl/rand.h>
 | 
					 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/bn.h>
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
#include <openssl/dsa.h>
 | 
					#include <openssl/dsa.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define DEFBITS	512
 | 
					#define DEFBITS	512
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG gendsa_main
 | 
					#define PROG gendsa_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static long dsa_load_rand(char *names);
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char buffer[200];
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	DSA *dsa=NULL;
 | 
						DSA *dsa=NULL;
 | 
				
			||||||
	int ret=1;
 | 
						int ret=1;
 | 
				
			||||||
	char *outfile=NULL;
 | 
						char *outfile=NULL;
 | 
				
			||||||
	char *inrand=NULL,*randfile,*dsaparams=NULL;
 | 
						char *inrand=NULL,*dsaparams=NULL;
 | 
				
			||||||
 | 
						char *passargout = NULL, *passout = NULL;
 | 
				
			||||||
	BIO *out=NULL,*in=NULL;
 | 
						BIO *out=NULL,*in=NULL;
 | 
				
			||||||
	EVP_CIPHER *enc=NULL;
 | 
						EVP_CIPHER *enc=NULL;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -101,6 +104,16 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			outfile= *(++argv);
 | 
								outfile= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passout") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargout= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-rand") == 0)
 | 
							else if (strcmp(*argv,"-rand") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -108,10 +121,6 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-") == 0)
 | 
							else if (strcmp(*argv,"-") == 0)
 | 
				
			||||||
			goto bad;
 | 
								goto bad;
 | 
				
			||||||
		else if (dsaparams == NULL)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			dsaparams= *argv;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
#ifndef NO_DES
 | 
					#ifndef NO_DES
 | 
				
			||||||
		else if (strcmp(*argv,"-des") == 0)
 | 
							else if (strcmp(*argv,"-des") == 0)
 | 
				
			||||||
			enc=EVP_des_cbc();
 | 
								enc=EVP_des_cbc();
 | 
				
			||||||
@@ -122,6 +131,10 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		else if (strcmp(*argv,"-idea") == 0)
 | 
							else if (strcmp(*argv,"-idea") == 0)
 | 
				
			||||||
			enc=EVP_idea_cbc();
 | 
								enc=EVP_idea_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
							else if (**argv != '-' && dsaparams == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								dsaparams = *argv;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			goto bad;
 | 
								goto bad;
 | 
				
			||||||
		argv++;
 | 
							argv++;
 | 
				
			||||||
@@ -140,7 +153,8 @@ bad:
 | 
				
			|||||||
#ifndef NO_IDEA
 | 
					#ifndef NO_IDEA
 | 
				
			||||||
		BIO_printf(bio_err," -idea     - encrypt the generated key with IDEA in cbc mode\n");
 | 
							BIO_printf(bio_err," -idea     - encrypt the generated key with IDEA in cbc mode\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		BIO_printf(bio_err," -rand file:file:...\n");
 | 
							BIO_printf(bio_err," -engine e - use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
		BIO_printf(bio_err,"           - load the file (or the files in the directory) into\n");
 | 
							BIO_printf(bio_err,"           - load the file (or the files in the directory) into\n");
 | 
				
			||||||
		BIO_printf(bio_err,"             the random number generator\n");
 | 
							BIO_printf(bio_err,"             the random number generator\n");
 | 
				
			||||||
		BIO_printf(bio_err," dsaparam-file\n");
 | 
							BIO_printf(bio_err," dsaparam-file\n");
 | 
				
			||||||
@@ -148,6 +162,30 @@ bad:
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting password\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
	if (!(BIO_read_filename(in,dsaparams)))
 | 
						if (!(BIO_read_filename(in,dsaparams)))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -155,18 +193,27 @@ bad:
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((dsa=PEM_read_bio_DSAparams(in,NULL,NULL)) == NULL)
 | 
						if ((dsa=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"unable to load DSA parameter file\n");
 | 
							BIO_printf(bio_err,"unable to load DSA parameter file\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	BIO_free(in);
 | 
						BIO_free(in);
 | 
				
			||||||
 | 
						in = NULL;
 | 
				
			||||||
		
 | 
							
 | 
				
			||||||
	out=BIO_new(BIO_s_file());
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
	if (out == NULL) goto end;
 | 
						if (out == NULL) goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_write_filename(out,outfile) <= 0)
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -176,57 +223,30 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	randfile=RAND_file_name(buffer,200);
 | 
						if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL)
 | 
				
			||||||
	if ((randfile == NULL)|| !RAND_load_file(randfile,1024L*1024L))
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"unable to load 'random state'\n");
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (inrand == NULL)
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
							BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
				
			||||||
			dsa_load_rand(inrand));
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
						if (inrand != NULL)
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
 | 
								app_RAND_load_files(inrand));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_err,"Generating DSA key, %d bits\n",
 | 
						BIO_printf(bio_err,"Generating DSA key, %d bits\n",
 | 
				
			||||||
							BN_num_bits(dsa->p));
 | 
												BN_num_bits(dsa->p));
 | 
				
			||||||
	if (!DSA_generate_key(dsa)) goto end;
 | 
						if (!DSA_generate_key(dsa)) goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (randfile == NULL)
 | 
						app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
		BIO_printf(bio_err,"unable to write 'random state'\n");
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		RAND_write_file(randfile);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL))
 | 
						if (!PEM_write_bio_DSAPrivateKey(out,dsa,enc,NULL,0,NULL, passout))
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (ret != 0)
 | 
						if (ret != 0)
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if (in != NULL) BIO_free(in);
 | 
				
			||||||
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
	if (dsa != NULL) DSA_free(dsa);
 | 
						if (dsa != NULL) DSA_free(dsa);
 | 
				
			||||||
 | 
						if(passout) OPENSSL_free(passout);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					 | 
				
			||||||
static long dsa_load_rand(char *name)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	char *p,*n;
 | 
					 | 
				
			||||||
	int last;
 | 
					 | 
				
			||||||
	long tot=0;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	for (;;)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		last=0;
 | 
					 | 
				
			||||||
		for (p=name; ((*p != '\0') && (*p != LIST_SEPARATOR_CHAR)); p++);
 | 
					 | 
				
			||||||
		if (*p == '\0') last=1;
 | 
					 | 
				
			||||||
		*p='\0';
 | 
					 | 
				
			||||||
		n=name;
 | 
					 | 
				
			||||||
		name=p+1;
 | 
					 | 
				
			||||||
		if (*n == '\0') break;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		tot+=RAND_load_file(n,1);
 | 
					 | 
				
			||||||
		if (last) break;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	return(tot);
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										154
									
								
								apps/genrsa.c
									
									
									
									
									
								
							
							
						
						
									
										154
									
								
								apps/genrsa.c
									
									
									
									
									
								
							@@ -63,31 +63,35 @@
 | 
				
			|||||||
#include <sys/stat.h>
 | 
					#include <sys/stat.h>
 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
#include <openssl/bio.h>
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
#include <openssl/rand.h>
 | 
					 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/bn.h>
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
#include <openssl/rsa.h>
 | 
					#include <openssl/rsa.h>
 | 
				
			||||||
#include <openssl/evp.h>
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define DEFBITS	512
 | 
					#define DEFBITS	512
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG genrsa_main
 | 
					#define PROG genrsa_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK genrsa_cb(int p, int n, char *arg);
 | 
					static void MS_CALLBACK genrsa_cb(int p, int n, void *arg);
 | 
				
			||||||
static long gr_load_rand(char *names);
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	int ret=1;
 | 
						int ret=1;
 | 
				
			||||||
	char buffer[200];
 | 
					 | 
				
			||||||
	RSA *rsa=NULL;
 | 
						RSA *rsa=NULL;
 | 
				
			||||||
	int i,num=DEFBITS;
 | 
						int i,num=DEFBITS;
 | 
				
			||||||
	long rnum=0,l;
 | 
						long l;
 | 
				
			||||||
	EVP_CIPHER *enc=NULL;
 | 
						EVP_CIPHER *enc=NULL;
 | 
				
			||||||
	unsigned long f4=RSA_F4;
 | 
						unsigned long f4=RSA_F4;
 | 
				
			||||||
	char *outfile=NULL;
 | 
						char *outfile=NULL;
 | 
				
			||||||
	char *inrand=NULL,*randfile;
 | 
						char *passargout = NULL, *passout = NULL;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
 | 
						char *inrand=NULL;
 | 
				
			||||||
	BIO *out=NULL;
 | 
						BIO *out=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
@@ -97,7 +101,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
	if ((out=BIO_new(BIO_s_file())) == NULL)
 | 
						if ((out=BIO_new(BIO_s_file())) == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"unable to creat BIO for output\n");
 | 
							BIO_printf(bio_err,"unable to create BIO for output\n");
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -113,8 +117,13 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-3") == 0)
 | 
							else if (strcmp(*argv,"-3") == 0)
 | 
				
			||||||
			f4=3;
 | 
								f4=3;
 | 
				
			||||||
		else if (strcmp(*argv,"-F4") == 0)
 | 
							else if (strcmp(*argv,"-F4") == 0 || strcmp(*argv,"-f4") == 0)
 | 
				
			||||||
			f4=RSA_F4;
 | 
								f4=RSA_F4;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-rand") == 0)
 | 
							else if (strcmp(*argv,"-rand") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -130,6 +139,11 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		else if (strcmp(*argv,"-idea") == 0)
 | 
							else if (strcmp(*argv,"-idea") == 0)
 | 
				
			||||||
			enc=EVP_idea_cbc();
 | 
								enc=EVP_idea_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passout") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargout= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			break;
 | 
								break;
 | 
				
			||||||
		argv++;
 | 
							argv++;
 | 
				
			||||||
@@ -139,23 +153,57 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		{
 | 
							{
 | 
				
			||||||
bad:
 | 
					bad:
 | 
				
			||||||
		BIO_printf(bio_err,"usage: genrsa [args] [numbits]\n");
 | 
							BIO_printf(bio_err,"usage: genrsa [args] [numbits]\n");
 | 
				
			||||||
		BIO_printf(bio_err," -des      - encrypt the generated key with DES in cbc mode\n");
 | 
							BIO_printf(bio_err," -des            encrypt the generated key with DES in cbc mode\n");
 | 
				
			||||||
		BIO_printf(bio_err," -des3     - encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
 | 
							BIO_printf(bio_err," -des3           encrypt the generated key with DES in ede cbc mode (168 bit key)\n");
 | 
				
			||||||
#ifndef NO_IDEA
 | 
					#ifndef NO_IDEA
 | 
				
			||||||
		BIO_printf(bio_err," -idea     - encrypt the generated key with IDEA in cbc mode\n");
 | 
							BIO_printf(bio_err," -idea           encrypt the generated key with IDEA in cbc mode\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		BIO_printf(bio_err," -out file - output the key to 'file\n");
 | 
							BIO_printf(bio_err," -out file       output the key to 'file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -f4       - use F4 (0x10001) for the E value\n");
 | 
							BIO_printf(bio_err," -passout arg    output file pass phrase source\n");
 | 
				
			||||||
		BIO_printf(bio_err," -3        - use 3 for the E value\n");
 | 
							BIO_printf(bio_err," -f4             use F4 (0x10001) for the E value\n");
 | 
				
			||||||
		BIO_printf(bio_err," -rand file:file:...\n");
 | 
							BIO_printf(bio_err," -3              use 3 for the E value\n");
 | 
				
			||||||
		BIO_printf(bio_err,"           - load the file (or the files in the directory) into\n");
 | 
							BIO_printf(bio_err," -engine e       use engine e, possibly a hardware device.\n");
 | 
				
			||||||
		BIO_printf(bio_err,"             the random number generator\n");
 | 
							BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                 load the file (or the files in the directory) into\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                 the random number generator\n");
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		
 | 
							
 | 
				
			||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!app_passwd(bio_err, NULL, passargout, NULL, &passout)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting password\n");
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_write_filename(out,outfile) <= 0)
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -165,45 +213,24 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef WINDOWS
 | 
						if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
 | 
				
			||||||
	BIO_printf(bio_err,"Loading 'screen' into random state -");
 | 
							&& !RAND_status())
 | 
				
			||||||
	BIO_flush(bio_err);
 | 
					 | 
				
			||||||
	RAND_screen();
 | 
					 | 
				
			||||||
	BIO_printf(bio_err," done\n");
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	randfile=RAND_file_name(buffer,200);
 | 
					 | 
				
			||||||
	if ((randfile == NULL) ||
 | 
					 | 
				
			||||||
		 !(rnum=(long)RAND_load_file(randfile,1024L*1024L)))
 | 
					 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"unable to load 'random state'\n");
 | 
							BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
						if (inrand != NULL)
 | 
				
			||||||
	if (inrand == NULL)
 | 
							BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
		{
 | 
								app_RAND_load_files(inrand));
 | 
				
			||||||
		if (rnum == 0)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		rnum+=gr_load_rand(inrand);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	if (rnum != 0)
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"%ld semi-random bytes loaded\n",rnum);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
 | 
						BIO_printf(bio_err,"Generating RSA private key, %d bit long modulus\n",
 | 
				
			||||||
		num);
 | 
							num);
 | 
				
			||||||
	rsa=RSA_generate_key(num,f4,genrsa_cb,(char *)bio_err);
 | 
						rsa=RSA_generate_key(num,f4,genrsa_cb,bio_err);
 | 
				
			||||||
		
 | 
							
 | 
				
			||||||
	if (randfile == NULL)
 | 
						app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
		BIO_printf(bio_err,"unable to write 'random state'\n");
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		RAND_write_file(randfile);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (rsa == NULL) goto err;
 | 
						if (rsa == NULL) goto err;
 | 
				
			||||||
	
 | 
						
 | 
				
			||||||
	/* We need to do the folloing for when the base number size is <
 | 
						/* We need to do the following for when the base number size is <
 | 
				
			||||||
	 * long, esp windows 3.1 :-(. */
 | 
						 * long, esp windows 3.1 :-(. */
 | 
				
			||||||
	l=0L;
 | 
						l=0L;
 | 
				
			||||||
	for (i=0; i<rsa->e->top; i++)
 | 
						for (i=0; i<rsa->e->top; i++)
 | 
				
			||||||
@@ -215,19 +242,20 @@ bad:
 | 
				
			|||||||
		l+=rsa->e->d[i];
 | 
							l+=rsa->e->d[i];
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	BIO_printf(bio_err,"e is %ld (0x%lX)\n",l,l);
 | 
						BIO_printf(bio_err,"e is %ld (0x%lX)\n",l,l);
 | 
				
			||||||
	if (!PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0,NULL))
 | 
						if (!PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0,NULL, passout))
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	if (rsa != NULL) RSA_free(rsa);
 | 
						if (rsa != NULL) RSA_free(rsa);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
 | 
						if(passout) OPENSSL_free(passout);
 | 
				
			||||||
	if (ret != 0)
 | 
						if (ret != 0)
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK genrsa_cb(int p, int n, char *arg)
 | 
					static void MS_CALLBACK genrsa_cb(int p, int n, void *arg)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char c='*';
 | 
						char c='*';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -236,31 +264,15 @@ static void MS_CALLBACK genrsa_cb(int p, int n, char *arg)
 | 
				
			|||||||
	if (p == 2) c='*';
 | 
						if (p == 2) c='*';
 | 
				
			||||||
	if (p == 3) c='\n';
 | 
						if (p == 3) c='\n';
 | 
				
			||||||
	BIO_write((BIO *)arg,&c,1);
 | 
						BIO_write((BIO *)arg,&c,1);
 | 
				
			||||||
	BIO_flush((BIO *)arg);
 | 
						(void)BIO_flush((BIO *)arg);
 | 
				
			||||||
#ifdef LINT
 | 
					#ifdef LINT
 | 
				
			||||||
	p=n;
 | 
						p=n;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					#else /* !NO_RSA */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static long gr_load_rand(char *name)
 | 
					# if PEDANTIC
 | 
				
			||||||
	{
 | 
					static void *dummy=&dummy;
 | 
				
			||||||
	char *p,*n;
 | 
					# endif
 | 
				
			||||||
	int last;
 | 
					 | 
				
			||||||
	long tot=0;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	for (;;)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		last=0;
 | 
					 | 
				
			||||||
		for (p=name; ((*p != '\0') && (*p != LIST_SEPARATOR_CHAR)); p++);
 | 
					 | 
				
			||||||
		if (*p == '\0') last=1;
 | 
					 | 
				
			||||||
		*p='\0';
 | 
					 | 
				
			||||||
		n=name;
 | 
					 | 
				
			||||||
		name=p+1;
 | 
					 | 
				
			||||||
		if (*n == '\0') break;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		tot+=RAND_load_file(n,1024L*1024L);
 | 
					 | 
				
			||||||
		if (last) break;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	return(tot);
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -79,7 +79,7 @@ $!
 | 
				
			|||||||
$! Define what programs should be compiled
 | 
					$! Define what programs should be compiled
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ PROGRAMS := OPENSSL
 | 
					$ PROGRAMS := OPENSSL
 | 
				
			||||||
$!$ PROGRAMS := VERIFY,ASN1PARS,REQ,DGST,DH,ENC,GENDH,ERRSTR,CA,CRL,-
 | 
					$!$ PROGRAMS := VERIFY,ASN1PARS,REQ,DGST,DH,ENC,PASSWD,GENDH,ERRSTR,CA,CRL,-
 | 
				
			||||||
$!	      RSA,DSA,DSAPARAM,-
 | 
					$!	      RSA,DSA,DSAPARAM,-
 | 
				
			||||||
$!	      X509,GENRSA,GENDSA,S_SERVER,S_CLIENT,SPEED,-
 | 
					$!	      X509,GENRSA,GENDSA,S_SERVER,S_CLIENT,SPEED,-
 | 
				
			||||||
$!	      S_TIME,VERSION,PKCS7,CRL2P7,SESS_ID,CIPHERS,NSEQ,
 | 
					$!	      S_TIME,VERSION,PKCS7,CRL2P7,SESS_ID,CIPHERS,NSEQ,
 | 
				
			||||||
@@ -152,20 +152,18 @@ $ GOSUB CHECK_OPT_FILE
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$! Define The Application Files.
 | 
					$! Define The Application Files.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ LIB_FILES = "VERIFY;ASN1PARS;REQ;DGST;DH;ENC;GENDH;"+-
 | 
					$ LIB_FILES = "VERIFY;ASN1PARS;REQ;DGST;DH;DHPARAM;ENC;PASSWD;GENDH;ERRSTR;"+-
 | 
				
			||||||
	      "ERRSTR;CA;"+-
 | 
						      "CA;PKCS7;CRL2P7;CRL;"+-
 | 
				
			||||||
	      "PKCS7;CRL2P7;CRL;"+-
 | 
						      "RSA;RSAUTL;DSA;DSAPARAM;"+-
 | 
				
			||||||
	      "RSA;DSA;DSAPARAM;"+-
 | 
					 | 
				
			||||||
	      "X509;GENRSA;GENDSA;S_SERVER;S_CLIENT;SPEED;"+-
 | 
						      "X509;GENRSA;GENDSA;S_SERVER;S_CLIENT;SPEED;"+-
 | 
				
			||||||
	      "S_TIME;APPS;S_CB;S_SOCKET;VERSION;SESS_ID;"+-
 | 
						      "S_TIME;APPS;S_CB;S_SOCKET;APP_RAND;VERSION;SESS_ID;"+-
 | 
				
			||||||
	      "CIPHERS;NSEQ;PKCS12"
 | 
						      "CIPHERS;NSEQ;PKCS12;PKCS8;SPKAC;SMIME;RAND"
 | 
				
			||||||
$ APP_FILES := OPENSSL,'OBJ_DIR'VERIFY.OBJ,ASN1PARS.OBJ,REQ.OBJ,DGST.OBJ,DH.OBJ,ENC.OBJ,GENDH.OBJ,-
 | 
					$ APP_FILES := OPENSSL,'OBJ_DIR'VERIFY.OBJ,ASN1PARS.OBJ,REQ.OBJ,DGST.OBJ,DH.OBJ,DHPARAM.OBJ,ENC.OBJ,PASSWD.OBJ,GENDH.OBJ,ERRSTR.OBJ,-
 | 
				
			||||||
	       ERRSTR.OBJ,CA.OBJ,-
 | 
						       CA.OBJ,PKCS7.OBJ,CRL2P7.OBJ,CRL.OBJ,-
 | 
				
			||||||
	       PKCS7.OBJ,CRL2P7.OBJ,CRL.OBJ,-
 | 
						       RSA.OBJ,RSAUTL.OBJ,DSA.OBJ,DSAPARAM.OBJ,-
 | 
				
			||||||
	       RSA.OBJ,DSA.OBJ,DSAPARAM.OBJ,-
 | 
					 | 
				
			||||||
	       X509.OBJ,GENRSA.OBJ,GENDSA.OBJ,S_SERVER.OBJ,S_CLIENT.OBJ,SPEED.OBJ,-
 | 
						       X509.OBJ,GENRSA.OBJ,GENDSA.OBJ,S_SERVER.OBJ,S_CLIENT.OBJ,SPEED.OBJ,-
 | 
				
			||||||
	       S_TIME.OBJ,APPS.OBJ,S_CB.OBJ,S_SOCKET.OBJ,VERSION.OBJ,SESS_ID.OBJ,-
 | 
						       S_TIME.OBJ,APPS.OBJ,S_CB.OBJ,S_SOCKET.OBJ,APP_RAND.OBJ,VERSION.OBJ,SESS_ID.OBJ,-
 | 
				
			||||||
	       CIPHERS.OBJ,NSEQ.OBJ,PKCS12.OBJ
 | 
						       CIPHERS.OBJ,NSEQ.OBJ,PKCS12.OBJ,PKCS8.OBJ,SPKAC.OBJ,SMIME.OBJ,RAND.OBJ
 | 
				
			||||||
$ TCPIP_PROGRAMS = ",,"
 | 
					$ TCPIP_PROGRAMS = ",,"
 | 
				
			||||||
$ IF COMPILER .EQS. "VAXC" THEN -
 | 
					$ IF COMPILER .EQS. "VAXC" THEN -
 | 
				
			||||||
     TCPIP_PROGRAMS = ",OPENSSL,"
 | 
					     TCPIP_PROGRAMS = ",OPENSSL,"
 | 
				
			||||||
@@ -808,12 +806,36 @@ $!
 | 
				
			|||||||
$! Set Up Initial CC Definitions, Possibly With User Ones
 | 
					$! Set Up Initial CC Definitions, Possibly With User Ones
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$ CCDEFS = "VMS=1,MONOLITH"
 | 
					$ CCDEFS = "VMS=1,MONOLITH"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_ASM") THEN CCDEFS = CCDEFS + ",NO_ASM"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_RSA") THEN CCDEFS = CCDEFS + ",NO_RSA"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_DSA") THEN CCDEFS = CCDEFS + ",NO_DSA"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_DH") THEN CCDEFS = CCDEFS + ",NO_DH"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_MD2") THEN CCDEFS = CCDEFS + ",NO_MD2"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_MD5") THEN CCDEFS = CCDEFS + ",NO_MD5"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_RIPEMD") THEN CCDEFS = CCDEFS + ",NO_RIPEMD"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_SHA") THEN CCDEFS = CCDEFS + ",NO_SHA"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_SHA0") THEN CCDEFS = CCDEFS + ",NO_SHA0"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_SHA1") THEN CCDEFS = CCDEFS + ",NO_SHA1"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_DES")
 | 
				
			||||||
 | 
					$ THEN
 | 
				
			||||||
 | 
					$   CCDEFS = CCDEFS + ",NO_DES,NO_MDC2"
 | 
				
			||||||
 | 
					$ ELSE
 | 
				
			||||||
 | 
					$   IF F$TRNLNM("OPENSSL_NO_MDC2") THEN CCDEFS = CCDEFS + ",NO_MDC2"
 | 
				
			||||||
 | 
					$ ENDIF
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_RC2") THEN CCDEFS = CCDEFS + ",NO_RC2"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_RC4") THEN CCDEFS = CCDEFS + ",NO_RC4"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_RC5") THEN CCDEFS = CCDEFS + ",NO_RC5"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_IDEA") THEN CCDEFS = CCDEFS + ",NO_IDEA"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_BF") THEN CCDEFS = CCDEFS + ",NO_BF"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_CAST") THEN CCDEFS = CCDEFS + ",NO_CAST"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_HMAC") THEN CCDEFS = CCDEFS + ",NO_HMAC"
 | 
				
			||||||
 | 
					$ IF F$TRNLNM("OPENSSL_NO_SSL2") THEN CCDEFS = CCDEFS + ",NO_SSL2"
 | 
				
			||||||
$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
 | 
					$ IF F$TYPE(USER_CCDEFS) .NES. "" THEN CCDEFS = CCDEFS + "," + USER_CCDEFS
 | 
				
			||||||
$ CCEXTRAFLAGS = ""
 | 
					$ CCEXTRAFLAGS = ""
 | 
				
			||||||
$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
 | 
					$ IF F$TYPE(USER_CCFLAGS) .NES. "" THEN CCEXTRAFLAGS = USER_CCFLAGS
 | 
				
			||||||
$ CCDISABLEWARNINGS = ""
 | 
					$ CCDISABLEWARNINGS = "LONGLONGTYPE,LONGLONGSUFX"
 | 
				
			||||||
$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. "" THEN -
 | 
					$ IF F$TYPE(USER_CCDISABLEWARNINGS) .NES. "" THEN -
 | 
				
			||||||
	CCDISABLEWARNINGS = USER_CCDISABLEWARNINGS
 | 
						CCDISABLEWARNINGS = CCDISABLEWARNINGS + "," + USER_CCDISABLEWARNINGS
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!  Check To See If The User Entered A Valid Paramter.
 | 
					$!  Check To See If The User Entered A Valid Paramter.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
@@ -900,7 +922,8 @@ $     WRITE SYS$OUTPUT "Using GNU 'C' Compiler."
 | 
				
			|||||||
$!
 | 
					$!
 | 
				
			||||||
$!    Use GNU C...
 | 
					$!    Use GNU C...
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$     CC = "GCC/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + CCEXTRAFLAGS
 | 
					$     IF F$TYPE(GCC) .EQS. "" THEN GCC := GCC
 | 
				
			||||||
 | 
					$     CC = GCC+"/NOCASE_HACK/''GCC_OPTIMIZE'/''DEBUGGER'/NOLIST" + CCEXTRAFLAGS
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
$!    Define The Linker Options File Name.
 | 
					$!    Define The Linker Options File Name.
 | 
				
			||||||
$!
 | 
					$!
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										49
									
								
								apps/nseq.c
									
									
									
									
									
								
							
							
						
						
									
										49
									
								
								apps/nseq.c
									
									
									
									
									
								
							@@ -65,7 +65,7 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG nseq_main
 | 
					#define PROG nseq_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int dump_cert_text(BIO *out, X509 *x);
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
@@ -99,9 +99,9 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		BIO_printf (bio_err, "Netscape certificate sequence utility\n");
 | 
							BIO_printf (bio_err, "Netscape certificate sequence utility\n");
 | 
				
			||||||
		BIO_printf (bio_err, "Usage nseq [options]\n");
 | 
							BIO_printf (bio_err, "Usage nseq [options]\n");
 | 
				
			||||||
		BIO_printf (bio_err, "where options are\n");
 | 
							BIO_printf (bio_err, "where options are\n");
 | 
				
			||||||
                BIO_printf (bio_err, "-in file  input file\n");
 | 
							BIO_printf (bio_err, "-in file  input file\n");
 | 
				
			||||||
                BIO_printf (bio_err, "-out file output file\n");
 | 
							BIO_printf (bio_err, "-out file output file\n");
 | 
				
			||||||
                BIO_printf (bio_err, "-toseq    output NS Sequence file\n");
 | 
							BIO_printf (bio_err, "-toseq    output NS Sequence file\n");
 | 
				
			||||||
		EXIT(1);
 | 
							EXIT(1);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -119,15 +119,22 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
				 "Can't open output file %s\n", outfile);
 | 
									 "Can't open output file %s\n", outfile);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	} else out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
						} else {
 | 
				
			||||||
 | 
							out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
	if (toseq) {
 | 
						if (toseq) {
 | 
				
			||||||
		seq = NETSCAPE_CERT_SEQUENCE_new();
 | 
							seq = NETSCAPE_CERT_SEQUENCE_new();
 | 
				
			||||||
		seq->certs = sk_new(NULL);
 | 
							seq->certs = sk_X509_new_null();
 | 
				
			||||||
		while((x509 = PEM_read_bio_X509(in, NULL, NULL))) 
 | 
							while((x509 = PEM_read_bio_X509(in, NULL, NULL, NULL))) 
 | 
				
			||||||
					sk_push(seq->certs, (char *)x509);
 | 
							    sk_X509_push(seq->certs,x509);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if(!sk_num(seq->certs))
 | 
							if(!sk_X509_num(seq->certs))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
			BIO_printf (bio_err, "Error reading certs file %s\n", infile);
 | 
								BIO_printf (bio_err, "Error reading certs file %s\n", infile);
 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
@@ -138,37 +145,23 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!(seq = PEM_read_bio_NETSCAPE_CERT_SEQUENCE(in, NULL, NULL))) {
 | 
						if (!(seq = PEM_read_bio_NETSCAPE_CERT_SEQUENCE(in, NULL, NULL, NULL))) {
 | 
				
			||||||
		BIO_printf (bio_err, "Error reading sequence file %s\n", infile);
 | 
							BIO_printf (bio_err, "Error reading sequence file %s\n", infile);
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	for(i = 0; i < sk_num(seq->certs); i++) {
 | 
						for(i = 0; i < sk_X509_num(seq->certs); i++) {
 | 
				
			||||||
		x509 = (X509 *) sk_value(seq->certs, i);
 | 
							x509 = sk_X509_value(seq->certs, i);
 | 
				
			||||||
		dump_cert_text(out, x509);
 | 
							dump_cert_text(out, x509);
 | 
				
			||||||
		PEM_write_bio_X509(out, x509);
 | 
							PEM_write_bio_X509(out, x509);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	ret = 0;
 | 
						ret = 0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	BIO_free(in);
 | 
						BIO_free(in);
 | 
				
			||||||
	BIO_free(out);
 | 
						BIO_free_all(out);
 | 
				
			||||||
	NETSCAPE_CERT_SEQUENCE_free(seq);
 | 
						NETSCAPE_CERT_SEQUENCE_free(seq);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int dump_cert_text(BIO *out, X509 *x)
 | 
					 | 
				
			||||||
{
 | 
					 | 
				
			||||||
        char buf[256];
 | 
					 | 
				
			||||||
        X509_NAME_oneline(X509_get_subject_name(x),buf,256);
 | 
					 | 
				
			||||||
        BIO_puts(out,"subject=");
 | 
					 | 
				
			||||||
        BIO_puts(out,buf);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
        X509_NAME_oneline(X509_get_issuer_name(x),buf,256);
 | 
					 | 
				
			||||||
        BIO_puts(out,"\nissuer= ");
 | 
					 | 
				
			||||||
        BIO_puts(out,buf);
 | 
					 | 
				
			||||||
        BIO_puts(out,"\n");
 | 
					 | 
				
			||||||
        return 0;
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
@@ -86,6 +86,19 @@ distinguished_name	= req_distinguished_name
 | 
				
			|||||||
attributes		= req_attributes
 | 
					attributes		= req_attributes
 | 
				
			||||||
x509_extensions	= v3_ca	# The extentions to add to the self signed cert
 | 
					x509_extensions	= v3_ca	# The extentions to add to the self signed cert
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# This sets the permitted types in a DirectoryString. There are several
 | 
				
			||||||
 | 
					# options. 
 | 
				
			||||||
 | 
					# default: PrintableString, T61String, BMPString.
 | 
				
			||||||
 | 
					# pkix	 : PrintableString, BMPString.
 | 
				
			||||||
 | 
					# utf8only: only UTF8Strings.
 | 
				
			||||||
 | 
					# nobmp : PrintableString, T61String (no BMPStrings).
 | 
				
			||||||
 | 
					# MASK:XXXX a literal mask value.
 | 
				
			||||||
 | 
					# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
 | 
				
			||||||
 | 
					# so use this option with caution!
 | 
				
			||||||
 | 
					dirstring_type = nobmp
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# req_extensions = v3_req # The extensions to add to a certificate request
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[ req_distinguished_name ]
 | 
					[ req_distinguished_name ]
 | 
				
			||||||
countryName			= Country Name (2 letter code)
 | 
					countryName			= Country Name (2 letter code)
 | 
				
			||||||
countryName_default		= AU
 | 
					countryName_default		= AU
 | 
				
			||||||
@@ -170,7 +183,15 @@ authorityKeyIdentifier=keyid,issuer:always
 | 
				
			|||||||
#nsCaPolicyUrl
 | 
					#nsCaPolicyUrl
 | 
				
			||||||
#nsSslServerName
 | 
					#nsSslServerName
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[ v3_ca]
 | 
					[ v3_req ]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Extensions to add to a certificate request
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					basicConstraints = CA:FALSE
 | 
				
			||||||
 | 
					keyUsage = nonRepudiation, digitalSignature, keyEncipherment
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					[ v3_ca ]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# Extensions for a typical CA
 | 
					# Extensions for a typical CA
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -200,10 +221,11 @@ basicConstraints = CA:true
 | 
				
			|||||||
# Copy issuer details
 | 
					# Copy issuer details
 | 
				
			||||||
# issuerAltName=issuer:copy
 | 
					# issuerAltName=issuer:copy
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# RAW DER hex encoding of an extension: beware experts only!
 | 
					# DER hex encoding of an extension: beware experts only!
 | 
				
			||||||
# 1.2.3.5=RAW:02:03
 | 
					# obj=DER:02:03
 | 
				
			||||||
 | 
					# Where 'obj' is a standard or added object
 | 
				
			||||||
# You can even override a supported extension:
 | 
					# You can even override a supported extension:
 | 
				
			||||||
# basicConstraints= critical, RAW:30:03:01:01:FF
 | 
					# basicConstraints= critical, DER:30:03:01:01:FF
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[ crl_ext ]
 | 
					[ crl_ext ]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -56,13 +56,10 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef DEBUG
 | 
					 | 
				
			||||||
#undef DEBUG
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
 | 
					#define OPENSSL_C /* tells apps.h to use complete apps_startup() */
 | 
				
			||||||
#include <openssl/bio.h>
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
#include <openssl/crypto.h>
 | 
					#include <openssl/crypto.h>
 | 
				
			||||||
#include <openssl/lhash.h>
 | 
					#include <openssl/lhash.h>
 | 
				
			||||||
@@ -70,19 +67,12 @@
 | 
				
			|||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
#include <openssl/ssl.h>
 | 
					#include <openssl/ssl.h>
 | 
				
			||||||
#define SSLEAY	/* turn off a few special case MONOLITH macros */
 | 
					 | 
				
			||||||
#define USE_SOCKETS /* needed for the _O_BINARY defs in the MS world */
 | 
					#define USE_SOCKETS /* needed for the _O_BINARY defs in the MS world */
 | 
				
			||||||
#define SSLEAY_SRC
 | 
					 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#include "progs.h"
 | 
				
			||||||
#include "s_apps.h"
 | 
					#include "s_apps.h"
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*
 | 
					 | 
				
			||||||
#ifdef WINDOWS
 | 
					 | 
				
			||||||
#include "bss_file.c"
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
*/
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
static unsigned long MS_CALLBACK hash(FUNCTION *a);
 | 
					static unsigned long MS_CALLBACK hash(FUNCTION *a);
 | 
				
			||||||
static int MS_CALLBACK cmp(FUNCTION *a,FUNCTION *b);
 | 
					static int MS_CALLBACK cmp(FUNCTION *a,FUNCTION *b);
 | 
				
			||||||
static LHASH *prog_init(void );
 | 
					static LHASH *prog_init(void );
 | 
				
			||||||
@@ -90,15 +80,6 @@ static int do_cmd(LHASH *prog,int argc,char *argv[]);
 | 
				
			|||||||
LHASH *config=NULL;
 | 
					LHASH *config=NULL;
 | 
				
			||||||
char *default_config_file=NULL;
 | 
					char *default_config_file=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef DEBUG
 | 
					 | 
				
			||||||
static void sig_stop(int i)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	char *a=NULL;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	*a='\0';
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/* Make sure there is only one when MONOLITH is defined */
 | 
					/* Make sure there is only one when MONOLITH is defined */
 | 
				
			||||||
#ifdef MONOLITH
 | 
					#ifdef MONOLITH
 | 
				
			||||||
BIO *bio_err=NULL;
 | 
					BIO *bio_err=NULL;
 | 
				
			||||||
@@ -120,24 +101,16 @@ int main(int Argc, char *Argv[])
 | 
				
			|||||||
	arg.data=NULL;
 | 
						arg.data=NULL;
 | 
				
			||||||
	arg.count=0;
 | 
						arg.count=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* SSLeay_add_ssl_algorithms(); is called in apps_startup() */
 | 
						if (getenv("OPENSSL_DEBUG_MEMORY") != NULL)
 | 
				
			||||||
	apps_startup();
 | 
							CRYPTO_malloc_debug_init();
 | 
				
			||||||
 | 
						CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(DEBUG) && !defined(WINDOWS) && !defined(MSDOS)
 | 
						apps_startup();
 | 
				
			||||||
#ifdef SIGBUS
 | 
					 | 
				
			||||||
	signal(SIGBUS,sig_stop);
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
#ifdef SIGSEGV
 | 
					 | 
				
			||||||
	signal(SIGSEGV,sig_stop);
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bio_err == NULL)
 | 
						if (bio_err == NULL)
 | 
				
			||||||
		if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
							if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
			BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* Lets load up our environment a little */
 | 
						/* Lets load up our environment a little */
 | 
				
			||||||
@@ -165,7 +138,7 @@ int main(int Argc, char *Argv[])
 | 
				
			|||||||
	program_name(Argv[0],pname,PROG_NAME_SIZE);
 | 
						program_name(Argv[0],pname,PROG_NAME_SIZE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	f.name=pname;
 | 
						f.name=pname;
 | 
				
			||||||
	fp=(FUNCTION *)lh_retrieve(prog,(char *)&f);
 | 
						fp=(FUNCTION *)lh_retrieve(prog,&f);
 | 
				
			||||||
	if (fp != NULL)
 | 
						if (fp != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		Argv[0]=pname;
 | 
							Argv[0]=pname;
 | 
				
			||||||
@@ -219,7 +192,7 @@ int main(int Argc, char *Argv[])
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		if (ret != 0)
 | 
							if (ret != 0)
 | 
				
			||||||
			BIO_printf(bio_err,"error in %s\n",argv[0]);
 | 
								BIO_printf(bio_err,"error in %s\n",argv[0]);
 | 
				
			||||||
		BIO_flush(bio_err);
 | 
							(void)BIO_flush(bio_err);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	BIO_printf(bio_err,"bad exit\n");
 | 
						BIO_printf(bio_err,"bad exit\n");
 | 
				
			||||||
	ret=1;
 | 
						ret=1;
 | 
				
			||||||
@@ -230,7 +203,7 @@ end:
 | 
				
			|||||||
		config=NULL;
 | 
							config=NULL;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (prog != NULL) lh_free(prog);
 | 
						if (prog != NULL) lh_free(prog);
 | 
				
			||||||
	if (arg.data != NULL) Free(arg.data);
 | 
						if (arg.data != NULL) OPENSSL_free(arg.data);
 | 
				
			||||||
	ERR_remove_state(0);
 | 
						ERR_remove_state(0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	EVP_cleanup();
 | 
						EVP_cleanup();
 | 
				
			||||||
@@ -257,11 +230,29 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
 | 
				
			|||||||
	if ((argc <= 0) || (argv[0] == NULL))
 | 
						if ((argc <= 0) || (argv[0] == NULL))
 | 
				
			||||||
		{ ret=0; goto end; }
 | 
							{ ret=0; goto end; }
 | 
				
			||||||
	f.name=argv[0];
 | 
						f.name=argv[0];
 | 
				
			||||||
	fp=(FUNCTION *)lh_retrieve(prog,(char *)&f);
 | 
						fp=(FUNCTION *)lh_retrieve(prog,&f);
 | 
				
			||||||
	if (fp != NULL)
 | 
						if (fp != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		ret=fp->func(argc,argv);
 | 
							ret=fp->func(argc,argv);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
						else if ((strncmp(argv[0],"no-",3)) == 0)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							bio_stdout = BIO_push(tmpbio, bio_stdout);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							f.name=argv[0]+3;
 | 
				
			||||||
 | 
							ret = (lh_retrieve(prog,&f) != NULL);
 | 
				
			||||||
 | 
							if (!ret)
 | 
				
			||||||
 | 
								BIO_printf(bio_stdout, "%s\n", argv[0]);
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								BIO_printf(bio_stdout, "%s\n", argv[0]+3);
 | 
				
			||||||
 | 
							BIO_free_all(bio_stdout);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else if ((strcmp(argv[0],"quit") == 0) ||
 | 
						else if ((strcmp(argv[0],"quit") == 0) ||
 | 
				
			||||||
		(strcmp(argv[0],"q") == 0) ||
 | 
							(strcmp(argv[0],"q") == 0) ||
 | 
				
			||||||
		(strcmp(argv[0],"exit") == 0) ||
 | 
							(strcmp(argv[0],"exit") == 0) ||
 | 
				
			||||||
@@ -284,11 +275,17 @@ static int do_cmd(LHASH *prog, int argc, char *argv[])
 | 
				
			|||||||
		else /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
 | 
							else /* strcmp(argv[0],LIST_CIPHER_COMMANDS) == 0 */
 | 
				
			||||||
			list_type = FUNC_TYPE_CIPHER;
 | 
								list_type = FUNC_TYPE_CIPHER;
 | 
				
			||||||
		bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
 | 
							bio_stdout = BIO_new_fp(stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							bio_stdout = BIO_push(tmpbio, bio_stdout);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
		
 | 
							
 | 
				
			||||||
		for (fp=functions; fp->name != NULL; fp++)
 | 
							for (fp=functions; fp->name != NULL; fp++)
 | 
				
			||||||
			if (fp->type == list_type)
 | 
								if (fp->type == list_type)
 | 
				
			||||||
				BIO_printf(bio_stdout, "%s\n", fp->name);
 | 
									BIO_printf(bio_stdout, "%s\n", fp->name);
 | 
				
			||||||
		BIO_free(bio_stdout);
 | 
							BIO_free_all(bio_stdout);
 | 
				
			||||||
		ret=0;
 | 
							ret=0;
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -356,7 +353,7 @@ static LHASH *prog_init(void)
 | 
				
			|||||||
	if ((ret=lh_new(hash,cmp)) == NULL) return(NULL);
 | 
						if ((ret=lh_new(hash,cmp)) == NULL) return(NULL);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	for (f=functions; f->name != NULL; f++)
 | 
						for (f=functions; f->name != NULL; f++)
 | 
				
			||||||
		lh_insert(ret,(char *)f);
 | 
							lh_insert(ret,f);
 | 
				
			||||||
	return(ret);
 | 
						return(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -369,5 +366,3 @@ static unsigned long MS_CALLBACK hash(FUNCTION *a)
 | 
				
			|||||||
	{
 | 
						{
 | 
				
			||||||
	return(lh_strhash(a->name));
 | 
						return(lh_strhash(a->name));
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					 | 
				
			||||||
#undef SSLEAY
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
@@ -3,8 +3,13 @@
 | 
				
			|||||||
# This is mostly being used for generation of certificate requests.
 | 
					# This is mostly being used for generation of certificate requests.
 | 
				
			||||||
#
 | 
					#
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# This definition stops the following lines choking if HOME isn't
 | 
				
			||||||
 | 
					# defined.
 | 
				
			||||||
 | 
					HOME			= .
 | 
				
			||||||
RANDFILE		= $ENV::HOME/.rnd
 | 
					RANDFILE		= $ENV::HOME/.rnd
 | 
				
			||||||
oid_file		= $ENV::HOME/.oid
 | 
					
 | 
				
			||||||
 | 
					# Extra OBJECT IDENTIFIER info:
 | 
				
			||||||
 | 
					#oid_file		= $ENV::HOME/.oid
 | 
				
			||||||
oid_section		= new_oids
 | 
					oid_section		= new_oids
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# To use this configuration file with the "-extfile" option of the
 | 
					# To use this configuration file with the "-extfile" option of the
 | 
				
			||||||
@@ -86,6 +91,22 @@ distinguished_name	= req_distinguished_name
 | 
				
			|||||||
attributes		= req_attributes
 | 
					attributes		= req_attributes
 | 
				
			||||||
x509_extensions	= v3_ca	# The extentions to add to the self signed cert
 | 
					x509_extensions	= v3_ca	# The extentions to add to the self signed cert
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Passwords for private keys if not present they will be prompted for
 | 
				
			||||||
 | 
					# input_password = secret
 | 
				
			||||||
 | 
					# output_password = secret
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# This sets a mask for permitted string types. There are several options. 
 | 
				
			||||||
 | 
					# default: PrintableString, T61String, BMPString.
 | 
				
			||||||
 | 
					# pkix	 : PrintableString, BMPString.
 | 
				
			||||||
 | 
					# utf8only: only UTF8Strings.
 | 
				
			||||||
 | 
					# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).
 | 
				
			||||||
 | 
					# MASK:XXXX a literal mask value.
 | 
				
			||||||
 | 
					# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings
 | 
				
			||||||
 | 
					# so use this option with caution!
 | 
				
			||||||
 | 
					string_mask = nombstr
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# req_extensions = v3_req # The extensions to add to a certificate request
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[ req_distinguished_name ]
 | 
					[ req_distinguished_name ]
 | 
				
			||||||
countryName			= Country Name (2 letter code)
 | 
					countryName			= Country Name (2 letter code)
 | 
				
			||||||
countryName_default		= AU
 | 
					countryName_default		= AU
 | 
				
			||||||
@@ -170,7 +191,15 @@ authorityKeyIdentifier=keyid,issuer:always
 | 
				
			|||||||
#nsCaPolicyUrl
 | 
					#nsCaPolicyUrl
 | 
				
			||||||
#nsSslServerName
 | 
					#nsSslServerName
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[ v3_ca]
 | 
					[ v3_req ]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# Extensions to add to a certificate request
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					basicConstraints = CA:FALSE
 | 
				
			||||||
 | 
					keyUsage = nonRepudiation, digitalSignature, keyEncipherment
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					[ v3_ca ]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# Extensions for a typical CA
 | 
					# Extensions for a typical CA
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -200,10 +229,11 @@ basicConstraints = CA:true
 | 
				
			|||||||
# Copy issuer details
 | 
					# Copy issuer details
 | 
				
			||||||
# issuerAltName=issuer:copy
 | 
					# issuerAltName=issuer:copy
 | 
				
			||||||
 | 
					
 | 
				
			||||||
# RAW DER hex encoding of an extension: beware experts only!
 | 
					# DER hex encoding of an extension: beware experts only!
 | 
				
			||||||
# 1.2.3.5=RAW:02:03
 | 
					# obj=DER:02:03
 | 
				
			||||||
 | 
					# Where 'obj' is a standard or added object
 | 
				
			||||||
# You can even override a supported extension:
 | 
					# You can even override a supported extension:
 | 
				
			||||||
# basicConstraints= critical, RAW:30:03:01:01:FF
 | 
					# basicConstraints= critical, DER:30:03:01:01:FF
 | 
				
			||||||
 | 
					
 | 
				
			||||||
[ crl_ext ]
 | 
					[ crl_ext ]
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										503
									
								
								apps/passwd.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										503
									
								
								apps/passwd.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,503 @@
 | 
				
			|||||||
 | 
					/* apps/passwd.c */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if defined NO_MD5 || defined CHARSET_EBCDIC
 | 
				
			||||||
 | 
					# define NO_MD5CRYPT_1
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#if !defined(NO_DES) || !defined(NO_MD5CRYPT_1)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <assert.h>
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
 | 
					#include <openssl/rand.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef NO_DES
 | 
				
			||||||
 | 
					# include <openssl/des.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_MD5CRYPT_1
 | 
				
			||||||
 | 
					# include <openssl/md5.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#undef PROG
 | 
				
			||||||
 | 
					#define PROG passwd_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static unsigned const char cov_2char[64]={
 | 
				
			||||||
 | 
						/* from crypto/des/fcrypt.c */
 | 
				
			||||||
 | 
						0x2E,0x2F,0x30,0x31,0x32,0x33,0x34,0x35,
 | 
				
			||||||
 | 
						0x36,0x37,0x38,0x39,0x41,0x42,0x43,0x44,
 | 
				
			||||||
 | 
						0x45,0x46,0x47,0x48,0x49,0x4A,0x4B,0x4C,
 | 
				
			||||||
 | 
						0x4D,0x4E,0x4F,0x50,0x51,0x52,0x53,0x54,
 | 
				
			||||||
 | 
						0x55,0x56,0x57,0x58,0x59,0x5A,0x61,0x62,
 | 
				
			||||||
 | 
						0x63,0x64,0x65,0x66,0x67,0x68,0x69,0x6A,
 | 
				
			||||||
 | 
						0x6B,0x6C,0x6D,0x6E,0x6F,0x70,0x71,0x72,
 | 
				
			||||||
 | 
						0x73,0x74,0x75,0x76,0x77,0x78,0x79,0x7A
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
 | 
				
			||||||
 | 
						char *passwd, BIO *out, int quiet, int table, int reverse,
 | 
				
			||||||
 | 
						size_t pw_maxlen, int usecrypt, int use1, int useapr1);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* -crypt        - standard Unix password algorithm (default)
 | 
				
			||||||
 | 
					 * -1            - MD5-based password algorithm
 | 
				
			||||||
 | 
					 * -apr1         - MD5-based password algorithm, Apache variant
 | 
				
			||||||
 | 
					 * -salt string  - salt
 | 
				
			||||||
 | 
					 * -in file      - read passwords from file
 | 
				
			||||||
 | 
					 * -stdin        - read passwords from stdin
 | 
				
			||||||
 | 
					 * -quiet        - no warnings
 | 
				
			||||||
 | 
					 * -table        - format output as table
 | 
				
			||||||
 | 
					 * -reverse      - switch table columns
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						int ret = 1;
 | 
				
			||||||
 | 
						char *infile = NULL;
 | 
				
			||||||
 | 
						int in_stdin = 0;
 | 
				
			||||||
 | 
						char *salt = NULL, *passwd = NULL, **passwds = NULL;
 | 
				
			||||||
 | 
						char *salt_malloc = NULL, *passwd_malloc = NULL;
 | 
				
			||||||
 | 
						size_t passwd_malloc_size = 0;
 | 
				
			||||||
 | 
						int pw_source_defined = 0;
 | 
				
			||||||
 | 
						BIO *in = NULL, *out = NULL;
 | 
				
			||||||
 | 
						int i, badopt, opt_done;
 | 
				
			||||||
 | 
						int passed_salt = 0, quiet = 0, table = 0, reverse = 0;
 | 
				
			||||||
 | 
						int usecrypt = 0, use1 = 0, useapr1 = 0;
 | 
				
			||||||
 | 
						size_t pw_maxlen = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (bio_err == NULL)
 | 
				
			||||||
 | 
							if ((bio_err=BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
 | 
								BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
						out = BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
						if (out == NULL)
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
						BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
						out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						badopt = 0, opt_done = 0;
 | 
				
			||||||
 | 
						i = 0;
 | 
				
			||||||
 | 
						while (!badopt && !opt_done && argv[++i] != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (strcmp(argv[i], "-crypt") == 0)
 | 
				
			||||||
 | 
								usecrypt = 1;
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-1") == 0)
 | 
				
			||||||
 | 
								use1 = 1;
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-apr1") == 0)
 | 
				
			||||||
 | 
								useapr1 = 1;
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-salt") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if ((argv[i+1] != NULL) && (salt == NULL))
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									passed_salt = 1;
 | 
				
			||||||
 | 
									salt = argv[++i];
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									badopt = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-in") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if ((argv[i+1] != NULL) && !pw_source_defined)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									pw_source_defined = 1;
 | 
				
			||||||
 | 
									infile = argv[++i];
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									badopt = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-stdin") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (!pw_source_defined)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									pw_source_defined = 1;
 | 
				
			||||||
 | 
									in_stdin = 1;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									badopt = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-quiet") == 0)
 | 
				
			||||||
 | 
								quiet = 1;
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-table") == 0)
 | 
				
			||||||
 | 
								table = 1;
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-reverse") == 0)
 | 
				
			||||||
 | 
								reverse = 1;
 | 
				
			||||||
 | 
							else if (argv[i][0] == '-')
 | 
				
			||||||
 | 
								badopt = 1;
 | 
				
			||||||
 | 
							else if (!pw_source_defined)
 | 
				
			||||||
 | 
								/* non-option arguments, use as passwords */
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								pw_source_defined = 1;
 | 
				
			||||||
 | 
								passwds = &argv[i];
 | 
				
			||||||
 | 
								opt_done = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								badopt = 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!usecrypt && !use1 && !useapr1) /* use default */
 | 
				
			||||||
 | 
							usecrypt = 1;
 | 
				
			||||||
 | 
						if (usecrypt + use1 + useapr1 > 1) /* conflict */
 | 
				
			||||||
 | 
							badopt = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* reject unsupported algorithms */
 | 
				
			||||||
 | 
					#ifdef NO_DES
 | 
				
			||||||
 | 
						if (usecrypt) badopt = 1;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifdef NO_MD5CRYPT_1
 | 
				
			||||||
 | 
						if (use1 || useapr1) badopt = 1;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (badopt) 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Usage: passwd [options] [passwords]\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "where options are\n");
 | 
				
			||||||
 | 
					#ifndef NO_DES
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-crypt             standard Unix password algorithm (default)\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_MD5CRYPT_1
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-1                 MD5-based password algorithm\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-apr1              MD5-based password algorithm, Apache variant\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-salt string       use provided salt\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-in file           read passwords from file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-stdin             read passwords from stdin\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-quiet             no warnings\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-table             format output as table\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-reverse           switch table columns\n");
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if ((infile != NULL) || in_stdin)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							in = BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
							if (in == NULL)
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
							if (infile != NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								assert(in_stdin == 0);
 | 
				
			||||||
 | 
								if (BIO_read_filename(in, infile) <= 0)
 | 
				
			||||||
 | 
									goto err;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								assert(in_stdin);
 | 
				
			||||||
 | 
								BIO_set_fp(in, stdin, BIO_NOCLOSE);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (usecrypt)
 | 
				
			||||||
 | 
							pw_maxlen = 8;
 | 
				
			||||||
 | 
						else if (use1 || useapr1)
 | 
				
			||||||
 | 
							pw_maxlen = 256; /* arbitrary limit, should be enough for most passwords */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (passwds == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							/* no passwords on the command line */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							passwd_malloc_size = pw_maxlen + 2;
 | 
				
			||||||
 | 
							/* longer than necessary so that we can warn about truncation */
 | 
				
			||||||
 | 
							passwd = passwd_malloc = OPENSSL_malloc(passwd_malloc_size);
 | 
				
			||||||
 | 
							if (passwd_malloc == NULL)
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if ((in == NULL) && (passwds == NULL))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							/* build a null-terminated list */
 | 
				
			||||||
 | 
							static char *passwds_static[2] = {NULL, NULL};
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							passwds = passwds_static;
 | 
				
			||||||
 | 
							if (in == NULL)
 | 
				
			||||||
 | 
								if (EVP_read_pw_string(passwd_malloc, passwd_malloc_size, "Password: ", 0) != 0)
 | 
				
			||||||
 | 
									goto err;
 | 
				
			||||||
 | 
							passwds[0] = passwd_malloc;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (in == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							assert(passwds != NULL);
 | 
				
			||||||
 | 
							assert(*passwds != NULL);
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							do /* loop over list of passwords */
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								passwd = *passwds++;
 | 
				
			||||||
 | 
								if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
 | 
				
			||||||
 | 
									quiet, table, reverse, pw_maxlen, usecrypt, use1, useapr1))
 | 
				
			||||||
 | 
									goto err;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							while (*passwds != NULL);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							/* in != NULL */
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							int done;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							assert (passwd != NULL);
 | 
				
			||||||
 | 
							do
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								int r = BIO_gets(in, passwd, pw_maxlen + 1);
 | 
				
			||||||
 | 
								if (r > 0)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									char *c = (strchr(passwd, '\n')) ;
 | 
				
			||||||
 | 
									if (c != NULL)
 | 
				
			||||||
 | 
										*c = 0; /* truncate at newline */
 | 
				
			||||||
 | 
									else
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										/* ignore rest of line */
 | 
				
			||||||
 | 
										char trash[BUFSIZ];
 | 
				
			||||||
 | 
										do
 | 
				
			||||||
 | 
											r = BIO_gets(in, trash, sizeof trash);
 | 
				
			||||||
 | 
										while ((r > 0) && (!strchr(trash, '\n')));
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									
 | 
				
			||||||
 | 
									if (!do_passwd(passed_salt, &salt, &salt_malloc, passwd, out,
 | 
				
			||||||
 | 
										quiet, table, reverse, pw_maxlen, usecrypt, use1, useapr1))
 | 
				
			||||||
 | 
										goto err;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								done = (r <= 0);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							while (!done);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						ret = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					err:
 | 
				
			||||||
 | 
						ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
						if (salt_malloc)
 | 
				
			||||||
 | 
							OPENSSL_free(salt_malloc);
 | 
				
			||||||
 | 
						if (passwd_malloc)
 | 
				
			||||||
 | 
							OPENSSL_free(passwd_malloc);
 | 
				
			||||||
 | 
						if (in)
 | 
				
			||||||
 | 
							BIO_free(in);
 | 
				
			||||||
 | 
						if (out)
 | 
				
			||||||
 | 
							BIO_free_all(out);
 | 
				
			||||||
 | 
						EXIT(ret);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef NO_MD5CRYPT_1
 | 
				
			||||||
 | 
					/* MD5-based password algorithm (should probably be available as a library
 | 
				
			||||||
 | 
					 * function; then the static buffer would not be acceptable).
 | 
				
			||||||
 | 
					 * For magic string "1", this should be compatible to the MD5-based BSD
 | 
				
			||||||
 | 
					 * password algorithm.
 | 
				
			||||||
 | 
					 * For 'magic' string "apr1", this is compatible to the MD5-based Apache
 | 
				
			||||||
 | 
					 * password algorithm.
 | 
				
			||||||
 | 
					 * (Apparently, the Apache password algorithm is identical except that the
 | 
				
			||||||
 | 
					 * 'magic' string was changed -- the laziest application of the NIH principle
 | 
				
			||||||
 | 
					 * I've ever encountered.)
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					static char *md5crypt(const char *passwd, const char *magic, const char *salt)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						static char out_buf[6 + 9 + 24 + 2]; /* "$apr1$..salt..$.......md5hash..........\0" */
 | 
				
			||||||
 | 
						unsigned char buf[MD5_DIGEST_LENGTH];
 | 
				
			||||||
 | 
						char *salt_out;
 | 
				
			||||||
 | 
						int n, i;
 | 
				
			||||||
 | 
						MD5_CTX md;
 | 
				
			||||||
 | 
						size_t passwd_len, salt_len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						passwd_len = strlen(passwd);
 | 
				
			||||||
 | 
						out_buf[0] = '$';
 | 
				
			||||||
 | 
						out_buf[1] = 0;
 | 
				
			||||||
 | 
						assert(strlen(magic) <= 4); /* "1" or "apr1" */
 | 
				
			||||||
 | 
						strncat(out_buf, magic, 4);
 | 
				
			||||||
 | 
						strncat(out_buf, "$", 1);
 | 
				
			||||||
 | 
						strncat(out_buf, salt, 8);
 | 
				
			||||||
 | 
						assert(strlen(out_buf) <= 6 + 8); /* "$apr1$..salt.." */
 | 
				
			||||||
 | 
						salt_out = out_buf + 2 + strlen(magic);
 | 
				
			||||||
 | 
						salt_len = strlen(salt_out);
 | 
				
			||||||
 | 
						assert(salt_len <= 8);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						MD5_Init(&md);
 | 
				
			||||||
 | 
						MD5_Update(&md, passwd, passwd_len);
 | 
				
			||||||
 | 
						MD5_Update(&md, "$", 1);
 | 
				
			||||||
 | 
						MD5_Update(&md, magic, strlen(magic));
 | 
				
			||||||
 | 
						MD5_Update(&md, "$", 1);
 | 
				
			||||||
 | 
						MD5_Update(&md, salt_out, salt_len);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						 {
 | 
				
			||||||
 | 
							MD5_CTX md2;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							MD5_Init(&md2);
 | 
				
			||||||
 | 
							MD5_Update(&md2, passwd, passwd_len);
 | 
				
			||||||
 | 
							MD5_Update(&md2, salt_out, salt_len);
 | 
				
			||||||
 | 
							MD5_Update(&md2, passwd, passwd_len);
 | 
				
			||||||
 | 
							MD5_Final(buf, &md2);
 | 
				
			||||||
 | 
						 }
 | 
				
			||||||
 | 
						for (i = passwd_len; i > sizeof buf; i -= sizeof buf)
 | 
				
			||||||
 | 
							MD5_Update(&md, buf, sizeof buf);
 | 
				
			||||||
 | 
						MD5_Update(&md, buf, i);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						n = passwd_len;
 | 
				
			||||||
 | 
						while (n)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							MD5_Update(&md, (n & 1) ? "\0" : passwd, 1);
 | 
				
			||||||
 | 
							n >>= 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						MD5_Final(buf, &md);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for (i = 0; i < 1000; i++)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							MD5_CTX md2;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							MD5_Init(&md2);
 | 
				
			||||||
 | 
							MD5_Update(&md2, (i & 1) ? (unsigned char *) passwd : buf,
 | 
				
			||||||
 | 
							                 (i & 1) ? passwd_len : sizeof buf);
 | 
				
			||||||
 | 
							if (i % 3)
 | 
				
			||||||
 | 
								MD5_Update(&md2, salt_out, salt_len);
 | 
				
			||||||
 | 
							if (i % 7)
 | 
				
			||||||
 | 
								MD5_Update(&md2, passwd, passwd_len);
 | 
				
			||||||
 | 
							MD5_Update(&md2, (i & 1) ? buf : (unsigned char *) passwd,
 | 
				
			||||||
 | 
							                 (i & 1) ? sizeof buf : passwd_len);
 | 
				
			||||||
 | 
							MD5_Final(buf, &md2);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						 {
 | 
				
			||||||
 | 
							/* transform buf into output string */
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
							unsigned char buf_perm[sizeof buf];
 | 
				
			||||||
 | 
							int dest, source;
 | 
				
			||||||
 | 
							char *output;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							/* silly output permutation */
 | 
				
			||||||
 | 
							for (dest = 0, source = 0; dest < 14; dest++, source = (source + 6) % 17)
 | 
				
			||||||
 | 
								buf_perm[dest] = buf[source];
 | 
				
			||||||
 | 
							buf_perm[14] = buf[5];
 | 
				
			||||||
 | 
							buf_perm[15] = buf[11];
 | 
				
			||||||
 | 
					#ifndef PEDANTIC /* Unfortunately, this generates a "no effect" warning */
 | 
				
			||||||
 | 
							assert(16 == sizeof buf_perm);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							output = salt_out + salt_len;
 | 
				
			||||||
 | 
							assert(output == out_buf + strlen(out_buf));
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							*output++ = '$';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							for (i = 0; i < 15; i += 3)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								*output++ = cov_2char[buf_perm[i+2] & 0x3f];
 | 
				
			||||||
 | 
								*output++ = cov_2char[((buf_perm[i+1] & 0xf) << 2) |
 | 
				
			||||||
 | 
									                  (buf_perm[i+2] >> 6)];
 | 
				
			||||||
 | 
								*output++ = cov_2char[((buf_perm[i] & 3) << 4) |
 | 
				
			||||||
 | 
									                  (buf_perm[i+1] >> 4)];
 | 
				
			||||||
 | 
								*output++ = cov_2char[buf_perm[i] >> 2];
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							assert(i == 15);
 | 
				
			||||||
 | 
							*output++ = cov_2char[buf_perm[i] & 0x3f];
 | 
				
			||||||
 | 
							*output++ = cov_2char[buf_perm[i] >> 6];
 | 
				
			||||||
 | 
							*output = 0;
 | 
				
			||||||
 | 
							assert(strlen(out_buf) < sizeof(out_buf));
 | 
				
			||||||
 | 
						 }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return out_buf;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int do_passwd(int passed_salt, char **salt_p, char **salt_malloc_p,
 | 
				
			||||||
 | 
						char *passwd, BIO *out,	int quiet, int table, int reverse,
 | 
				
			||||||
 | 
						size_t pw_maxlen, int usecrypt, int use1, int useapr1)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						char *hash = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						assert(salt_p != NULL);
 | 
				
			||||||
 | 
						assert(salt_malloc_p != NULL);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* first make sure we have a salt */
 | 
				
			||||||
 | 
						if (!passed_salt)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
					#ifndef NO_DES
 | 
				
			||||||
 | 
							if (usecrypt)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (*salt_malloc_p == NULL)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									*salt_p = *salt_malloc_p = OPENSSL_malloc(3);
 | 
				
			||||||
 | 
									if (*salt_malloc_p == NULL)
 | 
				
			||||||
 | 
										goto err;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								if (RAND_pseudo_bytes((unsigned char *)*salt_p, 2) < 0)
 | 
				
			||||||
 | 
									goto err;
 | 
				
			||||||
 | 
								(*salt_p)[0] = cov_2char[(*salt_p)[0] & 0x3f]; /* 6 bits */
 | 
				
			||||||
 | 
								(*salt_p)[1] = cov_2char[(*salt_p)[1] & 0x3f]; /* 6 bits */
 | 
				
			||||||
 | 
								(*salt_p)[2] = 0;
 | 
				
			||||||
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
 | 
								ascii2ebcdic(*salt_p, *salt_p, 2); /* des_crypt will convert
 | 
				
			||||||
 | 
								                                    * back to ASCII */
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif /* !NO_DES */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef NO_MD5CRYPT_1
 | 
				
			||||||
 | 
							if (use1 || useapr1)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								int i;
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
								if (*salt_malloc_p == NULL)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									*salt_p = *salt_malloc_p = OPENSSL_malloc(9);
 | 
				
			||||||
 | 
									if (*salt_malloc_p == NULL)
 | 
				
			||||||
 | 
										goto err;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								if (RAND_pseudo_bytes((unsigned char *)*salt_p, 8) < 0)
 | 
				
			||||||
 | 
									goto err;
 | 
				
			||||||
 | 
								
 | 
				
			||||||
 | 
								for (i = 0; i < 8; i++)
 | 
				
			||||||
 | 
									(*salt_p)[i] = cov_2char[(*salt_p)[i] & 0x3f]; /* 6 bits */
 | 
				
			||||||
 | 
								(*salt_p)[8] = 0;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif /* !NO_MD5CRYPT_1 */
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						assert(*salt_p != NULL);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						/* truncate password if necessary */
 | 
				
			||||||
 | 
						if ((strlen(passwd) > pw_maxlen))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (!quiet)
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Warning: truncating password to %u characters\n", pw_maxlen);
 | 
				
			||||||
 | 
							passwd[pw_maxlen] = 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						assert(strlen(passwd) <= pw_maxlen);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						/* now compute password hash */
 | 
				
			||||||
 | 
					#ifndef NO_DES
 | 
				
			||||||
 | 
						if (usecrypt)
 | 
				
			||||||
 | 
							hash = des_crypt(passwd, *salt_p);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_MD5CRYPT_1
 | 
				
			||||||
 | 
						if (use1 || useapr1)
 | 
				
			||||||
 | 
							hash = md5crypt(passwd, (use1 ? "1" : "apr1"), *salt_p);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						assert(hash != NULL);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (table && !reverse)
 | 
				
			||||||
 | 
							BIO_printf(out, "%s\t%s\n", passwd, hash);
 | 
				
			||||||
 | 
						else if (table && reverse)
 | 
				
			||||||
 | 
							BIO_printf(out, "%s\t%s\n", hash, passwd);
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							BIO_printf(out, "%s\n", hash);
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					err:
 | 
				
			||||||
 | 
						return 0;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						fputs("Program not available.\n", stderr)
 | 
				
			||||||
 | 
						EXIT(1);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
@@ -1 +1 @@
 | 
				
			|||||||
01
 | 
					07
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										170
									
								
								apps/pem_mail.c
									
									
									
									
									
								
							
							
						
						
									
										170
									
								
								apps/pem_mail.c
									
									
									
									
									
								
							@@ -1,170 +0,0 @@
 | 
				
			|||||||
/* apps/pem_mail.c */
 | 
					 | 
				
			||||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
					 | 
				
			||||||
 * All rights reserved.
 | 
					 | 
				
			||||||
 *
 | 
					 | 
				
			||||||
 * This package is an SSL implementation written
 | 
					 | 
				
			||||||
 * by Eric Young (eay@cryptsoft.com).
 | 
					 | 
				
			||||||
 * The implementation was written so as to conform with Netscapes SSL.
 | 
					 | 
				
			||||||
 * 
 | 
					 | 
				
			||||||
 * This library is free for commercial and non-commercial use as long as
 | 
					 | 
				
			||||||
 * the following conditions are aheared to.  The following conditions
 | 
					 | 
				
			||||||
 * apply to all code found in this distribution, be it the RC4, RSA,
 | 
					 | 
				
			||||||
 * lhash, DES, etc., code; not just the SSL code.  The SSL documentation
 | 
					 | 
				
			||||||
 * included with this distribution is covered by the same copyright terms
 | 
					 | 
				
			||||||
 * except that the holder is Tim Hudson (tjh@cryptsoft.com).
 | 
					 | 
				
			||||||
 * 
 | 
					 | 
				
			||||||
 * Copyright remains Eric Young's, and as such any Copyright notices in
 | 
					 | 
				
			||||||
 * the code are not to be removed.
 | 
					 | 
				
			||||||
 * If this package is used in a product, Eric Young should be given attribution
 | 
					 | 
				
			||||||
 * as the author of the parts of the library used.
 | 
					 | 
				
			||||||
 * This can be in the form of a textual message at program startup or
 | 
					 | 
				
			||||||
 * in documentation (online or textual) provided with the package.
 | 
					 | 
				
			||||||
 * 
 | 
					 | 
				
			||||||
 * Redistribution and use in source and binary forms, with or without
 | 
					 | 
				
			||||||
 * modification, are permitted provided that the following conditions
 | 
					 | 
				
			||||||
 * are met:
 | 
					 | 
				
			||||||
 * 1. Redistributions of source code must retain the copyright
 | 
					 | 
				
			||||||
 *    notice, this list of conditions and the following disclaimer.
 | 
					 | 
				
			||||||
 * 2. Redistributions in binary form must reproduce the above copyright
 | 
					 | 
				
			||||||
 *    notice, this list of conditions and the following disclaimer in the
 | 
					 | 
				
			||||||
 *    documentation and/or other materials provided with the distribution.
 | 
					 | 
				
			||||||
 * 3. All advertising materials mentioning features or use of this software
 | 
					 | 
				
			||||||
 *    must display the following acknowledgement:
 | 
					 | 
				
			||||||
 *    "This product includes cryptographic software written by
 | 
					 | 
				
			||||||
 *     Eric Young (eay@cryptsoft.com)"
 | 
					 | 
				
			||||||
 *    The word 'cryptographic' can be left out if the rouines from the library
 | 
					 | 
				
			||||||
 *    being used are not cryptographic related :-).
 | 
					 | 
				
			||||||
 * 4. If you include any Windows specific code (or a derivative thereof) from 
 | 
					 | 
				
			||||||
 *    the apps directory (application code) you must include an acknowledgement:
 | 
					 | 
				
			||||||
 *    "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"
 | 
					 | 
				
			||||||
 * 
 | 
					 | 
				
			||||||
 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
 | 
					 | 
				
			||||||
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
					 | 
				
			||||||
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 | 
					 | 
				
			||||||
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 | 
					 | 
				
			||||||
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 | 
					 | 
				
			||||||
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 | 
					 | 
				
			||||||
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
					 | 
				
			||||||
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 | 
					 | 
				
			||||||
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 | 
					 | 
				
			||||||
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 | 
					 | 
				
			||||||
 * SUCH DAMAGE.
 | 
					 | 
				
			||||||
 * 
 | 
					 | 
				
			||||||
 * The licence and distribution terms for any publically available version or
 | 
					 | 
				
			||||||
 * derivative of this code cannot be changed.  i.e. this code cannot simply be
 | 
					 | 
				
			||||||
 * copied and put under another distribution licence
 | 
					 | 
				
			||||||
 * [including the GNU Public Licence.]
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifndef NO_RSA
 | 
					 | 
				
			||||||
#include <stdio.h>
 | 
					 | 
				
			||||||
#include <openssl/rsa.h>
 | 
					 | 
				
			||||||
#include <openssl/evp.h>
 | 
					 | 
				
			||||||
#include <openssl/objects.h>
 | 
					 | 
				
			||||||
#include <openssl/x509.h>
 | 
					 | 
				
			||||||
#include <openssl/err.h>
 | 
					 | 
				
			||||||
#include <openssl/pem.h>
 | 
					 | 
				
			||||||
#include "apps.h"
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#undef PROG
 | 
					 | 
				
			||||||
#define PROG	pem_mail_main
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
static char *usage[]={
 | 
					 | 
				
			||||||
"usage: pem_mail args\n",
 | 
					 | 
				
			||||||
"\n",
 | 
					 | 
				
			||||||
" -in arg         - input file - default stdin\n",
 | 
					 | 
				
			||||||
" -out arg        - output file - default stdout\n",
 | 
					 | 
				
			||||||
" -cert arg       - the certificate to use\n",
 | 
					 | 
				
			||||||
" -key arg        - the private key to use\n",
 | 
					 | 
				
			||||||
" -MIC           - sign the message\n",
 | 
					 | 
				
			||||||
" -enc arg        - encrypt with one of cbc-des\n",
 | 
					 | 
				
			||||||
NULL
 | 
					 | 
				
			||||||
};
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
typedef struct lines_St
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	char *line;
 | 
					 | 
				
			||||||
	struct lines_st *next;
 | 
					 | 
				
			||||||
	} LINES;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
int main(int argc, char **argv)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	FILE *in;
 | 
					 | 
				
			||||||
	RSA *rsa=NULL;
 | 
					 | 
				
			||||||
	EVP_MD_CTX ctx;
 | 
					 | 
				
			||||||
	unsigned int mic=0,i,n;
 | 
					 | 
				
			||||||
	unsigned char buf[1024*15];
 | 
					 | 
				
			||||||
	char *prog,*infile=NULL,*outfile=NULL,*key=NULL;
 | 
					 | 
				
			||||||
	int badops=0;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	apps_startup();
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	prog=argv[0];
 | 
					 | 
				
			||||||
	argc--;
 | 
					 | 
				
			||||||
	argv++;
 | 
					 | 
				
			||||||
	while (argc >= 1)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		if (strcmp(*argv,"-key") == 0)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
					 | 
				
			||||||
			key= *(++argv);
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		else if (strcmp(*argv,"-in") == 0)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
					 | 
				
			||||||
			infile= *(++argv);
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		else if (strcmp(*argv,"-out") == 0)
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
					 | 
				
			||||||
			outfile= *(++argv);
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		else if (strcmp(*argv,"-mic") == 0)
 | 
					 | 
				
			||||||
			mic=1;
 | 
					 | 
				
			||||||
		else
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
					 | 
				
			||||||
			badops=1;
 | 
					 | 
				
			||||||
			break;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		argc--;
 | 
					 | 
				
			||||||
		argv++;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (badops)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
bad:
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"where options  are\n");
 | 
					 | 
				
			||||||
		EXIT(1);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (key == NULL)
 | 
					 | 
				
			||||||
		{ BIO_printf(bio_err,"you need to specify a key\n"); EXIT(1); }
 | 
					 | 
				
			||||||
	in=fopen(key,"r");
 | 
					 | 
				
			||||||
	if (in == NULL) { perror(key); EXIT(1); }
 | 
					 | 
				
			||||||
	rsa=PEM_read_RSAPrivateKey(in,NULL,NULL);
 | 
					 | 
				
			||||||
	if (rsa == NULL)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"unable to load Private Key\n");
 | 
					 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
					 | 
				
			||||||
		EXIT(1);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	fclose(in);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	PEM_SignInit(&ctx,EVP_md5());
 | 
					 | 
				
			||||||
	for (;;)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		i=fread(buf,1,1024*10,stdin);
 | 
					 | 
				
			||||||
		if (i <= 0) break;
 | 
					 | 
				
			||||||
		PEM_SignUpdate(&ctx,buf,i);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	if (!PEM_SignFinal(&ctx,buf,&n,rsa)) goto err;
 | 
					 | 
				
			||||||
	BIO_printf(bio_err,"%s\n",buf);
 | 
					 | 
				
			||||||
	EXIT(0);
 | 
					 | 
				
			||||||
err:
 | 
					 | 
				
			||||||
	ERR_print_errors(bio_err);
 | 
					 | 
				
			||||||
	EXIT(1);
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
							
								
								
									
										576
									
								
								apps/pkcs12.c
									
									
									
									
									
								
							
							
						
						
									
										576
									
								
								apps/pkcs12.c
									
									
									
									
									
								
							@@ -1,4 +1,6 @@
 | 
				
			|||||||
/* pkcs12.c */
 | 
					/* pkcs12.c */
 | 
				
			||||||
 | 
					#if !defined(NO_DES) && !defined(NO_SHA1)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
					/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
				
			||||||
 * project 1999.
 | 
					 * project 1999.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
@@ -59,12 +61,13 @@
 | 
				
			|||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
#include <openssl/des.h>
 | 
					 | 
				
			||||||
#include <openssl/pem.h>
 | 
					 | 
				
			||||||
#include <openssl/err.h>
 | 
					 | 
				
			||||||
#include <openssl/pkcs12.h>
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#include <openssl/crypto.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/pkcs12.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define PROG pkcs12_main
 | 
					#define PROG pkcs12_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
EVP_CIPHER *enc;
 | 
					EVP_CIPHER *enc;
 | 
				
			||||||
@@ -76,17 +79,21 @@ EVP_CIPHER *enc;
 | 
				
			|||||||
#define CLCERTS		0x8
 | 
					#define CLCERTS		0x8
 | 
				
			||||||
#define CACERTS		0x10
 | 
					#define CACERTS		0x10
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int get_cert_chain(X509 *cert, STACK **chain);
 | 
					int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain);
 | 
				
			||||||
int dump_cert_text (BIO *out, X509 *x);
 | 
					int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options, char *pempass);
 | 
				
			||||||
int dump_certs_keys_p12(BIO *out, PKCS12 *p12, char *pass, int passlen, int options);
 | 
					int dump_certs_pkeys_bags(BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags, char *pass,
 | 
				
			||||||
int dump_certs_pkeys_bags(BIO *out, STACK *bags, char *pass, int passlen, int options);
 | 
								  int passlen, int options, char *pempass);
 | 
				
			||||||
int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass, int passlen, int options);
 | 
					int dump_certs_pkeys_bag(BIO *out, PKCS12_SAFEBAG *bags, char *pass, int passlen, int options, char *pempass);
 | 
				
			||||||
int print_attribs(BIO *out, STACK *attrlst, char *name);
 | 
					int print_attribs(BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst, char *name);
 | 
				
			||||||
void hex_prin(BIO *out, unsigned char *buf, int len);
 | 
					void hex_prin(BIO *out, unsigned char *buf, int len);
 | 
				
			||||||
int alg_print(BIO *x, X509_ALGOR *alg);
 | 
					int alg_print(BIO *x, X509_ALGOR *alg);
 | 
				
			||||||
int cert_load(BIO *in, STACK *sk);
 | 
					int cert_load(BIO *in, STACK_OF(X509) *sk);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
 | 
					    ENGINE *e = NULL;
 | 
				
			||||||
    char *infile=NULL, *outfile=NULL, *keyname = NULL;	
 | 
					    char *infile=NULL, *outfile=NULL, *keyname = NULL;	
 | 
				
			||||||
    char *certfile=NULL;
 | 
					    char *certfile=NULL;
 | 
				
			||||||
    BIO *in=NULL, *out = NULL, *inkey = NULL, *certsin = NULL;
 | 
					    BIO *in=NULL, *out = NULL, *inkey = NULL, *certsin = NULL;
 | 
				
			||||||
@@ -99,15 +106,21 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
    int chain = 0;
 | 
					    int chain = 0;
 | 
				
			||||||
    int badarg = 0;
 | 
					    int badarg = 0;
 | 
				
			||||||
    int iter = PKCS12_DEFAULT_ITER;
 | 
					    int iter = PKCS12_DEFAULT_ITER;
 | 
				
			||||||
    int maciter = 1;
 | 
					    int maciter = PKCS12_DEFAULT_ITER;
 | 
				
			||||||
    int twopass = 0;
 | 
					    int twopass = 0;
 | 
				
			||||||
    int keytype = 0;
 | 
					    int keytype = 0;
 | 
				
			||||||
    int cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
 | 
					    int cert_pbe = NID_pbe_WithSHA1And40BitRC2_CBC;
 | 
				
			||||||
 | 
					    int key_pbe = NID_pbe_WithSHA1And3_Key_TripleDES_CBC;
 | 
				
			||||||
    int ret = 1;
 | 
					    int ret = 1;
 | 
				
			||||||
    int macver = 1;
 | 
					    int macver = 1;
 | 
				
			||||||
    int noprompt = 0;
 | 
					    int noprompt = 0;
 | 
				
			||||||
    STACK *canames = NULL;
 | 
					    STACK *canames = NULL;
 | 
				
			||||||
    char *cpass = NULL, *mpass = NULL;
 | 
					    char *cpass = NULL, *mpass = NULL;
 | 
				
			||||||
 | 
					    char *passargin = NULL, *passargout = NULL, *passarg = NULL;
 | 
				
			||||||
 | 
					    char *passin = NULL, *passout = NULL;
 | 
				
			||||||
 | 
					    char *inrand = NULL;
 | 
				
			||||||
 | 
					    char *CApath = NULL, *CAfile = NULL;
 | 
				
			||||||
 | 
					    char *engine=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    apps_startup();
 | 
					    apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -141,8 +154,35 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		else if (!strcmp (*args, "-noiter")) iter = 1;
 | 
							else if (!strcmp (*args, "-noiter")) iter = 1;
 | 
				
			||||||
		else if (!strcmp (*args, "-maciter"))
 | 
							else if (!strcmp (*args, "-maciter"))
 | 
				
			||||||
					 maciter = PKCS12_DEFAULT_ITER;
 | 
										 maciter = PKCS12_DEFAULT_ITER;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nomaciter"))
 | 
				
			||||||
 | 
										 maciter = 1;
 | 
				
			||||||
		else if (!strcmp (*args, "-nodes")) enc=NULL;
 | 
							else if (!strcmp (*args, "-nodes")) enc=NULL;
 | 
				
			||||||
		else if (!strcmp (*args, "-inkey")) {
 | 
							else if (!strcmp (*args, "-certpbe")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									cert_pbe=OBJ_txt2nid(*args);
 | 
				
			||||||
 | 
									if(cert_pbe == NID_undef) {
 | 
				
			||||||
 | 
										BIO_printf(bio_err,
 | 
				
			||||||
 | 
											 "Unknown PBE algorithm %s\n", *args);
 | 
				
			||||||
 | 
										badarg = 1;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-keypbe")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									key_pbe=OBJ_txt2nid(*args);
 | 
				
			||||||
 | 
									if(key_pbe == NID_undef) {
 | 
				
			||||||
 | 
										BIO_printf(bio_err,
 | 
				
			||||||
 | 
											 "Unknown PBE algorithm %s\n", *args);
 | 
				
			||||||
 | 
										badarg = 1;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-rand")) {
 | 
				
			||||||
 | 
							    if (args[1]) {
 | 
				
			||||||
 | 
								args++;	
 | 
				
			||||||
 | 
								inrand = *args;
 | 
				
			||||||
 | 
							    } else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-inkey")) {
 | 
				
			||||||
		    if (args[1]) {
 | 
							    if (args[1]) {
 | 
				
			||||||
			args++;	
 | 
								args++;	
 | 
				
			||||||
			keyname = *args;
 | 
								keyname = *args;
 | 
				
			||||||
@@ -160,7 +200,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		} else if (!strcmp (*args, "-caname")) {
 | 
							} else if (!strcmp (*args, "-caname")) {
 | 
				
			||||||
		    if (args[1]) {
 | 
							    if (args[1]) {
 | 
				
			||||||
			args++;	
 | 
								args++;	
 | 
				
			||||||
			if (!canames) canames = sk_new(NULL);
 | 
								if (!canames) canames = sk_new_null();
 | 
				
			||||||
			sk_push(canames, *args);
 | 
								sk_push(canames, *args);
 | 
				
			||||||
		    } else badarg = 1;
 | 
							    } else badarg = 1;
 | 
				
			||||||
		} else if (!strcmp (*args, "-in")) {
 | 
							} else if (!strcmp (*args, "-in")) {
 | 
				
			||||||
@@ -173,22 +213,37 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			args++;	
 | 
								args++;	
 | 
				
			||||||
			outfile = *args;
 | 
								outfile = *args;
 | 
				
			||||||
		    } else badarg = 1;
 | 
							    } else badarg = 1;
 | 
				
			||||||
		} else if (!strcmp (*args, "-envpass")) {
 | 
							} else if (!strcmp(*args,"-passin")) {
 | 
				
			||||||
		    if (args[1]) {
 | 
							    if (args[1]) {
 | 
				
			||||||
			args++;	
 | 
								args++;	
 | 
				
			||||||
			if(!(cpass = getenv(*args))) {
 | 
								passargin = *args;
 | 
				
			||||||
				BIO_printf(bio_err,
 | 
							    } else badarg = 1;
 | 
				
			||||||
				 "Can't read environment variable %s\n", *args);
 | 
							} else if (!strcmp(*args,"-passout")) {
 | 
				
			||||||
				goto end;
 | 
							    if (args[1]) {
 | 
				
			||||||
			}
 | 
								args++;	
 | 
				
			||||||
			noprompt = 1;
 | 
								passargout = *args;
 | 
				
			||||||
		    } else badarg = 1;
 | 
							    } else badarg = 1;
 | 
				
			||||||
		} else if (!strcmp (*args, "-password")) {
 | 
							} else if (!strcmp (*args, "-password")) {
 | 
				
			||||||
		    if (args[1]) {
 | 
							    if (args[1]) {
 | 
				
			||||||
			args++;	
 | 
								args++;	
 | 
				
			||||||
			cpass = *args;
 | 
								passarg = *args;
 | 
				
			||||||
		    	noprompt = 1;
 | 
							    	noprompt = 1;
 | 
				
			||||||
		    } else badarg = 1;
 | 
							    } else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp(*args,"-CApath")) {
 | 
				
			||||||
 | 
							    if (args[1]) {
 | 
				
			||||||
 | 
								args++;	
 | 
				
			||||||
 | 
								CApath = *args;
 | 
				
			||||||
 | 
							    } else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp(*args,"-CAfile")) {
 | 
				
			||||||
 | 
							    if (args[1]) {
 | 
				
			||||||
 | 
								args++;	
 | 
				
			||||||
 | 
								CAfile = *args;
 | 
				
			||||||
 | 
							    } else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp(*args,"-engine")) {
 | 
				
			||||||
 | 
							    if (args[1]) {
 | 
				
			||||||
 | 
								args++;	
 | 
				
			||||||
 | 
								engine = *args;
 | 
				
			||||||
 | 
							    } else badarg = 1;
 | 
				
			||||||
		} else badarg = 1;
 | 
							} else badarg = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	} else badarg = 1;
 | 
						} else badarg = 1;
 | 
				
			||||||
@@ -202,6 +257,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	BIO_printf (bio_err, "-chain        add certificate chain\n");
 | 
						BIO_printf (bio_err, "-chain        add certificate chain\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-inkey file   private key if not infile\n");
 | 
						BIO_printf (bio_err, "-inkey file   private key if not infile\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-certfile f   add all certs in f\n");
 | 
						BIO_printf (bio_err, "-certfile f   add all certs in f\n");
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "-CApath arg   - PEM format directory of CA's\n");
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "-CAfile arg   - PEM format file of CA's\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-name \"name\"  use name as friendly name\n");
 | 
						BIO_printf (bio_err, "-name \"name\"  use name as friendly name\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-caname \"nm\"  use nm as CA friendly name (can be used more than once).\n");
 | 
						BIO_printf (bio_err, "-caname \"nm\"  use nm as CA friendly name (can be used more than once).\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-in  infile   input filename\n");
 | 
						BIO_printf (bio_err, "-in  infile   input filename\n");
 | 
				
			||||||
@@ -223,202 +280,352 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	BIO_printf (bio_err, "-maciter      use MAC iteration\n");
 | 
						BIO_printf (bio_err, "-maciter      use MAC iteration\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-twopass      separate MAC, encryption passwords\n");
 | 
						BIO_printf (bio_err, "-twopass      separate MAC, encryption passwords\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-descert      encrypt PKCS#12 certificates with triple DES (default RC2-40)\n");
 | 
						BIO_printf (bio_err, "-descert      encrypt PKCS#12 certificates with triple DES (default RC2-40)\n");
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "-certpbe alg  specify certificate PBE algorithm (default RC2-40)\n");
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "-keypbe alg   specify private key PBE algorithm (default 3DES)\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-keyex        set MS key exchange type\n");
 | 
						BIO_printf (bio_err, "-keyex        set MS key exchange type\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-keysig       set MS key signature type\n");
 | 
						BIO_printf (bio_err, "-keysig       set MS key signature type\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-password p   set import/export password (NOT RECOMMENDED)\n");
 | 
						BIO_printf (bio_err, "-password p   set import/export password source\n");
 | 
				
			||||||
	BIO_printf (bio_err, "-envpass p    set import/export password from environment\n");
 | 
						BIO_printf (bio_err, "-passin p     input file pass phrase source\n");
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "-passout p    output file pass phrase source\n");
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "-engine e     use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err,  "-rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
 | 
						BIO_printf(bio_err,  "              load the file (or the files in the directory) into\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err,  "              the random number generator\n");
 | 
				
			||||||
    	goto end;
 | 
					    	goto end;
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    if(cpass) mpass = cpass;
 | 
					    if (engine != NULL) {
 | 
				
			||||||
    else {
 | 
						if((e = ENGINE_by_id(engine)) == NULL) {
 | 
				
			||||||
 | 
						    BIO_printf(bio_err,"invalid engine \"%s\"\n", engine);
 | 
				
			||||||
 | 
						    goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if(!ENGINE_set_default(e, ENGINE_METHOD_ALL)) {
 | 
				
			||||||
 | 
						    BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
						    goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
						/* Free our "structural" reference. */
 | 
				
			||||||
 | 
						ENGINE_free(e);
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    if(passarg) {
 | 
				
			||||||
 | 
						if(export_cert) passargout = passarg;
 | 
				
			||||||
 | 
						else passargin = passarg;
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "Error getting passwords\n");
 | 
				
			||||||
 | 
						goto end;
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    if(!cpass) {
 | 
				
			||||||
 | 
					    	if(export_cert) cpass = passout;
 | 
				
			||||||
 | 
					    	else cpass = passin;
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    if(cpass) {
 | 
				
			||||||
 | 
						mpass = cpass;
 | 
				
			||||||
 | 
						noprompt = 1;
 | 
				
			||||||
 | 
					    } else {
 | 
				
			||||||
	cpass = pass;
 | 
						cpass = pass;
 | 
				
			||||||
	mpass = macpass;
 | 
						mpass = macpass;
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    if(export_cert || inrand) {
 | 
				
			||||||
 | 
					    	app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
				
			||||||
 | 
					        if (inrand != NULL)
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
 | 
								app_RAND_load_files(inrand));
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
    ERR_load_crypto_strings();
 | 
					    ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    in = BIO_new (BIO_s_file());
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
    out = BIO_new (BIO_s_file());
 | 
					    CRYPTO_push_info("read files");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    if (!infile) BIO_set_fp (in, stdin, BIO_NOCLOSE);
 | 
					    if (!infile) in = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
				
			||||||
    else {
 | 
					    else in = BIO_new_file(infile, "rb");
 | 
				
			||||||
        if (BIO_read_filename (in, infile) <= 0) {
 | 
					    if (!in) {
 | 
				
			||||||
 | 
						    BIO_printf(bio_err, "Error opening input file %s\n",
 | 
				
			||||||
 | 
											infile ? infile : "<stdin>");
 | 
				
			||||||
	    perror (infile);
 | 
						    perror (infile);
 | 
				
			||||||
	    goto end;
 | 
						    goto end;
 | 
				
			||||||
	}
 | 
					   }
 | 
				
			||||||
    }
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
   if (certfile) {
 | 
					   if (certfile) {
 | 
				
			||||||
    	certsin = BIO_new (BIO_s_file());
 | 
					    	if(!(certsin = BIO_new_file(certfile, "r"))) {
 | 
				
			||||||
        if (BIO_read_filename (certsin, certfile) <= 0) {
 | 
						    BIO_printf(bio_err, "Can't open certificate file %s\n", certfile);
 | 
				
			||||||
	    perror (certfile);
 | 
						    perror (certfile);
 | 
				
			||||||
	    goto end;
 | 
						    goto end;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    if (keyname) {
 | 
					    if (keyname) {
 | 
				
			||||||
    	inkey = BIO_new (BIO_s_file());
 | 
					    	if(!(inkey = BIO_new_file(keyname, "r"))) {
 | 
				
			||||||
        if (BIO_read_filename (inkey, keyname) <= 0) {
 | 
						    BIO_printf(bio_err, "Can't key certificate file %s\n", keyname);
 | 
				
			||||||
	    perror (keyname);
 | 
						    perror (keyname);
 | 
				
			||||||
	    goto end;
 | 
						    goto end;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
     }
 | 
					     }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    if (!outfile) BIO_set_fp (out, stdout, BIO_NOCLOSE);
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
    else {
 | 
					    CRYPTO_pop_info();
 | 
				
			||||||
        if (BIO_write_filename (out, outfile) <= 0) {
 | 
					    CRYPTO_push_info("write files");
 | 
				
			||||||
	    perror (outfile);
 | 
					#endif
 | 
				
			||||||
	    goto end;
 | 
					
 | 
				
			||||||
 | 
					    if (!outfile) {
 | 
				
			||||||
 | 
						out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
						    out = BIO_push(tmpbio, out);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					    } else out = BIO_new_file(outfile, "wb");
 | 
				
			||||||
 | 
					    if (!out) {
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "Error opening output file %s\n",
 | 
				
			||||||
 | 
											outfile ? outfile : "<stdout>");
 | 
				
			||||||
 | 
						perror (outfile);
 | 
				
			||||||
 | 
						goto end;
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
    if (twopass) {
 | 
					    if (twopass) {
 | 
				
			||||||
	if(EVP_read_pw_string (macpass, 50, "Enter MAC Password:", export_cert)) {
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
					    CRYPTO_push_info("read MAC password");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						if(EVP_read_pw_string (macpass, 50, "Enter MAC Password:", export_cert))
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
    	    BIO_printf (bio_err, "Can't read Password\n");
 | 
					    	    BIO_printf (bio_err, "Can't read Password\n");
 | 
				
			||||||
    	    goto end;
 | 
					    	    goto end;
 | 
				
			||||||
       	}
 | 
					       	}
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
					    CRYPTO_pop_info();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
if (export_cert) {
 | 
					    if (export_cert) {
 | 
				
			||||||
	EVP_PKEY *key;
 | 
						EVP_PKEY *key = NULL;
 | 
				
			||||||
	STACK *bags, *safes;
 | 
						STACK_OF(PKCS12_SAFEBAG) *bags = NULL;
 | 
				
			||||||
	PKCS12_SAFEBAG *bag;
 | 
						STACK_OF(PKCS7) *safes = NULL;
 | 
				
			||||||
	PKCS8_PRIV_KEY_INFO *p8;
 | 
						PKCS12_SAFEBAG *bag = NULL;
 | 
				
			||||||
	PKCS7 *authsafe;
 | 
						PKCS8_PRIV_KEY_INFO *p8 = NULL;
 | 
				
			||||||
	X509 *cert, *ucert = NULL;
 | 
						PKCS7 *authsafe = NULL;
 | 
				
			||||||
	STACK *certs;
 | 
						X509 *ucert = NULL;
 | 
				
			||||||
	char *catmp;
 | 
						STACK_OF(X509) *certs=NULL;
 | 
				
			||||||
	int i, pmatch = 0;
 | 
						char *catmp = NULL;
 | 
				
			||||||
 | 
						int i;
 | 
				
			||||||
	unsigned char keyid[EVP_MAX_MD_SIZE];
 | 
						unsigned char keyid[EVP_MAX_MD_SIZE];
 | 
				
			||||||
	unsigned int keyidlen;
 | 
						unsigned int keyidlen = 0;
 | 
				
			||||||
	/* Get private key so we can match it to a certificate */
 | 
					
 | 
				
			||||||
	key = PEM_read_bio_PrivateKey(inkey ? inkey : in, NULL, NULL);
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
	if (!inkey) BIO_reset(in);
 | 
						CRYPTO_push_info("process -export_cert");
 | 
				
			||||||
 | 
						CRYPTO_push_info("reading private key");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						key = PEM_read_bio_PrivateKey(inkey ? inkey : in, NULL, NULL, passin);
 | 
				
			||||||
 | 
						if (!inkey) (void) BIO_reset(in);
 | 
				
			||||||
 | 
						else BIO_free(inkey);
 | 
				
			||||||
	if (!key) {
 | 
						if (!key) {
 | 
				
			||||||
		BIO_printf (bio_err, "Error loading private key\n");
 | 
							BIO_printf (bio_err, "Error loading private key\n");
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto end;
 | 
							goto export_end;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	certs = sk_new(NULL);
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("reading certs from input");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						certs = sk_X509_new_null();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* Load in all certs in input file */
 | 
						/* Load in all certs in input file */
 | 
				
			||||||
	if(!cert_load(in, certs)) {
 | 
						if(!cert_load(in, certs)) {
 | 
				
			||||||
		BIO_printf(bio_err, "Error loading certificates from input\n");
 | 
							BIO_printf(bio_err, "Error loading certificates from input\n");
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto end;
 | 
							goto export_end;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	bags = sk_new (NULL);
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("reading certs from input 2");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for(i = 0; i < sk_X509_num(certs); i++) {
 | 
				
			||||||
 | 
							ucert = sk_X509_value(certs, i);
 | 
				
			||||||
 | 
							if(X509_check_private_key(ucert, key)) {
 | 
				
			||||||
 | 
								X509_digest(ucert, EVP_sha1(), keyid, &keyidlen);
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if(!keyidlen) {
 | 
				
			||||||
 | 
							ucert = NULL;
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "No certificate matches private key\n");
 | 
				
			||||||
 | 
							goto export_end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("reading certs from certfile");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						bags = sk_PKCS12_SAFEBAG_new_null ();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* Add any more certificates asked for */
 | 
						/* Add any more certificates asked for */
 | 
				
			||||||
	if (certsin) {
 | 
						if (certsin) {
 | 
				
			||||||
		if(!cert_load(certsin, certs)) {
 | 
							if(!cert_load(certsin, certs)) {
 | 
				
			||||||
			BIO_printf(bio_err, "Error loading certificates from certfile\n");
 | 
								BIO_printf(bio_err, "Error loading certificates from certfile\n");
 | 
				
			||||||
			ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
			goto end;
 | 
								goto export_end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	    	BIO_free(certsin);
 | 
						    	BIO_free(certsin);
 | 
				
			||||||
 	}
 | 
					 	}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* Find certificate (if any) matching private key */
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
	for(i = 0; i < sk_num(certs); i++) {
 | 
						CRYPTO_push_info("building chain");
 | 
				
			||||||
			cert = (X509 *)sk_value(certs, i);
 | 
					#endif
 | 
				
			||||||
			if(X509_check_private_key(cert, key)) {
 | 
					 | 
				
			||||||
				ucert = cert;
 | 
					 | 
				
			||||||
				break;
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if(!ucert) {
 | 
					 | 
				
			||||||
		BIO_printf(bio_err, "No certificate matches private key\n");
 | 
					 | 
				
			||||||
		goto end;
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* If chaining get chain from user cert */
 | 
						/* If chaining get chain from user cert */
 | 
				
			||||||
	if (chain) {
 | 
						if (chain) {
 | 
				
			||||||
        	int vret;
 | 
					        	int vret;
 | 
				
			||||||
		STACK *chain2;
 | 
							STACK_OF(X509) *chain2;
 | 
				
			||||||
 | 
							X509_STORE *store = X509_STORE_new();
 | 
				
			||||||
 | 
							if (!store)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf (bio_err, "Memory allocation error\n");
 | 
				
			||||||
 | 
								goto export_end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (!X509_STORE_load_locations(store, CAfile, CApath))
 | 
				
			||||||
 | 
								X509_STORE_set_default_paths (store);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		vret = get_cert_chain (ucert, &chain2);
 | 
							vret = get_cert_chain (ucert, store, &chain2);
 | 
				
			||||||
 | 
							X509_STORE_free(store);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (!vret) {
 | 
				
			||||||
 | 
							    /* Exclude verified certificate */
 | 
				
			||||||
 | 
							    for (i = 1; i < sk_X509_num (chain2) ; i++) 
 | 
				
			||||||
 | 
								sk_X509_push(certs, sk_X509_value (chain2, i));
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							sk_X509_free(chain2);
 | 
				
			||||||
		if (vret) {
 | 
							if (vret) {
 | 
				
			||||||
			BIO_printf (bio_err, "Error %s getting chain.\n",
 | 
								BIO_printf (bio_err, "Error %s getting chain.\n",
 | 
				
			||||||
					X509_verify_cert_error_string(vret));
 | 
										X509_verify_cert_error_string(vret));
 | 
				
			||||||
			goto end;
 | 
								goto export_end;
 | 
				
			||||||
		}			
 | 
							}			
 | 
				
			||||||
		/* Exclude verified certificate */
 | 
					 | 
				
			||||||
		for (i = 1; i < sk_num (chain2) ; i++) 
 | 
					 | 
				
			||||||
				 sk_push(certs, sk_value (chain2, i));
 | 
					 | 
				
			||||||
		sk_free(chain2);
 | 
					 | 
				
			||||||
			
 | 
					 | 
				
			||||||
    	}
 | 
					    	}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("building bags");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* We now have loads of certificates: include them all */
 | 
						/* We now have loads of certificates: include them all */
 | 
				
			||||||
	for(i = 0; i < sk_num(certs); i++) {
 | 
						for(i = 0; i < sk_X509_num(certs); i++) {
 | 
				
			||||||
		cert = (X509 *)sk_value(certs, i);
 | 
							X509 *cert = NULL;
 | 
				
			||||||
 | 
							cert = sk_X509_value(certs, i);
 | 
				
			||||||
		bag = M_PKCS12_x5092certbag(cert);
 | 
							bag = M_PKCS12_x5092certbag(cert);
 | 
				
			||||||
		/* If it matches private key mark it */
 | 
							/* If it matches private key set id */
 | 
				
			||||||
		if(cert == ucert) {
 | 
							if(cert == ucert) {
 | 
				
			||||||
			if(name) PKCS12_add_friendlyname(bag, name, -1);
 | 
								if(name) PKCS12_add_friendlyname(bag, name, -1);
 | 
				
			||||||
			X509_digest(cert, EVP_sha1(), keyid, &keyidlen);
 | 
					 | 
				
			||||||
			PKCS12_add_localkeyid(bag, keyid, keyidlen);
 | 
								PKCS12_add_localkeyid(bag, keyid, keyidlen);
 | 
				
			||||||
			pmatch = 1;
 | 
					 | 
				
			||||||
		} else if((catmp = sk_shift(canames))) 
 | 
							} else if((catmp = sk_shift(canames))) 
 | 
				
			||||||
				PKCS12_add_friendlyname(bag, catmp, -1);
 | 
									PKCS12_add_friendlyname(bag, catmp, -1);
 | 
				
			||||||
		sk_push(bags, (char *)bag);
 | 
							sk_PKCS12_SAFEBAG_push(bags, bag);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
						sk_X509_pop_free(certs, X509_free);
 | 
				
			||||||
 | 
						certs = NULL;
 | 
				
			||||||
 | 
						/* ucert is part of certs so it is already freed */
 | 
				
			||||||
 | 
						ucert = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (canames) sk_free(canames);
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("encrypting bags");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if(!noprompt &&
 | 
						if(!noprompt &&
 | 
				
			||||||
		EVP_read_pw_string(pass, 50, "Enter Export Password:", 1)) {
 | 
							EVP_read_pw_string(pass, 50, "Enter Export Password:", 1)) {
 | 
				
			||||||
	    BIO_printf (bio_err, "Can't read Password\n");
 | 
						    BIO_printf (bio_err, "Can't read Password\n");
 | 
				
			||||||
	    goto end;
 | 
						    goto export_end;
 | 
				
			||||||
        }
 | 
					        }
 | 
				
			||||||
	if (!twopass) strcpy(macpass, pass);
 | 
						if (!twopass) strcpy(macpass, pass);
 | 
				
			||||||
	/* Turn certbags into encrypted authsafe */
 | 
						/* Turn certbags into encrypted authsafe */
 | 
				
			||||||
	authsafe = PKCS12_pack_p7encdata (cert_pbe, cpass, -1, NULL, 0,
 | 
						authsafe = PKCS12_pack_p7encdata(cert_pbe, cpass, -1, NULL, 0,
 | 
				
			||||||
								 iter, bags);
 | 
													 iter, bags);
 | 
				
			||||||
	sk_pop_free(bags, PKCS12_SAFEBAG_free);
 | 
						sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
 | 
				
			||||||
 | 
						bags = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!authsafe) {
 | 
						if (!authsafe) {
 | 
				
			||||||
		ERR_print_errors (bio_err);
 | 
							ERR_print_errors (bio_err);
 | 
				
			||||||
		goto end;
 | 
							goto export_end;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	safes = sk_new (NULL);
 | 
						safes = sk_PKCS7_new_null ();
 | 
				
			||||||
	sk_push (safes, (char *)authsafe);
 | 
						sk_PKCS7_push (safes, authsafe);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("building shrouded key bag");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* Make a shrouded key bag */
 | 
						/* Make a shrouded key bag */
 | 
				
			||||||
	p8 = EVP_PKEY2PKCS8 (key);
 | 
						p8 = EVP_PKEY2PKCS8 (key);
 | 
				
			||||||
	EVP_PKEY_free(key);
 | 
					 | 
				
			||||||
	if(keytype) PKCS8_add_keyusage(p8, keytype);
 | 
						if(keytype) PKCS8_add_keyusage(p8, keytype);
 | 
				
			||||||
	bag = PKCS12_MAKE_SHKEYBAG (NID_pbe_WithSHA1And3_Key_TripleDES_CBC,
 | 
						bag = PKCS12_MAKE_SHKEYBAG(key_pbe, cpass, -1, NULL, 0, iter, p8);
 | 
				
			||||||
			cpass, -1, NULL, 0, iter, p8);
 | 
					 | 
				
			||||||
	PKCS8_PRIV_KEY_INFO_free(p8);
 | 
						PKCS8_PRIV_KEY_INFO_free(p8);
 | 
				
			||||||
 | 
						p8 = NULL;
 | 
				
			||||||
        if (name) PKCS12_add_friendlyname (bag, name, -1);
 | 
					        if (name) PKCS12_add_friendlyname (bag, name, -1);
 | 
				
			||||||
	if(pmatch) PKCS12_add_localkeyid (bag, keyid, keyidlen);
 | 
						PKCS12_add_localkeyid (bag, keyid, keyidlen);
 | 
				
			||||||
	bags = sk_new(NULL);
 | 
						bags = sk_PKCS12_SAFEBAG_new_null();
 | 
				
			||||||
	sk_push (bags, (char *)bag);
 | 
						sk_PKCS12_SAFEBAG_push (bags, bag);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("encrypting shrouded key bag");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* Turn it into unencrypted safe bag */
 | 
						/* Turn it into unencrypted safe bag */
 | 
				
			||||||
	authsafe = PKCS12_pack_p7data (bags);
 | 
						authsafe = PKCS12_pack_p7data (bags);
 | 
				
			||||||
	sk_pop_free(bags, PKCS12_SAFEBAG_free);
 | 
						sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
 | 
				
			||||||
	sk_push (safes, (char *)authsafe);
 | 
						bags = NULL;
 | 
				
			||||||
 | 
						sk_PKCS7_push (safes, authsafe);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("building pkcs12");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	p12 = PKCS12_init (NID_pkcs7_data);
 | 
						p12 = PKCS12_init (NID_pkcs7_data);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	M_PKCS12_pack_authsafes (p12, safes);
 | 
						M_PKCS12_pack_authsafes (p12, safes);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	sk_pop_free(safes, PKCS7_free);
 | 
						sk_PKCS7_pop_free(safes, PKCS7_free);
 | 
				
			||||||
 | 
						safes = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	PKCS12_set_mac (p12, mpass, -1, NULL, 0, maciter, NULL);
 | 
						PKCS12_set_mac (p12, mpass, -1, NULL, 0, maciter, NULL);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("writing pkcs12");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	i2d_PKCS12_bio (out, p12);
 | 
						i2d_PKCS12_bio (out, p12);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	PKCS12_free(p12);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	ret = 0;
 | 
						ret = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    export_end:
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
						CRYPTO_push_info("process -export_cert: freeing");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (key) EVP_PKEY_free(key);
 | 
				
			||||||
 | 
						if (certs) sk_X509_pop_free(certs, X509_free);
 | 
				
			||||||
 | 
						if (safes) sk_PKCS7_pop_free(safes, PKCS7_free);
 | 
				
			||||||
 | 
						if (bags) sk_PKCS12_SAFEBAG_pop_free(bags, PKCS12_SAFEBAG_free);
 | 
				
			||||||
 | 
						if (ucert) X509_free(ucert);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
	goto end;
 | 
						goto end;
 | 
				
			||||||
	
 | 
						
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
@@ -428,57 +635,76 @@ if (export_cert) {
 | 
				
			|||||||
	goto end;
 | 
						goto end;
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
					    CRYPTO_push_info("read import password");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
    if(!noprompt && EVP_read_pw_string(pass, 50, "Enter Import Password:", 0)) {
 | 
					    if(!noprompt && EVP_read_pw_string(pass, 50, "Enter Import Password:", 0)) {
 | 
				
			||||||
	BIO_printf (bio_err, "Can't read Password\n");
 | 
						BIO_printf (bio_err, "Can't read Password\n");
 | 
				
			||||||
	goto end;
 | 
						goto end;
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
					    CRYPTO_pop_info();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    if (!twopass) strcpy(macpass, pass);
 | 
					    if (!twopass) strcpy(macpass, pass);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    if (options & INFO) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN1_INTEGER_get (p12->mac->iter) : 1);
 | 
					    if (options & INFO) BIO_printf (bio_err, "MAC Iteration %ld\n", p12->mac->iter ? ASN1_INTEGER_get (p12->mac->iter) : 1);
 | 
				
			||||||
    if(macver) {
 | 
					    if(macver) {
 | 
				
			||||||
	if (!PKCS12_verify_mac (p12, mpass, -1)) {
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
	    BIO_printf (bio_err, "Mac verify errror: invalid password?\n");
 | 
					    CRYPTO_push_info("verify MAC");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						/* If we enter empty password try no password first */
 | 
				
			||||||
 | 
						if(!macpass[0] && PKCS12_verify_mac(p12, NULL, 0)) {
 | 
				
			||||||
 | 
							/* If mac and crypto pass the same set it to NULL too */
 | 
				
			||||||
 | 
							if(!twopass) cpass = NULL;
 | 
				
			||||||
 | 
						} else if (!PKCS12_verify_mac(p12, mpass, -1)) {
 | 
				
			||||||
 | 
						    BIO_printf (bio_err, "Mac verify error: invalid password?\n");
 | 
				
			||||||
	    ERR_print_errors (bio_err);
 | 
						    ERR_print_errors (bio_err);
 | 
				
			||||||
	    goto end;
 | 
						    goto end;
 | 
				
			||||||
	} else BIO_printf (bio_err, "MAC verified OK\n");
 | 
						}
 | 
				
			||||||
 | 
						BIO_printf (bio_err, "MAC verified OK\n");
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
					    CRYPTO_pop_info();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
    if (!dump_certs_keys_p12 (out, p12, cpass, -1, options)) {
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
					    CRYPTO_push_info("output keys and certificates");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					    if (!dump_certs_keys_p12 (out, p12, cpass, -1, options, passout)) {
 | 
				
			||||||
	BIO_printf(bio_err, "Error outputting keys and certificates\n");
 | 
						BIO_printf(bio_err, "Error outputting keys and certificates\n");
 | 
				
			||||||
	ERR_print_errors (bio_err);
 | 
						ERR_print_errors (bio_err);
 | 
				
			||||||
	goto end;
 | 
						goto end;
 | 
				
			||||||
    }
 | 
					    }
 | 
				
			||||||
    PKCS12_free(p12);
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
					    CRYPTO_pop_info();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
    ret = 0;
 | 
					    ret = 0;
 | 
				
			||||||
    end:
 | 
					 end:
 | 
				
			||||||
    BIO_free(out);
 | 
					    if (p12) PKCS12_free(p12);
 | 
				
			||||||
 | 
					    if(export_cert || inrand) app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
					    CRYPTO_remove_all_info();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					    BIO_free(in);
 | 
				
			||||||
 | 
					    BIO_free_all(out);
 | 
				
			||||||
 | 
					    if (canames) sk_free(canames);
 | 
				
			||||||
 | 
					    if(passin) OPENSSL_free(passin);
 | 
				
			||||||
 | 
					    if(passout) OPENSSL_free(passout);
 | 
				
			||||||
    EXIT(ret);
 | 
					    EXIT(ret);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int dump_cert_text (BIO *out, X509 *x)
 | 
					 | 
				
			||||||
{
 | 
					 | 
				
			||||||
	char buf[256];
 | 
					 | 
				
			||||||
	X509_NAME_oneline(X509_get_subject_name(x),buf,256);
 | 
					 | 
				
			||||||
	BIO_puts(out,"subject=");
 | 
					 | 
				
			||||||
	BIO_puts(out,buf);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	X509_NAME_oneline(X509_get_issuer_name(x),buf,256);
 | 
					 | 
				
			||||||
	BIO_puts(out,"\nissuer= ");
 | 
					 | 
				
			||||||
	BIO_puts(out,buf);
 | 
					 | 
				
			||||||
	BIO_puts(out,"\n");
 | 
					 | 
				
			||||||
        return 0;
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass,
 | 
					int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass,
 | 
				
			||||||
	     int passlen, int options)
 | 
						     int passlen, int options, char *pempass)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	STACK *asafes, *bags;
 | 
						STACK_OF(PKCS7) *asafes;
 | 
				
			||||||
 | 
						STACK_OF(PKCS12_SAFEBAG) *bags;
 | 
				
			||||||
	int i, bagnid;
 | 
						int i, bagnid;
 | 
				
			||||||
	PKCS7 *p7;
 | 
						PKCS7 *p7;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!( asafes = M_PKCS12_unpack_authsafes (p12))) return 0;
 | 
						if (!( asafes = M_PKCS12_unpack_authsafes (p12))) return 0;
 | 
				
			||||||
	for (i = 0; i < sk_num (asafes); i++) {
 | 
						for (i = 0; i < sk_PKCS7_num (asafes); i++) {
 | 
				
			||||||
		p7 = (PKCS7 *) sk_value (asafes, i);
 | 
							p7 = sk_PKCS7_value (asafes, i);
 | 
				
			||||||
		bagnid = OBJ_obj2nid (p7->type);
 | 
							bagnid = OBJ_obj2nid (p7->type);
 | 
				
			||||||
		if (bagnid == NID_pkcs7_data) {
 | 
							if (bagnid == NID_pkcs7_data) {
 | 
				
			||||||
			bags = M_PKCS12_unpack_p7data (p7);
 | 
								bags = M_PKCS12_unpack_p7data (p7);
 | 
				
			||||||
@@ -493,30 +719,32 @@ int dump_certs_keys_p12 (BIO *out, PKCS12 *p12, char *pass,
 | 
				
			|||||||
		} else continue;
 | 
							} else continue;
 | 
				
			||||||
		if (!bags) return 0;
 | 
							if (!bags) return 0;
 | 
				
			||||||
	    	if (!dump_certs_pkeys_bags (out, bags, pass, passlen, 
 | 
						    	if (!dump_certs_pkeys_bags (out, bags, pass, passlen, 
 | 
				
			||||||
							 options)) {
 | 
											 options, pempass)) {
 | 
				
			||||||
			sk_pop_free (bags, PKCS12_SAFEBAG_free);
 | 
								sk_PKCS12_SAFEBAG_pop_free (bags, PKCS12_SAFEBAG_free);
 | 
				
			||||||
			return 0;
 | 
								return 0;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		sk_pop_free (bags, PKCS12_SAFEBAG_free);
 | 
							sk_PKCS12_SAFEBAG_pop_free (bags, PKCS12_SAFEBAG_free);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	sk_pop_free (asafes, PKCS7_free);
 | 
						sk_PKCS7_pop_free (asafes, PKCS7_free);
 | 
				
			||||||
	return 1;
 | 
						return 1;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int dump_certs_pkeys_bags (BIO *out, STACK *bags, char *pass,
 | 
					int dump_certs_pkeys_bags (BIO *out, STACK_OF(PKCS12_SAFEBAG) *bags,
 | 
				
			||||||
	     int passlen, int options)
 | 
								   char *pass, int passlen, int options, char *pempass)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	int i;
 | 
						int i;
 | 
				
			||||||
	for (i = 0; i < sk_num (bags); i++) {
 | 
						for (i = 0; i < sk_PKCS12_SAFEBAG_num (bags); i++) {
 | 
				
			||||||
		if (!dump_certs_pkeys_bag (out,
 | 
							if (!dump_certs_pkeys_bag (out,
 | 
				
			||||||
			 (PKCS12_SAFEBAG *)sk_value (bags, i), pass, passlen,
 | 
										   sk_PKCS12_SAFEBAG_value (bags, i),
 | 
				
			||||||
					 		options)) return 0;
 | 
										   pass, passlen,
 | 
				
			||||||
 | 
										   options, pempass))
 | 
				
			||||||
 | 
							    return 0;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	return 1;
 | 
						return 1;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
 | 
					int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
 | 
				
			||||||
	     int passlen, int options)
 | 
						     int passlen, int options, char *pempass)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	EVP_PKEY *pkey;
 | 
						EVP_PKEY *pkey;
 | 
				
			||||||
	PKCS8_PRIV_KEY_INFO *p8;
 | 
						PKCS8_PRIV_KEY_INFO *p8;
 | 
				
			||||||
@@ -531,7 +759,7 @@ int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
 | 
				
			|||||||
		p8 = bag->value.keybag;
 | 
							p8 = bag->value.keybag;
 | 
				
			||||||
		if (!(pkey = EVP_PKCS82PKEY (p8))) return 0;
 | 
							if (!(pkey = EVP_PKCS82PKEY (p8))) return 0;
 | 
				
			||||||
		print_attribs (out, p8->attributes, "Key Attributes");
 | 
							print_attribs (out, p8->attributes, "Key Attributes");
 | 
				
			||||||
		PEM_write_bio_PrivateKey (out, pkey, enc, NULL, 0, NULL);
 | 
							PEM_write_bio_PrivateKey (out, pkey, enc, NULL, 0, NULL, pempass);
 | 
				
			||||||
		EVP_PKEY_free(pkey);
 | 
							EVP_PKEY_free(pkey);
 | 
				
			||||||
	break;
 | 
						break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -547,7 +775,7 @@ int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
 | 
				
			|||||||
		if (!(pkey = EVP_PKCS82PKEY (p8))) return 0;
 | 
							if (!(pkey = EVP_PKCS82PKEY (p8))) return 0;
 | 
				
			||||||
		print_attribs (out, p8->attributes, "Key Attributes");
 | 
							print_attribs (out, p8->attributes, "Key Attributes");
 | 
				
			||||||
		PKCS8_PRIV_KEY_INFO_free(p8);
 | 
							PKCS8_PRIV_KEY_INFO_free(p8);
 | 
				
			||||||
		PEM_write_bio_PrivateKey (out, pkey, enc, NULL, 0, NULL);
 | 
							PEM_write_bio_PrivateKey (out, pkey, enc, NULL, 0, NULL, pempass);
 | 
				
			||||||
		EVP_PKEY_free(pkey);
 | 
							EVP_PKEY_free(pkey);
 | 
				
			||||||
	break;
 | 
						break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -570,7 +798,7 @@ int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
 | 
				
			|||||||
		if (options & INFO) BIO_printf (bio_err, "Safe Contents bag\n");
 | 
							if (options & INFO) BIO_printf (bio_err, "Safe Contents bag\n");
 | 
				
			||||||
		print_attribs (out, bag->attrib, "Bag Attributes");
 | 
							print_attribs (out, bag->attrib, "Bag Attributes");
 | 
				
			||||||
		return dump_certs_pkeys_bags (out, bag->value.safes, pass,
 | 
							return dump_certs_pkeys_bags (out, bag->value.safes, pass,
 | 
				
			||||||
							    passlen, options);
 | 
												    passlen, options, pempass);
 | 
				
			||||||
					
 | 
										
 | 
				
			||||||
	default:
 | 
						default:
 | 
				
			||||||
		BIO_printf (bio_err, "Warning unsupported bag type: ");
 | 
							BIO_printf (bio_err, "Warning unsupported bag type: ");
 | 
				
			||||||
@@ -586,30 +814,22 @@ int dump_certs_pkeys_bag (BIO *out, PKCS12_SAFEBAG *bag, char *pass,
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
/* Hope this is OK .... */
 | 
					/* Hope this is OK .... */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int get_cert_chain (X509 *cert, STACK **chain)
 | 
					int get_cert_chain (X509 *cert, X509_STORE *store, STACK_OF(X509) **chain)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	X509_STORE *store;
 | 
					 | 
				
			||||||
	X509_STORE_CTX store_ctx;
 | 
						X509_STORE_CTX store_ctx;
 | 
				
			||||||
	STACK *chn;
 | 
						STACK_OF(X509) *chn;
 | 
				
			||||||
	int i;
 | 
						int i;
 | 
				
			||||||
	X509 *x;
 | 
					
 | 
				
			||||||
	store = X509_STORE_new ();
 | 
					 | 
				
			||||||
	X509_STORE_set_default_paths (store);
 | 
					 | 
				
			||||||
	X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
 | 
						X509_STORE_CTX_init(&store_ctx, store, cert, NULL);
 | 
				
			||||||
	if (X509_verify_cert(&store_ctx) <= 0) {
 | 
						if (X509_verify_cert(&store_ctx) <= 0) {
 | 
				
			||||||
		i = X509_STORE_CTX_get_error (&store_ctx);
 | 
							i = X509_STORE_CTX_get_error (&store_ctx);
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	chn =  sk_dup(X509_STORE_CTX_get_chain (&store_ctx));
 | 
						chn =  X509_STORE_CTX_get1_chain(&store_ctx);
 | 
				
			||||||
	for (i = 0; i < sk_num(chn); i++) {
 | 
					 | 
				
			||||||
		x = (X509 *)sk_value(chn, i);
 | 
					 | 
				
			||||||
		CRYPTO_add(&x->references,1,CRYPTO_LOCK_X509);
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	i = 0;
 | 
						i = 0;
 | 
				
			||||||
	*chain = chn;
 | 
						*chain = chn;
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	X509_STORE_CTX_cleanup(&store_ctx);
 | 
						X509_STORE_CTX_cleanup(&store_ctx);
 | 
				
			||||||
	X509_STORE_free(store);
 | 
					 | 
				
			||||||
	
 | 
						
 | 
				
			||||||
	return i;
 | 
						return i;
 | 
				
			||||||
}	
 | 
					}	
 | 
				
			||||||
@@ -628,22 +848,34 @@ int alg_print (BIO *x, X509_ALGOR *alg)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
/* Load all certificates from a given file */
 | 
					/* Load all certificates from a given file */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int cert_load(BIO *in, STACK *sk)
 | 
					int cert_load(BIO *in, STACK_OF(X509) *sk)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	int ret;
 | 
						int ret;
 | 
				
			||||||
	X509 *cert;
 | 
						X509 *cert;
 | 
				
			||||||
	ret = 0;
 | 
						ret = 0;
 | 
				
			||||||
	while((cert = PEM_read_bio_X509(in, NULL, NULL))) {
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_push_info("cert_load(): reading one cert");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						while((cert = PEM_read_bio_X509(in, NULL, NULL, NULL))) {
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
							CRYPTO_pop_info();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
		ret = 1;
 | 
							ret = 1;
 | 
				
			||||||
		sk_push(sk, (char *)cert);
 | 
							sk_X509_push(sk, cert);
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
							CRYPTO_push_info("cert_load(): reading one cert");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					#ifdef CRYPTO_MDEBUG
 | 
				
			||||||
 | 
						CRYPTO_pop_info();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
	if(ret) ERR_clear_error();
 | 
						if(ret) ERR_clear_error();
 | 
				
			||||||
	return ret;
 | 
						return ret;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* Generalised attribute print: handle PKCS#8 and bag attributes */
 | 
					/* Generalised attribute print: handle PKCS#8 and bag attributes */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int print_attribs (BIO *out, STACK *attrlst, char *name)
 | 
					int print_attribs (BIO *out, STACK_OF(X509_ATTRIBUTE) *attrlst, char *name)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	X509_ATTRIBUTE *attr;
 | 
						X509_ATTRIBUTE *attr;
 | 
				
			||||||
	ASN1_TYPE *av;
 | 
						ASN1_TYPE *av;
 | 
				
			||||||
@@ -653,13 +885,13 @@ int print_attribs (BIO *out, STACK *attrlst, char *name)
 | 
				
			|||||||
		BIO_printf(out, "%s: <No Attributes>\n", name);
 | 
							BIO_printf(out, "%s: <No Attributes>\n", name);
 | 
				
			||||||
		return 1;
 | 
							return 1;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	if(!sk_num(attrlst)) {
 | 
						if(!sk_X509_ATTRIBUTE_num(attrlst)) {
 | 
				
			||||||
		BIO_printf(out, "%s: <Empty Attributes>\n", name);
 | 
							BIO_printf(out, "%s: <Empty Attributes>\n", name);
 | 
				
			||||||
		return 1;
 | 
							return 1;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	BIO_printf(out, "%s\n", name);
 | 
						BIO_printf(out, "%s\n", name);
 | 
				
			||||||
	for(i = 0; i < sk_num(attrlst); i++) {
 | 
						for(i = 0; i < sk_X509_ATTRIBUTE_num(attrlst); i++) {
 | 
				
			||||||
		attr = (X509_ATTRIBUTE *) sk_value(attrlst, i);
 | 
							attr = sk_X509_ATTRIBUTE_value(attrlst, i);
 | 
				
			||||||
		attr_nid = OBJ_obj2nid(attr->object);
 | 
							attr_nid = OBJ_obj2nid(attr->object);
 | 
				
			||||||
		BIO_printf(out, "    ");
 | 
							BIO_printf(out, "    ");
 | 
				
			||||||
		if(attr_nid == NID_undef) {
 | 
							if(attr_nid == NID_undef) {
 | 
				
			||||||
@@ -674,18 +906,18 @@ int print_attribs (BIO *out, STACK *attrlst, char *name)
 | 
				
			|||||||
        			value = uni2asc(av->value.bmpstring->data,
 | 
					        			value = uni2asc(av->value.bmpstring->data,
 | 
				
			||||||
                                	       av->value.bmpstring->length);
 | 
					                                	       av->value.bmpstring->length);
 | 
				
			||||||
				BIO_printf(out, "%s\n", value);
 | 
									BIO_printf(out, "%s\n", value);
 | 
				
			||||||
				Free(value);
 | 
									OPENSSL_free(value);
 | 
				
			||||||
				break;
 | 
									break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				case V_ASN1_OCTET_STRING:
 | 
									case V_ASN1_OCTET_STRING:
 | 
				
			||||||
				hex_prin(out, av->value.bit_string->data,
 | 
									hex_prin(out, av->value.octet_string->data,
 | 
				
			||||||
					av->value.bit_string->length);
 | 
										av->value.octet_string->length);
 | 
				
			||||||
				BIO_printf(out, "\n");	
 | 
									BIO_printf(out, "\n");	
 | 
				
			||||||
				break;
 | 
									break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				case V_ASN1_BIT_STRING:
 | 
									case V_ASN1_BIT_STRING:
 | 
				
			||||||
				hex_prin(out, av->value.octet_string->data,
 | 
									hex_prin(out, av->value.bit_string->data,
 | 
				
			||||||
					av->value.octet_string->length);
 | 
										av->value.bit_string->length);
 | 
				
			||||||
				BIO_printf(out, "\n");	
 | 
									BIO_printf(out, "\n");	
 | 
				
			||||||
				break;
 | 
									break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -703,3 +935,5 @@ void hex_prin(BIO *out, unsigned char *buf, int len)
 | 
				
			|||||||
	int i;
 | 
						int i;
 | 
				
			||||||
	for (i = 0; i < len; i++) BIO_printf (out, "%02X ", buf[i]);
 | 
						for (i = 0; i < len; i++) BIO_printf (out, "%02X ", buf[i]);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										141
									
								
								apps/pkcs7.c
									
									
									
									
									
								
							
							
						
						
									
										141
									
								
								apps/pkcs7.c
									
									
									
									
									
								
							@@ -67,32 +67,31 @@
 | 
				
			|||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pkcs7.h>
 | 
					#include <openssl/pkcs7.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	pkcs7_main
 | 
					#define PROG	pkcs7_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* -inform arg	- input format - default PEM (one of DER, TXT or PEM)
 | 
					/* -inform arg	- input format - default PEM (DER or PEM)
 | 
				
			||||||
 * -outform arg - output format - default PEM
 | 
					 * -outform arg - output format - default PEM
 | 
				
			||||||
 * -in arg	- input file - default stdin
 | 
					 * -in arg	- input file - default stdin
 | 
				
			||||||
 * -out arg	- output file - default stdout
 | 
					 * -out arg	- output file - default stdout
 | 
				
			||||||
 * -des		- encrypt output if PEM format with DES in cbc mode
 | 
					 | 
				
			||||||
 * -des3	- encrypt output if PEM format
 | 
					 | 
				
			||||||
 * -idea	- encrypt output if PEM format
 | 
					 | 
				
			||||||
 * -print_certs
 | 
					 * -print_certs
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	PKCS7 *p7=NULL;
 | 
						PKCS7 *p7=NULL;
 | 
				
			||||||
	int i,badops=0;
 | 
						int i,badops=0;
 | 
				
			||||||
#if !defined(NO_DES) || !defined(NO_IDEA)
 | 
					 | 
				
			||||||
	EVP_CIPHER *enc=NULL;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	BIO *in=NULL,*out=NULL;
 | 
						BIO *in=NULL,*out=NULL;
 | 
				
			||||||
	int informat,outformat;
 | 
						int informat,outformat;
 | 
				
			||||||
	char *infile,*outfile,*prog,buf[256];
 | 
						char *infile,*outfile,*prog;
 | 
				
			||||||
	int print_certs=0;
 | 
						int print_certs=0,text=0,noout=0;
 | 
				
			||||||
	int ret=0;
 | 
						int ret=0;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -130,18 +129,17 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			outfile= *(++argv);
 | 
								outfile= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-noout") == 0)
 | 
				
			||||||
 | 
								noout=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-text") == 0)
 | 
				
			||||||
 | 
								text=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-print_certs") == 0)
 | 
							else if (strcmp(*argv,"-print_certs") == 0)
 | 
				
			||||||
			print_certs=1;
 | 
								print_certs=1;
 | 
				
			||||||
#ifndef NO_DES
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
		else if (strcmp(*argv,"-des") == 0)
 | 
								{
 | 
				
			||||||
			enc=EVP_des_cbc();
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
		else if (strcmp(*argv,"-des3") == 0)
 | 
								engine= *(++argv);
 | 
				
			||||||
			enc=EVP_des_ede3_cbc();
 | 
								}
 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
#ifndef NO_IDEA
 | 
					 | 
				
			||||||
		else if (strcmp(*argv,"-idea") == 0)
 | 
					 | 
				
			||||||
			enc=EVP_idea_cbc();
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
								BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
				
			||||||
@@ -157,21 +155,37 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
bad:
 | 
					bad:
 | 
				
			||||||
		BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
							BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
				
			||||||
		BIO_printf(bio_err,"where options are\n");
 | 
							BIO_printf(bio_err,"where options are\n");
 | 
				
			||||||
		BIO_printf(bio_err," -inform arg   input format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -inform arg   input format - DER or PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -outform arg  output format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -outform arg  output format - DER or PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -in arg       input file\n");
 | 
							BIO_printf(bio_err," -in arg       input file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -out arg      output file\n");
 | 
							BIO_printf(bio_err," -out arg      output file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -print_certs  print any certs or crl in the input\n");
 | 
							BIO_printf(bio_err," -print_certs  print any certs or crl in the input\n");
 | 
				
			||||||
		BIO_printf(bio_err," -des          encrypt PEM output with cbc des\n");
 | 
							BIO_printf(bio_err," -text         print full details of certificates\n");
 | 
				
			||||||
		BIO_printf(bio_err," -des3         encrypt PEM output with ede cbc des using 168 bit key\n");
 | 
							BIO_printf(bio_err," -noout        don't output encoded data\n");
 | 
				
			||||||
#ifndef NO_IDEA
 | 
							BIO_printf(bio_err," -engine e     use engine e, possibly a hardware device.\n");
 | 
				
			||||||
		BIO_printf(bio_err," -idea         encrypt PEM output with cbc idea\n");
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
		EXIT(1);
 | 
							EXIT(1);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
	out=BIO_new(BIO_s_file());
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
	if ((in == NULL) || (out == NULL))
 | 
						if ((in == NULL) || (out == NULL))
 | 
				
			||||||
@@ -195,7 +209,7 @@ bad:
 | 
				
			|||||||
	if	(informat == FORMAT_ASN1)
 | 
						if	(informat == FORMAT_ASN1)
 | 
				
			||||||
		p7=d2i_PKCS7_bio(in,NULL);
 | 
							p7=d2i_PKCS7_bio(in,NULL);
 | 
				
			||||||
	else if (informat == FORMAT_PEM)
 | 
						else if (informat == FORMAT_PEM)
 | 
				
			||||||
		p7=PEM_read_bio_PKCS7(in,NULL,NULL);
 | 
							p7=PEM_read_bio_PKCS7(in,NULL,NULL,NULL);
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"bad input format specified for pkcs7 object\n");
 | 
							BIO_printf(bio_err,"bad input format specified for pkcs7 object\n");
 | 
				
			||||||
@@ -209,7 +223,15 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_write_filename(out,outfile) <= 0)
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -222,7 +244,7 @@ bad:
 | 
				
			|||||||
	if (print_certs)
 | 
						if (print_certs)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		STACK_OF(X509) *certs=NULL;
 | 
							STACK_OF(X509) *certs=NULL;
 | 
				
			||||||
		STACK *crls=NULL;
 | 
							STACK_OF(X509_CRL) *crls=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		i=OBJ_obj2nid(p7->type);
 | 
							i=OBJ_obj2nid(p7->type);
 | 
				
			||||||
		switch (i)
 | 
							switch (i)
 | 
				
			||||||
@@ -246,19 +268,10 @@ bad:
 | 
				
			|||||||
			for (i=0; i<sk_X509_num(certs); i++)
 | 
								for (i=0; i<sk_X509_num(certs); i++)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				x=sk_X509_value(certs,i);
 | 
									x=sk_X509_value(certs,i);
 | 
				
			||||||
 | 
									if(text) X509_print(out, x);
 | 
				
			||||||
 | 
									else dump_cert_text(out, x);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				X509_NAME_oneline(X509_get_subject_name(x),
 | 
									if(!noout) PEM_write_bio_X509(out,x);
 | 
				
			||||||
					buf,256);
 | 
					 | 
				
			||||||
				BIO_puts(out,"subject=");
 | 
					 | 
				
			||||||
				BIO_puts(out,buf);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				X509_NAME_oneline(X509_get_issuer_name(x),
 | 
					 | 
				
			||||||
					buf,256);
 | 
					 | 
				
			||||||
				BIO_puts(out,"\nissuer= ");
 | 
					 | 
				
			||||||
				BIO_puts(out,buf);
 | 
					 | 
				
			||||||
				BIO_puts(out,"\n");
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				PEM_write_bio_X509(out,x);
 | 
					 | 
				
			||||||
				BIO_puts(out,"\n");
 | 
									BIO_puts(out,"\n");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -266,21 +279,13 @@ bad:
 | 
				
			|||||||
			{
 | 
								{
 | 
				
			||||||
			X509_CRL *crl;
 | 
								X509_CRL *crl;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			for (i=0; i<sk_num(crls); i++)
 | 
								for (i=0; i<sk_X509_CRL_num(crls); i++)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				crl=(X509_CRL *)sk_value(crls,i);
 | 
									crl=sk_X509_CRL_value(crls,i);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				X509_NAME_oneline(crl->crl->issuer,buf,256);
 | 
									X509_CRL_print(out, crl);
 | 
				
			||||||
				BIO_puts(out,"issuer= ");
 | 
					 | 
				
			||||||
				BIO_puts(out,buf);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
				BIO_puts(out,"\nlast update=");
 | 
									if(!noout)PEM_write_bio_X509_CRL(out,crl);
 | 
				
			||||||
				ASN1_TIME_print(out,crl->crl->lastUpdate);
 | 
					 | 
				
			||||||
				BIO_puts(out,"\nnext update=");
 | 
					 | 
				
			||||||
				ASN1_TIME_print(out,crl->crl->nextUpdate);
 | 
					 | 
				
			||||||
				BIO_puts(out,"\n");
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
				PEM_write_bio_X509_CRL(out,crl);
 | 
					 | 
				
			||||||
				BIO_puts(out,"\n");
 | 
									BIO_puts(out,"\n");
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -289,25 +294,27 @@ bad:
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if 	(outformat == FORMAT_ASN1)
 | 
						if(!noout) {
 | 
				
			||||||
		i=i2d_PKCS7_bio(out,p7);
 | 
							if 	(outformat == FORMAT_ASN1)
 | 
				
			||||||
	else if (outformat == FORMAT_PEM)
 | 
								i=i2d_PKCS7_bio(out,p7);
 | 
				
			||||||
		i=PEM_write_bio_PKCS7(out,p7);
 | 
							else if (outformat == FORMAT_PEM)
 | 
				
			||||||
	else	{
 | 
								i=PEM_write_bio_PKCS7(out,p7);
 | 
				
			||||||
		BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
							else	{
 | 
				
			||||||
		goto end;
 | 
								BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
				
			||||||
		}
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!i)
 | 
							if (!i)
 | 
				
			||||||
		{
 | 
								{
 | 
				
			||||||
		BIO_printf(bio_err,"unable to write pkcs7 object\n");
 | 
								BIO_printf(bio_err,"unable to write pkcs7 object\n");
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
		goto end;
 | 
								goto end;
 | 
				
			||||||
		}
 | 
								}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (p7 != NULL) PKCS7_free(p7);
 | 
						if (p7 != NULL) PKCS7_free(p7);
 | 
				
			||||||
	if (in != NULL) BIO_free(in);
 | 
						if (in != NULL) BIO_free(in);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										382
									
								
								apps/pkcs8.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										382
									
								
								apps/pkcs8.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,382 @@
 | 
				
			|||||||
 | 
					/* pkcs8.c */
 | 
				
			||||||
 | 
					/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
				
			||||||
 | 
					 * project 1999.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer. 
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in
 | 
				
			||||||
 | 
					 *    the documentation and/or other materials provided with the
 | 
				
			||||||
 | 
					 *    distribution.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this
 | 
				
			||||||
 | 
					 *    software must display the following acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
				
			||||||
 | 
					 *    endorse or promote products derived from this software without
 | 
				
			||||||
 | 
					 *    prior written permission. For written permission, please contact
 | 
				
			||||||
 | 
					 *    licensing@OpenSSL.org.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 5. Products derived from this software may not be called "OpenSSL"
 | 
				
			||||||
 | 
					 *    nor may "OpenSSL" appear in their names without prior written
 | 
				
			||||||
 | 
					 *    permission of the OpenSSL Project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 6. Redistributions of any form whatsoever must retain the following
 | 
				
			||||||
 | 
					 *    acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
				
			||||||
 | 
					 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
				
			||||||
 | 
					 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
				
			||||||
 | 
					 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
				
			||||||
 | 
					 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
				
			||||||
 | 
					 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
				
			||||||
 | 
					 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
				
			||||||
 | 
					 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
				
			||||||
 | 
					 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
				
			||||||
 | 
					 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * ====================================================================
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This product includes cryptographic software written by Eric Young
 | 
				
			||||||
 | 
					 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
				
			||||||
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
 | 
					#include <openssl/pkcs12.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#define PROG pkcs8_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
 | 
						char **args, *infile = NULL, *outfile = NULL;
 | 
				
			||||||
 | 
						char *passargin = NULL, *passargout = NULL;
 | 
				
			||||||
 | 
						BIO *in = NULL, *out = NULL;
 | 
				
			||||||
 | 
						int topk8 = 0;
 | 
				
			||||||
 | 
						int pbe_nid = -1;
 | 
				
			||||||
 | 
						const EVP_CIPHER *cipher = NULL;
 | 
				
			||||||
 | 
						int iter = PKCS12_DEFAULT_ITER;
 | 
				
			||||||
 | 
						int informat, outformat;
 | 
				
			||||||
 | 
						int p8_broken = PKCS8_OK;
 | 
				
			||||||
 | 
						int nocrypt = 0;
 | 
				
			||||||
 | 
						X509_SIG *p8;
 | 
				
			||||||
 | 
						PKCS8_PRIV_KEY_INFO *p8inf;
 | 
				
			||||||
 | 
						EVP_PKEY *pkey;
 | 
				
			||||||
 | 
						char pass[50], *passin = NULL, *passout = NULL, *p8pass = NULL;
 | 
				
			||||||
 | 
						int badarg = 0;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (bio_err == NULL) bio_err = BIO_new_fp (stderr, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						informat=FORMAT_PEM;
 | 
				
			||||||
 | 
						outformat=FORMAT_PEM;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
						OpenSSL_add_all_algorithms();
 | 
				
			||||||
 | 
						args = argv + 1;
 | 
				
			||||||
 | 
						while (!badarg && *args && *args[0] == '-') {
 | 
				
			||||||
 | 
							if (!strcmp(*args,"-v2")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									cipher=EVP_get_cipherbyname(*args);
 | 
				
			||||||
 | 
									if(!cipher) {
 | 
				
			||||||
 | 
										BIO_printf(bio_err,
 | 
				
			||||||
 | 
											 "Unknown cipher %s\n", *args);
 | 
				
			||||||
 | 
										badarg = 1;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp(*args,"-v1")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									pbe_nid=OBJ_txt2nid(*args);
 | 
				
			||||||
 | 
									if(pbe_nid == NID_undef) {
 | 
				
			||||||
 | 
										BIO_printf(bio_err,
 | 
				
			||||||
 | 
											 "Unknown PBE algorithm %s\n", *args);
 | 
				
			||||||
 | 
										badarg = 1;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp(*args,"-inform")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									informat=str2fmt(*args);
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp(*args,"-outform")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									outformat=str2fmt(*args);
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-topk8")) topk8 = 1;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-noiter")) iter = 1;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nocrypt")) nocrypt = 1;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nooct")) p8_broken = PKCS8_NO_OCTET;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nsdb")) p8_broken = PKCS8_NS_DB;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-embed")) p8_broken = PKCS8_EMBEDDED_PARAM;
 | 
				
			||||||
 | 
							else if (!strcmp(*args,"-passin"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (!args[1]) goto bad;
 | 
				
			||||||
 | 
								passargin= *(++args);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp(*args,"-passout"))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (!args[1]) goto bad;
 | 
				
			||||||
 | 
								passargout= *(++args);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*args,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (!args[1]) goto bad;
 | 
				
			||||||
 | 
								engine= *(++args);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-in")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									infile = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-out")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									outfile = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else badarg = 1;
 | 
				
			||||||
 | 
							args++;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (badarg) {
 | 
				
			||||||
 | 
							bad:
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Usage pkcs8 [options]\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "where options are\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-in file        input file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-inform X       input format (DER or PEM)\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-passin arg     input file pass phrase source\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-outform X      output format (DER or PEM)\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-out file       output file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-passout arg    output file pass phrase source\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-topk8          output PKCS8 file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-nooct          use (nonstandard) no octet format\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-embed          use (nonstandard) embedded DSA parameters format\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-nsdb           use (nonstandard) DSA Netscape DB format\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-noiter         use 1 as iteration count\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-nocrypt        use or expect unencrypted private key\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-v2 alg         use PKCS#5 v2.0 and cipher \"alg\"\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-v1 obj         use PKCS#5 v1.5 and cipher \"alg\"\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -engine e       use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
							return (1);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting passwords\n");
 | 
				
			||||||
 | 
							return (1);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if ((pbe_nid == -1) && !cipher) pbe_nid = NID_pbeWithMD5AndDES_CBC;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (infile) {
 | 
				
			||||||
 | 
							if (!(in = BIO_new_file(infile, "rb"))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err,
 | 
				
			||||||
 | 
									 "Can't open input file %s\n", infile);
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else in = BIO_new_fp (stdin, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (outfile) {
 | 
				
			||||||
 | 
							if (!(out = BIO_new_file (outfile, "wb"))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err,
 | 
				
			||||||
 | 
									 "Can't open output file %s\n", outfile);
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							out = BIO_new_fp (stdout, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
								out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if (topk8) {
 | 
				
			||||||
 | 
							if(informat == FORMAT_PEM)
 | 
				
			||||||
 | 
								pkey = PEM_read_bio_PrivateKey(in, NULL, NULL, passin);
 | 
				
			||||||
 | 
							else if(informat == FORMAT_ASN1)
 | 
				
			||||||
 | 
								pkey = d2i_PrivateKey_bio(in, NULL);
 | 
				
			||||||
 | 
							else {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Bad format specified for key\n");
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if (!pkey) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error reading key\n", outfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							BIO_free(in);
 | 
				
			||||||
 | 
							if (!(p8inf = EVP_PKEY2PKCS8_broken(pkey, p8_broken))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error converting key\n", outfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if(nocrypt) {
 | 
				
			||||||
 | 
								if(outformat == FORMAT_PEM) 
 | 
				
			||||||
 | 
									PEM_write_bio_PKCS8_PRIV_KEY_INFO(out, p8inf);
 | 
				
			||||||
 | 
								else if(outformat == FORMAT_ASN1)
 | 
				
			||||||
 | 
									i2d_PKCS8_PRIV_KEY_INFO_bio(out, p8inf);
 | 
				
			||||||
 | 
								else {
 | 
				
			||||||
 | 
									BIO_printf(bio_err, "Bad format specified for key\n");
 | 
				
			||||||
 | 
									return (1);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							} else {
 | 
				
			||||||
 | 
								if(passout) p8pass = passout;
 | 
				
			||||||
 | 
								else {
 | 
				
			||||||
 | 
									p8pass = pass;
 | 
				
			||||||
 | 
									EVP_read_pw_string(pass, 50, "Enter Encryption Password:", 1);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								app_RAND_load_file(NULL, bio_err, 0);
 | 
				
			||||||
 | 
								if (!(p8 = PKCS8_encrypt(pbe_nid, cipher,
 | 
				
			||||||
 | 
										p8pass, strlen(p8pass),
 | 
				
			||||||
 | 
										NULL, 0, iter, p8inf))) {
 | 
				
			||||||
 | 
									BIO_printf(bio_err, "Error encrypting key\n",
 | 
				
			||||||
 | 
													 outfile);
 | 
				
			||||||
 | 
									ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
									return (1);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
 | 
								if(outformat == FORMAT_PEM) 
 | 
				
			||||||
 | 
									PEM_write_bio_PKCS8(out, p8);
 | 
				
			||||||
 | 
								else if(outformat == FORMAT_ASN1)
 | 
				
			||||||
 | 
									i2d_PKCS8_bio(out, p8);
 | 
				
			||||||
 | 
								else {
 | 
				
			||||||
 | 
									BIO_printf(bio_err, "Bad format specified for key\n");
 | 
				
			||||||
 | 
									return (1);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								X509_SIG_free(p8);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							PKCS8_PRIV_KEY_INFO_free (p8inf);
 | 
				
			||||||
 | 
							EVP_PKEY_free(pkey);
 | 
				
			||||||
 | 
							BIO_free_all(out);
 | 
				
			||||||
 | 
							if(passin) OPENSSL_free(passin);
 | 
				
			||||||
 | 
							if(passout) OPENSSL_free(passout);
 | 
				
			||||||
 | 
							return (0);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(nocrypt) {
 | 
				
			||||||
 | 
							if(informat == FORMAT_PEM) 
 | 
				
			||||||
 | 
								p8inf = PEM_read_bio_PKCS8_PRIV_KEY_INFO(in,NULL,NULL, NULL);
 | 
				
			||||||
 | 
							else if(informat == FORMAT_ASN1)
 | 
				
			||||||
 | 
								p8inf = d2i_PKCS8_PRIV_KEY_INFO_bio(in, NULL);
 | 
				
			||||||
 | 
							else {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Bad format specified for key\n");
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							if(informat == FORMAT_PEM) 
 | 
				
			||||||
 | 
								p8 = PEM_read_bio_PKCS8(in, NULL, NULL, NULL);
 | 
				
			||||||
 | 
							else if(informat == FORMAT_ASN1)
 | 
				
			||||||
 | 
								p8 = d2i_PKCS8_bio(in, NULL);
 | 
				
			||||||
 | 
							else {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Bad format specified for key\n");
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (!p8) {
 | 
				
			||||||
 | 
								BIO_printf (bio_err, "Error reading key\n", outfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if(passin) p8pass = passin;
 | 
				
			||||||
 | 
							else {
 | 
				
			||||||
 | 
								p8pass = pass;
 | 
				
			||||||
 | 
								EVP_read_pw_string(pass, 50, "Enter Password:", 0);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							p8inf = M_PKCS8_decrypt(p8, p8pass, strlen(p8pass));
 | 
				
			||||||
 | 
							X509_SIG_free(p8);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!p8inf) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error decrypting key\n", outfile);
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							return (1);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!(pkey = EVP_PKCS82PKEY(p8inf))) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error converting key\n", outfile);
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							return (1);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (p8inf->broken) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Warning: broken key encoding: ");
 | 
				
			||||||
 | 
							switch (p8inf->broken) {
 | 
				
			||||||
 | 
								case PKCS8_NO_OCTET:
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "No Octet String in PrivateKey\n");
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								case PKCS8_EMBEDDED_PARAM:
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "DSA parameters included in PrivateKey\n");
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								case PKCS8_NS_DB:
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "DSA public key include in PrivateKey\n");
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								default:
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Unknown broken type\n");
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						PKCS8_PRIV_KEY_INFO_free(p8inf);
 | 
				
			||||||
 | 
						if(outformat == FORMAT_PEM) 
 | 
				
			||||||
 | 
							PEM_write_bio_PrivateKey(out, pkey, NULL, NULL, 0, NULL, passout);
 | 
				
			||||||
 | 
						else if(outformat == FORMAT_ASN1)
 | 
				
			||||||
 | 
							i2d_PrivateKey_bio(out, pkey);
 | 
				
			||||||
 | 
						else {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Bad format specified for key\n");
 | 
				
			||||||
 | 
								return (1);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						EVP_PKEY_free(pkey);
 | 
				
			||||||
 | 
						BIO_free_all(out);
 | 
				
			||||||
 | 
						BIO_free(in);
 | 
				
			||||||
 | 
						if(passin) OPENSSL_free(passin);
 | 
				
			||||||
 | 
						if(passout) OPENSSL_free(passout);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return (0);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
							
								
								
									
										45
									
								
								apps/progs.h
									
									
									
									
									
								
							
							
						
						
									
										45
									
								
								apps/progs.h
									
									
									
									
									
								
							@@ -1,16 +1,20 @@
 | 
				
			|||||||
/* This file was generated by progs.pl. */
 | 
					/* apps/progs.h */
 | 
				
			||||||
 | 
					/* automatically generated by progs.pl for openssl.c */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
extern int verify_main(int argc,char *argv[]);
 | 
					extern int verify_main(int argc,char *argv[]);
 | 
				
			||||||
extern int asn1parse_main(int argc,char *argv[]);
 | 
					extern int asn1parse_main(int argc,char *argv[]);
 | 
				
			||||||
extern int req_main(int argc,char *argv[]);
 | 
					extern int req_main(int argc,char *argv[]);
 | 
				
			||||||
extern int dgst_main(int argc,char *argv[]);
 | 
					extern int dgst_main(int argc,char *argv[]);
 | 
				
			||||||
extern int dh_main(int argc,char *argv[]);
 | 
					extern int dh_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					extern int dhparam_main(int argc,char *argv[]);
 | 
				
			||||||
extern int enc_main(int argc,char *argv[]);
 | 
					extern int enc_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					extern int passwd_main(int argc,char *argv[]);
 | 
				
			||||||
extern int gendh_main(int argc,char *argv[]);
 | 
					extern int gendh_main(int argc,char *argv[]);
 | 
				
			||||||
extern int errstr_main(int argc,char *argv[]);
 | 
					extern int errstr_main(int argc,char *argv[]);
 | 
				
			||||||
extern int ca_main(int argc,char *argv[]);
 | 
					extern int ca_main(int argc,char *argv[]);
 | 
				
			||||||
extern int crl_main(int argc,char *argv[]);
 | 
					extern int crl_main(int argc,char *argv[]);
 | 
				
			||||||
extern int rsa_main(int argc,char *argv[]);
 | 
					extern int rsa_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					extern int rsautl_main(int argc,char *argv[]);
 | 
				
			||||||
extern int dsa_main(int argc,char *argv[]);
 | 
					extern int dsa_main(int argc,char *argv[]);
 | 
				
			||||||
extern int dsaparam_main(int argc,char *argv[]);
 | 
					extern int dsaparam_main(int argc,char *argv[]);
 | 
				
			||||||
extern int x509_main(int argc,char *argv[]);
 | 
					extern int x509_main(int argc,char *argv[]);
 | 
				
			||||||
@@ -27,8 +31,10 @@ extern int sess_id_main(int argc,char *argv[]);
 | 
				
			|||||||
extern int ciphers_main(int argc,char *argv[]);
 | 
					extern int ciphers_main(int argc,char *argv[]);
 | 
				
			||||||
extern int nseq_main(int argc,char *argv[]);
 | 
					extern int nseq_main(int argc,char *argv[]);
 | 
				
			||||||
extern int pkcs12_main(int argc,char *argv[]);
 | 
					extern int pkcs12_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					extern int pkcs8_main(int argc,char *argv[]);
 | 
				
			||||||
#ifdef SSLEAY_SRC  /* Defined only in openssl.c. */
 | 
					extern int spkac_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					extern int smime_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					extern int rand_main(int argc,char *argv[]);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define FUNC_TYPE_GENERAL	1
 | 
					#define FUNC_TYPE_GENERAL	1
 | 
				
			||||||
#define FUNC_TYPE_MD		2
 | 
					#define FUNC_TYPE_MD		2
 | 
				
			||||||
@@ -47,8 +53,12 @@ FUNCTION functions[] = {
 | 
				
			|||||||
	{FUNC_TYPE_GENERAL,"dgst",dgst_main},
 | 
						{FUNC_TYPE_GENERAL,"dgst",dgst_main},
 | 
				
			||||||
#ifndef NO_DH
 | 
					#ifndef NO_DH
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"dh",dh_main},
 | 
						{FUNC_TYPE_GENERAL,"dh",dh_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_DH
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"dhparam",dhparam_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"enc",enc_main},
 | 
						{FUNC_TYPE_GENERAL,"enc",enc_main},
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"passwd",passwd_main},
 | 
				
			||||||
#ifndef NO_DH
 | 
					#ifndef NO_DH
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"gendh",gendh_main},
 | 
						{FUNC_TYPE_GENERAL,"gendh",gendh_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -58,6 +68,9 @@ FUNCTION functions[] = {
 | 
				
			|||||||
#ifndef NO_RSA
 | 
					#ifndef NO_RSA
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"rsa",rsa_main},
 | 
						{FUNC_TYPE_GENERAL,"rsa",rsa_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_RSA
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"rsautl",rsautl_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef NO_DSA
 | 
					#ifndef NO_DSA
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"dsa",dsa_main},
 | 
						{FUNC_TYPE_GENERAL,"dsa",dsa_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -71,26 +84,33 @@ FUNCTION functions[] = {
 | 
				
			|||||||
#ifndef NO_DSA
 | 
					#ifndef NO_DSA
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
 | 
						{FUNC_TYPE_GENERAL,"gendsa",gendsa_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(O_SSL3))
 | 
					#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"s_server",s_server_main},
 | 
						{FUNC_TYPE_GENERAL,"s_server",s_server_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(O_SSL3))
 | 
					#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"s_client",s_client_main},
 | 
						{FUNC_TYPE_GENERAL,"s_client",s_client_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"speed",speed_main},
 | 
						{FUNC_TYPE_GENERAL,"speed",speed_main},
 | 
				
			||||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(O_SSL3))
 | 
					#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"s_time",s_time_main},
 | 
						{FUNC_TYPE_GENERAL,"s_time",s_time_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"version",version_main},
 | 
						{FUNC_TYPE_GENERAL,"version",version_main},
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"pkcs7",pkcs7_main},
 | 
						{FUNC_TYPE_GENERAL,"pkcs7",pkcs7_main},
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"crl2pkcs7",crl2pkcs7_main},
 | 
						{FUNC_TYPE_GENERAL,"crl2pkcs7",crl2pkcs7_main},
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"sess_id",sess_id_main},
 | 
						{FUNC_TYPE_GENERAL,"sess_id",sess_id_main},
 | 
				
			||||||
#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(O_SSL3))
 | 
					#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"ciphers",ciphers_main},
 | 
						{FUNC_TYPE_GENERAL,"ciphers",ciphers_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"nseq",nseq_main},
 | 
						{FUNC_TYPE_GENERAL,"nseq",nseq_main},
 | 
				
			||||||
 | 
					#if !defined(NO_DES) && !defined(NO_SHA1)
 | 
				
			||||||
	{FUNC_TYPE_GENERAL,"pkcs12",pkcs12_main},
 | 
						{FUNC_TYPE_GENERAL,"pkcs12",pkcs12_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"pkcs8",pkcs8_main},
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"spkac",spkac_main},
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"smime",smime_main},
 | 
				
			||||||
 | 
						{FUNC_TYPE_GENERAL,"rand",rand_main},
 | 
				
			||||||
	{FUNC_TYPE_MD,"md2",dgst_main},
 | 
						{FUNC_TYPE_MD,"md2",dgst_main},
 | 
				
			||||||
 | 
						{FUNC_TYPE_MD,"md4",dgst_main},
 | 
				
			||||||
	{FUNC_TYPE_MD,"md5",dgst_main},
 | 
						{FUNC_TYPE_MD,"md5",dgst_main},
 | 
				
			||||||
	{FUNC_TYPE_MD,"sha",dgst_main},
 | 
						{FUNC_TYPE_MD,"sha",dgst_main},
 | 
				
			||||||
	{FUNC_TYPE_MD,"sha1",dgst_main},
 | 
						{FUNC_TYPE_MD,"sha1",dgst_main},
 | 
				
			||||||
@@ -112,6 +132,9 @@ FUNCTION functions[] = {
 | 
				
			|||||||
#ifndef NO_RC4
 | 
					#ifndef NO_RC4
 | 
				
			||||||
	{FUNC_TYPE_CIPHER,"rc4",enc_main},
 | 
						{FUNC_TYPE_CIPHER,"rc4",enc_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_RC4
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"rc4-40",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef NO_RC2
 | 
					#ifndef NO_RC2
 | 
				
			||||||
	{FUNC_TYPE_CIPHER,"rc2",enc_main},
 | 
						{FUNC_TYPE_CIPHER,"rc2",enc_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -184,6 +207,12 @@ FUNCTION functions[] = {
 | 
				
			|||||||
#ifndef NO_RC2
 | 
					#ifndef NO_RC2
 | 
				
			||||||
	{FUNC_TYPE_CIPHER,"rc2-ofb",enc_main},
 | 
						{FUNC_TYPE_CIPHER,"rc2-ofb",enc_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_RC2
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"rc2-64-cbc",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_RC2
 | 
				
			||||||
 | 
						{FUNC_TYPE_CIPHER,"rc2-40-cbc",enc_main},
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
#ifndef NO_BF
 | 
					#ifndef NO_BF
 | 
				
			||||||
	{FUNC_TYPE_CIPHER,"bf-cbc",enc_main},
 | 
						{FUNC_TYPE_CIPHER,"bf-cbc",enc_main},
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -225,5 +254,3 @@ FUNCTION functions[] = {
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
	{0,NULL,NULL}
 | 
						{0,NULL,NULL}
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,6 +1,7 @@
 | 
				
			|||||||
#!/usr/local/bin/perl
 | 
					#!/usr/local/bin/perl
 | 
				
			||||||
 | 
					
 | 
				
			||||||
print "/* This file was generated by progs.pl. */\n\n";
 | 
					print "/* apps/progs.h */\n";
 | 
				
			||||||
 | 
					print "/* automatically generated by progs.pl for openssl.c */\n\n";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
grep(s/^asn1pars$/asn1parse/,@ARGV);
 | 
					grep(s/^asn1pars$/asn1parse/,@ARGV);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -9,8 +10,6 @@ foreach (@ARGV)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
print <<'EOF';
 | 
					print <<'EOF';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef SSLEAY_SRC  /* Defined only in openssl.c. */
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#define FUNC_TYPE_GENERAL	1
 | 
					#define FUNC_TYPE_GENERAL	1
 | 
				
			||||||
#define FUNC_TYPE_MD		2
 | 
					#define FUNC_TYPE_MD		2
 | 
				
			||||||
#define FUNC_TYPE_CIPHER	3
 | 
					#define FUNC_TYPE_CIPHER	3
 | 
				
			||||||
@@ -29,18 +28,20 @@ foreach (@ARGV)
 | 
				
			|||||||
	push(@files,$_);
 | 
						push(@files,$_);
 | 
				
			||||||
	$str="\t{FUNC_TYPE_GENERAL,\"$_\",${_}_main},\n";
 | 
						$str="\t{FUNC_TYPE_GENERAL,\"$_\",${_}_main},\n";
 | 
				
			||||||
	if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
 | 
						if (($_ =~ /^s_/) || ($_ =~ /^ciphers$/))
 | 
				
			||||||
		{ print "#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(O_SSL3))\n${str}#endif\n"; } 
 | 
							{ print "#if !defined(NO_SOCK) && !(defined(NO_SSL2) && defined(NO_SSL3))\n${str}#endif\n"; } 
 | 
				
			||||||
	elsif ( ($_ =~ /^rsa$/) || ($_ =~ /^genrsa$/) ) 
 | 
						elsif ( ($_ =~ /^rsa$/) || ($_ =~ /^genrsa$/) || ($_ =~ /^rsautl$/)) 
 | 
				
			||||||
		{ print "#ifndef NO_RSA\n${str}#endif\n";  }
 | 
							{ print "#ifndef NO_RSA\n${str}#endif\n";  }
 | 
				
			||||||
	elsif ( ($_ =~ /^dsa$/) || ($_ =~ /^gendsa$/) || ($_ =~ /^dsaparam$/))
 | 
						elsif ( ($_ =~ /^dsa$/) || ($_ =~ /^gendsa$/) || ($_ =~ /^dsaparam$/))
 | 
				
			||||||
		{ print "#ifndef NO_DSA\n${str}#endif\n"; }
 | 
							{ print "#ifndef NO_DSA\n${str}#endif\n"; }
 | 
				
			||||||
	elsif ( ($_ =~ /^dh$/) || ($_ =~ /^gendh$/))
 | 
						elsif ( ($_ =~ /^dh$/) || ($_ =~ /^gendh$/) || ($_ =~ /^dhparam$/))
 | 
				
			||||||
		{ print "#ifndef NO_DH\n${str}#endif\n"; }
 | 
							{ print "#ifndef NO_DH\n${str}#endif\n"; }
 | 
				
			||||||
 | 
						elsif ( ($_ =~ /^pkcs12$/))
 | 
				
			||||||
 | 
							{ print "#if !defined(NO_DES) && !defined(NO_SHA1)\n${str}#endif\n"; }
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{ print $str; }
 | 
							{ print $str; }
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
foreach ("md2","md5","sha","sha1","mdc2","rmd160")
 | 
					foreach ("md2","md4","md5","sha","sha1","mdc2","rmd160")
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	push(@files,$_);
 | 
						push(@files,$_);
 | 
				
			||||||
	printf "\t{FUNC_TYPE_MD,\"%s\",dgst_main},\n",$_;
 | 
						printf "\t{FUNC_TYPE_MD,\"%s\",dgst_main},\n",$_;
 | 
				
			||||||
@@ -48,13 +49,14 @@ foreach ("md2","md5","sha","sha1","mdc2","rmd160")
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
foreach (
 | 
					foreach (
 | 
				
			||||||
	"base64",
 | 
						"base64",
 | 
				
			||||||
	"des", "des3", "desx", "idea", "rc4", "rc2","bf","cast","rc5",
 | 
						"des", "des3", "desx", "idea", "rc4", "rc4-40",
 | 
				
			||||||
 | 
						"rc2", "bf", "cast", "rc5",
 | 
				
			||||||
	"des-ecb", "des-ede",    "des-ede3",
 | 
						"des-ecb", "des-ede",    "des-ede3",
 | 
				
			||||||
	"des-cbc", "des-ede-cbc","des-ede3-cbc",
 | 
						"des-cbc", "des-ede-cbc","des-ede3-cbc",
 | 
				
			||||||
	"des-cfb", "des-ede-cfb","des-ede3-cfb",
 | 
						"des-cfb", "des-ede-cfb","des-ede3-cfb",
 | 
				
			||||||
	"des-ofb", "des-ede-ofb","des-ede3-ofb",
 | 
						"des-ofb", "des-ede-ofb","des-ede3-ofb",
 | 
				
			||||||
	"idea-cbc","idea-ecb",   "idea-cfb", "idea-ofb",
 | 
						"idea-cbc","idea-ecb",   "idea-cfb", "idea-ofb",
 | 
				
			||||||
	"rc2-cbc", "rc2-ecb",    "rc2-cfb",  "rc2-ofb",
 | 
						"rc2-cbc", "rc2-ecb", "rc2-cfb","rc2-ofb", "rc2-64-cbc", "rc2-40-cbc",
 | 
				
			||||||
	"bf-cbc",  "bf-ecb",     "bf-cfb",   "bf-ofb",
 | 
						"bf-cbc",  "bf-ecb",     "bf-cfb",   "bf-ofb",
 | 
				
			||||||
	"cast5-cbc","cast5-ecb", "cast5-cfb","cast5-ofb",
 | 
						"cast5-cbc","cast5-ecb", "cast5-cfb","cast5-ofb",
 | 
				
			||||||
	"cast-cbc", "rc5-cbc",   "rc5-ecb",  "rc5-cfb",  "rc5-ofb")
 | 
						"cast-cbc", "rc5-cbc",   "rc5-ecb",  "rc5-cfb",  "rc5-ofb")
 | 
				
			||||||
@@ -73,5 +75,3 @@ foreach (
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
print "\t{0,NULL,NULL}\n\t};\n";
 | 
					print "\t{0,NULL,NULL}\n\t};\n";
 | 
				
			||||||
print "#endif\n\n";
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										177
									
								
								apps/rand.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										177
									
								
								apps/rand.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,177 @@
 | 
				
			|||||||
 | 
					/* apps/rand.c */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <ctype.h>
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/rand.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#undef PROG
 | 
				
			||||||
 | 
					#define PROG rand_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* -out file         - write to file
 | 
				
			||||||
 | 
					 * -rand file:file   - PRNG seed files
 | 
				
			||||||
 | 
					 * -base64           - encode output
 | 
				
			||||||
 | 
					 * num               - write 'num' bytes
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
 | 
						int i, r, ret = 1;
 | 
				
			||||||
 | 
						int badopt;
 | 
				
			||||||
 | 
						char *outfile = NULL;
 | 
				
			||||||
 | 
						char *inrand = NULL;
 | 
				
			||||||
 | 
						int base64 = 0;
 | 
				
			||||||
 | 
						BIO *out = NULL;
 | 
				
			||||||
 | 
						int num = -1;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (bio_err == NULL)
 | 
				
			||||||
 | 
							if ((bio_err = BIO_new(BIO_s_file())) != NULL)
 | 
				
			||||||
 | 
								BIO_set_fp(bio_err, stderr, BIO_NOCLOSE|BIO_FP_TEXT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						badopt = 0;
 | 
				
			||||||
 | 
						i = 0;
 | 
				
			||||||
 | 
						while (!badopt && argv[++i] != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (strcmp(argv[i], "-out") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if ((argv[i+1] != NULL) && (outfile == NULL))
 | 
				
			||||||
 | 
									outfile = argv[++i];
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									badopt = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (strcmp(argv[i], "-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if ((argv[i+1] != NULL) && (engine == NULL))
 | 
				
			||||||
 | 
									engine = argv[++i];
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									badopt = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-rand") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if ((argv[i+1] != NULL) && (inrand == NULL))
 | 
				
			||||||
 | 
									inrand = argv[++i];
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									badopt = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(argv[i], "-base64") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (!base64)
 | 
				
			||||||
 | 
									base64 = 1;
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									badopt = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (isdigit((unsigned char)argv[i][0]))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (num < 0)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									r = sscanf(argv[i], "%d", &num);
 | 
				
			||||||
 | 
									if (r == 0 || num < 0)
 | 
				
			||||||
 | 
										badopt = 1;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									badopt = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else
 | 
				
			||||||
 | 
								badopt = 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (num < 0)
 | 
				
			||||||
 | 
							badopt = 1;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if (badopt) 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Usage: rand [options] num\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "where options are\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-out file             - write to file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -engine e             - use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-rand file%cfile%c... - seed PRNG from files\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "-base64               - encode output\n");
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
				
			||||||
 | 
						if (inrand != NULL)
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
 | 
								app_RAND_load_files(inrand));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						out = BIO_new(BIO_s_file());
 | 
				
			||||||
 | 
						if (out == NULL)
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
						if (outfile != NULL)
 | 
				
			||||||
 | 
							r = BIO_write_filename(out, outfile);
 | 
				
			||||||
 | 
						else
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							r = BIO_set_fp(out, stdout, BIO_NOCLOSE | BIO_FP_TEXT);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (r <= 0)
 | 
				
			||||||
 | 
							goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (base64)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *b64 = BIO_new(BIO_f_base64());
 | 
				
			||||||
 | 
							if (b64 == NULL)
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
							out = BIO_push(b64, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						while (num > 0) 
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							unsigned char buf[4096];
 | 
				
			||||||
 | 
							int chunk;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							chunk = num;
 | 
				
			||||||
 | 
							if (chunk > sizeof buf)
 | 
				
			||||||
 | 
								chunk = sizeof buf;
 | 
				
			||||||
 | 
							r = RAND_bytes(buf, chunk);
 | 
				
			||||||
 | 
							if (r <= 0)
 | 
				
			||||||
 | 
								goto err;
 | 
				
			||||||
 | 
							BIO_write(out, buf, chunk);
 | 
				
			||||||
 | 
							num -= chunk;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						BIO_flush(out);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
 | 
						ret = 0;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					err:
 | 
				
			||||||
 | 
						ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
						if (out)
 | 
				
			||||||
 | 
							BIO_free_all(out);
 | 
				
			||||||
 | 
						EXIT(ret);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
							
								
								
									
										553
									
								
								apps/req.c
									
									
									
									
									
								
							
							
						
						
									
										553
									
								
								apps/req.c
									
									
									
									
									
								
							@@ -66,7 +66,6 @@
 | 
				
			|||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
#include <openssl/bio.h>
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
#include <openssl/evp.h>
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
#include <openssl/rand.h>
 | 
					 | 
				
			||||||
#include <openssl/conf.h>
 | 
					#include <openssl/conf.h>
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/asn1.h>
 | 
					#include <openssl/asn1.h>
 | 
				
			||||||
@@ -74,14 +73,18 @@
 | 
				
			|||||||
#include <openssl/x509v3.h>
 | 
					#include <openssl/x509v3.h>
 | 
				
			||||||
#include <openssl/objects.h>
 | 
					#include <openssl/objects.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define SECTION		"req"
 | 
					#define SECTION		"req"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define BITS		"default_bits"
 | 
					#define BITS		"default_bits"
 | 
				
			||||||
#define KEYFILE		"default_keyfile"
 | 
					#define KEYFILE		"default_keyfile"
 | 
				
			||||||
 | 
					#define PROMPT		"prompt"
 | 
				
			||||||
#define DISTINGUISHED_NAME	"distinguished_name"
 | 
					#define DISTINGUISHED_NAME	"distinguished_name"
 | 
				
			||||||
#define ATTRIBUTES	"attributes"
 | 
					#define ATTRIBUTES	"attributes"
 | 
				
			||||||
#define V3_EXTENSIONS	"x509_extensions"
 | 
					#define V3_EXTENSIONS	"x509_extensions"
 | 
				
			||||||
 | 
					#define REQ_EXTENSIONS	"req_extensions"
 | 
				
			||||||
 | 
					#define STRING_MASK	"string_mask"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define DEFAULT_KEY_LENGTH	512
 | 
					#define DEFAULT_KEY_LENGTH	512
 | 
				
			||||||
#define MIN_KEY_LENGTH		384
 | 
					#define MIN_KEY_LENGTH		384
 | 
				
			||||||
@@ -89,7 +92,7 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	req_main
 | 
					#define PROG	req_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* -inform arg	- input format - default PEM (one of DER, TXT or PEM)
 | 
					/* -inform arg	- input format - default PEM (DER or PEM)
 | 
				
			||||||
 * -outform arg - output format - default PEM
 | 
					 * -outform arg - output format - default PEM
 | 
				
			||||||
 * -in arg	- input file - default stdin
 | 
					 * -in arg	- input file - default stdin
 | 
				
			||||||
 * -out arg	- output file - default stdout
 | 
					 * -out arg	- output file - default stdout
 | 
				
			||||||
@@ -100,6 +103,7 @@
 | 
				
			|||||||
 * -config file	- Load configuration file.
 | 
					 * -config file	- Load configuration file.
 | 
				
			||||||
 * -key file	- make a request using key in file (or use it for verification).
 | 
					 * -key file	- make a request using key in file (or use it for verification).
 | 
				
			||||||
 * -keyform	- key file format.
 | 
					 * -keyform	- key file format.
 | 
				
			||||||
 | 
					 * -rand file(s) - load the file(s) into the PRNG.
 | 
				
			||||||
 * -newkey	- make a key and a request.
 | 
					 * -newkey	- make a key and a request.
 | 
				
			||||||
 * -modulus	- print RSA modulus.
 | 
					 * -modulus	- print RSA modulus.
 | 
				
			||||||
 * -x509	- output a self signed X509 structure instead.
 | 
					 * -x509	- output a self signed X509 structure instead.
 | 
				
			||||||
@@ -108,15 +112,21 @@
 | 
				
			|||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int make_REQ(X509_REQ *req,EVP_PKEY *pkey,int attribs);
 | 
					static int make_REQ(X509_REQ *req,EVP_PKEY *pkey,int attribs);
 | 
				
			||||||
static int add_attribute_object(STACK_OF(X509_ATTRIBUTE) *n, char *text,
 | 
					static int prompt_info(X509_REQ *req,
 | 
				
			||||||
 | 
							STACK_OF(CONF_VALUE) *dn_sk, char *dn_sect,
 | 
				
			||||||
 | 
							STACK_OF(CONF_VALUE) *attr_sk, char *attr_sect, int attribs);
 | 
				
			||||||
 | 
					static int auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *sk,
 | 
				
			||||||
 | 
									STACK_OF(CONF_VALUE) *attr, int attribs);
 | 
				
			||||||
 | 
					static int add_attribute_object(X509_REQ *req, char *text,
 | 
				
			||||||
				char *def, char *value, int nid, int min,
 | 
									char *def, char *value, int nid, int min,
 | 
				
			||||||
				int max);
 | 
									int max);
 | 
				
			||||||
static int add_DN_object(X509_NAME *n, char *text, char *def, char *value,
 | 
					static int add_DN_object(X509_NAME *n, char *text, char *def, char *value,
 | 
				
			||||||
	int nid,int min,int max);
 | 
						int nid,int min,int max);
 | 
				
			||||||
static void MS_CALLBACK req_cb(int p,int n,char *arg);
 | 
					#ifndef NO_RSA
 | 
				
			||||||
static int req_fix_data(int nid,int *type,int len,int min,int max);
 | 
					static void MS_CALLBACK req_cb(int p,int n,void *arg);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					static int req_check_len(int len,int min,int max);
 | 
				
			||||||
static int check_end(char *str, char *end);
 | 
					static int check_end(char *str, char *end);
 | 
				
			||||||
static int add_oid_section(LHASH *conf);
 | 
					 | 
				
			||||||
#ifndef MONOLITH
 | 
					#ifndef MONOLITH
 | 
				
			||||||
static char *default_config_file=NULL;
 | 
					static char *default_config_file=NULL;
 | 
				
			||||||
static LHASH *config=NULL;
 | 
					static LHASH *config=NULL;
 | 
				
			||||||
@@ -127,8 +137,11 @@ static LHASH *req_conf=NULL;
 | 
				
			|||||||
#define TYPE_DSA	2
 | 
					#define TYPE_DSA	2
 | 
				
			||||||
#define TYPE_DH		3
 | 
					#define TYPE_DH		3
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
#ifndef NO_DSA
 | 
					#ifndef NO_DSA
 | 
				
			||||||
	DSA *dsa_params=NULL;
 | 
						DSA *dsa_params=NULL;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -139,17 +152,23 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	int i,badops=0,newreq=0,newkey= -1,pkey_type=0;
 | 
						int i,badops=0,newreq=0,newkey= -1,pkey_type=0;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL;
 | 
						BIO *in=NULL,*out=NULL;
 | 
				
			||||||
	int informat,outformat,verify=0,noout=0,text=0,keyform=FORMAT_PEM;
 | 
						int informat,outformat,verify=0,noout=0,text=0,keyform=FORMAT_PEM;
 | 
				
			||||||
	int nodes=0,kludge=0;
 | 
						int nodes=0,kludge=0,newhdr=0;
 | 
				
			||||||
	char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL;
 | 
						char *infile,*outfile,*prog,*keyfile=NULL,*template=NULL,*keyout=NULL;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
	char *extensions = NULL;
 | 
						char *extensions = NULL;
 | 
				
			||||||
 | 
						char *req_exts = NULL;
 | 
				
			||||||
	EVP_CIPHER *cipher=NULL;
 | 
						EVP_CIPHER *cipher=NULL;
 | 
				
			||||||
	int modulus=0;
 | 
						int modulus=0;
 | 
				
			||||||
 | 
						char *inrand=NULL;
 | 
				
			||||||
 | 
						char *passargin = NULL, *passargout = NULL;
 | 
				
			||||||
 | 
						char *passin = NULL, *passout = NULL;
 | 
				
			||||||
	char *p;
 | 
						char *p;
 | 
				
			||||||
	const EVP_MD *md_alg=NULL,*digest=EVP_md5();
 | 
						const EVP_MD *md_alg=NULL,*digest=EVP_md5();
 | 
				
			||||||
#ifndef MONOLITH
 | 
					#ifndef MONOLITH
 | 
				
			||||||
	MS_STATIC char config_name[256];
 | 
						MS_STATIC char config_name[256];
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						req_conf = NULL;
 | 
				
			||||||
#ifndef NO_DES
 | 
					#ifndef NO_DES
 | 
				
			||||||
	cipher=EVP_des_ede3_cbc();
 | 
						cipher=EVP_des_ede3_cbc();
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -179,6 +198,11 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			outformat=str2fmt(*(++argv));
 | 
								outformat=str2fmt(*(++argv));
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-key") == 0)
 | 
							else if (strcmp(*argv,"-key") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -214,6 +238,21 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			keyout= *(++argv);
 | 
								keyout= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passin") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargin= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passout") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargout= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-rand") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								inrand= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if (strcmp(*argv,"-newkey") == 0)
 | 
							else if (strcmp(*argv,"-newkey") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			int is_numeric;
 | 
								int is_numeric;
 | 
				
			||||||
@@ -242,11 +281,11 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
					perror(p);
 | 
										perror(p);
 | 
				
			||||||
					goto end;
 | 
										goto end;
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				if ((dsa_params=PEM_read_bio_DSAparams(in,NULL,NULL)) == NULL)
 | 
									if ((dsa_params=PEM_read_bio_DSAparams(in,NULL,NULL,NULL)) == NULL)
 | 
				
			||||||
					{
 | 
										{
 | 
				
			||||||
					ERR_clear_error();
 | 
										ERR_clear_error();
 | 
				
			||||||
					BIO_reset(in);
 | 
										(void)BIO_reset(in);
 | 
				
			||||||
					if ((xtmp=PEM_read_bio_X509(in,NULL,NULL)) == NULL)
 | 
										if ((xtmp=PEM_read_bio_X509(in,NULL,NULL,NULL)) == NULL)
 | 
				
			||||||
						{
 | 
											{
 | 
				
			||||||
						BIO_printf(bio_err,"unable to load DSA parameters from file\n");
 | 
											BIO_printf(bio_err,"unable to load DSA parameters from file\n");
 | 
				
			||||||
						goto end;
 | 
											goto end;
 | 
				
			||||||
@@ -281,6 +320,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
			newreq=1;
 | 
								newreq=1;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-newhdr") == 0)
 | 
				
			||||||
 | 
								newhdr=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-modulus") == 0)
 | 
							else if (strcmp(*argv,"-modulus") == 0)
 | 
				
			||||||
			modulus=1;
 | 
								modulus=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-verify") == 0)
 | 
							else if (strcmp(*argv,"-verify") == 0)
 | 
				
			||||||
@@ -308,8 +349,17 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			/* ok */
 | 
								/* ok */
 | 
				
			||||||
			digest=md_alg;
 | 
								digest=md_alg;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-extensions") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								extensions = *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-reqexts") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								req_exts = *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
 | 
					 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
								BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
				
			||||||
			badops=1;
 | 
								badops=1;
 | 
				
			||||||
@@ -324,8 +374,8 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
bad:
 | 
					bad:
 | 
				
			||||||
		BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
							BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
				
			||||||
		BIO_printf(bio_err,"where options  are\n");
 | 
							BIO_printf(bio_err,"where options  are\n");
 | 
				
			||||||
		BIO_printf(bio_err," -inform arg    input format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -inform arg    input format - DER or PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -outform arg   output format - one of DER TXT PEM\n");
 | 
							BIO_printf(bio_err," -outform arg   output format - DER or PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -in arg        input file\n");
 | 
							BIO_printf(bio_err," -in arg        input file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -out arg       output file\n");
 | 
							BIO_printf(bio_err," -out arg       output file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -text          text form of request\n");
 | 
							BIO_printf(bio_err," -text          text form of request\n");
 | 
				
			||||||
@@ -333,9 +383,13 @@ bad:
 | 
				
			|||||||
		BIO_printf(bio_err," -verify        verify signature on REQ\n");
 | 
							BIO_printf(bio_err," -verify        verify signature on REQ\n");
 | 
				
			||||||
		BIO_printf(bio_err," -modulus       RSA modulus\n");
 | 
							BIO_printf(bio_err," -modulus       RSA modulus\n");
 | 
				
			||||||
		BIO_printf(bio_err," -nodes         don't encrypt the output key\n");
 | 
							BIO_printf(bio_err," -nodes         don't encrypt the output key\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -engine e      use engine e, possibly a hardware device.\n");
 | 
				
			||||||
		BIO_printf(bio_err," -key file	use the private key contained in file\n");
 | 
							BIO_printf(bio_err," -key file	use the private key contained in file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -keyform arg   key file format\n");
 | 
							BIO_printf(bio_err," -keyform arg   key file format\n");
 | 
				
			||||||
		BIO_printf(bio_err," -keyout arg    file to send the key to\n");
 | 
							BIO_printf(bio_err," -keyout arg    file to send the key to\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                load the file (or the files in the directory) into\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"                the random number generator\n");
 | 
				
			||||||
		BIO_printf(bio_err," -newkey rsa:bits generate a new RSA key of 'bits' in size\n");
 | 
							BIO_printf(bio_err," -newkey rsa:bits generate a new RSA key of 'bits' in size\n");
 | 
				
			||||||
		BIO_printf(bio_err," -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n");
 | 
							BIO_printf(bio_err," -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -344,16 +398,21 @@ bad:
 | 
				
			|||||||
		BIO_printf(bio_err," -new           new request.\n");
 | 
							BIO_printf(bio_err," -new           new request.\n");
 | 
				
			||||||
		BIO_printf(bio_err," -x509          output a x509 structure instead of a cert. req.\n");
 | 
							BIO_printf(bio_err," -x509          output a x509 structure instead of a cert. req.\n");
 | 
				
			||||||
		BIO_printf(bio_err," -days          number of days a x509 generated by -x509 is valid for.\n");
 | 
							BIO_printf(bio_err," -days          number of days a x509 generated by -x509 is valid for.\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -newhdr        output \"NEW\" in the header lines\n");
 | 
				
			||||||
		BIO_printf(bio_err," -asn1-kludge   Output the 'request' in a format that is wrong but some CA's\n");
 | 
							BIO_printf(bio_err," -asn1-kludge   Output the 'request' in a format that is wrong but some CA's\n");
 | 
				
			||||||
		BIO_printf(bio_err,"                have been reported as requiring\n");
 | 
							BIO_printf(bio_err,"                have been reported as requiring\n");
 | 
				
			||||||
		BIO_printf(bio_err,"                [ It is now always turned on but can be turned off with -no-asn1-kludge ]\n");
 | 
							BIO_printf(bio_err," -extensions .. specify certificate extension section (override value in config file)\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -reqexts ..    specify request extension section (override value in config file)\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
	X509V3_add_standard_extensions();
 | 
						if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting passwords\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef MONOLITH
 | 
					#ifndef MONOLITH /* else this has happened in openssl.c (global `config') */
 | 
				
			||||||
	/* Lets load up our environment a little */
 | 
						/* Lets load up our environment a little */
 | 
				
			||||||
	p=getenv("OPENSSL_CONF");
 | 
						p=getenv("OPENSSL_CONF");
 | 
				
			||||||
	if (p == NULL)
 | 
						if (p == NULL)
 | 
				
			||||||
@@ -367,7 +426,7 @@ bad:
 | 
				
			|||||||
		strcat(config_name,OPENSSL_CONF);
 | 
							strcat(config_name,OPENSSL_CONF);
 | 
				
			||||||
		p=config_name;
 | 
							p=config_name;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
        default_config_file=p;
 | 
						default_config_file=p;
 | 
				
			||||||
	config=CONF_load(config,p,NULL);
 | 
						config=CONF_load(config,p,NULL);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -416,7 +475,7 @@ bad:
 | 
				
			|||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
		if(!add_oid_section(req_conf)) goto end;
 | 
							if(!add_oid_section(bio_err, req_conf)) goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((md_alg == NULL) &&
 | 
						if ((md_alg == NULL) &&
 | 
				
			||||||
		((p=CONF_get_string(req_conf,SECTION,"default_md")) != NULL))
 | 
							((p=CONF_get_string(req_conf,SECTION,"default_md")) != NULL))
 | 
				
			||||||
@@ -425,7 +484,8 @@ bad:
 | 
				
			|||||||
			digest=md_alg;
 | 
								digest=md_alg;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	extensions = CONF_get_string(req_conf, SECTION, V3_EXTENSIONS);
 | 
						if(!extensions)
 | 
				
			||||||
 | 
							extensions = CONF_get_string(req_conf, SECTION, V3_EXTENSIONS);
 | 
				
			||||||
	if(extensions) {
 | 
						if(extensions) {
 | 
				
			||||||
		/* Check syntax of file */
 | 
							/* Check syntax of file */
 | 
				
			||||||
		X509V3_CTX ctx;
 | 
							X509V3_CTX ctx;
 | 
				
			||||||
@@ -438,28 +498,88 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!passin)
 | 
				
			||||||
 | 
							passin = CONF_get_string(req_conf, SECTION, "input_password");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!passout)
 | 
				
			||||||
 | 
							passout = CONF_get_string(req_conf, SECTION, "output_password");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						p = CONF_get_string(req_conf, SECTION, STRING_MASK);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(p && !ASN1_STRING_set_default_mask_asc(p)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Invalid global string mask setting %s\n", p);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!req_exts)
 | 
				
			||||||
 | 
							req_exts = CONF_get_string(req_conf, SECTION, REQ_EXTENSIONS);
 | 
				
			||||||
 | 
						if(req_exts) {
 | 
				
			||||||
 | 
							/* Check syntax of file */
 | 
				
			||||||
 | 
							X509V3_CTX ctx;
 | 
				
			||||||
 | 
							X509V3_set_ctx_test(&ctx);
 | 
				
			||||||
 | 
							X509V3_set_conf_lhash(&ctx, req_conf);
 | 
				
			||||||
 | 
							if(!X509V3_EXT_add_conf(req_conf, &ctx, req_exts, NULL)) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err,
 | 
				
			||||||
 | 
								 "Error Loading request extension section %s\n",
 | 
				
			||||||
 | 
													req_exts);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
	out=BIO_new(BIO_s_file());
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
	if ((in == NULL) || (out == NULL))
 | 
						if ((in == NULL) || (out == NULL))
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (keyfile != NULL)
 | 
						if (engine != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_read_filename(in,keyfile) <= 0)
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			perror(keyfile);
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/*		if (keyform == FORMAT_ASN1)
 | 
						if (keyfile != NULL)
 | 
				
			||||||
			rsa=d2i_RSAPrivateKey_bio(in,NULL);
 | 
							{
 | 
				
			||||||
		else */
 | 
							if (keyform == FORMAT_ENGINE)
 | 
				
			||||||
		if (keyform == FORMAT_PEM)
 | 
								{
 | 
				
			||||||
			pkey=PEM_read_bio_PrivateKey(in,NULL,NULL);
 | 
								if (!e)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(bio_err,"no engine specified\n");
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								pkey = ENGINE_load_private_key(e, keyfile, NULL);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"bad input format specified for X509 request\n");
 | 
								if (BIO_read_filename(in,keyfile) <= 0)
 | 
				
			||||||
			goto end;
 | 
									{
 | 
				
			||||||
 | 
									perror(keyfile);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								if (keyform == FORMAT_ASN1)
 | 
				
			||||||
 | 
									pkey=d2i_PrivateKey_bio(in,NULL);
 | 
				
			||||||
 | 
								else if (keyform == FORMAT_PEM)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									pkey=PEM_read_bio_PrivateKey(in,NULL,NULL,
 | 
				
			||||||
 | 
										passin);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(bio_err,"bad input format specified for X509 request\n");
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (pkey == NULL)
 | 
							if (pkey == NULL)
 | 
				
			||||||
@@ -467,29 +587,20 @@ bad:
 | 
				
			|||||||
			BIO_printf(bio_err,"unable to load Private key\n");
 | 
								BIO_printf(bio_err,"unable to load Private key\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					                if (EVP_PKEY_type(pkey->type) == EVP_PKEY_DSA)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								char *randfile = CONF_get_string(req_conf,SECTION,"RANDFILE");
 | 
				
			||||||
 | 
								app_RAND_load_file(randfile, bio_err, 0);
 | 
				
			||||||
 | 
					                	}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (newreq && (pkey == NULL))
 | 
						if (newreq && (pkey == NULL))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		char *randfile;
 | 
							char *randfile = CONF_get_string(req_conf,SECTION,"RANDFILE");
 | 
				
			||||||
		char buffer[200];
 | 
							app_RAND_load_file(randfile, bio_err, 0);
 | 
				
			||||||
 | 
							if (inrand)
 | 
				
			||||||
 | 
								app_RAND_load_files(inrand);
 | 
				
			||||||
	
 | 
						
 | 
				
			||||||
		if ((randfile=CONF_get_string(req_conf,SECTION,"RANDFILE")) == NULL)
 | 
					 | 
				
			||||||
			randfile=RAND_file_name(buffer,200);
 | 
					 | 
				
			||||||
#ifdef WINDOWS
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"Loading 'screen' into random state -");
 | 
					 | 
				
			||||||
		BIO_flush(bio_err);
 | 
					 | 
				
			||||||
		RAND_screen();
 | 
					 | 
				
			||||||
		BIO_printf(bio_err," done\n");
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
		if ((randfile == NULL) || !RAND_load_file(randfile,1024L*1024L))
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			BIO_printf(bio_err,"unable to load 'random state'\n");
 | 
					 | 
				
			||||||
			BIO_printf(bio_err,"What this means is that the random number generator has not been seeded\n");
 | 
					 | 
				
			||||||
			BIO_printf(bio_err,"with much random data.\n");
 | 
					 | 
				
			||||||
			BIO_printf(bio_err,"Consider setting the RANDFILE environment variable to point at a file that\n");
 | 
					 | 
				
			||||||
			BIO_printf(bio_err,"'random' data can be kept in.\n");
 | 
					 | 
				
			||||||
			}
 | 
					 | 
				
			||||||
		if (newkey <= 0)
 | 
							if (newkey <= 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			newkey=(int)CONF_get_number(req_conf,SECTION,BITS);
 | 
								newkey=(int)CONF_get_number(req_conf,SECTION,BITS);
 | 
				
			||||||
@@ -513,7 +624,7 @@ bad:
 | 
				
			|||||||
			{
 | 
								{
 | 
				
			||||||
			if (!EVP_PKEY_assign_RSA(pkey,
 | 
								if (!EVP_PKEY_assign_RSA(pkey,
 | 
				
			||||||
				RSA_generate_key(newkey,0x10001,
 | 
									RSA_generate_key(newkey,0x10001,
 | 
				
			||||||
					req_cb,(char *)bio_err)))
 | 
										req_cb,bio_err)))
 | 
				
			||||||
				goto end;
 | 
									goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
@@ -527,8 +638,7 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if ((randfile == NULL) || (RAND_write_file(randfile) == 0))
 | 
							app_RAND_write_file(randfile, bio_err);
 | 
				
			||||||
			BIO_printf(bio_err,"unable to write 'random state'\n");
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (pkey == NULL) goto end;
 | 
							if (pkey == NULL) goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -539,6 +649,12 @@ bad:
 | 
				
			|||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"writing new private key to stdout\n");
 | 
								BIO_printf(bio_err,"writing new private key to stdout\n");
 | 
				
			||||||
			BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
								BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
								out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -560,7 +676,7 @@ bad:
 | 
				
			|||||||
		i=0;
 | 
							i=0;
 | 
				
			||||||
loop:
 | 
					loop:
 | 
				
			||||||
		if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
 | 
							if (!PEM_write_bio_PrivateKey(out,pkey,cipher,
 | 
				
			||||||
			NULL,0,NULL))
 | 
								NULL,0,NULL,passout))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if ((ERR_GET_REASON(ERR_peek_error()) ==
 | 
								if ((ERR_GET_REASON(ERR_peek_error()) ==
 | 
				
			||||||
				PEM_R_PROBLEMS_GETTING_PASSWORD) && (i < 3))
 | 
									PEM_R_PROBLEMS_GETTING_PASSWORD) && (i < 3))
 | 
				
			||||||
@@ -594,7 +710,7 @@ loop:
 | 
				
			|||||||
		if	(informat == FORMAT_ASN1)
 | 
							if	(informat == FORMAT_ASN1)
 | 
				
			||||||
			req=d2i_X509_REQ_bio(in,NULL);
 | 
								req=d2i_X509_REQ_bio(in,NULL);
 | 
				
			||||||
		else if (informat == FORMAT_PEM)
 | 
							else if (informat == FORMAT_PEM)
 | 
				
			||||||
			req=PEM_read_bio_X509_REQ(in,NULL,NULL);
 | 
								req=PEM_read_bio_X509_REQ(in,NULL,NULL,NULL);
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"bad input format specified for X509 request\n");
 | 
								BIO_printf(bio_err,"bad input format specified for X509 request\n");
 | 
				
			||||||
@@ -609,16 +725,15 @@ loop:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (newreq || x509)
 | 
						if (newreq || x509)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
#ifndef NO_DSA
 | 
					 | 
				
			||||||
		if (pkey->type == EVP_PKEY_DSA)
 | 
					 | 
				
			||||||
			digest=EVP_dss1();
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		if (pkey == NULL)
 | 
							if (pkey == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"you need to specify a private key\n");
 | 
								BIO_printf(bio_err,"you need to specify a private key\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					#ifndef NO_DSA
 | 
				
			||||||
 | 
							if (pkey->type == EVP_PKEY_DSA)
 | 
				
			||||||
 | 
								digest=EVP_dss1();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
		if (req == NULL)
 | 
							if (req == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			req=X509_REQ_new();
 | 
								req=X509_REQ_new();
 | 
				
			||||||
@@ -677,6 +792,22 @@ loop:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
 | 
								X509V3_CTX ext_ctx;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								/* Set up V3 context struct */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								X509V3_set_ctx(&ext_ctx, NULL, NULL, req, NULL, 0);
 | 
				
			||||||
 | 
								X509V3_set_conf_lhash(&ext_ctx, req_conf);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								/* Add extensions */
 | 
				
			||||||
 | 
								if(req_exts && !X509V3_EXT_REQ_add_conf(req_conf, 
 | 
				
			||||||
 | 
									 	&ext_ctx, req_exts, req))
 | 
				
			||||||
 | 
								    {
 | 
				
			||||||
 | 
								    BIO_printf(bio_err,
 | 
				
			||||||
 | 
									       "Error Loading extension section %s\n",
 | 
				
			||||||
 | 
									       req_exts);
 | 
				
			||||||
 | 
								    goto end;
 | 
				
			||||||
 | 
								    }
 | 
				
			||||||
			if (!(i=X509_REQ_sign(req,pkey,digest)))
 | 
								if (!(i=X509_REQ_sign(req,pkey,digest)))
 | 
				
			||||||
				goto end;
 | 
									goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -718,7 +849,15 @@ loop:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if ((keyout != NULL) && (strcmp(outfile,keyout) == 0))
 | 
							if ((keyout != NULL) && (strcmp(outfile,keyout) == 0))
 | 
				
			||||||
@@ -767,9 +906,10 @@ loop:
 | 
				
			|||||||
		{
 | 
							{
 | 
				
			||||||
		if 	(outformat == FORMAT_ASN1)
 | 
							if 	(outformat == FORMAT_ASN1)
 | 
				
			||||||
			i=i2d_X509_REQ_bio(out,req);
 | 
								i=i2d_X509_REQ_bio(out,req);
 | 
				
			||||||
		else if (outformat == FORMAT_PEM)
 | 
							else if (outformat == FORMAT_PEM) {
 | 
				
			||||||
			i=PEM_write_bio_X509_REQ(out,req);
 | 
								if(newhdr) i=PEM_write_bio_X509_REQ_NEW(out,req);
 | 
				
			||||||
		else	{
 | 
								else i=PEM_write_bio_X509_REQ(out,req);
 | 
				
			||||||
 | 
							} else {
 | 
				
			||||||
			BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
								BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
@@ -803,11 +943,12 @@ end:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	if ((req_conf != NULL) && (req_conf != config)) CONF_free(req_conf);
 | 
						if ((req_conf != NULL) && (req_conf != config)) CONF_free(req_conf);
 | 
				
			||||||
	BIO_free(in);
 | 
						BIO_free(in);
 | 
				
			||||||
	BIO_free(out);
 | 
						BIO_free_all(out);
 | 
				
			||||||
	EVP_PKEY_free(pkey);
 | 
						EVP_PKEY_free(pkey);
 | 
				
			||||||
	X509_REQ_free(req);
 | 
						X509_REQ_free(req);
 | 
				
			||||||
	X509_free(x509ss);
 | 
						X509_free(x509ss);
 | 
				
			||||||
	X509V3_EXT_cleanup();
 | 
						if(passargin && passin) OPENSSL_free(passin);
 | 
				
			||||||
 | 
						if(passargout && passout) OPENSSL_free(passout);
 | 
				
			||||||
	OBJ_cleanup();
 | 
						OBJ_cleanup();
 | 
				
			||||||
#ifndef NO_DSA
 | 
					#ifndef NO_DSA
 | 
				
			||||||
	if (dsa_params != NULL) DSA_free(dsa_params);
 | 
						if (dsa_params != NULL) DSA_free(dsa_params);
 | 
				
			||||||
@@ -818,43 +959,67 @@ end:
 | 
				
			|||||||
static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, int attribs)
 | 
					static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, int attribs)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int ret=0,i;
 | 
						int ret=0,i;
 | 
				
			||||||
	char *p,*q;
 | 
						char no_prompt = 0;
 | 
				
			||||||
	X509_REQ_INFO *ri;
 | 
						STACK_OF(CONF_VALUE) *dn_sk, *attr_sk = NULL;
 | 
				
			||||||
	char buf[100];
 | 
						char *tmp, *dn_sect,*attr_sect;
 | 
				
			||||||
	int nid,min,max;
 | 
					 | 
				
			||||||
	char *type,*def,*tmp,*value,*tmp_attr;
 | 
					 | 
				
			||||||
	STACK *sk,*attr=NULL;
 | 
					 | 
				
			||||||
	CONF_VALUE *v;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	tmp=CONF_get_string(req_conf,SECTION,DISTINGUISHED_NAME);
 | 
						tmp=CONF_get_string(req_conf,SECTION,PROMPT);
 | 
				
			||||||
	if (tmp == NULL)
 | 
						if((tmp != NULL) && !strcmp(tmp, "no")) no_prompt = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						dn_sect=CONF_get_string(req_conf,SECTION,DISTINGUISHED_NAME);
 | 
				
			||||||
 | 
						if (dn_sect == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"unable to find '%s' in config\n",
 | 
							BIO_printf(bio_err,"unable to find '%s' in config\n",
 | 
				
			||||||
			DISTINGUISHED_NAME);
 | 
								DISTINGUISHED_NAME);
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	sk=CONF_get_section(req_conf,tmp);
 | 
						dn_sk=CONF_get_section(req_conf,dn_sect);
 | 
				
			||||||
	if (sk == NULL)
 | 
						if (dn_sk == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"unable to get '%s' section\n",tmp);
 | 
							BIO_printf(bio_err,"unable to get '%s' section\n",dn_sect);
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	tmp_attr=CONF_get_string(req_conf,SECTION,ATTRIBUTES);
 | 
						attr_sect=CONF_get_string(req_conf,SECTION,ATTRIBUTES);
 | 
				
			||||||
	if (tmp_attr == NULL)
 | 
						if (attr_sect == NULL)
 | 
				
			||||||
		attr=NULL;
 | 
							attr_sk=NULL;
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		attr=CONF_get_section(req_conf,tmp_attr);
 | 
							attr_sk=CONF_get_section(req_conf,attr_sect);
 | 
				
			||||||
		if (attr == NULL)
 | 
							if (attr_sk == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unable to get '%s' section\n",tmp_attr);
 | 
								BIO_printf(bio_err,"unable to get '%s' section\n",attr_sect);
 | 
				
			||||||
			goto err;
 | 
								goto err;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ri=req->req_info;
 | 
						/* setup version number */
 | 
				
			||||||
 | 
						if (!X509_REQ_set_version(req,0L)) goto err; /* version 1 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(no_prompt) i = auto_info(req, dn_sk, attr_sk, attribs);
 | 
				
			||||||
 | 
						else i = prompt_info(req, dn_sk, dn_sect, attr_sk, attr_sect, attribs);
 | 
				
			||||||
 | 
						if(!i) goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						X509_REQ_set_pubkey(req,pkey);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ret=1;
 | 
				
			||||||
 | 
					err:
 | 
				
			||||||
 | 
						return(ret);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int prompt_info(X509_REQ *req,
 | 
				
			||||||
 | 
							STACK_OF(CONF_VALUE) *dn_sk, char *dn_sect,
 | 
				
			||||||
 | 
							STACK_OF(CONF_VALUE) *attr_sk, char *attr_sect, int attribs)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						int i;
 | 
				
			||||||
 | 
						char *p,*q;
 | 
				
			||||||
 | 
						char buf[100];
 | 
				
			||||||
 | 
						int nid,min,max;
 | 
				
			||||||
 | 
						char *type,*def,*value;
 | 
				
			||||||
 | 
						CONF_VALUE *v;
 | 
				
			||||||
 | 
						X509_NAME *subj;
 | 
				
			||||||
 | 
						subj = X509_REQ_get_subject_name(req);
 | 
				
			||||||
	BIO_printf(bio_err,"You are about to be asked to enter information that will be incorporated\n");
 | 
						BIO_printf(bio_err,"You are about to be asked to enter information that will be incorporated\n");
 | 
				
			||||||
	BIO_printf(bio_err,"into your certificate request.\n");
 | 
						BIO_printf(bio_err,"into your certificate request.\n");
 | 
				
			||||||
	BIO_printf(bio_err,"What you are about to enter is what is called a Distinguished Name or a DN.\n");
 | 
						BIO_printf(bio_err,"What you are about to enter is what is called a Distinguished Name or a DN.\n");
 | 
				
			||||||
@@ -863,18 +1028,16 @@ static int make_REQ(X509_REQ *req, EVP_PKEY *pkey, int attribs)
 | 
				
			|||||||
	BIO_printf(bio_err,"If you enter '.', the field will be left blank.\n");
 | 
						BIO_printf(bio_err,"If you enter '.', the field will be left blank.\n");
 | 
				
			||||||
	BIO_printf(bio_err,"-----\n");
 | 
						BIO_printf(bio_err,"-----\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* setup version number */
 | 
					 | 
				
			||||||
	if (!ASN1_INTEGER_set(ri->version,0L)) goto err; /* version 1 */
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (sk_num(sk))
 | 
						if (sk_CONF_VALUE_num(dn_sk))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		i= -1;
 | 
							i= -1;
 | 
				
			||||||
start:		for (;;)
 | 
					start:		for (;;)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			i++;
 | 
								i++;
 | 
				
			||||||
			if ((int)sk_num(sk) <= i) break;
 | 
								if (sk_CONF_VALUE_num(dn_sk) <= i) break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			v=(CONF_VALUE *)sk_value(sk,i);
 | 
								v=sk_CONF_VALUE_value(dn_sk,i);
 | 
				
			||||||
			p=q=NULL;
 | 
								p=q=NULL;
 | 
				
			||||||
			type=v->name;
 | 
								type=v->name;
 | 
				
			||||||
			if(!check_end(type,"_min") || !check_end(type,"_max") ||
 | 
								if(!check_end(type,"_min") || !check_end(type,"_max") ||
 | 
				
			||||||
@@ -893,32 +1056,32 @@ start:		for (;;)
 | 
				
			|||||||
			/* If OBJ not recognised ignore it */
 | 
								/* If OBJ not recognised ignore it */
 | 
				
			||||||
			if ((nid=OBJ_txt2nid(type)) == NID_undef) goto start;
 | 
								if ((nid=OBJ_txt2nid(type)) == NID_undef) goto start;
 | 
				
			||||||
			sprintf(buf,"%s_default",v->name);
 | 
								sprintf(buf,"%s_default",v->name);
 | 
				
			||||||
			if ((def=CONF_get_string(req_conf,tmp,buf)) == NULL)
 | 
								if ((def=CONF_get_string(req_conf,dn_sect,buf)) == NULL)
 | 
				
			||||||
				def="";
 | 
									def="";
 | 
				
			||||||
				
 | 
									
 | 
				
			||||||
			sprintf(buf,"%s_value",v->name);
 | 
								sprintf(buf,"%s_value",v->name);
 | 
				
			||||||
			if ((value=CONF_get_string(req_conf,tmp,buf)) == NULL)
 | 
								if ((value=CONF_get_string(req_conf,dn_sect,buf)) == NULL)
 | 
				
			||||||
				value=NULL;
 | 
									value=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			sprintf(buf,"%s_min",v->name);
 | 
								sprintf(buf,"%s_min",v->name);
 | 
				
			||||||
			min=(int)CONF_get_number(req_conf,tmp,buf);
 | 
								min=(int)CONF_get_number(req_conf,dn_sect,buf);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			sprintf(buf,"%s_max",v->name);
 | 
								sprintf(buf,"%s_max",v->name);
 | 
				
			||||||
			max=(int)CONF_get_number(req_conf,tmp,buf);
 | 
								max=(int)CONF_get_number(req_conf,dn_sect,buf);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if (!add_DN_object(ri->subject,v->value,def,value,nid,
 | 
								if (!add_DN_object(subj,v->value,def,value,nid,
 | 
				
			||||||
				min,max))
 | 
									min,max))
 | 
				
			||||||
				goto err;
 | 
									return 0;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		if (sk_X509_NAME_ENTRY_num(ri->subject->entries) == 0)
 | 
							if (X509_NAME_entry_count(subj) == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"error, no objects specified in config file\n");
 | 
								BIO_printf(bio_err,"error, no objects specified in config file\n");
 | 
				
			||||||
			goto err;
 | 
								return 0;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (attribs)
 | 
							if (attribs)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if ((attr != NULL) && (sk_num(attr) > 0))
 | 
								if ((attr_sk != NULL) && (sk_CONF_VALUE_num(attr_sk) > 0))
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(bio_err,"\nPlease enter the following 'extra' attributes\n");
 | 
									BIO_printf(bio_err,"\nPlease enter the following 'extra' attributes\n");
 | 
				
			||||||
				BIO_printf(bio_err,"to be sent with your certificate request\n");
 | 
									BIO_printf(bio_err,"to be sent with your certificate request\n");
 | 
				
			||||||
@@ -928,58 +1091,107 @@ start:		for (;;)
 | 
				
			|||||||
start2:			for (;;)
 | 
					start2:			for (;;)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				i++;
 | 
									i++;
 | 
				
			||||||
				if ((attr == NULL) || ((int)sk_num(attr) <= i))
 | 
									if ((attr_sk == NULL) ||
 | 
				
			||||||
 | 
										    (sk_CONF_VALUE_num(attr_sk) <= i))
 | 
				
			||||||
					break;
 | 
										break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				v=(CONF_VALUE *)sk_value(attr,i);
 | 
									v=sk_CONF_VALUE_value(attr_sk,i);
 | 
				
			||||||
				type=v->name;
 | 
									type=v->name;
 | 
				
			||||||
				if ((nid=OBJ_txt2nid(type)) == NID_undef)
 | 
									if ((nid=OBJ_txt2nid(type)) == NID_undef)
 | 
				
			||||||
					goto start2;
 | 
										goto start2;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				sprintf(buf,"%s_default",type);
 | 
									sprintf(buf,"%s_default",type);
 | 
				
			||||||
				if ((def=CONF_get_string(req_conf,tmp_attr,buf))
 | 
									if ((def=CONF_get_string(req_conf,attr_sect,buf))
 | 
				
			||||||
					== NULL)
 | 
										== NULL)
 | 
				
			||||||
					def="";
 | 
										def="";
 | 
				
			||||||
				
 | 
									
 | 
				
			||||||
				sprintf(buf,"%s_value",type);
 | 
									sprintf(buf,"%s_value",type);
 | 
				
			||||||
				if ((value=CONF_get_string(req_conf,tmp_attr,buf))
 | 
									if ((value=CONF_get_string(req_conf,attr_sect,buf))
 | 
				
			||||||
					== NULL)
 | 
										== NULL)
 | 
				
			||||||
					value=NULL;
 | 
										value=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				sprintf(buf,"%s_min",type);
 | 
									sprintf(buf,"%s_min",type);
 | 
				
			||||||
				min=(int)CONF_get_number(req_conf,tmp_attr,buf);
 | 
									min=(int)CONF_get_number(req_conf,attr_sect,buf);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				sprintf(buf,"%s_max",type);
 | 
									sprintf(buf,"%s_max",type);
 | 
				
			||||||
				max=(int)CONF_get_number(req_conf,tmp_attr,buf);
 | 
									max=(int)CONF_get_number(req_conf,attr_sect,buf);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
				if (!add_attribute_object(ri->attributes,
 | 
									if (!add_attribute_object(req,
 | 
				
			||||||
					v->value,def,value,nid,min,max))
 | 
										v->value,def,value,nid,min,max))
 | 
				
			||||||
					goto err;
 | 
										return 0;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"No template, please set one up.\n");
 | 
							BIO_printf(bio_err,"No template, please set one up.\n");
 | 
				
			||||||
		goto err;
 | 
							return 0;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	X509_REQ_set_pubkey(req,pkey);
 | 
						return 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ret=1;
 | 
					 | 
				
			||||||
err:
 | 
					 | 
				
			||||||
	return(ret);
 | 
					 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int auto_info(X509_REQ *req, STACK_OF(CONF_VALUE) *dn_sk,
 | 
				
			||||||
 | 
								STACK_OF(CONF_VALUE) *attr_sk, int attribs)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						int i;
 | 
				
			||||||
 | 
						char *p,*q;
 | 
				
			||||||
 | 
						char *type;
 | 
				
			||||||
 | 
						CONF_VALUE *v;
 | 
				
			||||||
 | 
						X509_NAME *subj;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						subj = X509_REQ_get_subject_name(req);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						for (i = 0; i < sk_CONF_VALUE_num(dn_sk); i++)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							v=sk_CONF_VALUE_value(dn_sk,i);
 | 
				
			||||||
 | 
							p=q=NULL;
 | 
				
			||||||
 | 
							type=v->name;
 | 
				
			||||||
 | 
							/* Skip past any leading X. X: X, etc to allow for
 | 
				
			||||||
 | 
							 * multiple instances 
 | 
				
			||||||
 | 
							 */
 | 
				
			||||||
 | 
							for(p = v->name; *p ; p++) 
 | 
				
			||||||
 | 
					#ifndef CHARSET_EBCDIC
 | 
				
			||||||
 | 
								if ((*p == ':') || (*p == ',') || (*p == '.')) {
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
								if ((*p == os_toascii[':']) || (*p == os_toascii[',']) || (*p == os_toascii['.'])) {
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
									p++;
 | 
				
			||||||
 | 
									if(*p) type = p;
 | 
				
			||||||
 | 
									break;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (!X509_NAME_add_entry_by_txt(subj,type, MBSTRING_ASC,
 | 
				
			||||||
 | 
									(unsigned char *) v->value,-1,-1,0)) return 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (!X509_NAME_entry_count(subj))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"error, no objects specified in config file\n");
 | 
				
			||||||
 | 
								return 0;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (attribs)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								for (i = 0; i < sk_CONF_VALUE_num(attr_sk); i++)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									v=sk_CONF_VALUE_value(attr_sk,i);
 | 
				
			||||||
 | 
									if(!X509_REQ_add1_attr_by_txt(req, v->name, MBSTRING_ASC,
 | 
				
			||||||
 | 
										(unsigned char *)v->value, -1)) return 0;
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int add_DN_object(X509_NAME *n, char *text, char *def, char *value,
 | 
					static int add_DN_object(X509_NAME *n, char *text, char *def, char *value,
 | 
				
			||||||
	     int nid, int min, int max)
 | 
						     int nid, int min, int max)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int i,j,ret=0;
 | 
						int i,ret=0;
 | 
				
			||||||
	X509_NAME_ENTRY *ne=NULL;
 | 
					 | 
				
			||||||
	MS_STATIC char buf[1024];
 | 
						MS_STATIC char buf[1024];
 | 
				
			||||||
 | 
					start:
 | 
				
			||||||
	BIO_printf(bio_err,"%s [%s]:",text,def);
 | 
						BIO_printf(bio_err,"%s [%s]:",text,def);
 | 
				
			||||||
	BIO_flush(bio_err);
 | 
						(void)BIO_flush(bio_err);
 | 
				
			||||||
	if (value != NULL)
 | 
						if (value != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		strcpy(buf,value);
 | 
							strcpy(buf,value);
 | 
				
			||||||
@@ -1010,34 +1222,27 @@ static int add_DN_object(X509_NAME *n, char *text, char *def, char *value,
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	buf[--i]='\0';
 | 
						buf[--i]='\0';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	j=ASN1_PRINTABLE_type((unsigned char *)buf,-1);
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
	if (req_fix_data(nid,&j,i,min,max) == 0)
 | 
						ebcdic2ascii(buf, buf, i);
 | 
				
			||||||
		goto err;
 | 
					#endif
 | 
				
			||||||
	if ((ne=X509_NAME_ENTRY_create_by_NID(NULL,nid,j,(unsigned char *)buf,
 | 
						if(!req_check_len(i, min, max)) goto start;
 | 
				
			||||||
		strlen(buf)))
 | 
						if (!X509_NAME_add_entry_by_NID(n,nid, MBSTRING_ASC,
 | 
				
			||||||
		== NULL) goto err;
 | 
									(unsigned char *) buf, -1,-1,0)) goto err;
 | 
				
			||||||
	if (!X509_NAME_add_entry(n,ne,X509_NAME_entry_count(n),0))
 | 
					 | 
				
			||||||
		goto err;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	ret=1;
 | 
						ret=1;
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	if (ne != NULL) X509_NAME_ENTRY_free(ne);
 | 
					 | 
				
			||||||
	return(ret);
 | 
						return(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int add_attribute_object(STACK_OF(X509_ATTRIBUTE) *n, char *text,
 | 
					static int add_attribute_object(X509_REQ *req, char *text,
 | 
				
			||||||
				char *def, char *value, int nid, int min,
 | 
									char *def, char *value, int nid, int min,
 | 
				
			||||||
				int max)
 | 
									int max)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int i,z;
 | 
						int i;
 | 
				
			||||||
	X509_ATTRIBUTE *xa=NULL;
 | 
					 | 
				
			||||||
	static char buf[1024];
 | 
						static char buf[1024];
 | 
				
			||||||
	ASN1_BIT_STRING *bs=NULL;
 | 
					 | 
				
			||||||
	ASN1_TYPE *at=NULL;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
start:
 | 
					start:
 | 
				
			||||||
	BIO_printf(bio_err,"%s [%s]:",text,def);
 | 
						BIO_printf(bio_err,"%s [%s]:",text,def);
 | 
				
			||||||
	BIO_flush(bio_err);
 | 
						(void)BIO_flush(bio_err);
 | 
				
			||||||
	if (value != NULL)
 | 
						if (value != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		strcpy(buf,value);
 | 
							strcpy(buf,value);
 | 
				
			||||||
@@ -1067,51 +1272,25 @@ start:
 | 
				
			|||||||
		return(0);
 | 
							return(0);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	buf[--i]='\0';
 | 
						buf[--i]='\0';
 | 
				
			||||||
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
 | 
						ebcdic2ascii(buf, buf, i);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						if(!req_check_len(i, min, max)) goto start;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* add object plus value */
 | 
						if(!X509_REQ_add1_attr_by_NID(req, nid, MBSTRING_ASC,
 | 
				
			||||||
	if ((xa=X509_ATTRIBUTE_new()) == NULL)
 | 
										(unsigned char *)buf, -1)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error adding attribute\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
	if ((xa->value.set=sk_ASN1_TYPE_new_null()) == NULL)
 | 
						}
 | 
				
			||||||
		goto err;
 | 
					 | 
				
			||||||
	xa->set=1;
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (xa->object != NULL) ASN1_OBJECT_free(xa->object);
 | 
					 | 
				
			||||||
	xa->object=OBJ_nid2obj(nid);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if ((bs=ASN1_BIT_STRING_new()) == NULL) goto err;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	bs->type=ASN1_PRINTABLE_type((unsigned char *)buf,-1);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	z=req_fix_data(nid,&bs->type,i,min,max);
 | 
					 | 
				
			||||||
	if (z == 0)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		if (value == NULL)
 | 
					 | 
				
			||||||
			goto start;
 | 
					 | 
				
			||||||
		else	goto err;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (!ASN1_STRING_set(bs,(unsigned char *)buf,i+1))
 | 
					 | 
				
			||||||
		{ BIO_printf(bio_err,"Malloc failure\n"); goto err; }
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if ((at=ASN1_TYPE_new()) == NULL)
 | 
					 | 
				
			||||||
		{ BIO_printf(bio_err,"Malloc failure\n"); goto err; }
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	ASN1_TYPE_set(at,bs->type,(char *)bs);
 | 
					 | 
				
			||||||
	sk_ASN1_TYPE_push(xa->value.set,at);
 | 
					 | 
				
			||||||
	bs=NULL;
 | 
					 | 
				
			||||||
	at=NULL;
 | 
					 | 
				
			||||||
	/* only one item per attribute */
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (!sk_X509_ATTRIBUTE_push(n,xa)) goto err;
 | 
					 | 
				
			||||||
	return(1);
 | 
						return(1);
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	if (xa != NULL) X509_ATTRIBUTE_free(xa);
 | 
					 | 
				
			||||||
	if (at != NULL) ASN1_TYPE_free(at);
 | 
					 | 
				
			||||||
	if (bs != NULL) ASN1_BIT_STRING_free(bs);
 | 
					 | 
				
			||||||
	return(0);
 | 
						return(0);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void MS_CALLBACK req_cb(int p, int n, char *arg)
 | 
					#ifndef NO_RSA
 | 
				
			||||||
 | 
					static void MS_CALLBACK req_cb(int p, int n, void *arg)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char c='*';
 | 
						char c='*';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1120,31 +1299,15 @@ static void MS_CALLBACK req_cb(int p, int n, char *arg)
 | 
				
			|||||||
	if (p == 2) c='*';
 | 
						if (p == 2) c='*';
 | 
				
			||||||
	if (p == 3) c='\n';
 | 
						if (p == 3) c='\n';
 | 
				
			||||||
	BIO_write((BIO *)arg,&c,1);
 | 
						BIO_write((BIO *)arg,&c,1);
 | 
				
			||||||
	BIO_flush((BIO *)arg);
 | 
						(void)BIO_flush((BIO *)arg);
 | 
				
			||||||
#ifdef LINT
 | 
					#ifdef LINT
 | 
				
			||||||
	p=n;
 | 
						p=n;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int req_fix_data(int nid, int *type, int len, int min, int max)
 | 
					static int req_check_len(int len, int min, int max)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	if (nid == NID_pkcs9_emailAddress)
 | 
					 | 
				
			||||||
		*type=V_ASN1_IA5STRING;
 | 
					 | 
				
			||||||
	if ((nid == NID_commonName) && (*type == V_ASN1_IA5STRING))
 | 
					 | 
				
			||||||
		*type=V_ASN1_T61STRING;
 | 
					 | 
				
			||||||
	if ((nid == NID_pkcs9_challengePassword) &&
 | 
					 | 
				
			||||||
		(*type == V_ASN1_IA5STRING))
 | 
					 | 
				
			||||||
		*type=V_ASN1_T61STRING;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if ((nid == NID_pkcs9_unstructuredName) &&
 | 
					 | 
				
			||||||
		(*type == V_ASN1_T61STRING))
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		BIO_printf(bio_err,"invalid characters in string, please re-enter the string\n");
 | 
					 | 
				
			||||||
		return(0);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	if (nid == NID_pkcs9_unstructuredName)
 | 
					 | 
				
			||||||
		*type=V_ASN1_IA5STRING;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (len < min)
 | 
						if (len < min)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"string is too short, it needs to be at least %d bytes long\n",min);
 | 
							BIO_printf(bio_err,"string is too short, it needs to be at least %d bytes long\n",min);
 | 
				
			||||||
@@ -1169,25 +1332,3 @@ static int check_end(char *str, char *end)
 | 
				
			|||||||
	tmp = str + slen - elen;
 | 
						tmp = str + slen - elen;
 | 
				
			||||||
	return strcmp(tmp, end);
 | 
						return strcmp(tmp, end);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					 | 
				
			||||||
static int add_oid_section(LHASH *conf)
 | 
					 | 
				
			||||||
{	
 | 
					 | 
				
			||||||
	char *p;
 | 
					 | 
				
			||||||
	STACK *sktmp;
 | 
					 | 
				
			||||||
	CONF_VALUE *cnf;
 | 
					 | 
				
			||||||
	int i;
 | 
					 | 
				
			||||||
	if(!(p=CONF_get_string(conf,NULL,"oid_section"))) return 1;
 | 
					 | 
				
			||||||
	if(!(sktmp = CONF_get_section(conf, p))) {
 | 
					 | 
				
			||||||
		BIO_printf(bio_err, "problem loading oid section %s\n", p);
 | 
					 | 
				
			||||||
		return 0;
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	for(i = 0; i < sk_num(sktmp); i++) {
 | 
					 | 
				
			||||||
		cnf = (CONF_VALUE *)sk_value(sktmp, i);
 | 
					 | 
				
			||||||
		if(OBJ_create(cnf->value, cnf->name, cnf->name) == NID_undef) {
 | 
					 | 
				
			||||||
			BIO_printf(bio_err, "problem creating object %s=%s\n",
 | 
					 | 
				
			||||||
							 cnf->name, cnf->value);
 | 
					 | 
				
			||||||
			return 0;
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
	return 1;
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										199
									
								
								apps/rsa.c
									
									
									
									
									
								
							
							
						
						
									
										199
									
								
								apps/rsa.c
									
									
									
									
									
								
							@@ -68,6 +68,7 @@
 | 
				
			|||||||
#include <openssl/evp.h>
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	rsa_main
 | 
					#define PROG	rsa_main
 | 
				
			||||||
@@ -81,17 +82,27 @@
 | 
				
			|||||||
 * -idea	- encrypt output if PEM format
 | 
					 * -idea	- encrypt output if PEM format
 | 
				
			||||||
 * -text	- print a text version
 | 
					 * -text	- print a text version
 | 
				
			||||||
 * -modulus	- print the RSA key modulus
 | 
					 * -modulus	- print the RSA key modulus
 | 
				
			||||||
 | 
					 * -check	- verify key consistency
 | 
				
			||||||
 | 
					 * -pubin	- Expect a public key in input file.
 | 
				
			||||||
 | 
					 * -pubout	- Output a public key.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	int ret=1;
 | 
						int ret=1;
 | 
				
			||||||
	RSA *rsa=NULL;
 | 
						RSA *rsa=NULL;
 | 
				
			||||||
	int i,badops=0;
 | 
						int i,badops=0, sgckey=0;
 | 
				
			||||||
	const EVP_CIPHER *enc=NULL;
 | 
						const EVP_CIPHER *enc=NULL;
 | 
				
			||||||
	BIO *in=NULL,*out=NULL;
 | 
						BIO *in=NULL,*out=NULL;
 | 
				
			||||||
	int informat,outformat,text=0,noout=0;
 | 
						int informat,outformat,text=0,check=0,noout=0;
 | 
				
			||||||
 | 
						int pubin = 0, pubout = 0;
 | 
				
			||||||
	char *infile,*outfile,*prog;
 | 
						char *infile,*outfile,*prog;
 | 
				
			||||||
 | 
						char *passargin = NULL, *passargout = NULL;
 | 
				
			||||||
 | 
						char *passin = NULL, *passout = NULL;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
	int modulus=0;
 | 
						int modulus=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
@@ -130,12 +141,35 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			outfile= *(++argv);
 | 
								outfile= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passin") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargin= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passout") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargout= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-sgckey") == 0)
 | 
				
			||||||
 | 
								sgckey=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-pubin") == 0)
 | 
				
			||||||
 | 
								pubin=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-pubout") == 0)
 | 
				
			||||||
 | 
								pubout=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-noout") == 0)
 | 
							else if (strcmp(*argv,"-noout") == 0)
 | 
				
			||||||
			noout=1;
 | 
								noout=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-text") == 0)
 | 
							else if (strcmp(*argv,"-text") == 0)
 | 
				
			||||||
			text=1;
 | 
								text=1;
 | 
				
			||||||
		else if (strcmp(*argv,"-modulus") == 0)
 | 
							else if (strcmp(*argv,"-modulus") == 0)
 | 
				
			||||||
			modulus=1;
 | 
								modulus=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-check") == 0)
 | 
				
			||||||
 | 
								check=1;
 | 
				
			||||||
		else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
 | 
							else if ((enc=EVP_get_cipherbyname(&(argv[0][1]))) == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
								BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
				
			||||||
@@ -151,23 +185,58 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
bad:
 | 
					bad:
 | 
				
			||||||
		BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
							BIO_printf(bio_err,"%s [options] <infile >outfile\n",prog);
 | 
				
			||||||
		BIO_printf(bio_err,"where options are\n");
 | 
							BIO_printf(bio_err,"where options are\n");
 | 
				
			||||||
		BIO_printf(bio_err," -inform arg   input format - one of DER NET PEM\n");
 | 
							BIO_printf(bio_err," -inform arg     input format - one of DER NET PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -outform arg  output format - one of DER NET PEM\n");
 | 
							BIO_printf(bio_err," -outform arg    output format - one of DER NET PEM\n");
 | 
				
			||||||
		BIO_printf(bio_err," -in arg       input file\n");
 | 
							BIO_printf(bio_err," -in arg         input file\n");
 | 
				
			||||||
		BIO_printf(bio_err," -out arg      output file\n");
 | 
							BIO_printf(bio_err," -sgckey         Use IIS SGC key format\n");
 | 
				
			||||||
		BIO_printf(bio_err," -des          encrypt PEM output with cbc des\n");
 | 
							BIO_printf(bio_err," -passin arg     input file pass phrase source\n");
 | 
				
			||||||
		BIO_printf(bio_err," -des3         encrypt PEM output with ede cbc des using 168 bit key\n");
 | 
							BIO_printf(bio_err," -out arg        output file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -passout arg    output file pass phrase source\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -des            encrypt PEM output with cbc des\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -des3           encrypt PEM output with ede cbc des using 168 bit key\n");
 | 
				
			||||||
#ifndef NO_IDEA
 | 
					#ifndef NO_IDEA
 | 
				
			||||||
		BIO_printf(bio_err," -idea         encrypt PEM output with cbc idea\n");
 | 
							BIO_printf(bio_err," -idea           encrypt PEM output with cbc idea\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
		BIO_printf(bio_err," -text         print the key in text\n");
 | 
							BIO_printf(bio_err," -text           print the key in text\n");
 | 
				
			||||||
		BIO_printf(bio_err," -noout        don't print key out\n");
 | 
							BIO_printf(bio_err," -noout          don't print key out\n");
 | 
				
			||||||
		BIO_printf(bio_err," -modulus      print the RSA key modulus\n");
 | 
							BIO_printf(bio_err," -modulus        print the RSA key modulus\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -check          verify key consistency\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -pubin          expect a public key in input file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -pubout         output a public key\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -engine e       use engine e, possibly a hardware device.\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ERR_load_crypto_strings();
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!app_passwd(bio_err, passargin, passargout, &passin, &passout)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting passwords\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(check && pubin) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Only private keys can be checked\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
	out=BIO_new(BIO_s_file());
 | 
						out=BIO_new(BIO_s_file());
 | 
				
			||||||
	if ((in == NULL) || (out == NULL))
 | 
						if ((in == NULL) || (out == NULL))
 | 
				
			||||||
@@ -187,9 +256,11 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_err,"read RSA private key\n");
 | 
						BIO_printf(bio_err,"read RSA key\n");
 | 
				
			||||||
	if	(informat == FORMAT_ASN1)
 | 
						if	(informat == FORMAT_ASN1) {
 | 
				
			||||||
		rsa=d2i_RSAPrivateKey_bio(in,NULL);
 | 
							if (pubin) rsa=d2i_RSA_PUBKEY_bio(in,NULL);
 | 
				
			||||||
 | 
							else rsa=d2i_RSAPrivateKey_bio(in,NULL);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
#ifndef NO_RC4
 | 
					#ifndef NO_RC4
 | 
				
			||||||
	else if (informat == FORMAT_NETSCAPE)
 | 
						else if (informat == FORMAT_NETSCAPE)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -213,12 +284,14 @@ bad:
 | 
				
			|||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		p=(unsigned char *)buf->data;
 | 
							p=(unsigned char *)buf->data;
 | 
				
			||||||
		rsa=(RSA *)d2i_Netscape_RSA(NULL,&p,(long)size,NULL);
 | 
							rsa=d2i_RSA_NET(NULL,&p,(long)size,NULL, sgckey);
 | 
				
			||||||
		BUF_MEM_free(buf);
 | 
							BUF_MEM_free(buf);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	else if (informat == FORMAT_PEM)
 | 
						else if (informat == FORMAT_PEM) {
 | 
				
			||||||
		rsa=PEM_read_bio_RSAPrivateKey(in,NULL,NULL);
 | 
							if(pubin) rsa=PEM_read_bio_RSA_PUBKEY(in,NULL,NULL,NULL);
 | 
				
			||||||
 | 
							else rsa=PEM_read_bio_RSAPrivateKey(in,NULL, NULL,passin);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"bad input format specified for key\n");
 | 
							BIO_printf(bio_err,"bad input format specified for key\n");
 | 
				
			||||||
@@ -226,13 +299,21 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	if (rsa == NULL)
 | 
						if (rsa == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"unable to load Private Key\n");
 | 
							BIO_printf(bio_err,"unable to load key\n");
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (outfile == NULL)
 | 
						if (outfile == NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
		BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
							BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (BIO_write_filename(out,outfile) <= 0)
 | 
							if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -252,15 +333,48 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (modulus)
 | 
						if (modulus)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		fprintf(stdout,"Modulus=");
 | 
							BIO_printf(out,"Modulus=");
 | 
				
			||||||
		BN_print(out,rsa->n);
 | 
							BN_print(out,rsa->n);
 | 
				
			||||||
		fprintf(stdout,"\n");
 | 
							BIO_printf(out,"\n");
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (noout) goto end;
 | 
						if (check)
 | 
				
			||||||
	BIO_printf(bio_err,"writing RSA private key\n");
 | 
							{
 | 
				
			||||||
	if 	(outformat == FORMAT_ASN1)
 | 
							int r = RSA_check_key(rsa);
 | 
				
			||||||
		i=i2d_RSAPrivateKey_bio(out,rsa);
 | 
					
 | 
				
			||||||
 | 
							if (r == 1)
 | 
				
			||||||
 | 
								BIO_printf(out,"RSA key ok\n");
 | 
				
			||||||
 | 
							else if (r == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								long e;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								while ((e = ERR_peek_error()) != 0 &&
 | 
				
			||||||
 | 
									ERR_GET_LIB(e) == ERR_LIB_RSA &&
 | 
				
			||||||
 | 
									ERR_GET_FUNC(e) == RSA_F_RSA_CHECK_KEY &&
 | 
				
			||||||
 | 
									ERR_GET_REASON(e) != ERR_R_MALLOC_FAILURE)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									BIO_printf(out, "RSA key error: %s\n", ERR_reason_error_string(e));
 | 
				
			||||||
 | 
									ERR_get_error(); /* remove e from error stack */
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
							if (r == -1 || ERR_peek_error() != 0) /* should happen only if r == -1 */
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
						if (noout)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							ret = 0;
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						BIO_printf(bio_err,"writing RSA key\n");
 | 
				
			||||||
 | 
						if 	(outformat == FORMAT_ASN1) {
 | 
				
			||||||
 | 
							if(pubout || pubin) i=i2d_RSA_PUBKEY_bio(out,rsa);
 | 
				
			||||||
 | 
							else i=i2d_RSAPrivateKey_bio(out,rsa);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
#ifndef NO_RC4
 | 
					#ifndef NO_RC4
 | 
				
			||||||
	else if (outformat == FORMAT_NETSCAPE)
 | 
						else if (outformat == FORMAT_NETSCAPE)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -268,35 +382,46 @@ bad:
 | 
				
			|||||||
		int size;
 | 
							int size;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		i=1;
 | 
							i=1;
 | 
				
			||||||
		size=i2d_Netscape_RSA(rsa,NULL,NULL);
 | 
							size=i2d_RSA_NET(rsa,NULL,NULL, sgckey);
 | 
				
			||||||
		if ((p=(unsigned char *)Malloc(size)) == NULL)
 | 
							if ((p=(unsigned char *)OPENSSL_malloc(size)) == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"Malloc failure\n");
 | 
								BIO_printf(bio_err,"Memory allocation failure\n");
 | 
				
			||||||
			goto end;
 | 
								goto end;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		pp=p;
 | 
							pp=p;
 | 
				
			||||||
		i2d_Netscape_RSA(rsa,&p,NULL);
 | 
							i2d_RSA_NET(rsa,&p,NULL, sgckey);
 | 
				
			||||||
		BIO_write(out,(char *)pp,size);
 | 
							BIO_write(out,(char *)pp,size);
 | 
				
			||||||
		Free(pp);
 | 
							OPENSSL_free(pp);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	else if (outformat == FORMAT_PEM)
 | 
						else if (outformat == FORMAT_PEM) {
 | 
				
			||||||
		i=PEM_write_bio_RSAPrivateKey(out,rsa,enc,NULL,0,NULL);
 | 
							if(pubout || pubin)
 | 
				
			||||||
	else	{
 | 
							    i=PEM_write_bio_RSA_PUBKEY(out,rsa);
 | 
				
			||||||
 | 
							else i=PEM_write_bio_RSAPrivateKey(out,rsa,
 | 
				
			||||||
 | 
											enc,NULL,0,NULL,passout);
 | 
				
			||||||
 | 
						} else	{
 | 
				
			||||||
		BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
							BIO_printf(bio_err,"bad output format specified for outfile\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (!i)
 | 
						if (!i)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"unable to write private key\n");
 | 
							BIO_printf(bio_err,"unable to write key\n");
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		ret=0;
 | 
							ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (in != NULL) BIO_free(in);
 | 
						if(in != NULL) BIO_free(in);
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if(out != NULL) BIO_free_all(out);
 | 
				
			||||||
	if (rsa != NULL) RSA_free(rsa);
 | 
						if(rsa != NULL) RSA_free(rsa);
 | 
				
			||||||
 | 
						if(passin) OPENSSL_free(passin);
 | 
				
			||||||
 | 
						if(passout) OPENSSL_free(passout);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					#else /* !NO_RSA */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					# if PEDANTIC
 | 
				
			||||||
 | 
					static void *dummy=&dummy;
 | 
				
			||||||
 | 
					# endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,15 +0,0 @@
 | 
				
			|||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIICTjCCAbsCEGiuFKTJn6nzmiPPLxUZs1owDQYJKoZIhvcNAQEEBQAwXzELMAkG
 | 
					 | 
				
			||||||
A1UEBhMCVVMxIDAeBgNVBAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMS4wLAYD
 | 
					 | 
				
			||||||
VQQLEyVTZWN1cmUgU2VydmVyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTk4
 | 
					 | 
				
			||||||
MDUxODAwMDAwMFoXDTk5MDUxODIzNTk1OVowdTELMAkGA1UEBhMCVVMxETAPBgNV
 | 
					 | 
				
			||||||
BAgTCE5ldyBZb3JrMREwDwYDVQQHFAhOZXcgWW9yazEeMBwGA1UEChQVSW5kdXN0
 | 
					 | 
				
			||||||
cmlhbCBQcmVzcyBJbmMuMSAwHgYDVQQDFBd3d3cuaW5kdXN0cmlhbHByZXNzLmNv
 | 
					 | 
				
			||||||
bTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAqiH9xUJNHvqCmaDon27ValJb
 | 
					 | 
				
			||||||
qTLymF3yKKWBxbODLWjX7yKjewoqWhotaEARI6jXPqomU87gFU1tH4r/bgwh3FmU
 | 
					 | 
				
			||||||
MK3qo92XOsvwNAHzXzWRXQNJmm54g2F1RUt00pgYiOximDse1t9RL5POCDEbfX8D
 | 
					 | 
				
			||||||
gugrE/WwkS2FrSoc5/cCAwEAATANBgkqhkiG9w0BAQQFAAN+AIw7fvF0EtEvrNS/
 | 
					 | 
				
			||||||
LYuqAgUw/tH0FLgCkqKLmYYm/yR+Z0hD2eP/UhF+jAwmV8rHtBnaTM7oN23RVW2k
 | 
					 | 
				
			||||||
Cf8soiGfr2PYtfufpXtd7azUFa+WJCWnp0N29EG0BR1JOFC0Q/4dh/X9qulM8luq
 | 
					 | 
				
			||||||
Pjrmw2eSgbdmmdumWAcNPVbV
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,50 +0,0 @@
 | 
				
			|||||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
					 | 
				
			||||||
subject=/C=US/ST=New York/L=New York/O=Industrial Press Inc./CN=www.industrialpress.com
 | 
					 | 
				
			||||||
Certificate:
 | 
					 | 
				
			||||||
    Data:
 | 
					 | 
				
			||||||
        Version: 1 (0x0)
 | 
					 | 
				
			||||||
        Serial Number:
 | 
					 | 
				
			||||||
            68:ae:14:a4:c9:9f:a9:f3:9a:23:cf:2f:15:19:b3:5a
 | 
					 | 
				
			||||||
        Signature Algorithm: md5WithRSAEncryption
 | 
					 | 
				
			||||||
        Issuer: C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority
 | 
					 | 
				
			||||||
        Validity
 | 
					 | 
				
			||||||
            Not Before: May 18 00:00:00 1998 GMT
 | 
					 | 
				
			||||||
            Not After : May 18 23:59:59 1999 GMT
 | 
					 | 
				
			||||||
        Subject: C=US, ST=New York, L=New York, O=Industrial Press Inc., CN=www.industrialpress.com
 | 
					 | 
				
			||||||
        Subject Public Key Info:
 | 
					 | 
				
			||||||
            Public Key Algorithm: rsaEncryption
 | 
					 | 
				
			||||||
            RSA Public Key: (1024 bit)
 | 
					 | 
				
			||||||
                Modulus (1024 bit):
 | 
					 | 
				
			||||||
                    00:aa:21:fd:c5:42:4d:1e:fa:82:99:a0:e8:9f:6e:
 | 
					 | 
				
			||||||
                    d5:6a:52:5b:a9:32:f2:98:5d:f2:28:a5:81:c5:b3:
 | 
					 | 
				
			||||||
                    83:2d:68:d7:ef:22:a3:7b:0a:2a:5a:1a:2d:68:40:
 | 
					 | 
				
			||||||
                    11:23:a8:d7:3e:aa:26:53:ce:e0:15:4d:6d:1f:8a:
 | 
					 | 
				
			||||||
                    ff:6e:0c:21:dc:59:94:30:ad:ea:a3:dd:97:3a:cb:
 | 
					 | 
				
			||||||
                    f0:34:01:f3:5f:35:91:5d:03:49:9a:6e:78:83:61:
 | 
					 | 
				
			||||||
                    75:45:4b:74:d2:98:18:88:ec:62:98:3b:1e:d6:df:
 | 
					 | 
				
			||||||
                    51:2f:93:ce:08:31:1b:7d:7f:03:82:e8:2b:13:f5:
 | 
					 | 
				
			||||||
                    b0:91:2d:85:ad:2a:1c:e7:f7
 | 
					 | 
				
			||||||
                Exponent: 65537 (0x10001)
 | 
					 | 
				
			||||||
    Signature Algorithm: md5WithRSAEncryption
 | 
					 | 
				
			||||||
        8c:3b:7e:f1:74:12:d1:2f:ac:d4:bf:2d:8b:aa:02:05:30:fe:
 | 
					 | 
				
			||||||
        d1:f4:14:b8:02:92:a2:8b:99:86:26:ff:24:7e:67:48:43:d9:
 | 
					 | 
				
			||||||
        e3:ff:52:11:7e:8c:0c:26:57:ca:c7:b4:19:da:4c:ce:e8:37:
 | 
					 | 
				
			||||||
        6d:d1:55:6d:a4:09:ff:2c:a2:21:9f:af:63:d8:b5:fb:9f:a5:
 | 
					 | 
				
			||||||
        7b:5d:ed:ac:d4:15:af:96:24:25:a7:a7:43:76:f4:41:b4:05:
 | 
					 | 
				
			||||||
        1d:49:38:50:b4:43:fe:1d:87:f5:fd:aa:e9:4c:f2:5b:aa:3e:
 | 
					 | 
				
			||||||
        3a:e6:c3:67:92:81:b7:66:99:db:a6:58:07:0d:3d:56:d5
 | 
					 | 
				
			||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIICTjCCAbsCEGiuFKTJn6nzmiPPLxUZs1owDQYJKoZIhvcNAQEEBQAwXzELMAkG
 | 
					 | 
				
			||||||
A1UEBhMCVVMxIDAeBgNVBAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMS4wLAYD
 | 
					 | 
				
			||||||
VQQLEyVTZWN1cmUgU2VydmVyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTk4
 | 
					 | 
				
			||||||
MDUxODAwMDAwMFoXDTk5MDUxODIzNTk1OVowdTELMAkGA1UEBhMCVVMxETAPBgNV
 | 
					 | 
				
			||||||
BAgTCE5ldyBZb3JrMREwDwYDVQQHFAhOZXcgWW9yazEeMBwGA1UEChQVSW5kdXN0
 | 
					 | 
				
			||||||
cmlhbCBQcmVzcyBJbmMuMSAwHgYDVQQDFBd3d3cuaW5kdXN0cmlhbHByZXNzLmNv
 | 
					 | 
				
			||||||
bTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAqiH9xUJNHvqCmaDon27ValJb
 | 
					 | 
				
			||||||
qTLymF3yKKWBxbODLWjX7yKjewoqWhotaEARI6jXPqomU87gFU1tH4r/bgwh3FmU
 | 
					 | 
				
			||||||
MK3qo92XOsvwNAHzXzWRXQNJmm54g2F1RUt00pgYiOximDse1t9RL5POCDEbfX8D
 | 
					 | 
				
			||||||
gugrE/WwkS2FrSoc5/cCAwEAATANBgkqhkiG9w0BAQQFAAN+AIw7fvF0EtEvrNS/
 | 
					 | 
				
			||||||
LYuqAgUw/tH0FLgCkqKLmYYm/yR+Z0hD2eP/UhF+jAwmV8rHtBnaTM7oN23RVW2k
 | 
					 | 
				
			||||||
Cf8soiGfr2PYtfufpXtd7azUFa+WJCWnp0N29EG0BR1JOFC0Q/4dh/X9qulM8luq
 | 
					 | 
				
			||||||
Pjrmw2eSgbdmmdumWAcNPVbV
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,47 +0,0 @@
 | 
				
			|||||||
Certificate:
 | 
					 | 
				
			||||||
    Data:
 | 
					 | 
				
			||||||
        Version: 1 (0x0)
 | 
					 | 
				
			||||||
        Serial Number:
 | 
					 | 
				
			||||||
            02:ad:66:7e:4e:45:fe:5e:57:6f:3c:98:19:5e:dd:c0
 | 
					 | 
				
			||||||
        Signature Algorithm: md2WithRSAEncryption
 | 
					 | 
				
			||||||
        Issuer: C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority
 | 
					 | 
				
			||||||
        Validity
 | 
					 | 
				
			||||||
            Not Before: Nov  9 00:00:00 1994 GMT
 | 
					 | 
				
			||||||
            Not After : Jan  7 23:59:59 2010 GMT
 | 
					 | 
				
			||||||
        Subject: C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority
 | 
					 | 
				
			||||||
        Subject Public Key Info:
 | 
					 | 
				
			||||||
            Public Key Algorithm: rsaEncryption
 | 
					 | 
				
			||||||
            RSA Public Key: (1000 bit)
 | 
					 | 
				
			||||||
                Modulus (1000 bit):
 | 
					 | 
				
			||||||
                    00:92:ce:7a:c1:ae:83:3e:5a:aa:89:83:57:ac:25:
 | 
					 | 
				
			||||||
                    01:76:0c:ad:ae:8e:2c:37:ce:eb:35:78:64:54:03:
 | 
					 | 
				
			||||||
                    e5:84:40:51:c9:bf:8f:08:e2:8a:82:08:d2:16:86:
 | 
					 | 
				
			||||||
                    37:55:e9:b1:21:02:ad:76:68:81:9a:05:a2:4b:c9:
 | 
					 | 
				
			||||||
                    4b:25:66:22:56:6c:88:07:8f:f7:81:59:6d:84:07:
 | 
					 | 
				
			||||||
                    65:70:13:71:76:3e:9b:77:4c:e3:50:89:56:98:48:
 | 
					 | 
				
			||||||
                    b9:1d:a7:29:1a:13:2e:4a:11:59:9c:1e:15:d5:49:
 | 
					 | 
				
			||||||
                    54:2c:73:3a:69:82:b1:97:39:9c:6d:70:67:48:e5:
 | 
					 | 
				
			||||||
                    dd:2d:d6:c8:1e:7b
 | 
					 | 
				
			||||||
                Exponent: 65537 (0x10001)
 | 
					 | 
				
			||||||
    Signature Algorithm: md2WithRSAEncryption
 | 
					 | 
				
			||||||
        65:dd:7e:e1:b2:ec:b0:e2:3a:e0:ec:71:46:9a:19:11:b8:d3:
 | 
					 | 
				
			||||||
        c7:a0:b4:03:40:26:02:3e:09:9c:e1:12:b3:d1:5a:f6:37:a5:
 | 
					 | 
				
			||||||
        b7:61:03:b6:5b:16:69:3b:c6:44:08:0c:88:53:0c:6b:97:49:
 | 
					 | 
				
			||||||
        c7:3e:35:dc:6c:b9:bb:aa:df:5c:bb:3a:2f:93:60:b6:a9:4b:
 | 
					 | 
				
			||||||
        4d:f2:20:f7:cd:5f:7f:64:7b:8e:dc:00:5c:d7:fa:77:ca:39:
 | 
					 | 
				
			||||||
        16:59:6f:0e:ea:d3:b5:83:7f:4d:4d:42:56:76:b4:c9:5f:04:
 | 
					 | 
				
			||||||
        f8:38:f8:eb:d2:5f:75:5f:cd:7b:fc:e5:8e:80:7c:fc:50
 | 
					 | 
				
			||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIICNDCCAaECEAKtZn5ORf5eV288mBle3cAwDQYJKoZIhvcNAQECBQAwXzELMAkG
 | 
					 | 
				
			||||||
A1UEBhMCVVMxIDAeBgNVBAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMS4wLAYD
 | 
					 | 
				
			||||||
VQQLEyVTZWN1cmUgU2VydmVyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTk0
 | 
					 | 
				
			||||||
MTEwOTAwMDAwMFoXDTEwMDEwNzIzNTk1OVowXzELMAkGA1UEBhMCVVMxIDAeBgNV
 | 
					 | 
				
			||||||
BAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMS4wLAYDVQQLEyVTZWN1cmUgU2Vy
 | 
					 | 
				
			||||||
dmVyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIGbMA0GCSqGSIb3DQEBAQUAA4GJ
 | 
					 | 
				
			||||||
ADCBhQJ+AJLOesGugz5aqomDV6wlAXYMra6OLDfO6zV4ZFQD5YRAUcm/jwjiioII
 | 
					 | 
				
			||||||
0haGN1XpsSECrXZogZoFokvJSyVmIlZsiAeP94FZbYQHZXATcXY+m3dM41CJVphI
 | 
					 | 
				
			||||||
uR2nKRoTLkoRWZweFdVJVCxzOmmCsZc5nG1wZ0jl3S3WyB57AgMBAAEwDQYJKoZI
 | 
					 | 
				
			||||||
hvcNAQECBQADfgBl3X7hsuyw4jrg7HFGmhkRuNPHoLQDQCYCPgmc4RKz0Vr2N6W3
 | 
					 | 
				
			||||||
YQO2WxZpO8ZECAyIUwxrl0nHPjXcbLm7qt9cuzovk2C2qUtN8iD3zV9/ZHuO3ABc
 | 
					 | 
				
			||||||
1/p3yjkWWW8O6tO1g39NTUJWdrTJXwT4OPjr0l91X817/OWOgHz8UA==
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
@@ -1,49 +0,0 @@
 | 
				
			|||||||
issuer= /C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
					 | 
				
			||||||
subject=/C=US/O=RSA Data Security, Inc./OU=Secure Server Certification Authority
 | 
					 | 
				
			||||||
Certificate:
 | 
					 | 
				
			||||||
    Data:
 | 
					 | 
				
			||||||
        Version: 1 (0x0)
 | 
					 | 
				
			||||||
        Serial Number:
 | 
					 | 
				
			||||||
            02:ad:66:7e:4e:45:fe:5e:57:6f:3c:98:19:5e:dd:c0
 | 
					 | 
				
			||||||
        Signature Algorithm: md2WithRSAEncryption
 | 
					 | 
				
			||||||
        Issuer: C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority
 | 
					 | 
				
			||||||
        Validity
 | 
					 | 
				
			||||||
            Not Before: Nov  9 00:00:00 1994 GMT
 | 
					 | 
				
			||||||
            Not After : Jan  7 23:59:59 2010 GMT
 | 
					 | 
				
			||||||
        Subject: C=US, O=RSA Data Security, Inc., OU=Secure Server Certification Authority
 | 
					 | 
				
			||||||
        Subject Public Key Info:
 | 
					 | 
				
			||||||
            Public Key Algorithm: rsaEncryption
 | 
					 | 
				
			||||||
            RSA Public Key: (1000 bit)
 | 
					 | 
				
			||||||
                Modulus (1000 bit):
 | 
					 | 
				
			||||||
                    00:92:ce:7a:c1:ae:83:3e:5a:aa:89:83:57:ac:25:
 | 
					 | 
				
			||||||
                    01:76:0c:ad:ae:8e:2c:37:ce:eb:35:78:64:54:03:
 | 
					 | 
				
			||||||
                    e5:84:40:51:c9:bf:8f:08:e2:8a:82:08:d2:16:86:
 | 
					 | 
				
			||||||
                    37:55:e9:b1:21:02:ad:76:68:81:9a:05:a2:4b:c9:
 | 
					 | 
				
			||||||
                    4b:25:66:22:56:6c:88:07:8f:f7:81:59:6d:84:07:
 | 
					 | 
				
			||||||
                    65:70:13:71:76:3e:9b:77:4c:e3:50:89:56:98:48:
 | 
					 | 
				
			||||||
                    b9:1d:a7:29:1a:13:2e:4a:11:59:9c:1e:15:d5:49:
 | 
					 | 
				
			||||||
                    54:2c:73:3a:69:82:b1:97:39:9c:6d:70:67:48:e5:
 | 
					 | 
				
			||||||
                    dd:2d:d6:c8:1e:7b
 | 
					 | 
				
			||||||
                Exponent: 65537 (0x10001)
 | 
					 | 
				
			||||||
    Signature Algorithm: md2WithRSAEncryption
 | 
					 | 
				
			||||||
        65:dd:7e:e1:b2:ec:b0:e2:3a:e0:ec:71:46:9a:19:11:b8:d3:
 | 
					 | 
				
			||||||
        c7:a0:b4:03:40:26:02:3e:09:9c:e1:12:b3:d1:5a:f6:37:a5:
 | 
					 | 
				
			||||||
        b7:61:03:b6:5b:16:69:3b:c6:44:08:0c:88:53:0c:6b:97:49:
 | 
					 | 
				
			||||||
        c7:3e:35:dc:6c:b9:bb:aa:df:5c:bb:3a:2f:93:60:b6:a9:4b:
 | 
					 | 
				
			||||||
        4d:f2:20:f7:cd:5f:7f:64:7b:8e:dc:00:5c:d7:fa:77:ca:39:
 | 
					 | 
				
			||||||
        16:59:6f:0e:ea:d3:b5:83:7f:4d:4d:42:56:76:b4:c9:5f:04:
 | 
					 | 
				
			||||||
        f8:38:f8:eb:d2:5f:75:5f:cd:7b:fc:e5:8e:80:7c:fc:50
 | 
					 | 
				
			||||||
-----BEGIN CERTIFICATE-----
 | 
					 | 
				
			||||||
MIICNDCCAaECEAKtZn5ORf5eV288mBle3cAwDQYJKoZIhvcNAQECBQAwXzELMAkG
 | 
					 | 
				
			||||||
A1UEBhMCVVMxIDAeBgNVBAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMS4wLAYD
 | 
					 | 
				
			||||||
VQQLEyVTZWN1cmUgU2VydmVyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTk0
 | 
					 | 
				
			||||||
MTEwOTAwMDAwMFoXDTEwMDEwNzIzNTk1OVowXzELMAkGA1UEBhMCVVMxIDAeBgNV
 | 
					 | 
				
			||||||
BAoTF1JTQSBEYXRhIFNlY3VyaXR5LCBJbmMuMS4wLAYDVQQLEyVTZWN1cmUgU2Vy
 | 
					 | 
				
			||||||
dmVyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIGbMA0GCSqGSIb3DQEBAQUAA4GJ
 | 
					 | 
				
			||||||
ADCBhQJ+AJLOesGugz5aqomDV6wlAXYMra6OLDfO6zV4ZFQD5YRAUcm/jwjiioII
 | 
					 | 
				
			||||||
0haGN1XpsSECrXZogZoFokvJSyVmIlZsiAeP94FZbYQHZXATcXY+m3dM41CJVphI
 | 
					 | 
				
			||||||
uR2nKRoTLkoRWZweFdVJVCxzOmmCsZc5nG1wZ0jl3S3WyB57AgMBAAEwDQYJKoZI
 | 
					 | 
				
			||||||
hvcNAQECBQADfgBl3X7hsuyw4jrg7HFGmhkRuNPHoLQDQCYCPgmc4RKz0Vr2N6W3
 | 
					 | 
				
			||||||
YQO2WxZpO8ZECAyIUwxrl0nHPjXcbLm7qt9cuzovk2C2qUtN8iD3zV9/ZHuO3ABc
 | 
					 | 
				
			||||||
1/p3yjkWWW8O6tO1g39NTUJWdrTJXwT4OPjr0l91X817/OWOgHz8UA==
 | 
					 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					 | 
				
			||||||
							
								
								
									
										319
									
								
								apps/rsautl.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										319
									
								
								apps/rsautl.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,319 @@
 | 
				
			|||||||
 | 
					/* rsautl.c */
 | 
				
			||||||
 | 
					/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
				
			||||||
 | 
					 * project 2000.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright (c) 2000 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer. 
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in
 | 
				
			||||||
 | 
					 *    the documentation and/or other materials provided with the
 | 
				
			||||||
 | 
					 *    distribution.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this
 | 
				
			||||||
 | 
					 *    software must display the following acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
				
			||||||
 | 
					 *    endorse or promote products derived from this software without
 | 
				
			||||||
 | 
					 *    prior written permission. For written permission, please contact
 | 
				
			||||||
 | 
					 *    licensing@OpenSSL.org.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 5. Products derived from this software may not be called "OpenSSL"
 | 
				
			||||||
 | 
					 *    nor may "OpenSSL" appear in their names without prior written
 | 
				
			||||||
 | 
					 *    permission of the OpenSSL Project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 6. Redistributions of any form whatsoever must retain the following
 | 
				
			||||||
 | 
					 *    acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
				
			||||||
 | 
					 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
				
			||||||
 | 
					 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
				
			||||||
 | 
					 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
				
			||||||
 | 
					 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
				
			||||||
 | 
					 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
				
			||||||
 | 
					 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
				
			||||||
 | 
					 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
				
			||||||
 | 
					 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
				
			||||||
 | 
					 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * ====================================================================
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This product includes cryptographic software written by Eric Young
 | 
				
			||||||
 | 
					 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
				
			||||||
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef NO_RSA
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define RSA_SIGN 	1
 | 
				
			||||||
 | 
					#define RSA_VERIFY 	2
 | 
				
			||||||
 | 
					#define RSA_ENCRYPT 	3
 | 
				
			||||||
 | 
					#define RSA_DECRYPT 	4
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define KEY_PRIVKEY	1
 | 
				
			||||||
 | 
					#define KEY_PUBKEY	2
 | 
				
			||||||
 | 
					#define KEY_CERT	3
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void usage(void);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#undef PROG
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define PROG rsautl_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
 | 
						BIO *in = NULL, *out = NULL;
 | 
				
			||||||
 | 
						char *infile = NULL, *outfile = NULL;
 | 
				
			||||||
 | 
						char *keyfile = NULL;
 | 
				
			||||||
 | 
						char rsa_mode = RSA_VERIFY, key_type = KEY_PRIVKEY;
 | 
				
			||||||
 | 
						int keyform = FORMAT_PEM;
 | 
				
			||||||
 | 
						char need_priv = 0, badarg = 0, rev = 0;
 | 
				
			||||||
 | 
						char hexdump = 0, asn1parse = 0;
 | 
				
			||||||
 | 
						X509 *x;
 | 
				
			||||||
 | 
						EVP_PKEY *pkey = NULL;
 | 
				
			||||||
 | 
						RSA *rsa = NULL;
 | 
				
			||||||
 | 
						unsigned char *rsa_in = NULL, *rsa_out = NULL, pad;
 | 
				
			||||||
 | 
						int rsa_inlen, rsa_outlen = 0;
 | 
				
			||||||
 | 
						int keysize;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						int ret = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						argc--;
 | 
				
			||||||
 | 
						argv++;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
				
			||||||
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
						OpenSSL_add_all_algorithms();
 | 
				
			||||||
 | 
						pad = RSA_PKCS1_PADDING;
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						while(argc >= 1)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							if (!strcmp(*argv,"-in")) {
 | 
				
			||||||
 | 
								if (--argc < 1) badarg = 1;
 | 
				
			||||||
 | 
					                        infile= *(++argv);
 | 
				
			||||||
 | 
							} else if (!strcmp(*argv,"-out")) {
 | 
				
			||||||
 | 
								if (--argc < 1) badarg = 1;
 | 
				
			||||||
 | 
								outfile= *(++argv);
 | 
				
			||||||
 | 
							} else if(!strcmp(*argv, "-inkey")) {
 | 
				
			||||||
 | 
								if (--argc < 1) badarg = 1;
 | 
				
			||||||
 | 
								keyfile = *(++argv);
 | 
				
			||||||
 | 
							} else if(!strcmp(*argv, "-engine")) {
 | 
				
			||||||
 | 
								if (--argc < 1) badarg = 1;
 | 
				
			||||||
 | 
								engine = *(++argv);
 | 
				
			||||||
 | 
							} else if(!strcmp(*argv, "-pubin")) {
 | 
				
			||||||
 | 
								key_type = KEY_PUBKEY;
 | 
				
			||||||
 | 
							} else if(!strcmp(*argv, "-certin")) {
 | 
				
			||||||
 | 
								key_type = KEY_CERT;
 | 
				
			||||||
 | 
							} 
 | 
				
			||||||
 | 
							else if(!strcmp(*argv, "-asn1parse")) asn1parse = 1;
 | 
				
			||||||
 | 
							else if(!strcmp(*argv, "-hexdump")) hexdump = 1;
 | 
				
			||||||
 | 
							else if(!strcmp(*argv, "-raw")) pad = RSA_NO_PADDING;
 | 
				
			||||||
 | 
							else if(!strcmp(*argv, "-oaep")) pad = RSA_PKCS1_OAEP_PADDING;
 | 
				
			||||||
 | 
							else if(!strcmp(*argv, "-ssl")) pad = RSA_SSLV23_PADDING;
 | 
				
			||||||
 | 
							else if(!strcmp(*argv, "-pkcs")) pad = RSA_PKCS1_PADDING;
 | 
				
			||||||
 | 
							else if(!strcmp(*argv, "-sign")) {
 | 
				
			||||||
 | 
								rsa_mode = RSA_SIGN;
 | 
				
			||||||
 | 
								need_priv = 1;
 | 
				
			||||||
 | 
							} else if(!strcmp(*argv, "-verify")) rsa_mode = RSA_VERIFY;
 | 
				
			||||||
 | 
							else if(!strcmp(*argv, "-rev")) rev = 1;
 | 
				
			||||||
 | 
							else if(!strcmp(*argv, "-encrypt")) rsa_mode = RSA_ENCRYPT;
 | 
				
			||||||
 | 
							else if(!strcmp(*argv, "-decrypt")) {
 | 
				
			||||||
 | 
								rsa_mode = RSA_DECRYPT;
 | 
				
			||||||
 | 
								need_priv = 1;
 | 
				
			||||||
 | 
							} else badarg = 1;
 | 
				
			||||||
 | 
							if(badarg) {
 | 
				
			||||||
 | 
								usage();
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							argc--;
 | 
				
			||||||
 | 
							argv++;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(need_priv && (key_type != KEY_PRIVKEY)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "A private key is needed for this operation\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* FIXME: seed PRNG only if needed */
 | 
				
			||||||
 | 
						app_RAND_load_file(NULL, bio_err, 0);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						switch(key_type) {
 | 
				
			||||||
 | 
							case KEY_PRIVKEY:
 | 
				
			||||||
 | 
							pkey = load_key(bio_err, keyfile, keyform, NULL);
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case KEY_PUBKEY:
 | 
				
			||||||
 | 
							pkey = load_pubkey(bio_err, keyfile, keyform);
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case KEY_CERT:
 | 
				
			||||||
 | 
							x = load_cert(bio_err, keyfile, keyform);
 | 
				
			||||||
 | 
							if(x) {
 | 
				
			||||||
 | 
								pkey = X509_get_pubkey(x);
 | 
				
			||||||
 | 
								X509_free(x);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!pkey) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error loading key\n");
 | 
				
			||||||
 | 
							return 1;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						rsa = EVP_PKEY_get1_RSA(pkey);
 | 
				
			||||||
 | 
						EVP_PKEY_free(pkey);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!rsa) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting RSA key\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(infile) {
 | 
				
			||||||
 | 
							if(!(in = BIO_new_file(infile, "rb"))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error Reading Input File\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);	
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else in = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(outfile) {
 | 
				
			||||||
 | 
							if(!(out = BIO_new_file(outfile, "wb"))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error Reading Output File\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);	
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							    out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						keysize = RSA_size(rsa);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						rsa_in = OPENSSL_malloc(keysize * 2);
 | 
				
			||||||
 | 
						rsa_out = OPENSSL_malloc(keysize);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* Read the input data */
 | 
				
			||||||
 | 
						rsa_inlen = BIO_read(in, rsa_in, keysize * 2);
 | 
				
			||||||
 | 
						if(rsa_inlen <= 0) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error reading input Data\n");
 | 
				
			||||||
 | 
							exit(1);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if(rev) {
 | 
				
			||||||
 | 
							int i;
 | 
				
			||||||
 | 
							unsigned char ctmp;
 | 
				
			||||||
 | 
							for(i = 0; i < rsa_inlen/2; i++) {
 | 
				
			||||||
 | 
								ctmp = rsa_in[i];
 | 
				
			||||||
 | 
								rsa_in[i] = rsa_in[rsa_inlen - 1 - i];
 | 
				
			||||||
 | 
								rsa_in[rsa_inlen - 1 - i] = ctmp;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						switch(rsa_mode) {
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case RSA_VERIFY:
 | 
				
			||||||
 | 
								rsa_outlen  = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case RSA_SIGN:
 | 
				
			||||||
 | 
								rsa_outlen  = RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case RSA_ENCRYPT:
 | 
				
			||||||
 | 
								rsa_outlen  = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							case RSA_DECRYPT:
 | 
				
			||||||
 | 
								rsa_outlen  = RSA_private_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad);
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(rsa_outlen <= 0) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "RSA operation error\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						ret = 0;
 | 
				
			||||||
 | 
						if(asn1parse) {
 | 
				
			||||||
 | 
							if(!ASN1_parse_dump(out, rsa_out, rsa_outlen, 1, -1)) {
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else if(hexdump) BIO_dump(out, (char *)rsa_out, rsa_outlen);
 | 
				
			||||||
 | 
						else BIO_write(out, rsa_out, rsa_outlen);
 | 
				
			||||||
 | 
						end:
 | 
				
			||||||
 | 
						RSA_free(rsa);
 | 
				
			||||||
 | 
						BIO_free(in);
 | 
				
			||||||
 | 
						BIO_free_all(out);
 | 
				
			||||||
 | 
						if(rsa_in) OPENSSL_free(rsa_in);
 | 
				
			||||||
 | 
						if(rsa_out) OPENSSL_free(rsa_out);
 | 
				
			||||||
 | 
						return ret;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static void usage()
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "Usage: rsautl [options]\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-in file        input file\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-out file       output file\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-inkey file     input key\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-pubin          input is an RSA public\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-certin         input is a certificate carrying an RSA public key\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-engine e       use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-ssl            use SSL v2 padding\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-raw            use no padding\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-pkcs           use PKCS#1 v1.5 padding (default)\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-oaep           use PKCS#1 OAEP\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-sign           sign with private key\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-verify         verify with public key\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-encrypt        encrypt with public key\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-decrypt        decrypt with private key\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err, "-hexdump        hex dump output\n");
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
@@ -84,7 +84,6 @@ typedef fd_mask fd_set;
 | 
				
			|||||||
#define PORT_STR        "4433"
 | 
					#define PORT_STR        "4433"
 | 
				
			||||||
#define PROTOCOL        "tcp"
 | 
					#define PROTOCOL        "tcp"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int do_accept(int acc_sock, int *sock, char **host);
 | 
					 | 
				
			||||||
int do_server(int port, int *ret, int (*cb) (), char *context);
 | 
					int do_server(int port, int *ret, int (*cb) (), char *context);
 | 
				
			||||||
#ifdef HEADER_X509_H
 | 
					#ifdef HEADER_X509_H
 | 
				
			||||||
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
 | 
					int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
 | 
				
			||||||
@@ -97,17 +96,9 @@ int set_cert_stuff(SSL_CTX *ctx, char *cert_file, char *key_file);
 | 
				
			|||||||
int set_cert_stuff(char *ctx, char *cert_file, char *key_file);
 | 
					int set_cert_stuff(char *ctx, char *cert_file, char *key_file);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
int init_client(int *sock, char *server, int port);
 | 
					int init_client(int *sock, char *server, int port);
 | 
				
			||||||
int init_client_ip(int *sock,unsigned char ip[4], int port);
 | 
					 | 
				
			||||||
int nbio_init_client_ip(int *sock,unsigned char ip[4], int port);
 | 
					 | 
				
			||||||
int nbio_sock_error(int sock);
 | 
					 | 
				
			||||||
int spawn(int argc, char **argv, int *in, int *out);
 | 
					 | 
				
			||||||
int init_server(int *sock, int port);
 | 
					 | 
				
			||||||
int init_server_long(int *sock, int port,char *ip);
 | 
					 | 
				
			||||||
int should_retry(int i);
 | 
					int should_retry(int i);
 | 
				
			||||||
void sock_cleanup(void );
 | 
					 | 
				
			||||||
int extract_port(char *str, short *port_ptr);
 | 
					int extract_port(char *str, short *port_ptr);
 | 
				
			||||||
int extract_host_port(char *str,char **host_ptr,unsigned char *ip,short *p);
 | 
					int extract_host_port(char *str,char **host_ptr,unsigned char *ip,short *p);
 | 
				
			||||||
int host_ip(char *str, unsigned char ip[4]);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp,
 | 
					long MS_CALLBACK bio_dump_cb(BIO *bio, int cmd, const char *argp,
 | 
				
			||||||
	int argi, long argl, long ret);
 | 
						int argi, long argl, long ret);
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,4 +1,4 @@
 | 
				
			|||||||
/* apps/s_cb.c */
 | 
					/* apps/s_cb.c - callback functions used by s_client, s_server, and s_time */
 | 
				
			||||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
					/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
				
			||||||
 * All rights reserved.
 | 
					 * All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										201
									
								
								apps/s_client.c
									
									
									
									
									
								
							
							
						
						
									
										201
									
								
								apps/s_client.c
									
									
									
									
									
								
							@@ -56,38 +56,43 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <assert.h>
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <stdlib.h>
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					#ifdef NO_STDIO
 | 
				
			||||||
 | 
					#define APPS_WIN16
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* With IPv6, it looks like Digital has mixed up the proper order of
 | 
					/* With IPv6, it looks like Digital has mixed up the proper order of
 | 
				
			||||||
   recursive header file inclusion, resulting in the compiler complaining
 | 
					   recursive header file inclusion, resulting in the compiler complaining
 | 
				
			||||||
   that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
 | 
					   that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
 | 
				
			||||||
   is needed to have fileno() declared correctly...  So let's define u_int */
 | 
					   is needed to have fileno() declared correctly...  So let's define u_int */
 | 
				
			||||||
#if defined(__DECC) && !defined(__U_INT)
 | 
					#if defined(VMS) && defined(__DECC) && !defined(__U_INT)
 | 
				
			||||||
#define __U_INT
 | 
					#define __U_INT
 | 
				
			||||||
typedef unsigned int u_int;
 | 
					typedef unsigned int u_int;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#include <stdio.h>
 | 
					 | 
				
			||||||
#include <stdlib.h>
 | 
					 | 
				
			||||||
#include <string.h>
 | 
					 | 
				
			||||||
#define USE_SOCKETS
 | 
					#define USE_SOCKETS
 | 
				
			||||||
#ifdef NO_STDIO
 | 
					 | 
				
			||||||
#define APPS_WIN16
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/ssl.h>
 | 
					#include <openssl/ssl.h>
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/rand.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
#include "s_apps.h"
 | 
					#include "s_apps.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
					#include <conio.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if (defined(VMS) && __VMS_VER < 70000000)
 | 
					#if (defined(VMS) && __VMS_VER < 70000000)
 | 
				
			||||||
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
 | 
					/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
 | 
				
			||||||
#undef FIONBIO
 | 
					#undef FIONBIO
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(NO_RSA) && !defined(NO_SSL2)
 | 
					 | 
				
			||||||
#define NO_SSL2
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	s_client_main
 | 
					#define PROG	s_client_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -114,6 +119,7 @@ static void sc_usage(void);
 | 
				
			|||||||
static void print_stuff(BIO *berr,SSL *con,int full);
 | 
					static void print_stuff(BIO *berr,SSL *con,int full);
 | 
				
			||||||
static BIO *bio_c_out=NULL;
 | 
					static BIO *bio_c_out=NULL;
 | 
				
			||||||
static int c_quiet=0;
 | 
					static int c_quiet=0;
 | 
				
			||||||
 | 
					static int c_ign_eof=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static void sc_usage(void)
 | 
					static void sc_usage(void)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
@@ -138,17 +144,22 @@ static void sc_usage(void)
 | 
				
			|||||||
#ifdef FIONBIO
 | 
					#ifdef FIONBIO
 | 
				
			||||||
	BIO_printf(bio_err," -nbio         - Run with non-blocking IO\n");
 | 
						BIO_printf(bio_err," -nbio         - Run with non-blocking IO\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -crlf         - convert LF from terminal into CRLF\n");
 | 
				
			||||||
	BIO_printf(bio_err," -quiet        - no s_client output\n");
 | 
						BIO_printf(bio_err," -quiet        - no s_client output\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -ign_eof      - ignore input eof (default when -quiet)\n");
 | 
				
			||||||
	BIO_printf(bio_err," -ssl2         - just use SSLv2\n");
 | 
						BIO_printf(bio_err," -ssl2         - just use SSLv2\n");
 | 
				
			||||||
	BIO_printf(bio_err," -ssl3         - just use SSLv3\n");
 | 
						BIO_printf(bio_err," -ssl3         - just use SSLv3\n");
 | 
				
			||||||
	BIO_printf(bio_err," -tls1         - just use TLSv1\n");
 | 
						BIO_printf(bio_err," -tls1         - just use TLSv1\n");
 | 
				
			||||||
	BIO_printf(bio_err," -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
 | 
						BIO_printf(bio_err," -no_tls1/-no_ssl3/-no_ssl2 - turn off that protocol\n");
 | 
				
			||||||
	BIO_printf(bio_err," -bugs         - Switch on all SSL implementation bug workarounds\n");
 | 
						BIO_printf(bio_err," -bugs         - Switch on all SSL implementation bug workarounds\n");
 | 
				
			||||||
	BIO_printf(bio_err," -cipher       - prefered cipher to use, use the 'openssl ciphers'\n");
 | 
						BIO_printf(bio_err," -cipher       - preferred cipher to use, use the 'openssl ciphers'\n");
 | 
				
			||||||
	BIO_printf(bio_err,"                 command to see what is available\n");
 | 
						BIO_printf(bio_err,"                 command to see what is available\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -engine id    - Initialise and use the specified engine\n");
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int off=0;
 | 
						int off=0;
 | 
				
			||||||
@@ -164,12 +175,19 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	char *cert_file=NULL,*key_file=NULL;
 | 
						char *cert_file=NULL,*key_file=NULL;
 | 
				
			||||||
	char *CApath=NULL,*CAfile=NULL,*cipher=NULL;
 | 
						char *CApath=NULL,*CAfile=NULL,*cipher=NULL;
 | 
				
			||||||
	int reconnect=0,badop=0,verify=SSL_VERIFY_NONE,bugs=0;
 | 
						int reconnect=0,badop=0,verify=SSL_VERIFY_NONE,bugs=0;
 | 
				
			||||||
 | 
						int crlf=0;
 | 
				
			||||||
	int write_tty,read_tty,write_ssl,read_ssl,tty_on,ssl_pending;
 | 
						int write_tty,read_tty,write_ssl,read_ssl,tty_on,ssl_pending;
 | 
				
			||||||
	SSL_CTX *ctx=NULL;
 | 
						SSL_CTX *ctx=NULL;
 | 
				
			||||||
	int ret=1,in_init=1,i,nbio_test=0;
 | 
						int ret=1,in_init=1,i,nbio_test=0;
 | 
				
			||||||
 | 
						int prexit = 0;
 | 
				
			||||||
	SSL_METHOD *meth=NULL;
 | 
						SSL_METHOD *meth=NULL;
 | 
				
			||||||
	BIO *sbio;
 | 
						BIO *sbio;
 | 
				
			||||||
	/*static struct timeval timeout={10,0};*/
 | 
						char *inrand=NULL;
 | 
				
			||||||
 | 
						char *engine_id=NULL;
 | 
				
			||||||
 | 
						ENGINE *e=NULL;
 | 
				
			||||||
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
						struct timeval tv;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if !defined(NO_SSL2) && !defined(NO_SSL3)
 | 
					#if !defined(NO_SSL2) && !defined(NO_SSL3)
 | 
				
			||||||
	meth=SSLv23_client_method();
 | 
						meth=SSLv23_client_method();
 | 
				
			||||||
@@ -182,14 +200,15 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
	c_Pause=0;
 | 
						c_Pause=0;
 | 
				
			||||||
	c_quiet=0;
 | 
						c_quiet=0;
 | 
				
			||||||
 | 
						c_ign_eof=0;
 | 
				
			||||||
	c_debug=0;
 | 
						c_debug=0;
 | 
				
			||||||
	c_showcerts=0;
 | 
						c_showcerts=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bio_err == NULL)
 | 
						if (bio_err == NULL)
 | 
				
			||||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
							bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (	((cbuf=Malloc(BUFSIZZ)) == NULL) ||
 | 
						if (	((cbuf=OPENSSL_malloc(BUFSIZZ)) == NULL) ||
 | 
				
			||||||
		((sbuf=Malloc(BUFSIZZ)) == NULL))
 | 
							((sbuf=OPENSSL_malloc(BUFSIZZ)) == NULL))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"out of memory\n");
 | 
							BIO_printf(bio_err,"out of memory\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
@@ -234,8 +253,17 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			cert_file= *(++argv);
 | 
								cert_file= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-prexit") == 0)
 | 
				
			||||||
 | 
								prexit=1;
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-crlf") == 0)
 | 
				
			||||||
 | 
								crlf=1;
 | 
				
			||||||
		else if	(strcmp(*argv,"-quiet") == 0)
 | 
							else if	(strcmp(*argv,"-quiet") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			c_quiet=1;
 | 
								c_quiet=1;
 | 
				
			||||||
 | 
								c_ign_eof=1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-ign_eof") == 0)
 | 
				
			||||||
 | 
								c_ign_eof=1;
 | 
				
			||||||
		else if	(strcmp(*argv,"-pause") == 0)
 | 
							else if	(strcmp(*argv,"-pause") == 0)
 | 
				
			||||||
			c_Pause=1;
 | 
								c_Pause=1;
 | 
				
			||||||
		else if	(strcmp(*argv,"-debug") == 0)
 | 
							else if	(strcmp(*argv,"-debug") == 0)
 | 
				
			||||||
@@ -294,6 +322,16 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
		else if (strcmp(*argv,"-nbio") == 0)
 | 
							else if (strcmp(*argv,"-nbio") == 0)
 | 
				
			||||||
			{ c_nbio=1; }
 | 
								{ c_nbio=1; }
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-rand") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								inrand= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine_id = *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
								BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
				
			||||||
@@ -310,6 +348,15 @@ bad:
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
 | 
				
			||||||
 | 
							&& !RAND_status())
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (inrand != NULL)
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
 | 
								app_RAND_load_files(inrand));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bio_c_out == NULL)
 | 
						if (bio_c_out == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (c_quiet)
 | 
							if (c_quiet)
 | 
				
			||||||
@@ -323,7 +370,32 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	SSLeay_add_ssl_algorithms();
 | 
						OpenSSL_add_ssl_algorithms();
 | 
				
			||||||
 | 
						SSL_load_error_strings();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine_id != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine_id)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (c_debug)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								ENGINE_ctrl(e, ENGINE_CTRL_SET_LOGSTREAM,
 | 
				
			||||||
 | 
									0, bio_err, 0);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine_id);
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ctx=SSL_CTX_new(meth);
 | 
						ctx=SSL_CTX_new(meth);
 | 
				
			||||||
	if (ctx == NULL)
 | 
						if (ctx == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -338,7 +410,11 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
	if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
 | 
						if (state) SSL_CTX_set_info_callback(ctx,apps_ssl_info_callback);
 | 
				
			||||||
	if (cipher != NULL)
 | 
						if (cipher != NULL)
 | 
				
			||||||
		SSL_CTX_set_cipher_list(ctx,cipher);
 | 
							if(!SSL_CTX_set_cipher_list(ctx,cipher)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"error setting cipher list\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
#if 0
 | 
					#if 0
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		SSL_CTX_set_cipher_list(ctx,getenv("SSL_CIPHER"));
 | 
							SSL_CTX_set_cipher_list(ctx,getenv("SSL_CIPHER"));
 | 
				
			||||||
@@ -351,14 +427,13 @@ bad:
 | 
				
			|||||||
	if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
 | 
						if ((!SSL_CTX_load_verify_locations(ctx,CAfile,CApath)) ||
 | 
				
			||||||
		(!SSL_CTX_set_default_verify_paths(ctx)))
 | 
							(!SSL_CTX_set_default_verify_paths(ctx)))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		/* BIO_printf(bio_err,"error seting default verify locations\n"); */
 | 
							/* BIO_printf(bio_err,"error setting default verify locations\n"); */
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		/* goto end; */
 | 
							/* goto end; */
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	SSL_load_error_strings();
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
	con=(SSL *)SSL_new(ctx);
 | 
						con=SSL_new(ctx);
 | 
				
			||||||
/*	SSL_set_cipher_list(con,"RC4-MD5"); */
 | 
					/*	SSL_set_cipher_list(con,"RC4-MD5"); */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
re_start:
 | 
					re_start:
 | 
				
			||||||
@@ -459,12 +534,18 @@ re_start:
 | 
				
			|||||||
				if (read_tty)  FD_SET(fileno(stdin),&readfds);
 | 
									if (read_tty)  FD_SET(fileno(stdin),&readfds);
 | 
				
			||||||
				if (write_tty) FD_SET(fileno(stdout),&writefds);
 | 
									if (write_tty) FD_SET(fileno(stdout),&writefds);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
			if (read_ssl)
 | 
								if (read_ssl)
 | 
				
			||||||
				FD_SET(SSL_get_fd(con),&readfds);
 | 
									FD_SET(SSL_get_fd(con),&readfds);
 | 
				
			||||||
			if (write_ssl)
 | 
								if (write_ssl)
 | 
				
			||||||
				FD_SET(SSL_get_fd(con),&writefds);
 | 
									FD_SET(SSL_get_fd(con),&writefds);
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
								if(!tty_on || !write_tty) {
 | 
				
			||||||
 | 
									if (read_ssl)
 | 
				
			||||||
 | 
										FD_SET(SSL_get_fd(con),&readfds);
 | 
				
			||||||
 | 
									if (write_ssl)
 | 
				
			||||||
 | 
										FD_SET(SSL_get_fd(con),&writefds);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
/*			printf("mode tty(%d %d%d) ssl(%d%d)\n",
 | 
					/*			printf("mode tty(%d %d%d) ssl(%d%d)\n",
 | 
				
			||||||
				tty_on,read_tty,write_tty,read_ssl,write_ssl);*/
 | 
									tty_on,read_tty,write_tty,read_ssl,write_ssl);*/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -474,8 +555,29 @@ re_start:
 | 
				
			|||||||
			 * will choke the compiler: if you do have a cast then
 | 
								 * will choke the compiler: if you do have a cast then
 | 
				
			||||||
			 * you can either go for (int *) or (void *).
 | 
								 * you can either go for (int *) or (void *).
 | 
				
			||||||
			 */
 | 
								 */
 | 
				
			||||||
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
								/* Under Windows we make the assumption that we can
 | 
				
			||||||
 | 
								 * always write to the tty: therefore if we need to
 | 
				
			||||||
 | 
								 * write to the tty we just fall through. Otherwise
 | 
				
			||||||
 | 
								 * we timeout the select every second and see if there
 | 
				
			||||||
 | 
								 * are any keypresses. Note: this is a hack, in a proper
 | 
				
			||||||
 | 
								 * Windows application we wouldn't do this.
 | 
				
			||||||
 | 
								 */
 | 
				
			||||||
 | 
								i=0;
 | 
				
			||||||
 | 
								if(!write_tty) {
 | 
				
			||||||
 | 
									if(read_tty) {
 | 
				
			||||||
 | 
										tv.tv_sec = 1;
 | 
				
			||||||
 | 
										tv.tv_usec = 0;
 | 
				
			||||||
 | 
										i=select(width,(void *)&readfds,(void *)&writefds,
 | 
				
			||||||
 | 
											 NULL,&tv);
 | 
				
			||||||
 | 
										if(!i && (!((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0))) || !read_tty) ) continue;
 | 
				
			||||||
 | 
									} else 	i=select(width,(void *)&readfds,(void *)&writefds,
 | 
				
			||||||
 | 
										 NULL,NULL);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
			i=select(width,(void *)&readfds,(void *)&writefds,
 | 
								i=select(width,(void *)&readfds,(void *)&writefds,
 | 
				
			||||||
				 NULL,NULL);
 | 
									 NULL,NULL);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
			if ( i < 0)
 | 
								if ( i < 0)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(bio_err,"bad select %d\n",
 | 
									BIO_printf(bio_err,"bad select %d\n",
 | 
				
			||||||
@@ -552,9 +654,16 @@ re_start:
 | 
				
			|||||||
				goto shut;
 | 
									goto shut;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
#ifndef WINDOWS
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
							/* Assume Windows can always write */
 | 
				
			||||||
 | 
							else if (!ssl_pending && write_tty)
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
		else if (!ssl_pending && FD_ISSET(fileno(stdout),&writefds))
 | 
							else if (!ssl_pending && FD_ISSET(fileno(stdout),&writefds))
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
 | 
								ascii2ebcdic(&(sbuf[sbuf_off]),&(sbuf[sbuf_off]),sbuf_len);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
			i=write(fileno(stdout),&(sbuf[sbuf_off]),sbuf_len);
 | 
								i=write(fileno(stdout),&(sbuf[sbuf_off]),sbuf_len);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if (i <= 0)
 | 
								if (i <= 0)
 | 
				
			||||||
@@ -572,7 +681,6 @@ re_start:
 | 
				
			|||||||
				write_tty=0;
 | 
									write_tty=0;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
		else if (ssl_pending || FD_ISSET(SSL_get_fd(con),&readfds))
 | 
							else if (ssl_pending || FD_ISSET(SSL_get_fd(con),&readfds))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
#ifdef RENEG
 | 
					#ifdef RENEG
 | 
				
			||||||
@@ -627,18 +735,44 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
 | 
				
			|||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef WINDOWS
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
							else if ((_kbhit()) || (WAIT_OBJECT_0 == WaitForSingleObject(GetStdHandle(STD_INPUT_HANDLE), 0)))
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
		else if (FD_ISSET(fileno(stdin),&readfds))
 | 
							else if (FD_ISSET(fileno(stdin),&readfds))
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			i=read(fileno(stdin),cbuf,BUFSIZZ);
 | 
								if (crlf)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									int j, lf_num;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if ((!c_quiet) && ((i <= 0) || (cbuf[0] == 'Q')))
 | 
									i=read(fileno(stdin),cbuf,BUFSIZZ/2);
 | 
				
			||||||
 | 
									lf_num = 0;
 | 
				
			||||||
 | 
									/* both loops are skipped when i <= 0 */
 | 
				
			||||||
 | 
									for (j = 0; j < i; j++)
 | 
				
			||||||
 | 
										if (cbuf[j] == '\n')
 | 
				
			||||||
 | 
											lf_num++;
 | 
				
			||||||
 | 
									for (j = i-1; j >= 0; j--)
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										cbuf[j+lf_num] = cbuf[j];
 | 
				
			||||||
 | 
										if (cbuf[j] == '\n')
 | 
				
			||||||
 | 
											{
 | 
				
			||||||
 | 
											lf_num--;
 | 
				
			||||||
 | 
											i++;
 | 
				
			||||||
 | 
											cbuf[j+lf_num] = '\r';
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									assert(lf_num == 0);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									i=read(fileno(stdin),cbuf,BUFSIZZ);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								if ((!c_ign_eof) && ((i <= 0) || (cbuf[0] == 'Q')))
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(bio_err,"DONE\n");
 | 
									BIO_printf(bio_err,"DONE\n");
 | 
				
			||||||
				goto shut;
 | 
									goto shut;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			if ((!c_quiet) && (cbuf[0] == 'R'))
 | 
								if ((!c_ign_eof) && (cbuf[0] == 'R'))
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				BIO_printf(bio_err,"RENEGOTIATING\n");
 | 
									BIO_printf(bio_err,"RENEGOTIATING\n");
 | 
				
			||||||
				SSL_renegotiate(con);
 | 
									SSL_renegotiate(con);
 | 
				
			||||||
@@ -648,23 +782,26 @@ printf("read=%d pending=%d peek=%d\n",k,SSL_pending(con),SSL_peek(con,zbuf,10240
 | 
				
			|||||||
				{
 | 
									{
 | 
				
			||||||
				cbuf_len=i;
 | 
									cbuf_len=i;
 | 
				
			||||||
				cbuf_off=0;
 | 
									cbuf_off=0;
 | 
				
			||||||
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
 | 
									ebcdic2ascii(cbuf, cbuf, i);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			write_ssl=1;
 | 
								write_ssl=1;
 | 
				
			||||||
			read_tty=0;
 | 
								read_tty=0;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
shut:
 | 
					shut:
 | 
				
			||||||
	SSL_shutdown(con);
 | 
						SSL_shutdown(con);
 | 
				
			||||||
	SHUTDOWN(SSL_get_fd(con));
 | 
						SHUTDOWN(SSL_get_fd(con));
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
 | 
						if(prexit) print_stuff(bio_c_out,con,1);
 | 
				
			||||||
	if (con != NULL) SSL_free(con);
 | 
						if (con != NULL) SSL_free(con);
 | 
				
			||||||
	if (con2 != NULL) SSL_free(con2);
 | 
						if (con2 != NULL) SSL_free(con2);
 | 
				
			||||||
	if (ctx != NULL) SSL_CTX_free(ctx);
 | 
						if (ctx != NULL) SSL_CTX_free(ctx);
 | 
				
			||||||
	if (cbuf != NULL) { memset(cbuf,0,BUFSIZZ); Free(cbuf); }
 | 
						if (cbuf != NULL) { memset(cbuf,0,BUFSIZZ); OPENSSL_free(cbuf); }
 | 
				
			||||||
	if (sbuf != NULL) { memset(sbuf,0,BUFSIZZ); Free(sbuf); }
 | 
						if (sbuf != NULL) { memset(sbuf,0,BUFSIZZ); OPENSSL_free(sbuf); }
 | 
				
			||||||
	if (bio_c_out != NULL)
 | 
						if (bio_c_out != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_free(bio_c_out);
 | 
							BIO_free(bio_c_out);
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										454
									
								
								apps/s_server.c
									
									
									
									
									
								
							
							
						
						
									
										454
									
								
								apps/s_server.c
									
									
									
									
									
								
							@@ -56,15 +56,7 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* With IPv6, it looks like Digital has mixed up the proper order of
 | 
					#include <assert.h>
 | 
				
			||||||
   recursive header file inclusion, resulting in the compiler complaining
 | 
					 | 
				
			||||||
   that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
 | 
					 | 
				
			||||||
   is needed to have fileno() declared correctly...  So let's define u_int */
 | 
					 | 
				
			||||||
#if defined(__DECC) && !defined(__U_INT)
 | 
					 | 
				
			||||||
#define __U_INT
 | 
					 | 
				
			||||||
typedef unsigned int u_int;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
@@ -73,6 +65,16 @@ typedef unsigned int u_int;
 | 
				
			|||||||
#ifdef NO_STDIO
 | 
					#ifdef NO_STDIO
 | 
				
			||||||
#define APPS_WIN16
 | 
					#define APPS_WIN16
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* With IPv6, it looks like Digital has mixed up the proper order of
 | 
				
			||||||
 | 
					   recursive header file inclusion, resulting in the compiler complaining
 | 
				
			||||||
 | 
					   that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
 | 
				
			||||||
 | 
					   is needed to have fileno() declared correctly...  So let's define u_int */
 | 
				
			||||||
 | 
					#if defined(VMS) && defined(__DECC) && !defined(__U_INT)
 | 
				
			||||||
 | 
					#define __U_INT
 | 
				
			||||||
 | 
					typedef unsigned int u_int;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#include <openssl/lhash.h>
 | 
					#include <openssl/lhash.h>
 | 
				
			||||||
#include <openssl/bn.h>
 | 
					#include <openssl/bn.h>
 | 
				
			||||||
#define USE_SOCKETS
 | 
					#define USE_SOCKETS
 | 
				
			||||||
@@ -81,19 +83,21 @@ typedef unsigned int u_int;
 | 
				
			|||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
#include <openssl/ssl.h>
 | 
					#include <openssl/ssl.h>
 | 
				
			||||||
 | 
					#include <openssl/rand.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
#include "s_apps.h"
 | 
					#include "s_apps.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
					#include <conio.h>
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if (defined(VMS) && __VMS_VER < 70000000)
 | 
					#if (defined(VMS) && __VMS_VER < 70000000)
 | 
				
			||||||
/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
 | 
					/* FIONBIO used as a switch to enable ioctl, and that isn't in VMS < 7.0 */
 | 
				
			||||||
#undef FIONBIO
 | 
					#undef FIONBIO
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(NO_RSA) && !defined(NO_SSL2)
 | 
					 | 
				
			||||||
#define NO_SSL2
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifndef NO_RSA
 | 
					#ifndef NO_RSA
 | 
				
			||||||
static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int export,int keylength);
 | 
					static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
static int sv_body(char *hostname, int s, unsigned char *context);
 | 
					static int sv_body(char *hostname, int s, unsigned char *context);
 | 
				
			||||||
static int www_body(char *hostname, int s, unsigned char *context);
 | 
					static int www_body(char *hostname, int s, unsigned char *context);
 | 
				
			||||||
@@ -102,17 +106,19 @@ static void sv_usage(void);
 | 
				
			|||||||
static int init_ssl_connection(SSL *s);
 | 
					static int init_ssl_connection(SSL *s);
 | 
				
			||||||
static void print_stats(BIO *bp,SSL_CTX *ctx);
 | 
					static void print_stats(BIO *bp,SSL_CTX *ctx);
 | 
				
			||||||
#ifndef NO_DH
 | 
					#ifndef NO_DH
 | 
				
			||||||
static DH *load_dh_param(void );
 | 
					static DH *load_dh_param(char *dhfile);
 | 
				
			||||||
static DH *get_dh512(void);
 | 
					static DH *get_dh512(void);
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
/* static void s_server_init(void);*/
 | 
					#ifdef MONOLITH
 | 
				
			||||||
 | 
					static void s_server_init(void);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef S_ISDIR
 | 
					#ifndef S_ISDIR
 | 
				
			||||||
#if defined(VMS) && !defined(__DECC)
 | 
					# if defined(_S_IFMT) && defined(_S_IFDIR)
 | 
				
			||||||
#define S_ISDIR(a)	(((a) & S_IFMT) == S_IFDIR)
 | 
					#  define S_ISDIR(a)	(((a) & _S_IFMT) == _S_IFDIR)
 | 
				
			||||||
#else
 | 
					# else
 | 
				
			||||||
#define S_ISDIR(a)	(((a) & _S_IFMT) == _S_IFDIR)
 | 
					#  define S_ISDIR(a)	(((a) & S_IFMT) == S_IFDIR)
 | 
				
			||||||
#endif
 | 
					# endif
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef NO_DH
 | 
					#ifndef NO_DH
 | 
				
			||||||
@@ -145,15 +151,13 @@ static DH *get_dh512(void)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
#undef BUFSIZZ
 | 
					#undef BUFSIZZ
 | 
				
			||||||
#define BUFSIZZ	16*1024
 | 
					#define BUFSIZZ	16*1024
 | 
				
			||||||
static int bufsize=32;
 | 
					static int bufsize=BUFSIZZ;
 | 
				
			||||||
static int accept_socket= -1;
 | 
					static int accept_socket= -1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define TEST_CERT	"server.pem"
 | 
					#define TEST_CERT	"server.pem"
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG		s_server_main
 | 
					#define PROG		s_server_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define DH_PARAM	"server.pem"
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
extern int verify_depth;
 | 
					extern int verify_depth;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static char *cipher=NULL;
 | 
					static char *cipher=NULL;
 | 
				
			||||||
@@ -165,6 +169,7 @@ static char *s_dcert_file=NULL,*s_dkey_file=NULL;
 | 
				
			|||||||
static int s_nbio=0;
 | 
					static int s_nbio=0;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
static int s_nbio_test=0;
 | 
					static int s_nbio_test=0;
 | 
				
			||||||
 | 
					int s_crlf=0;
 | 
				
			||||||
static SSL_CTX *ctx=NULL;
 | 
					static SSL_CTX *ctx=NULL;
 | 
				
			||||||
static int www=0;
 | 
					static int www=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -172,9 +177,13 @@ static BIO *bio_s_out=NULL;
 | 
				
			|||||||
static int s_debug=0;
 | 
					static int s_debug=0;
 | 
				
			||||||
static int s_quiet=0;
 | 
					static int s_quiet=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if 0
 | 
					static int hack=0;
 | 
				
			||||||
 | 
					static char *engine_id=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifdef MONOLITH
 | 
				
			||||||
static void s_server_init(void)
 | 
					static void s_server_init(void)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						accept_socket=-1;
 | 
				
			||||||
	cipher=NULL;
 | 
						cipher=NULL;
 | 
				
			||||||
	s_server_verify=SSL_VERIFY_NONE;
 | 
						s_server_verify=SSL_VERIFY_NONE;
 | 
				
			||||||
	s_dcert_file=NULL;
 | 
						s_dcert_file=NULL;
 | 
				
			||||||
@@ -191,6 +200,8 @@ static void s_server_init(void)
 | 
				
			|||||||
	bio_s_out=NULL;
 | 
						bio_s_out=NULL;
 | 
				
			||||||
	s_debug=0;
 | 
						s_debug=0;
 | 
				
			||||||
	s_quiet=0;
 | 
						s_quiet=0;
 | 
				
			||||||
 | 
						hack=0;
 | 
				
			||||||
 | 
						engine_id=NULL;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -204,14 +215,17 @@ static void sv_usage(void)
 | 
				
			|||||||
	BIO_printf(bio_err," -Verify arg   - turn on peer certificate verification, must have a cert.\n");
 | 
						BIO_printf(bio_err," -Verify arg   - turn on peer certificate verification, must have a cert.\n");
 | 
				
			||||||
	BIO_printf(bio_err," -cert arg     - certificate file to use, PEM format assumed\n");
 | 
						BIO_printf(bio_err," -cert arg     - certificate file to use, PEM format assumed\n");
 | 
				
			||||||
	BIO_printf(bio_err,"                 (default is %s)\n",TEST_CERT);
 | 
						BIO_printf(bio_err,"                 (default is %s)\n",TEST_CERT);
 | 
				
			||||||
	BIO_printf(bio_err," -key arg      - RSA file to use, PEM format assumed, in cert file if\n");
 | 
						BIO_printf(bio_err," -key arg      - Private Key file to use, PEM format assumed, in cert file if\n");
 | 
				
			||||||
	BIO_printf(bio_err,"                 not specified (default is %s)\n",TEST_CERT);
 | 
						BIO_printf(bio_err,"                 not specified (default is %s)\n",TEST_CERT);
 | 
				
			||||||
	BIO_printf(bio_err," -dcert arg    - second certificate file to use (usually for DSA)\n");
 | 
						BIO_printf(bio_err," -dcert arg    - second certificate file to use (usually for DSA)\n");
 | 
				
			||||||
	BIO_printf(bio_err," -dkey arg     - second private key file to use (usually for DSA)\n");
 | 
						BIO_printf(bio_err," -dkey arg     - second private key file to use (usually for DSA)\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -dhparam arg  - DH parameter file to use, in cert file if not specified\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err,"                 or a default set of parameters is used\n");
 | 
				
			||||||
#ifdef FIONBIO
 | 
					#ifdef FIONBIO
 | 
				
			||||||
	BIO_printf(bio_err," -nbio         - Run with non-blocking IO\n");
 | 
						BIO_printf(bio_err," -nbio         - Run with non-blocking IO\n");
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	BIO_printf(bio_err," -nbio_test    - test with the non-blocking test bio\n");
 | 
						BIO_printf(bio_err," -nbio_test    - test with the non-blocking test bio\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -crlf         - convert LF from terminal into CRLF\n");
 | 
				
			||||||
	BIO_printf(bio_err," -debug        - Print more output\n");
 | 
						BIO_printf(bio_err," -debug        - Print more output\n");
 | 
				
			||||||
	BIO_printf(bio_err," -state        - Print the SSL states\n");
 | 
						BIO_printf(bio_err," -state        - Print the SSL states\n");
 | 
				
			||||||
	BIO_printf(bio_err," -CApath arg   - PEM format directory of CA's\n");
 | 
						BIO_printf(bio_err," -CApath arg   - PEM format directory of CA's\n");
 | 
				
			||||||
@@ -226,26 +240,186 @@ static void sv_usage(void)
 | 
				
			|||||||
	BIO_printf(bio_err," -no_ssl2      - Just disable SSLv2\n");
 | 
						BIO_printf(bio_err," -no_ssl2      - Just disable SSLv2\n");
 | 
				
			||||||
	BIO_printf(bio_err," -no_ssl3      - Just disable SSLv3\n");
 | 
						BIO_printf(bio_err," -no_ssl3      - Just disable SSLv3\n");
 | 
				
			||||||
	BIO_printf(bio_err," -no_tls1      - Just disable TLSv1\n");
 | 
						BIO_printf(bio_err," -no_tls1      - Just disable TLSv1\n");
 | 
				
			||||||
	BIO_printf(bio_err," -bugs         - Turn on SSL bug compatability\n");
 | 
					#ifndef NO_DH
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -no_dhe       - Disable ephemeral DH\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -bugs         - Turn on SSL bug compatibility\n");
 | 
				
			||||||
	BIO_printf(bio_err," -www          - Respond to a 'GET /' with a status page\n");
 | 
						BIO_printf(bio_err," -www          - Respond to a 'GET /' with a status page\n");
 | 
				
			||||||
	BIO_printf(bio_err," -WWW          - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
 | 
						BIO_printf(bio_err," -WWW          - Respond to a 'GET /<path> HTTP/1.0' with file ./<path>\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -engine id    - Initialise and use the specified engine\n");
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int local_argc=0;
 | 
					static int local_argc=0;
 | 
				
			||||||
static char **local_argv;
 | 
					static char **local_argv;
 | 
				
			||||||
static int hack=0;
 | 
					
 | 
				
			||||||
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
 | 
					static int ebcdic_new(BIO *bi);
 | 
				
			||||||
 | 
					static int ebcdic_free(BIO *a);
 | 
				
			||||||
 | 
					static int ebcdic_read(BIO *b, char *out, int outl);
 | 
				
			||||||
 | 
					static int ebcdic_write(BIO *b, char *in, int inl);
 | 
				
			||||||
 | 
					static long ebcdic_ctrl(BIO *b, int cmd, long num, char *ptr);
 | 
				
			||||||
 | 
					static int ebcdic_gets(BIO *bp, char *buf, int size);
 | 
				
			||||||
 | 
					static int ebcdic_puts(BIO *bp, char *str);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define BIO_TYPE_EBCDIC_FILTER	(18|0x0200)
 | 
				
			||||||
 | 
					static BIO_METHOD methods_ebcdic=
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						BIO_TYPE_EBCDIC_FILTER,
 | 
				
			||||||
 | 
						"EBCDIC/ASCII filter",
 | 
				
			||||||
 | 
						ebcdic_write,
 | 
				
			||||||
 | 
						ebcdic_read,
 | 
				
			||||||
 | 
						ebcdic_puts,
 | 
				
			||||||
 | 
						ebcdic_gets,
 | 
				
			||||||
 | 
						ebcdic_ctrl,
 | 
				
			||||||
 | 
						ebcdic_new,
 | 
				
			||||||
 | 
						ebcdic_free,
 | 
				
			||||||
 | 
						};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					typedef struct
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						size_t	alloced;
 | 
				
			||||||
 | 
						char	buff[1];
 | 
				
			||||||
 | 
					} EBCDIC_OUTBUFF;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					BIO_METHOD *BIO_f_ebcdic_filter()
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						return(&methods_ebcdic);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int ebcdic_new(BIO *bi)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						EBCDIC_OUTBUFF *wbuf;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						wbuf = (EBCDIC_OUTBUFF *)OPENSSL_malloc(sizeof(EBCDIC_OUTBUFF) + 1024);
 | 
				
			||||||
 | 
						wbuf->alloced = 1024;
 | 
				
			||||||
 | 
						wbuf->buff[0] = '\0';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						bi->ptr=(char *)wbuf;
 | 
				
			||||||
 | 
						bi->init=1;
 | 
				
			||||||
 | 
						bi->flags=0;
 | 
				
			||||||
 | 
						return(1);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int ebcdic_free(BIO *a)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						if (a == NULL) return(0);
 | 
				
			||||||
 | 
						if (a->ptr != NULL)
 | 
				
			||||||
 | 
							OPENSSL_free(a->ptr);
 | 
				
			||||||
 | 
						a->ptr=NULL;
 | 
				
			||||||
 | 
						a->init=0;
 | 
				
			||||||
 | 
						a->flags=0;
 | 
				
			||||||
 | 
						return(1);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					static int ebcdic_read(BIO *b, char *out, int outl)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						int ret=0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (out == NULL || outl == 0) return(0);
 | 
				
			||||||
 | 
						if (b->next_bio == NULL) return(0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ret=BIO_read(b->next_bio,out,outl);
 | 
				
			||||||
 | 
						if (ret > 0)
 | 
				
			||||||
 | 
							ascii2ebcdic(out,out,ret);
 | 
				
			||||||
 | 
						return(ret);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int ebcdic_write(BIO *b, char *in, int inl)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						EBCDIC_OUTBUFF *wbuf;
 | 
				
			||||||
 | 
						int ret=0;
 | 
				
			||||||
 | 
						int num;
 | 
				
			||||||
 | 
						unsigned char n;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if ((in == NULL) || (inl <= 0)) return(0);
 | 
				
			||||||
 | 
						if (b->next_bio == NULL) return(0);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						wbuf=(EBCDIC_OUTBUFF *)b->ptr;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (inl > (num = wbuf->alloced))
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							num = num + num;  /* double the size */
 | 
				
			||||||
 | 
							if (num < inl)
 | 
				
			||||||
 | 
								num = inl;
 | 
				
			||||||
 | 
							OPENSSL_free(wbuf);
 | 
				
			||||||
 | 
							wbuf=(EBCDIC_OUTBUFF *)OPENSSL_malloc(sizeof(EBCDIC_OUTBUFF) + num);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							wbuf->alloced = num;
 | 
				
			||||||
 | 
							wbuf->buff[0] = '\0';
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							b->ptr=(char *)wbuf;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ebcdic2ascii(wbuf->buff, in, inl);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ret=BIO_write(b->next_bio, wbuf->buff, inl);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						return(ret);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static long ebcdic_ctrl(BIO *b, int cmd, long num, char *ptr)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						long ret;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (b->next_bio == NULL) return(0);
 | 
				
			||||||
 | 
						switch (cmd)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						case BIO_CTRL_DUP:
 | 
				
			||||||
 | 
							ret=0L;
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
						default:
 | 
				
			||||||
 | 
							ret=BIO_ctrl(b->next_bio,cmd,num,ptr);
 | 
				
			||||||
 | 
							break;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						return(ret);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int ebcdic_gets(BIO *bp, char *buf, int size)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						int i, ret;
 | 
				
			||||||
 | 
						if (bp->next_bio == NULL) return(0);
 | 
				
			||||||
 | 
					/*	return(BIO_gets(bp->next_bio,buf,size));*/
 | 
				
			||||||
 | 
						for (i=0; i<size-1; ++i)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							ret = ebcdic_read(bp,&buf[i],1);
 | 
				
			||||||
 | 
							if (ret <= 0)
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
							else if (buf[i] == '\n')
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
								++i;
 | 
				
			||||||
 | 
								break;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if (i < size)
 | 
				
			||||||
 | 
							buf[i] = '\0';
 | 
				
			||||||
 | 
						return (ret < 0 && i == 0) ? ret : i;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int ebcdic_puts(BIO *bp, char *str)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						if (bp->next_bio == NULL) return(0);
 | 
				
			||||||
 | 
						return ebcdic_write(bp, str, strlen(str));
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char *argv[])
 | 
					int MAIN(int argc, char *argv[])
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	short port=PORT;
 | 
						short port=PORT;
 | 
				
			||||||
	char *CApath=NULL,*CAfile=NULL;
 | 
						char *CApath=NULL,*CAfile=NULL;
 | 
				
			||||||
	char *context = NULL;
 | 
						char *context = NULL;
 | 
				
			||||||
 | 
						char *dhfile = NULL;
 | 
				
			||||||
	int badop=0,bugs=0;
 | 
						int badop=0,bugs=0;
 | 
				
			||||||
	int ret=1;
 | 
						int ret=1;
 | 
				
			||||||
	int off=0;
 | 
						int off=0;
 | 
				
			||||||
	int no_tmp_rsa=0,nocert=0;
 | 
						int no_tmp_rsa=0,no_dhe=0,nocert=0;
 | 
				
			||||||
	int state=0;
 | 
						int state=0;
 | 
				
			||||||
	SSL_METHOD *meth=NULL;
 | 
						SSL_METHOD *meth=NULL;
 | 
				
			||||||
 | 
						char *inrand=NULL;
 | 
				
			||||||
 | 
						char *engine_id=NULL;
 | 
				
			||||||
 | 
						ENGINE *e=NULL;
 | 
				
			||||||
#ifndef NO_DH
 | 
					#ifndef NO_DH
 | 
				
			||||||
	DH *dh=NULL;
 | 
						DH *dh=NULL;
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -262,8 +436,9 @@ int MAIN(int argc, char *argv[])
 | 
				
			|||||||
	local_argv=argv;
 | 
						local_argv=argv;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	apps_startup();
 | 
						apps_startup();
 | 
				
			||||||
	s_quiet=0;
 | 
					#ifdef MONOLITH
 | 
				
			||||||
	s_debug=0;
 | 
						s_server_init();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bio_err == NULL)
 | 
						if (bio_err == NULL)
 | 
				
			||||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
							bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
				
			||||||
@@ -316,6 +491,11 @@ int MAIN(int argc, char *argv[])
 | 
				
			|||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
			s_key_file= *(++argv);
 | 
								s_key_file= *(++argv);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-dhparam") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								dhfile = *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else if	(strcmp(*argv,"-dcert") == 0)
 | 
							else if	(strcmp(*argv,"-dcert") == 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (--argc < 1) goto bad;
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
@@ -362,12 +542,16 @@ int MAIN(int argc, char *argv[])
 | 
				
			|||||||
			{ hack=1; }
 | 
								{ hack=1; }
 | 
				
			||||||
		else if	(strcmp(*argv,"-state") == 0)
 | 
							else if	(strcmp(*argv,"-state") == 0)
 | 
				
			||||||
			{ state=1; }
 | 
								{ state=1; }
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-crlf") == 0)
 | 
				
			||||||
 | 
								{ s_crlf=1; }
 | 
				
			||||||
		else if	(strcmp(*argv,"-quiet") == 0)
 | 
							else if	(strcmp(*argv,"-quiet") == 0)
 | 
				
			||||||
			{ s_quiet=1; }
 | 
								{ s_quiet=1; }
 | 
				
			||||||
		else if	(strcmp(*argv,"-bugs") == 0)
 | 
							else if	(strcmp(*argv,"-bugs") == 0)
 | 
				
			||||||
			{ bugs=1; }
 | 
								{ bugs=1; }
 | 
				
			||||||
		else if	(strcmp(*argv,"-no_tmp_rsa") == 0)
 | 
							else if	(strcmp(*argv,"-no_tmp_rsa") == 0)
 | 
				
			||||||
			{ no_tmp_rsa=1; }
 | 
								{ no_tmp_rsa=1; }
 | 
				
			||||||
 | 
							else if	(strcmp(*argv,"-no_dhe") == 0)
 | 
				
			||||||
 | 
								{ no_dhe=1; }
 | 
				
			||||||
		else if	(strcmp(*argv,"-www") == 0)
 | 
							else if	(strcmp(*argv,"-www") == 0)
 | 
				
			||||||
			{ www=1; }
 | 
								{ www=1; }
 | 
				
			||||||
		else if	(strcmp(*argv,"-WWW") == 0)
 | 
							else if	(strcmp(*argv,"-WWW") == 0)
 | 
				
			||||||
@@ -390,6 +574,16 @@ int MAIN(int argc, char *argv[])
 | 
				
			|||||||
		else if	(strcmp(*argv,"-tls1") == 0)
 | 
							else if	(strcmp(*argv,"-tls1") == 0)
 | 
				
			||||||
			{ meth=TLSv1_server_method(); }
 | 
								{ meth=TLSv1_server_method(); }
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-rand") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								inrand= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine_id= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
								BIO_printf(bio_err,"unknown option %s\n",*argv);
 | 
				
			||||||
@@ -406,6 +600,15 @@ bad:
 | 
				
			|||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL
 | 
				
			||||||
 | 
							&& !RAND_status())
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"warning, not much extra random data, consider using the -rand option\n");
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if (inrand != NULL)
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
 | 
								app_RAND_load_files(inrand));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bio_s_out == NULL)
 | 
						if (bio_s_out == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if (s_quiet && !s_debug)
 | 
							if (s_quiet && !s_debug)
 | 
				
			||||||
@@ -430,7 +633,30 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	SSL_load_error_strings();
 | 
						SSL_load_error_strings();
 | 
				
			||||||
	SSLeay_add_ssl_algorithms();
 | 
						OpenSSL_add_ssl_algorithms();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine_id != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine_id)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (s_debug)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								ENGINE_ctrl(e, ENGINE_CTRL_SET_LOGSTREAM,
 | 
				
			||||||
 | 
									0, bio_err, 0);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine_id);
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ctx=SSL_CTX_new(meth);
 | 
						ctx=SSL_CTX_new(meth);
 | 
				
			||||||
	if (ctx == NULL)
 | 
						if (ctx == NULL)
 | 
				
			||||||
@@ -470,21 +696,23 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef NO_DH
 | 
					#ifndef NO_DH
 | 
				
			||||||
	/* EAY EAY EAY evil hack */
 | 
						if (!no_dhe)
 | 
				
			||||||
	dh=load_dh_param();
 | 
					 | 
				
			||||||
	if (dh != NULL)
 | 
					 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_s_out,"Setting temp DH parameters\n");
 | 
							dh=load_dh_param(dhfile ? dhfile : s_cert_file);
 | 
				
			||||||
		}
 | 
							if (dh != NULL)
 | 
				
			||||||
	else
 | 
								{
 | 
				
			||||||
		{
 | 
								BIO_printf(bio_s_out,"Setting temp DH parameters\n");
 | 
				
			||||||
		BIO_printf(bio_s_out,"Using default temp DH parameters\n");
 | 
								}
 | 
				
			||||||
		dh=get_dh512();
 | 
							else
 | 
				
			||||||
		}
 | 
								{
 | 
				
			||||||
	BIO_flush(bio_s_out);
 | 
								BIO_printf(bio_s_out,"Using default temp DH parameters\n");
 | 
				
			||||||
 | 
								dh=get_dh512();
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							(void)BIO_flush(bio_s_out);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	SSL_CTX_set_tmp_dh(ctx,dh);
 | 
							SSL_CTX_set_tmp_dh(ctx,dh);
 | 
				
			||||||
	DH_free(dh);
 | 
							DH_free(dh);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
	
 | 
						
 | 
				
			||||||
	if (!set_cert_stuff(ctx,s_cert_file,s_key_file))
 | 
						if (!set_cert_stuff(ctx,s_cert_file,s_key_file))
 | 
				
			||||||
@@ -497,7 +725,8 @@ bad:
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
#ifndef NO_RSA
 | 
					#ifndef NO_RSA
 | 
				
			||||||
#if 1
 | 
					#if 1
 | 
				
			||||||
	SSL_CTX_set_tmp_rsa_callback(ctx,tmp_rsa_cb);
 | 
						if (!no_tmp_rsa)
 | 
				
			||||||
 | 
							SSL_CTX_set_tmp_rsa_callback(ctx,tmp_rsa_cb);
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
	if (!no_tmp_rsa && SSL_CTX_need_tmp_RSA(ctx))
 | 
						if (!no_tmp_rsa && SSL_CTX_need_tmp_RSA(ctx))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -520,12 +749,17 @@ bad:
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (cipher != NULL)
 | 
						if (cipher != NULL)
 | 
				
			||||||
		SSL_CTX_set_cipher_list(ctx,cipher);
 | 
							if(!SSL_CTX_set_cipher_list(ctx,cipher)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"error setting cipher list\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
	SSL_CTX_set_verify(ctx,s_server_verify,verify_callback);
 | 
						SSL_CTX_set_verify(ctx,s_server_verify,verify_callback);
 | 
				
			||||||
	SSL_CTX_set_session_id_context(ctx,(void*)&s_server_session_id_context,
 | 
						SSL_CTX_set_session_id_context(ctx,(void*)&s_server_session_id_context,
 | 
				
			||||||
		sizeof s_server_session_id_context);
 | 
							sizeof s_server_session_id_context);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	SSL_CTX_set_client_CA_list(ctx,SSL_load_client_CA_file(CAfile));
 | 
						if (CAfile != NULL)
 | 
				
			||||||
 | 
						    SSL_CTX_set_client_CA_list(ctx,SSL_load_client_CA_file(CAfile));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	BIO_printf(bio_s_out,"ACCEPT\n");
 | 
						BIO_printf(bio_s_out,"ACCEPT\n");
 | 
				
			||||||
	if (www)
 | 
						if (www)
 | 
				
			||||||
@@ -578,8 +812,11 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
				
			|||||||
	unsigned long l;
 | 
						unsigned long l;
 | 
				
			||||||
	SSL *con=NULL;
 | 
						SSL *con=NULL;
 | 
				
			||||||
	BIO *sbio;
 | 
						BIO *sbio;
 | 
				
			||||||
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
						struct timeval tv;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((buf=Malloc(bufsize)) == NULL)
 | 
						if ((buf=OPENSSL_malloc(bufsize)) == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		BIO_printf(bio_err,"out of memory\n");
 | 
							BIO_printf(bio_err,"out of memory\n");
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
@@ -597,7 +834,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
				
			|||||||
#endif
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (con == NULL) {
 | 
						if (con == NULL) {
 | 
				
			||||||
		con=(SSL *)SSL_new(ctx);
 | 
							con=SSL_new(ctx);
 | 
				
			||||||
		if(context)
 | 
							if(context)
 | 
				
			||||||
		      SSL_set_session_id_context(con, context,
 | 
							      SSL_set_session_id_context(con, context,
 | 
				
			||||||
						 strlen((char *)context));
 | 
											 strlen((char *)context));
 | 
				
			||||||
@@ -626,22 +863,72 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
				
			|||||||
	width=s+1;
 | 
						width=s+1;
 | 
				
			||||||
	for (;;)
 | 
						for (;;)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		FD_ZERO(&readfds);
 | 
							int read_from_terminal;
 | 
				
			||||||
#ifndef WINDOWS
 | 
							int read_from_sslcon;
 | 
				
			||||||
		FD_SET(fileno(stdin),&readfds);
 | 
					
 | 
				
			||||||
#endif
 | 
							read_from_terminal = 0;
 | 
				
			||||||
		FD_SET(s,&readfds);
 | 
							read_from_sslcon = SSL_pending(con);
 | 
				
			||||||
		/* Note: under VMS with SOCKETSHR the second parameter is
 | 
					
 | 
				
			||||||
		 * currently of type (int *) whereas under other systems
 | 
							if (!read_from_sslcon)
 | 
				
			||||||
		 * it is (void *) if you don't have a cast it will choke
 | 
					 | 
				
			||||||
		 * the compiler: if you do have a cast then you can either
 | 
					 | 
				
			||||||
		 * go for (int *) or (void *).
 | 
					 | 
				
			||||||
		 */
 | 
					 | 
				
			||||||
		i=select(width,(void *)&readfds,NULL,NULL,NULL);
 | 
					 | 
				
			||||||
		if (i <= 0) continue;
 | 
					 | 
				
			||||||
		if (FD_ISSET(fileno(stdin),&readfds))
 | 
					 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			i=read(fileno(stdin),buf,bufsize);
 | 
								FD_ZERO(&readfds);
 | 
				
			||||||
 | 
					#ifndef WINDOWS
 | 
				
			||||||
 | 
								FD_SET(fileno(stdin),&readfds);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
								FD_SET(s,&readfds);
 | 
				
			||||||
 | 
								/* Note: under VMS with SOCKETSHR the second parameter is
 | 
				
			||||||
 | 
								 * currently of type (int *) whereas under other systems
 | 
				
			||||||
 | 
								 * it is (void *) if you don't have a cast it will choke
 | 
				
			||||||
 | 
								 * the compiler: if you do have a cast then you can either
 | 
				
			||||||
 | 
								 * go for (int *) or (void *).
 | 
				
			||||||
 | 
								 */
 | 
				
			||||||
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
								/* Under Windows we can't select on stdin: only
 | 
				
			||||||
 | 
								 * on sockets. As a workaround we timeout the select every
 | 
				
			||||||
 | 
								 * second and check for any keypress. In a proper Windows
 | 
				
			||||||
 | 
								 * application we wouldn't do this because it is inefficient.
 | 
				
			||||||
 | 
								 */
 | 
				
			||||||
 | 
								tv.tv_sec = 1;
 | 
				
			||||||
 | 
								tv.tv_usec = 0;
 | 
				
			||||||
 | 
								i=select(width,(void *)&readfds,NULL,NULL,&tv);
 | 
				
			||||||
 | 
								if((i < 0) || (!i && !_kbhit() ) )continue;
 | 
				
			||||||
 | 
								if(_kbhit())
 | 
				
			||||||
 | 
									read_from_terminal = 1;
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
								i=select(width,(void *)&readfds,NULL,NULL,NULL);
 | 
				
			||||||
 | 
								if (i <= 0) continue;
 | 
				
			||||||
 | 
								if (FD_ISSET(fileno(stdin),&readfds))
 | 
				
			||||||
 | 
									read_from_terminal = 1;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
								if (FD_ISSET(s,&readfds))
 | 
				
			||||||
 | 
									read_from_sslcon = 1;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if (read_from_terminal)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (s_crlf)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									int j, lf_num;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
									i=read(fileno(stdin), buf, bufsize/2);
 | 
				
			||||||
 | 
									lf_num = 0;
 | 
				
			||||||
 | 
									/* both loops are skipped when i <= 0 */
 | 
				
			||||||
 | 
									for (j = 0; j < i; j++)
 | 
				
			||||||
 | 
										if (buf[j] == '\n')
 | 
				
			||||||
 | 
											lf_num++;
 | 
				
			||||||
 | 
									for (j = i-1; j >= 0; j--)
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										buf[j+lf_num] = buf[j];
 | 
				
			||||||
 | 
										if (buf[j] == '\n')
 | 
				
			||||||
 | 
											{
 | 
				
			||||||
 | 
											lf_num--;
 | 
				
			||||||
 | 
											i++;
 | 
				
			||||||
 | 
											buf[j+lf_num] = '\r';
 | 
				
			||||||
 | 
											}
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									assert(lf_num == 0);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else
 | 
				
			||||||
 | 
									i=read(fileno(stdin),buf,bufsize);
 | 
				
			||||||
			if (!s_quiet)
 | 
								if (!s_quiet)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
				if ((i <= 0) || (buf[0] == 'Q'))
 | 
									if ((i <= 0) || (buf[0] == 'Q'))
 | 
				
			||||||
@@ -692,6 +979,9 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
				
			|||||||
					print_stats(bio_s_out,SSL_get_SSL_CTX(con));
 | 
										print_stats(bio_s_out,SSL_get_SSL_CTX(con));
 | 
				
			||||||
					}
 | 
										}
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
 | 
								ebcdic2ascii(buf,buf,i);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
			l=k=0;
 | 
								l=k=0;
 | 
				
			||||||
			for (;;)
 | 
								for (;;)
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
@@ -726,7 +1016,7 @@ static int sv_body(char *hostname, int s, unsigned char *context)
 | 
				
			|||||||
				if (i <= 0) break;
 | 
									if (i <= 0) break;
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		if (FD_ISSET(s,&readfds))
 | 
							if (read_from_sslcon)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (!SSL_is_init_finished(con))
 | 
								if (!SSL_is_init_finished(con))
 | 
				
			||||||
				{
 | 
									{
 | 
				
			||||||
@@ -750,6 +1040,9 @@ again:
 | 
				
			|||||||
				switch (SSL_get_error(con,i))
 | 
									switch (SSL_get_error(con,i))
 | 
				
			||||||
					{
 | 
										{
 | 
				
			||||||
				case SSL_ERROR_NONE:
 | 
									case SSL_ERROR_NONE:
 | 
				
			||||||
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
 | 
										ascii2ebcdic(buf,buf,i);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
					write(fileno(stdout),buf,
 | 
										write(fileno(stdout),buf,
 | 
				
			||||||
						(unsigned int)i);
 | 
											(unsigned int)i);
 | 
				
			||||||
					if (SSL_pending(con)) goto again;
 | 
										if (SSL_pending(con)) goto again;
 | 
				
			||||||
@@ -785,7 +1078,7 @@ err:
 | 
				
			|||||||
	if (buf != NULL)
 | 
						if (buf != NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		memset(buf,0,bufsize);
 | 
							memset(buf,0,bufsize);
 | 
				
			||||||
		Free(buf);
 | 
							OPENSSL_free(buf);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (ret >= 0)
 | 
						if (ret >= 0)
 | 
				
			||||||
		BIO_printf(bio_s_out,"ACCEPT\n");
 | 
							BIO_printf(bio_s_out,"ACCEPT\n");
 | 
				
			||||||
@@ -856,14 +1149,14 @@ static int init_ssl_connection(SSL *con)
 | 
				
			|||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef NO_DH
 | 
					#ifndef NO_DH
 | 
				
			||||||
static DH *load_dh_param(void)
 | 
					static DH *load_dh_param(char *dhfile)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	DH *ret=NULL;
 | 
						DH *ret=NULL;
 | 
				
			||||||
	BIO *bio;
 | 
						BIO *bio;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((bio=BIO_new_file(DH_PARAM,"r")) == NULL)
 | 
						if ((bio=BIO_new_file(dhfile,"r")) == NULL)
 | 
				
			||||||
		goto err;
 | 
							goto err;
 | 
				
			||||||
	ret=PEM_read_bio_DHparams(bio,NULL,NULL);
 | 
						ret=PEM_read_bio_DHparams(bio,NULL,NULL,NULL);
 | 
				
			||||||
err:
 | 
					err:
 | 
				
			||||||
	if (bio != NULL) BIO_free(bio);
 | 
						if (bio != NULL) BIO_free(bio);
 | 
				
			||||||
	return(ret);
 | 
						return(ret);
 | 
				
			||||||
@@ -902,7 +1195,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
				
			|||||||
	BIO *io,*ssl_bio,*sbio;
 | 
						BIO *io,*ssl_bio,*sbio;
 | 
				
			||||||
	long total_bytes;
 | 
						long total_bytes;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	buf=Malloc(bufsize);
 | 
						buf=OPENSSL_malloc(bufsize);
 | 
				
			||||||
	if (buf == NULL) return(0);
 | 
						if (buf == NULL) return(0);
 | 
				
			||||||
	io=BIO_new(BIO_f_buffer());
 | 
						io=BIO_new(BIO_f_buffer());
 | 
				
			||||||
	ssl_bio=BIO_new(BIO_f_ssl());
 | 
						ssl_bio=BIO_new(BIO_f_ssl());
 | 
				
			||||||
@@ -923,7 +1216,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
				
			|||||||
	/* lets make the output buffer a reasonable size */
 | 
						/* lets make the output buffer a reasonable size */
 | 
				
			||||||
	if (!BIO_set_write_buffer_size(io,bufsize)) goto err;
 | 
						if (!BIO_set_write_buffer_size(io,bufsize)) goto err;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if ((con=(SSL *)SSL_new(ctx)) == NULL) goto err;
 | 
						if ((con=SSL_new(ctx)) == NULL) goto err;
 | 
				
			||||||
	if(context) SSL_set_session_id_context(con, context,
 | 
						if(context) SSL_set_session_id_context(con, context,
 | 
				
			||||||
					       strlen((char *)context));
 | 
										       strlen((char *)context));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -941,6 +1234,9 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
				
			|||||||
	/* SSL_set_fd(con,s); */
 | 
						/* SSL_set_fd(con,s); */
 | 
				
			||||||
	BIO_set_ssl(ssl_bio,con,BIO_CLOSE);
 | 
						BIO_set_ssl(ssl_bio,con,BIO_CLOSE);
 | 
				
			||||||
	BIO_push(io,ssl_bio);
 | 
						BIO_push(io,ssl_bio);
 | 
				
			||||||
 | 
					#ifdef CHARSET_EBCDIC
 | 
				
			||||||
 | 
						io = BIO_push(BIO_new(BIO_f_ebcdic_filter()),io);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (s_debug)
 | 
						if (s_debug)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
@@ -1010,7 +1306,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
				
			|||||||
			static char *space="                          ";
 | 
								static char *space="                          ";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			BIO_puts(io,"HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n");
 | 
								BIO_puts(io,"HTTP/1.0 200 ok\r\nContent-type: text/html\r\n\r\n");
 | 
				
			||||||
			BIO_puts(io,"<HTML><BODY BGCOLOR=ffffff>\n");
 | 
								BIO_puts(io,"<HTML><BODY BGCOLOR=\"#ffffff\">\n");
 | 
				
			||||||
			BIO_puts(io,"<pre>\n");
 | 
								BIO_puts(io,"<pre>\n");
 | 
				
			||||||
/*			BIO_puts(io,SSLeay_version(SSLEAY_VERSION));*/
 | 
					/*			BIO_puts(io,SSLeay_version(SSLEAY_VERSION));*/
 | 
				
			||||||
			BIO_puts(io,"\n");
 | 
								BIO_puts(io,"\n");
 | 
				
			||||||
@@ -1082,7 +1378,7 @@ static int www_body(char *hostname, int s, unsigned char *context)
 | 
				
			|||||||
			BIO_puts(io,"</BODY></HTML>\r\n\r\n");
 | 
								BIO_puts(io,"</BODY></HTML>\r\n\r\n");
 | 
				
			||||||
			break;
 | 
								break;
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		else if ((www == 2) && (strncmp("GET ",buf,4) == 0))
 | 
							else if ((www == 2) && (strncmp("GET /",buf,5) == 0))
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO *file;
 | 
								BIO *file;
 | 
				
			||||||
			char *p,*e;
 | 
								char *p,*e;
 | 
				
			||||||
@@ -1218,7 +1514,7 @@ end:
 | 
				
			|||||||
	/* make sure we re-use sessions */
 | 
						/* make sure we re-use sessions */
 | 
				
			||||||
	SSL_set_shutdown(con,SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN);
 | 
						SSL_set_shutdown(con,SSL_SENT_SHUTDOWN|SSL_RECEIVED_SHUTDOWN);
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
	/* This kills performace */
 | 
						/* This kills performance */
 | 
				
			||||||
/*	SSL_shutdown(con); A shutdown gets sent in the
 | 
					/*	SSL_shutdown(con); A shutdown gets sent in the
 | 
				
			||||||
 *	BIO_free_all(io) procession */
 | 
					 *	BIO_free_all(io) procession */
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -1228,14 +1524,14 @@ err:
 | 
				
			|||||||
	if (ret >= 0)
 | 
						if (ret >= 0)
 | 
				
			||||||
		BIO_printf(bio_s_out,"ACCEPT\n");
 | 
							BIO_printf(bio_s_out,"ACCEPT\n");
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (buf != NULL) Free(buf);
 | 
						if (buf != NULL) OPENSSL_free(buf);
 | 
				
			||||||
	if (io != NULL) BIO_free_all(io);
 | 
						if (io != NULL) BIO_free_all(io);
 | 
				
			||||||
/*	if (ssl_bio != NULL) BIO_free(ssl_bio);*/
 | 
					/*	if (ssl_bio != NULL) BIO_free(ssl_bio);*/
 | 
				
			||||||
	return(ret);
 | 
						return(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifndef NO_RSA
 | 
					#ifndef NO_RSA
 | 
				
			||||||
static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int export, int keylength)
 | 
					static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int is_export, int keylength)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	static RSA *rsa_tmp=NULL;
 | 
						static RSA *rsa_tmp=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -1244,13 +1540,13 @@ static RSA MS_CALLBACK *tmp_rsa_cb(SSL *s, int export, int keylength)
 | 
				
			|||||||
		if (!s_quiet)
 | 
							if (!s_quiet)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength);
 | 
								BIO_printf(bio_err,"Generating temp (%d bit) RSA key...",keylength);
 | 
				
			||||||
			BIO_flush(bio_err);
 | 
								(void)BIO_flush(bio_err);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		rsa_tmp=RSA_generate_key(keylength,RSA_F4,NULL,NULL);
 | 
							rsa_tmp=RSA_generate_key(keylength,RSA_F4,NULL,NULL);
 | 
				
			||||||
		if (!s_quiet)
 | 
							if (!s_quiet)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			BIO_printf(bio_err,"\n");
 | 
								BIO_printf(bio_err,"\n");
 | 
				
			||||||
			BIO_flush(bio_err);
 | 
								(void)BIO_flush(bio_err);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	return(rsa_tmp);
 | 
						return(rsa_tmp);
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										203
									
								
								apps/s_socket.c
									
									
									
									
									
								
							
							
						
						
									
										203
									
								
								apps/s_socket.c
									
									
									
									
									
								
							@@ -1,4 +1,4 @@
 | 
				
			|||||||
/* apps/s_socket.c */
 | 
					/* apps/s_socket.c -  socket-related functions used by s_client and s_server */
 | 
				
			||||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
					/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
				
			||||||
 * All rights reserved.
 | 
					 * All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
@@ -56,20 +56,21 @@
 | 
				
			|||||||
 * [including the GNU Public Licence.]
 | 
					 * [including the GNU Public Licence.]
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* With IPv6, it looks like Digital has mixed up the proper order of
 | 
					 | 
				
			||||||
   recursive header file inclusion, resulting in the compiler complaining
 | 
					 | 
				
			||||||
   that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
 | 
					 | 
				
			||||||
   is needed to have fileno() declared correctly...  So let's define u_int */
 | 
					 | 
				
			||||||
#if defined(__DECC) && !defined(__U_INT)
 | 
					 | 
				
			||||||
#define __U_INT
 | 
					 | 
				
			||||||
typedef unsigned int u_int;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#include <stdio.h>
 | 
					#include <stdio.h>
 | 
				
			||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
#include <errno.h>
 | 
					#include <errno.h>
 | 
				
			||||||
#include <signal.h>
 | 
					#include <signal.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* With IPv6, it looks like Digital has mixed up the proper order of
 | 
				
			||||||
 | 
					   recursive header file inclusion, resulting in the compiler complaining
 | 
				
			||||||
 | 
					   that u_int isn't defined, but only if _POSIX_C_SOURCE is defined, which
 | 
				
			||||||
 | 
					   is needed to have fileno() declared correctly...  So let's define u_int */
 | 
				
			||||||
 | 
					#if defined(VMS) && defined(__DECC) && !defined(__U_INT)
 | 
				
			||||||
 | 
					#define __U_INT
 | 
				
			||||||
 | 
					typedef unsigned int u_int;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define USE_SOCKETS
 | 
					#define USE_SOCKETS
 | 
				
			||||||
#define NON_MAIN
 | 
					#define NON_MAIN
 | 
				
			||||||
#include "apps.h"
 | 
					#include "apps.h"
 | 
				
			||||||
@@ -78,16 +79,17 @@ typedef unsigned int u_int;
 | 
				
			|||||||
#include "s_apps.h"
 | 
					#include "s_apps.h"
 | 
				
			||||||
#include <openssl/ssl.h>
 | 
					#include <openssl/ssl.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef VMS
 | 
					 | 
				
			||||||
#if (__VMS_VER < 70000000) /* FIONBIO used as a switch to enable ioctl,
 | 
					 | 
				
			||||||
			      and that isn't in VMS < 7.0 */
 | 
					 | 
				
			||||||
#undef FIONBIO
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
#include <processes.h> /* for vfork() */
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
static struct hostent *GetHostByName(char *name);
 | 
					static struct hostent *GetHostByName(char *name);
 | 
				
			||||||
int sock_init(void );
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
					static void sock_cleanup(void);
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					static int sock_init(void);
 | 
				
			||||||
 | 
					static int init_client_ip(int *sock,unsigned char ip[4], int port);
 | 
				
			||||||
 | 
					static int init_server(int *sock, int port);
 | 
				
			||||||
 | 
					static int init_server_long(int *sock, int port,char *ip);
 | 
				
			||||||
 | 
					static int do_accept(int acc_sock, int *sock, char **host);
 | 
				
			||||||
 | 
					static int host_ip(char *str, unsigned char ip[4]);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#ifdef WIN16
 | 
					#ifdef WIN16
 | 
				
			||||||
#define SOCKET_PROTOCOL	0 /* more microsoft stupidity */
 | 
					#define SOCKET_PROTOCOL	0 /* more microsoft stupidity */
 | 
				
			||||||
#else
 | 
					#else
 | 
				
			||||||
@@ -130,19 +132,19 @@ static BOOL CALLBACK enumproc(HWND hwnd,LPARAM lParam)
 | 
				
			|||||||
#endif /* WIN32 */
 | 
					#endif /* WIN32 */
 | 
				
			||||||
#endif /* WINDOWS */
 | 
					#endif /* WINDOWS */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
void sock_cleanup(void)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
#ifdef WINDOWS
 | 
					#ifdef WINDOWS
 | 
				
			||||||
 | 
					static void sock_cleanup(void)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
	if (wsa_init_done)
 | 
						if (wsa_init_done)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		wsa_init_done=0;
 | 
							wsa_init_done=0;
 | 
				
			||||||
		WSACancelBlockingCall();
 | 
							WSACancelBlockingCall();
 | 
				
			||||||
		WSACleanup();
 | 
							WSACleanup();
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int sock_init(void)
 | 
					static int sock_init(void)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
#ifdef WINDOWS
 | 
					#ifdef WINDOWS
 | 
				
			||||||
	if (!wsa_init_done)
 | 
						if (!wsa_init_done)
 | 
				
			||||||
@@ -186,7 +188,7 @@ int init_client(int *sock, char *host, int port)
 | 
				
			|||||||
	return(init_client_ip(sock,ip,port));
 | 
						return(init_client_ip(sock,ip,port));
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int init_client_ip(int *sock, unsigned char ip[4], int port)
 | 
					static int init_client_ip(int *sock, unsigned char ip[4], int port)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	unsigned long addr;
 | 
						unsigned long addr;
 | 
				
			||||||
	struct sockaddr_in them;
 | 
						struct sockaddr_in them;
 | 
				
			||||||
@@ -207,9 +209,11 @@ int init_client_ip(int *sock, unsigned char ip[4], int port)
 | 
				
			|||||||
	s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
 | 
						s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
 | 
				
			||||||
	if (s == INVALID_SOCKET) { perror("socket"); return(0); }
 | 
						if (s == INVALID_SOCKET) { perror("socket"); return(0); }
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#ifndef MPE
 | 
				
			||||||
	i=0;
 | 
						i=0;
 | 
				
			||||||
	i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
 | 
						i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
 | 
				
			||||||
	if (i < 0) { perror("keepalive"); return(0); }
 | 
						if (i < 0) { perror("keepalive"); return(0); }
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (connect(s,(struct sockaddr *)&them,sizeof(them)) == -1)
 | 
						if (connect(s,(struct sockaddr *)&them,sizeof(them)) == -1)
 | 
				
			||||||
		{ close(s); perror("connect"); return(0); }
 | 
							{ close(s); perror("connect"); return(0); }
 | 
				
			||||||
@@ -217,75 +221,6 @@ int init_client_ip(int *sock, unsigned char ip[4], int port)
 | 
				
			|||||||
	return(1);
 | 
						return(1);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int nbio_sock_error(int sock)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	int j,i;
 | 
					 | 
				
			||||||
	int size;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	size=sizeof(int);
 | 
					 | 
				
			||||||
	/* Note: under VMS with SOCKETSHR the third parameter is currently
 | 
					 | 
				
			||||||
	 * of type (int *) whereas under other systems it is (void *) if
 | 
					 | 
				
			||||||
	 * you don't have a cast it will choke the compiler: if you do
 | 
					 | 
				
			||||||
	 * have a cast then you can either go for (int *) or (void *).
 | 
					 | 
				
			||||||
	 */
 | 
					 | 
				
			||||||
	i=getsockopt(sock,SOL_SOCKET,SO_ERROR,(char *)&j,(void *)&size);
 | 
					 | 
				
			||||||
	if (i < 0)
 | 
					 | 
				
			||||||
		return(1);
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		return(j);
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
int nbio_init_client_ip(int *sock, unsigned char ip[4], int port)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	unsigned long addr;
 | 
					 | 
				
			||||||
	struct sockaddr_in them;
 | 
					 | 
				
			||||||
	int s,i;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (!sock_init()) return(0);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	memset((char *)&them,0,sizeof(them));
 | 
					 | 
				
			||||||
	them.sin_family=AF_INET;
 | 
					 | 
				
			||||||
	them.sin_port=htons((unsigned short)port);
 | 
					 | 
				
			||||||
	addr=	(unsigned long)
 | 
					 | 
				
			||||||
		((unsigned long)ip[0]<<24L)|
 | 
					 | 
				
			||||||
		((unsigned long)ip[1]<<16L)|
 | 
					 | 
				
			||||||
		((unsigned long)ip[2]<< 8L)|
 | 
					 | 
				
			||||||
		((unsigned long)ip[3]);
 | 
					 | 
				
			||||||
	them.sin_addr.s_addr=htonl(addr);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (*sock <= 0)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
#ifdef FIONBIO
 | 
					 | 
				
			||||||
		unsigned long l=1;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		s=socket(AF_INET,SOCK_STREAM,SOCKET_PROTOCOL);
 | 
					 | 
				
			||||||
		if (s == INVALID_SOCKET) { perror("socket"); return(0); }
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		i=0;
 | 
					 | 
				
			||||||
		i=setsockopt(s,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i));
 | 
					 | 
				
			||||||
		if (i < 0) { perror("keepalive"); return(0); }
 | 
					 | 
				
			||||||
		*sock=s;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifdef FIONBIO
 | 
					 | 
				
			||||||
		BIO_socket_ioctl(s,FIONBIO,&l);
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		s= *sock;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	i=connect(s,(struct sockaddr *)&them,sizeof(them));
 | 
					 | 
				
			||||||
	if (i == INVALID_SOCKET)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		if (BIO_sock_should_retry(i))
 | 
					 | 
				
			||||||
			return(-1);
 | 
					 | 
				
			||||||
		else
 | 
					 | 
				
			||||||
			return(0);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	else
 | 
					 | 
				
			||||||
		return(1);
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
int do_server(int port, int *ret, int (*cb)(), char *context)
 | 
					int do_server(int port, int *ret, int (*cb)(), char *context)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int sock;
 | 
						int sock;
 | 
				
			||||||
@@ -308,7 +243,7 @@ int do_server(int port, int *ret, int (*cb)(), char *context)
 | 
				
			|||||||
			return(0);
 | 
								return(0);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		i=(*cb)(name,sock, context);
 | 
							i=(*cb)(name,sock, context);
 | 
				
			||||||
		if (name != NULL) Free(name);
 | 
							if (name != NULL) OPENSSL_free(name);
 | 
				
			||||||
		SHUTDOWN2(sock);
 | 
							SHUTDOWN2(sock);
 | 
				
			||||||
		if (i < 0)
 | 
							if (i < 0)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
@@ -318,7 +253,7 @@ int do_server(int port, int *ret, int (*cb)(), char *context)
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int init_server_long(int *sock, int port, char *ip)
 | 
					static int init_server_long(int *sock, int port, char *ip)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int ret=0;
 | 
						int ret=0;
 | 
				
			||||||
	struct sockaddr_in server;
 | 
						struct sockaddr_in server;
 | 
				
			||||||
@@ -368,12 +303,12 @@ err:
 | 
				
			|||||||
	return(ret);
 | 
						return(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int init_server(int *sock, int port)
 | 
					static int init_server(int *sock, int port)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	return(init_server_long(sock, port, NULL));
 | 
						return(init_server_long(sock, port, NULL));
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int do_accept(int acc_sock, int *sock, char **host)
 | 
					static int do_accept(int acc_sock, int *sock, char **host)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int ret,i;
 | 
						int ret,i;
 | 
				
			||||||
	struct hostent *h1,*h2;
 | 
						struct hostent *h1,*h2;
 | 
				
			||||||
@@ -439,9 +374,9 @@ redoit:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		if ((*host=(char *)Malloc(strlen(h1->h_name)+1)) == NULL)
 | 
							if ((*host=(char *)OPENSSL_malloc(strlen(h1->h_name)+1)) == NULL)
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			perror("Malloc");
 | 
								perror("OPENSSL_malloc");
 | 
				
			||||||
			return(0);
 | 
								return(0);
 | 
				
			||||||
			}
 | 
								}
 | 
				
			||||||
		strcpy(*host,h1->h_name);
 | 
							strcpy(*host,h1->h_name);
 | 
				
			||||||
@@ -489,12 +424,12 @@ err:
 | 
				
			|||||||
	return(0);
 | 
						return(0);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int host_ip(char *str, unsigned char ip[4])
 | 
					static int host_ip(char *str, unsigned char ip[4])
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	unsigned int in[4]; 
 | 
						unsigned int in[4]; 
 | 
				
			||||||
	int i;
 | 
						int i;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (sscanf(str,"%d.%d.%d.%d",&(in[0]),&(in[1]),&(in[2]),&(in[3])) == 4)
 | 
						if (sscanf(str,"%u.%u.%u.%u",&(in[0]),&(in[1]),&(in[2]),&(in[3])) == 4)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		for (i=0; i<4; i++)
 | 
							for (i=0; i<4; i++)
 | 
				
			||||||
			if (in[i] > 255)
 | 
								if (in[i] > 255)
 | 
				
			||||||
@@ -605,69 +540,3 @@ static struct hostent *GetHostByName(char *name)
 | 
				
			|||||||
		return(ret);
 | 
							return(ret);
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifndef MSDOS
 | 
					 | 
				
			||||||
int spawn(int argc, char **argv, int *in, int *out)
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	int pid;
 | 
					 | 
				
			||||||
#define CHILD_READ	p1[0]
 | 
					 | 
				
			||||||
#define CHILD_WRITE	p2[1]
 | 
					 | 
				
			||||||
#define PARENT_READ	p2[0]
 | 
					 | 
				
			||||||
#define PARENT_WRITE	p1[1]
 | 
					 | 
				
			||||||
	int p1[2],p2[2];
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if ((pipe(p1) < 0) || (pipe(p2) < 0)) return(-1);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifdef VMS
 | 
					 | 
				
			||||||
	if ((pid=vfork()) == 0)
 | 
					 | 
				
			||||||
#else
 | 
					 | 
				
			||||||
	if ((pid=fork()) == 0)
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
		{ /* child */
 | 
					 | 
				
			||||||
		if (dup2(CHILD_WRITE,fileno(stdout)) < 0)
 | 
					 | 
				
			||||||
			perror("dup2");
 | 
					 | 
				
			||||||
		if (dup2(CHILD_WRITE,fileno(stderr)) < 0)
 | 
					 | 
				
			||||||
			perror("dup2");
 | 
					 | 
				
			||||||
		if (dup2(CHILD_READ,fileno(stdin)) < 0)
 | 
					 | 
				
			||||||
			perror("dup2");
 | 
					 | 
				
			||||||
		close(CHILD_READ); 
 | 
					 | 
				
			||||||
		close(CHILD_WRITE);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		close(PARENT_READ);
 | 
					 | 
				
			||||||
		close(PARENT_WRITE);
 | 
					 | 
				
			||||||
		execvp(argv[0],argv);
 | 
					 | 
				
			||||||
		perror("child");
 | 
					 | 
				
			||||||
		exit(1);
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	/* parent */
 | 
					 | 
				
			||||||
	*in= PARENT_READ;
 | 
					 | 
				
			||||||
	*out=PARENT_WRITE;
 | 
					 | 
				
			||||||
	close(CHILD_READ);
 | 
					 | 
				
			||||||
	close(CHILD_WRITE);
 | 
					 | 
				
			||||||
	return(pid);
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
#endif /* MSDOS */
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifdef undef
 | 
					 | 
				
			||||||
	/* Turn on synchronous sockets so that we can do a WaitForMultipleObjects
 | 
					 | 
				
			||||||
	 * on sockets */
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	SOCKET s;
 | 
					 | 
				
			||||||
	int optionValue = SO_SYNCHRONOUS_NONALERT;
 | 
					 | 
				
			||||||
	int err;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	err = setsockopt( 
 | 
					 | 
				
			||||||
	    INVALID_SOCKET, 
 | 
					 | 
				
			||||||
	    SOL_SOCKET, 
 | 
					 | 
				
			||||||
	    SO_OPENTYPE, 
 | 
					 | 
				
			||||||
	    (char *)&optionValue, 
 | 
					 | 
				
			||||||
	    sizeof(optionValue));
 | 
					 | 
				
			||||||
	if (err != NO_ERROR) {
 | 
					 | 
				
			||||||
	/* failed for some reason... */
 | 
					 | 
				
			||||||
		BIO_printf(bio_err, "failed to setsockopt(SO_OPENTYPE, SO_SYNCHRONOUS_ALERT) - %d\n",
 | 
					 | 
				
			||||||
			WSAGetLastError());
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 
 | 
				
			|||||||
@@ -67,10 +67,6 @@
 | 
				
			|||||||
#include <stdlib.h>
 | 
					#include <stdlib.h>
 | 
				
			||||||
#include <string.h>
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if defined(NO_RSA) && !defined(NO_SSL2)
 | 
					 | 
				
			||||||
#define NO_SSL2
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
#ifdef NO_STDIO
 | 
					#ifdef NO_STDIO
 | 
				
			||||||
#define APPS_WIN16
 | 
					#define APPS_WIN16
 | 
				
			||||||
#endif
 | 
					#endif
 | 
				
			||||||
@@ -220,7 +216,7 @@ static void s_time_usage(void)
 | 
				
			|||||||
                file if not specified by this option\n\
 | 
					                file if not specified by this option\n\
 | 
				
			||||||
-CApath arg   - PEM format directory of CA's\n\
 | 
					-CApath arg   - PEM format directory of CA's\n\
 | 
				
			||||||
-CAfile arg   - PEM format file of CA's\n\
 | 
					-CAfile arg   - PEM format file of CA's\n\
 | 
				
			||||||
-cipher       - prefered cipher to use, play with 'openssl ciphers'\n\n";
 | 
					-cipher       - preferred cipher to use, play with 'openssl ciphers'\n\n";
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	printf( "usage: s_time <args>\n\n" );
 | 
						printf( "usage: s_time <args>\n\n" );
 | 
				
			||||||
 | 
					
 | 
				
			||||||
@@ -229,7 +225,7 @@ static void s_time_usage(void)
 | 
				
			|||||||
	printf("-nbio         - Run with non-blocking IO\n");
 | 
						printf("-nbio         - Run with non-blocking IO\n");
 | 
				
			||||||
	printf("-ssl2         - Just use SSLv2\n");
 | 
						printf("-ssl2         - Just use SSLv2\n");
 | 
				
			||||||
	printf("-ssl3         - Just use SSLv3\n");
 | 
						printf("-ssl3         - Just use SSLv3\n");
 | 
				
			||||||
	printf("-bugs         - Turn on SSL bug compatability\n");
 | 
						printf("-bugs         - Turn on SSL bug compatibility\n");
 | 
				
			||||||
	printf("-new          - Just time new connections\n");
 | 
						printf("-new          - Just time new connections\n");
 | 
				
			||||||
	printf("-reuse        - Just time connection reuse\n");
 | 
						printf("-reuse        - Just time connection reuse\n");
 | 
				
			||||||
	printf("-www page     - Retrieve 'page' from the site\n");
 | 
						printf("-www page     - Retrieve 'page' from the site\n");
 | 
				
			||||||
@@ -248,15 +244,6 @@ static int parseArgs(int argc, char **argv)
 | 
				
			|||||||
 | 
					
 | 
				
			||||||
    verify_depth=0;
 | 
					    verify_depth=0;
 | 
				
			||||||
    verify_error=X509_V_OK;
 | 
					    verify_error=X509_V_OK;
 | 
				
			||||||
#ifdef FIONBIO
 | 
					 | 
				
			||||||
    t_nbio=0;
 | 
					 | 
				
			||||||
#endif
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	apps_startup();
 | 
					 | 
				
			||||||
	s_time_init();
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	if (bio_err == NULL)
 | 
					 | 
				
			||||||
		bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
					 | 
				
			||||||
 | 
					
 | 
				
			||||||
    argc--;
 | 
					    argc--;
 | 
				
			||||||
    argv++;
 | 
					    argv++;
 | 
				
			||||||
@@ -401,6 +388,8 @@ static double tm_Time_F(int s)
 | 
				
			|||||||
 * MAIN - main processing area for client
 | 
					 * MAIN - main processing area for client
 | 
				
			||||||
 *			real name depends on MONOLITH
 | 
					 *			real name depends on MONOLITH
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	double totalTime = 0.0;
 | 
						double totalTime = 0.0;
 | 
				
			||||||
@@ -411,6 +400,12 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	MS_STATIC char buf[1024*8];
 | 
						MS_STATIC char buf[1024*8];
 | 
				
			||||||
	int ver;
 | 
						int ver;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						apps_startup();
 | 
				
			||||||
 | 
						s_time_init();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (bio_err == NULL)
 | 
				
			||||||
 | 
							bio_err=BIO_new_fp(stderr,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#if !defined(NO_SSL2) && !defined(NO_SSL3)
 | 
					#if !defined(NO_SSL2) && !defined(NO_SSL3)
 | 
				
			||||||
	s_time_meth=SSLv23_client_method();
 | 
						s_time_meth=SSLv23_client_method();
 | 
				
			||||||
#elif !defined(NO_SSL3)
 | 
					#elif !defined(NO_SSL3)
 | 
				
			||||||
@@ -423,7 +418,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	if( parseArgs( argc, argv ) < 0 )
 | 
						if( parseArgs( argc, argv ) < 0 )
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	SSLeay_add_ssl_algorithms();
 | 
						OpenSSL_add_ssl_algorithms();
 | 
				
			||||||
	if ((tm_ctx=SSL_CTX_new(s_time_meth)) == NULL) return(1);
 | 
						if ((tm_ctx=SSL_CTX_new(s_time_meth)) == NULL) return(1);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	SSL_CTX_set_quiet_shutdown(tm_ctx,1);
 | 
						SSL_CTX_set_quiet_shutdown(tm_ctx,1);
 | 
				
			||||||
@@ -438,7 +433,7 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
	if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
 | 
						if ((!SSL_CTX_load_verify_locations(tm_ctx,CAfile,CApath)) ||
 | 
				
			||||||
		(!SSL_CTX_set_default_verify_paths(tm_ctx)))
 | 
							(!SSL_CTX_set_default_verify_paths(tm_ctx)))
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		/* BIO_printf(bio_err,"error seting default verify locations\n"); */
 | 
							/* BIO_printf(bio_err,"error setting default verify locations\n"); */
 | 
				
			||||||
		ERR_print_errors(bio_err);
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
		/* goto end; */
 | 
							/* goto end; */
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
@@ -639,7 +634,7 @@ static SSL *doConnection(SSL *scon)
 | 
				
			|||||||
	BIO_set_conn_hostname(conn,host);
 | 
						BIO_set_conn_hostname(conn,host);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (scon == NULL)
 | 
						if (scon == NULL)
 | 
				
			||||||
		serverCon=(SSL *)SSL_new(tm_ctx);
 | 
							serverCon=SSL_new(tm_ctx);
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		serverCon=scon;
 | 
							serverCon=scon;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,17 +1,17 @@
 | 
				
			|||||||
issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
					issuer= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 | 
				
			||||||
subject=/C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Server test cert (512 bit)
 | 
					subject= /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Server test cert (512 bit)
 | 
				
			||||||
-----BEGIN CERTIFICATE-----
 | 
					-----BEGIN CERTIFICATE-----
 | 
				
			||||||
MIIB6TCCAVICAQQwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
					MIIB6TCCAVICAQYwDQYJKoZIhvcNAQEEBQAwWzELMAkGA1UEBhMCQVUxEzARBgNV
 | 
				
			||||||
BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
					BAgTClF1ZWVuc2xhbmQxGjAYBgNVBAoTEUNyeXB0U29mdCBQdHkgTHRkMRswGQYD
 | 
				
			||||||
VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNOTgwNjI5MjM1MjQwWhcNMDAwNjI4
 | 
					VQQDExJUZXN0IENBICgxMDI0IGJpdCkwHhcNMDAxMDE2MjIzMTAzWhcNMDMwMTE0
 | 
				
			||||||
MjM1MjQwWjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
					MjIzMTAzWjBjMQswCQYDVQQGEwJBVTETMBEGA1UECBMKUXVlZW5zbGFuZDEaMBgG
 | 
				
			||||||
A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGlNlcnZlciB0ZXN0IGNl
 | 
					A1UEChMRQ3J5cHRTb2Z0IFB0eSBMdGQxIzAhBgNVBAMTGlNlcnZlciB0ZXN0IGNl
 | 
				
			||||||
cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAJ+zw4Qnlf8SMVIP
 | 
					cnQgKDUxMiBiaXQpMFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAJ+zw4Qnlf8SMVIP
 | 
				
			||||||
Fe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVDTGiXav6ooKXfX3j/7tdkuD8Ey2//
 | 
					Fe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVDTGiXav6ooKXfX3j/7tdkuD8Ey2//
 | 
				
			||||||
Kv7+ue0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQCVvvfkGSe2GHgDFfmOua4Isjb9
 | 
					Kv7+ue0CAwEAATANBgkqhkiG9w0BAQQFAAOBgQCT0grFQeZaqYb5EYfk20XixZV4
 | 
				
			||||||
JVhImWMASiOClkZlMESDJjsszg/6+d/W+8TrbObhazpl95FivXBVucbj9dudh7AO
 | 
					GmyAbXMftG1Eo7qGiMhYzRwGNWxEYojf5PZkYZXvSqZ/ZXHXa4g59jK/rJNnaVGM
 | 
				
			||||||
IZu1h1MAPlyknc9Ud816vz3FejB4qqUoaXjnlkrIgEbr/un7jSS86WOe0hRhwHkJ
 | 
					k+xIX8mxQvlV0n5O9PIha5BX5teZnkHKgL8aKKLKW1BK7YTngsfSzzaeame5iKfz
 | 
				
			||||||
FUGcPZf9ND22Etc+AQ==
 | 
					itAE+OjGF+PFKbwX8Q==
 | 
				
			||||||
-----END CERTIFICATE-----
 | 
					-----END CERTIFICATE-----
 | 
				
			||||||
-----BEGIN RSA PRIVATE KEY-----
 | 
					-----BEGIN RSA PRIVATE KEY-----
 | 
				
			||||||
MIIBPAIBAAJBAJ+zw4Qnlf8SMVIPFe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVD
 | 
					MIIBPAIBAAJBAJ+zw4Qnlf8SMVIPFe9GEcStgOY2Ww/dgNdhjeD8ckUJNP5VZkVD
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -72,7 +72,7 @@
 | 
				
			|||||||
static char *sess_id_usage[]={
 | 
					static char *sess_id_usage[]={
 | 
				
			||||||
"usage: sess_id args\n",
 | 
					"usage: sess_id args\n",
 | 
				
			||||||
"\n",
 | 
					"\n",
 | 
				
			||||||
" -inform arg     - input format - default PEM (one of DER, TXT or PEM)\n",
 | 
					" -inform arg     - input format - default PEM (DER or PEM)\n",
 | 
				
			||||||
" -outform arg    - output format - default PEM\n",
 | 
					" -outform arg    - output format - default PEM\n",
 | 
				
			||||||
" -in arg         - input file - default stdin\n",
 | 
					" -in arg         - input file - default stdin\n",
 | 
				
			||||||
" -out arg        - output file - default stdout\n",
 | 
					" -out arg        - output file - default stdout\n",
 | 
				
			||||||
@@ -84,6 +84,9 @@ NULL
 | 
				
			|||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static SSL_SESSION *load_sess_id(char *file, int format);
 | 
					static SSL_SESSION *load_sess_id(char *file, int format);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	SSL_SESSION *x=NULL;
 | 
						SSL_SESSION *x=NULL;
 | 
				
			||||||
@@ -203,7 +206,15 @@ bad:
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (outfile == NULL)
 | 
							if (outfile == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
			BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
								BIO_set_fp(out,stdout,BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
								out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
		else
 | 
							else
 | 
				
			||||||
			{
 | 
								{
 | 
				
			||||||
			if (BIO_write_filename(out,outfile) <= 0)
 | 
								if (BIO_write_filename(out,outfile) <= 0)
 | 
				
			||||||
@@ -259,7 +270,7 @@ bad:
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (out != NULL) BIO_free(out);
 | 
						if (out != NULL) BIO_free_all(out);
 | 
				
			||||||
	if (x != NULL) SSL_SESSION_free(x);
 | 
						if (x != NULL) SSL_SESSION_free(x);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
@@ -289,7 +300,7 @@ static SSL_SESSION *load_sess_id(char *infile, int format)
 | 
				
			|||||||
	if 	(format == FORMAT_ASN1)
 | 
						if 	(format == FORMAT_ASN1)
 | 
				
			||||||
		x=d2i_SSL_SESSION_bio(in,NULL);
 | 
							x=d2i_SSL_SESSION_bio(in,NULL);
 | 
				
			||||||
	else if (format == FORMAT_PEM)
 | 
						else if (format == FORMAT_PEM)
 | 
				
			||||||
		x=PEM_read_bio_SSL_SESSION(in,NULL,NULL);
 | 
							x=PEM_read_bio_SSL_SESSION(in,NULL,NULL,NULL);
 | 
				
			||||||
	else	{
 | 
						else	{
 | 
				
			||||||
		BIO_printf(bio_err,"bad input format specified for input crl\n");
 | 
							BIO_printf(bio_err,"bad input format specified for input crl\n");
 | 
				
			||||||
		goto end;
 | 
							goto end;
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										575
									
								
								apps/smime.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										575
									
								
								apps/smime.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,575 @@
 | 
				
			|||||||
 | 
					/* smime.c */
 | 
				
			||||||
 | 
					/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
				
			||||||
 | 
					 * project 1999.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer. 
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in
 | 
				
			||||||
 | 
					 *    the documentation and/or other materials provided with the
 | 
				
			||||||
 | 
					 *    distribution.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this
 | 
				
			||||||
 | 
					 *    software must display the following acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
				
			||||||
 | 
					 *    endorse or promote products derived from this software without
 | 
				
			||||||
 | 
					 *    prior written permission. For written permission, please contact
 | 
				
			||||||
 | 
					 *    licensing@OpenSSL.org.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 5. Products derived from this software may not be called "OpenSSL"
 | 
				
			||||||
 | 
					 *    nor may "OpenSSL" appear in their names without prior written
 | 
				
			||||||
 | 
					 *    permission of the OpenSSL Project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 6. Redistributions of any form whatsoever must retain the following
 | 
				
			||||||
 | 
					 *    acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
				
			||||||
 | 
					 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
				
			||||||
 | 
					 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
				
			||||||
 | 
					 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
				
			||||||
 | 
					 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
				
			||||||
 | 
					 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
				
			||||||
 | 
					 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
				
			||||||
 | 
					 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
				
			||||||
 | 
					 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
				
			||||||
 | 
					 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * ====================================================================
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This product includes cryptographic software written by Eric Young
 | 
				
			||||||
 | 
					 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
				
			||||||
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* S/MIME utility function */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#include <openssl/crypto.h>
 | 
				
			||||||
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#undef PROG
 | 
				
			||||||
 | 
					#define PROG smime_main
 | 
				
			||||||
 | 
					static X509_STORE *setup_verify(char *CAfile, char *CApath);
 | 
				
			||||||
 | 
					static int save_certs(char *signerfile, STACK_OF(X509) *signers);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#define SMIME_OP	0x10
 | 
				
			||||||
 | 
					#define SMIME_ENCRYPT	(1 | SMIME_OP)
 | 
				
			||||||
 | 
					#define SMIME_DECRYPT	2
 | 
				
			||||||
 | 
					#define SMIME_SIGN	(3 | SMIME_OP)
 | 
				
			||||||
 | 
					#define SMIME_VERIFY	4
 | 
				
			||||||
 | 
					#define SMIME_PK7OUT	5
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
 | 
						int operation = 0;
 | 
				
			||||||
 | 
						int ret = 0;
 | 
				
			||||||
 | 
						char **args;
 | 
				
			||||||
 | 
						char *inmode = "r", *outmode = "w";
 | 
				
			||||||
 | 
						char *infile = NULL, *outfile = NULL;
 | 
				
			||||||
 | 
						char *signerfile = NULL, *recipfile = NULL;
 | 
				
			||||||
 | 
						char *certfile = NULL, *keyfile = NULL, *contfile=NULL;
 | 
				
			||||||
 | 
						EVP_CIPHER *cipher = NULL;
 | 
				
			||||||
 | 
						PKCS7 *p7 = NULL;
 | 
				
			||||||
 | 
						X509_STORE *store = NULL;
 | 
				
			||||||
 | 
						X509 *cert = NULL, *recip = NULL, *signer = NULL;
 | 
				
			||||||
 | 
						EVP_PKEY *key = NULL;
 | 
				
			||||||
 | 
						STACK_OF(X509) *encerts = NULL, *other = NULL;
 | 
				
			||||||
 | 
						BIO *in = NULL, *out = NULL, *indata = NULL;
 | 
				
			||||||
 | 
						int badarg = 0;
 | 
				
			||||||
 | 
						int flags = PKCS7_DETACHED;
 | 
				
			||||||
 | 
						char *to = NULL, *from = NULL, *subject = NULL;
 | 
				
			||||||
 | 
						char *CAfile = NULL, *CApath = NULL;
 | 
				
			||||||
 | 
						char *passargin = NULL, *passin = NULL;
 | 
				
			||||||
 | 
						char *inrand = NULL;
 | 
				
			||||||
 | 
						int need_rand = 0;
 | 
				
			||||||
 | 
						int informat = FORMAT_SMIME, outformat = FORMAT_SMIME;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						args = argv + 1;
 | 
				
			||||||
 | 
						ret = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						while (!badarg && *args && *args[0] == '-') {
 | 
				
			||||||
 | 
							if (!strcmp (*args, "-encrypt")) operation = SMIME_ENCRYPT;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-decrypt")) operation = SMIME_DECRYPT;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-sign")) operation = SMIME_SIGN;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-verify")) operation = SMIME_VERIFY;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-pk7out")) operation = SMIME_PK7OUT;
 | 
				
			||||||
 | 
					#ifndef NO_DES
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-des3")) 
 | 
				
			||||||
 | 
									cipher = EVP_des_ede3_cbc();
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-des")) 
 | 
				
			||||||
 | 
									cipher = EVP_des_cbc();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_RC2
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-rc2-40")) 
 | 
				
			||||||
 | 
									cipher = EVP_rc2_40_cbc();
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-rc2-128")) 
 | 
				
			||||||
 | 
									cipher = EVP_rc2_cbc();
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-rc2-64")) 
 | 
				
			||||||
 | 
									cipher = EVP_rc2_64_cbc();
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-text")) 
 | 
				
			||||||
 | 
									flags |= PKCS7_TEXT;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nointern")) 
 | 
				
			||||||
 | 
									flags |= PKCS7_NOINTERN;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-noverify")) 
 | 
				
			||||||
 | 
									flags |= PKCS7_NOVERIFY;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nochain")) 
 | 
				
			||||||
 | 
									flags |= PKCS7_NOCHAIN;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nocerts")) 
 | 
				
			||||||
 | 
									flags |= PKCS7_NOCERTS;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-noattr")) 
 | 
				
			||||||
 | 
									flags |= PKCS7_NOATTR;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nodetach")) 
 | 
				
			||||||
 | 
									flags &= ~PKCS7_DETACHED;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nosmimecap"))
 | 
				
			||||||
 | 
									flags |= PKCS7_NOSMIMECAP;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-binary"))
 | 
				
			||||||
 | 
									flags |= PKCS7_BINARY;
 | 
				
			||||||
 | 
							else if (!strcmp (*args, "-nosigs"))
 | 
				
			||||||
 | 
									flags |= PKCS7_NOSIGS;
 | 
				
			||||||
 | 
							else if (!strcmp(*args,"-rand")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									inrand = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
								need_rand = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp(*args,"-engine")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									engine = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp(*args,"-passin")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									passargin = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-to")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									to = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-from")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									from = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-subject")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									subject = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-signer")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									signerfile = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-recip")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									recipfile = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-inkey")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									keyfile = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-certfile")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									certfile = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-CAfile")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									CAfile = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-CApath")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									CApath = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-in")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									infile = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-inform")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									informat = str2fmt(*args);
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-outform")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									outformat = str2fmt(*args);
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-out")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									outfile = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else if (!strcmp (*args, "-content")) {
 | 
				
			||||||
 | 
								if (args[1]) {
 | 
				
			||||||
 | 
									args++;
 | 
				
			||||||
 | 
									contfile = *args;
 | 
				
			||||||
 | 
								} else badarg = 1;
 | 
				
			||||||
 | 
							} else badarg = 1;
 | 
				
			||||||
 | 
							args++;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(operation == SMIME_SIGN) {
 | 
				
			||||||
 | 
							if(!signerfile) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "No signer certificate specified\n");
 | 
				
			||||||
 | 
								badarg = 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							need_rand = 1;
 | 
				
			||||||
 | 
						} else if(operation == SMIME_DECRYPT) {
 | 
				
			||||||
 | 
							if(!recipfile) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "No recipient certificate and key specified\n");
 | 
				
			||||||
 | 
								badarg = 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else if(operation == SMIME_ENCRYPT) {
 | 
				
			||||||
 | 
							if(!*args) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "No recipient(s) certificate(s) specified\n");
 | 
				
			||||||
 | 
								badarg = 1;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							need_rand = 1;
 | 
				
			||||||
 | 
						} else if(!operation) badarg = 1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (badarg) {
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "Usage smime [options] cert.pem ...\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "where options are\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-encrypt       encrypt message\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-decrypt       decrypt encrypted message\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-sign          sign message\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-verify        verify signed message\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-pk7out        output PKCS#7 structure\n");
 | 
				
			||||||
 | 
					#ifndef NO_DES
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-des3          encrypt with triple DES\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-des           encrypt with DES\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
					#ifndef NO_RC2
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-rc2-40        encrypt with RC2-40 (default)\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-rc2-64        encrypt with RC2-64\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-rc2-128       encrypt with RC2-128\n");
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-nointern      don't search certificates in message for signer\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-nosigs        don't verify message signature\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-noverify      don't verify signers certificate\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-nocerts       don't include signers certificate when signing\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-nodetach      use opaque signing\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-noattr        don't include any signed attributes\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-binary        don't translate message to text\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-certfile file other certificates file\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-signer file   signer certificate file\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-recip  file   recipient certificate file for decryption\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-in file       input file\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-inform arg    input format SMIME (default), PEM or DER\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-inkey file    input private key (if not signer or recipient)\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-out file      output file\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-outform arg   output format SMIME (default), PEM or DER\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-content file  supply or override content for detached signature\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-to addr       to address\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-from ad       from address\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-subject s     subject\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-text          include or delete text MIME headers\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-CApath dir    trusted certificates directory\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-CAfile file   trusted certificates file\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "-engine e      use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,  "-rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
 | 
				
			||||||
 | 
							BIO_printf(bio_err,  "               load the file (or the files in the directory) into\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,  "               the random number generator\n");
 | 
				
			||||||
 | 
							BIO_printf (bio_err, "cert.pem       recipient certificate(s) for encryption\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting password\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (need_rand) {
 | 
				
			||||||
 | 
							app_RAND_load_file(NULL, bio_err, (inrand != NULL));
 | 
				
			||||||
 | 
							if (inrand != NULL)
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"%ld semi-random bytes loaded\n",
 | 
				
			||||||
 | 
									app_RAND_load_files(inrand));
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ret = 2;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(operation != SMIME_SIGN) flags &= ~PKCS7_DETACHED;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(operation & SMIME_OP) {
 | 
				
			||||||
 | 
							if(flags & PKCS7_BINARY) inmode = "rb";
 | 
				
			||||||
 | 
							if(outformat == FORMAT_ASN1) outmode = "wb";
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							if(flags & PKCS7_BINARY) outmode = "wb";
 | 
				
			||||||
 | 
							if(informat == FORMAT_ASN1) inmode = "rb";
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(operation == SMIME_ENCRYPT) {
 | 
				
			||||||
 | 
							if (!cipher) {
 | 
				
			||||||
 | 
					#ifndef NO_RC2			
 | 
				
			||||||
 | 
								cipher = EVP_rc2_40_cbc();
 | 
				
			||||||
 | 
					#else
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "No cipher selected\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							encerts = sk_X509_new_null();
 | 
				
			||||||
 | 
							while (*args) {
 | 
				
			||||||
 | 
								if(!(cert = load_cert(bio_err,*args,FORMAT_PEM))) {
 | 
				
			||||||
 | 
									BIO_printf(bio_err, "Can't read recipient certificate file %s\n", *args);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
								sk_X509_push(encerts, cert);
 | 
				
			||||||
 | 
								cert = NULL;
 | 
				
			||||||
 | 
								args++;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(signerfile && (operation == SMIME_SIGN)) {
 | 
				
			||||||
 | 
							if(!(signer = load_cert(bio_err,signerfile,FORMAT_PEM))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Can't read signer certificate file %s\n", signerfile);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(certfile) {
 | 
				
			||||||
 | 
							if(!(other = load_certs(bio_err,certfile,FORMAT_PEM))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Can't read certificate file %s\n", certfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(recipfile && (operation == SMIME_DECRYPT)) {
 | 
				
			||||||
 | 
							if(!(recip = load_cert(bio_err,recipfile,FORMAT_PEM))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Can't read recipient certificate file %s\n", recipfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(operation == SMIME_DECRYPT) {
 | 
				
			||||||
 | 
							if(!keyfile) keyfile = recipfile;
 | 
				
			||||||
 | 
						} else if(operation == SMIME_SIGN) {
 | 
				
			||||||
 | 
							if(!keyfile) keyfile = signerfile;
 | 
				
			||||||
 | 
						} else keyfile = NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(keyfile) {
 | 
				
			||||||
 | 
							if(!(key = load_key(bio_err,keyfile, FORMAT_PEM, passin))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Can't read recipient certificate file %s\n", keyfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (infile) {
 | 
				
			||||||
 | 
							if (!(in = BIO_new_file(infile, inmode))) {
 | 
				
			||||||
 | 
								BIO_printf (bio_err,
 | 
				
			||||||
 | 
									 "Can't open input file %s\n", infile);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else in = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (outfile) {
 | 
				
			||||||
 | 
							if (!(out = BIO_new_file(outfile, outmode))) {
 | 
				
			||||||
 | 
								BIO_printf (bio_err,
 | 
				
			||||||
 | 
									 "Can't open output file %s\n", outfile);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							    out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(operation == SMIME_VERIFY) {
 | 
				
			||||||
 | 
							if(!(store = setup_verify(CAfile, CApath))) goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ret = 3;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(operation == SMIME_ENCRYPT) {
 | 
				
			||||||
 | 
							p7 = PKCS7_encrypt(encerts, in, cipher, flags);
 | 
				
			||||||
 | 
						} else if(operation == SMIME_SIGN) {
 | 
				
			||||||
 | 
							p7 = PKCS7_sign(signer, key, other, in, flags);
 | 
				
			||||||
 | 
							BIO_reset(in);
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							if(informat == FORMAT_SMIME) 
 | 
				
			||||||
 | 
								p7 = SMIME_read_PKCS7(in, &indata);
 | 
				
			||||||
 | 
							else if(informat == FORMAT_PEM) 
 | 
				
			||||||
 | 
								p7 = PEM_read_bio_PKCS7(in, NULL, NULL, NULL);
 | 
				
			||||||
 | 
							else if(informat == FORMAT_ASN1) 
 | 
				
			||||||
 | 
								p7 = d2i_PKCS7_bio(in, NULL);
 | 
				
			||||||
 | 
							else {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Bad input format for PKCS#7 file\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if(!p7) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error reading S/MIME message\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							if(contfile) {
 | 
				
			||||||
 | 
								BIO_free(indata);
 | 
				
			||||||
 | 
								if(!(indata = BIO_new_file(contfile, "rb"))) {
 | 
				
			||||||
 | 
									BIO_printf(bio_err, "Can't read content file %s\n", contfile);
 | 
				
			||||||
 | 
									goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!p7) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error creating PKCS#7 structure\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ret = 4;
 | 
				
			||||||
 | 
						if(operation == SMIME_DECRYPT) {
 | 
				
			||||||
 | 
							if(!PKCS7_decrypt(p7, key, recip, out, flags)) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error decrypting PKCS#7 structure\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else if(operation == SMIME_VERIFY) {
 | 
				
			||||||
 | 
							STACK_OF(X509) *signers;
 | 
				
			||||||
 | 
							if(PKCS7_verify(p7, other, store, indata, out, flags)) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Verification Successful\n");
 | 
				
			||||||
 | 
							} else {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Verification Failure\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							signers = PKCS7_get0_signers(p7, other, flags);
 | 
				
			||||||
 | 
							if(!save_certs(signerfile, signers)) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error writing signers to %s\n",
 | 
				
			||||||
 | 
													signerfile);
 | 
				
			||||||
 | 
								ret = 5;
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							sk_X509_free(signers);
 | 
				
			||||||
 | 
						} else if(operation == SMIME_PK7OUT) {
 | 
				
			||||||
 | 
							PEM_write_bio_PKCS7(out, p7);
 | 
				
			||||||
 | 
						} else {
 | 
				
			||||||
 | 
							if(to) BIO_printf(out, "To: %s\n", to);
 | 
				
			||||||
 | 
							if(from) BIO_printf(out, "From: %s\n", from);
 | 
				
			||||||
 | 
							if(subject) BIO_printf(out, "Subject: %s\n", subject);
 | 
				
			||||||
 | 
							if(outformat == FORMAT_SMIME) 
 | 
				
			||||||
 | 
								SMIME_write_PKCS7(out, p7, in, flags);
 | 
				
			||||||
 | 
							else if(outformat == FORMAT_PEM) 
 | 
				
			||||||
 | 
								PEM_write_bio_PKCS7(out,p7);
 | 
				
			||||||
 | 
							else if(outformat == FORMAT_ASN1) 
 | 
				
			||||||
 | 
								i2d_PKCS7_bio(out,p7);
 | 
				
			||||||
 | 
							else {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Bad output format for PKCS#7 file\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						ret = 0;
 | 
				
			||||||
 | 
					end:
 | 
				
			||||||
 | 
						if (need_rand)
 | 
				
			||||||
 | 
							app_RAND_write_file(NULL, bio_err);
 | 
				
			||||||
 | 
						if(ret) ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
						sk_X509_pop_free(encerts, X509_free);
 | 
				
			||||||
 | 
						sk_X509_pop_free(other, X509_free);
 | 
				
			||||||
 | 
						X509_STORE_free(store);
 | 
				
			||||||
 | 
						X509_free(cert);
 | 
				
			||||||
 | 
						X509_free(recip);
 | 
				
			||||||
 | 
						X509_free(signer);
 | 
				
			||||||
 | 
						EVP_PKEY_free(key);
 | 
				
			||||||
 | 
						PKCS7_free(p7);
 | 
				
			||||||
 | 
						BIO_free(in);
 | 
				
			||||||
 | 
						BIO_free(indata);
 | 
				
			||||||
 | 
						BIO_free_all(out);
 | 
				
			||||||
 | 
						if(passin) OPENSSL_free(passin);
 | 
				
			||||||
 | 
						return (ret);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static X509_STORE *setup_verify(char *CAfile, char *CApath)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						X509_STORE *store;
 | 
				
			||||||
 | 
						X509_LOOKUP *lookup;
 | 
				
			||||||
 | 
						if(!(store = X509_STORE_new())) goto end;
 | 
				
			||||||
 | 
						lookup=X509_STORE_add_lookup(store,X509_LOOKUP_file());
 | 
				
			||||||
 | 
						if (lookup == NULL) goto end;
 | 
				
			||||||
 | 
						if (CAfile) {
 | 
				
			||||||
 | 
							if(!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM)) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error loading file %s\n", CAfile);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
						lookup=X509_STORE_add_lookup(store,X509_LOOKUP_hash_dir());
 | 
				
			||||||
 | 
						if (lookup == NULL) goto end;
 | 
				
			||||||
 | 
						if (CApath) {
 | 
				
			||||||
 | 
							if(!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM)) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error loading directory %s\n", CApath);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ERR_clear_error();
 | 
				
			||||||
 | 
						return store;
 | 
				
			||||||
 | 
						end:
 | 
				
			||||||
 | 
						X509_STORE_free(store);
 | 
				
			||||||
 | 
						return NULL;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int save_certs(char *signerfile, STACK_OF(X509) *signers)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						int i;
 | 
				
			||||||
 | 
						BIO *tmp;
 | 
				
			||||||
 | 
						if(!signerfile) return 1;
 | 
				
			||||||
 | 
						tmp = BIO_new_file(signerfile, "w");
 | 
				
			||||||
 | 
						if(!tmp) return 0;
 | 
				
			||||||
 | 
						for(i = 0; i < sk_X509_num(signers); i++)
 | 
				
			||||||
 | 
							PEM_write_bio_X509(tmp, sk_X509_value(signers, i));
 | 
				
			||||||
 | 
						BIO_free(tmp);
 | 
				
			||||||
 | 
						return 1;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
						
 | 
				
			||||||
							
								
								
									
										635
									
								
								apps/speed.c
									
									
									
									
									
								
							
							
						
						
									
										635
									
								
								apps/speed.c
									
									
									
									
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							
							
								
								
									
										319
									
								
								apps/spkac.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										319
									
								
								apps/spkac.c
									
									
									
									
									
										Normal file
									
								
							@@ -0,0 +1,319 @@
 | 
				
			|||||||
 | 
					/* apps/spkac.c */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Written by Dr Stephen N Henson (shenson@bigfoot.com) for the OpenSSL
 | 
				
			||||||
 | 
					 * project 1999. Based on an original idea by Massimiliano Pala
 | 
				
			||||||
 | 
					 * (madwolf@openca.org).
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					/* ====================================================================
 | 
				
			||||||
 | 
					 * Copyright (c) 1999 The OpenSSL Project.  All rights reserved.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Redistribution and use in source and binary forms, with or without
 | 
				
			||||||
 | 
					 * modification, are permitted provided that the following conditions
 | 
				
			||||||
 | 
					 * are met:
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 1. Redistributions of source code must retain the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer. 
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 2. Redistributions in binary form must reproduce the above copyright
 | 
				
			||||||
 | 
					 *    notice, this list of conditions and the following disclaimer in
 | 
				
			||||||
 | 
					 *    the documentation and/or other materials provided with the
 | 
				
			||||||
 | 
					 *    distribution.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 3. All advertising materials mentioning features or use of this
 | 
				
			||||||
 | 
					 *    software must display the following acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit. (http://www.OpenSSL.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
 | 
				
			||||||
 | 
					 *    endorse or promote products derived from this software without
 | 
				
			||||||
 | 
					 *    prior written permission. For written permission, please contact
 | 
				
			||||||
 | 
					 *    licensing@OpenSSL.org.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 5. Products derived from this software may not be called "OpenSSL"
 | 
				
			||||||
 | 
					 *    nor may "OpenSSL" appear in their names without prior written
 | 
				
			||||||
 | 
					 *    permission of the OpenSSL Project.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * 6. Redistributions of any form whatsoever must retain the following
 | 
				
			||||||
 | 
					 *    acknowledgment:
 | 
				
			||||||
 | 
					 *    "This product includes software developed by the OpenSSL Project
 | 
				
			||||||
 | 
					 *    for use in the OpenSSL Toolkit (http://www.OpenSSL.org/)"
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
 | 
				
			||||||
 | 
					 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 | 
				
			||||||
 | 
					 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 | 
				
			||||||
 | 
					 * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE OpenSSL PROJECT OR
 | 
				
			||||||
 | 
					 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 | 
				
			||||||
 | 
					 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
 | 
				
			||||||
 | 
					 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
 | 
				
			||||||
 | 
					 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 | 
				
			||||||
 | 
					 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
 | 
				
			||||||
 | 
					 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 | 
				
			||||||
 | 
					 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 | 
				
			||||||
 | 
					 * OF THE POSSIBILITY OF SUCH DAMAGE.
 | 
				
			||||||
 | 
					 * ====================================================================
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * This product includes cryptographic software written by Eric Young
 | 
				
			||||||
 | 
					 * (eay@cryptsoft.com).  This product includes software written by Tim
 | 
				
			||||||
 | 
					 * Hudson (tjh@cryptsoft.com).
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <stdlib.h>
 | 
				
			||||||
 | 
					#include <string.h>
 | 
				
			||||||
 | 
					#include <time.h>
 | 
				
			||||||
 | 
					#include "apps.h"
 | 
				
			||||||
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
 | 
					#include <openssl/conf.h>
 | 
				
			||||||
 | 
					#include <openssl/err.h>
 | 
				
			||||||
 | 
					#include <openssl/evp.h>
 | 
				
			||||||
 | 
					#include <openssl/lhash.h>
 | 
				
			||||||
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#undef PROG
 | 
				
			||||||
 | 
					#define PROG	spkac_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* -in arg	- input file - default stdin
 | 
				
			||||||
 | 
					 * -out arg	- output file - default stdout
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
 | 
						int i,badops=0, ret = 1;
 | 
				
			||||||
 | 
						BIO *in = NULL,*out = NULL, *key = NULL;
 | 
				
			||||||
 | 
						int verify=0,noout=0,pubkey=0;
 | 
				
			||||||
 | 
						char *infile = NULL,*outfile = NULL,*prog;
 | 
				
			||||||
 | 
						char *passargin = NULL, *passin = NULL;
 | 
				
			||||||
 | 
						char *spkac = "SPKAC", *spksect = "default", *spkstr = NULL;
 | 
				
			||||||
 | 
						char *challenge = NULL, *keyfile = NULL;
 | 
				
			||||||
 | 
						LHASH *conf = NULL;
 | 
				
			||||||
 | 
						NETSCAPE_SPKI *spki = NULL;
 | 
				
			||||||
 | 
						EVP_PKEY *pkey = NULL;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						apps_startup();
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (!bio_err) bio_err = BIO_new_fp(stderr, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						prog=argv[0];
 | 
				
			||||||
 | 
						argc--;
 | 
				
			||||||
 | 
						argv++;
 | 
				
			||||||
 | 
						while (argc >= 1)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if (strcmp(*argv,"-in") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								infile= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-out") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								outfile= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-passin") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								passargin= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-key") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								keyfile= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-challenge") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								challenge= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-spkac") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								spkac= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-spksect") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								spksect= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								if (--argc < 1) goto bad;
 | 
				
			||||||
 | 
								engine= *(++argv);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-noout") == 0)
 | 
				
			||||||
 | 
								noout=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-pubkey") == 0)
 | 
				
			||||||
 | 
								pubkey=1;
 | 
				
			||||||
 | 
							else if (strcmp(*argv,"-verify") == 0)
 | 
				
			||||||
 | 
								verify=1;
 | 
				
			||||||
 | 
							else badops = 1;
 | 
				
			||||||
 | 
							argc--;
 | 
				
			||||||
 | 
							argv++;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (badops)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
					bad:
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"%s [options]\n",prog);
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"where options are\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -in arg        input file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -out arg       output file\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -key arg       create SPKAC using private key\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -passin arg    input file pass phrase source\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -challenge arg challenge string\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -spkac arg     alternative SPKAC name\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -noout         don't print SPKAC\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -pubkey        output public key\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -verify        verify SPKAC signature\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err," -engine e      use engine e, possibly a hardware device.\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ERR_load_crypto_strings();
 | 
				
			||||||
 | 
						if(!app_passwd(bio_err, passargin, NULL, &passin, NULL)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error getting password\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(keyfile) {
 | 
				
			||||||
 | 
							if(strcmp(keyfile, "-")) key = BIO_new_file(keyfile, "r");
 | 
				
			||||||
 | 
							else key = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
				
			||||||
 | 
							if(!key) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error opening key file\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							pkey = PEM_read_bio_PrivateKey(key, NULL, NULL, passin);
 | 
				
			||||||
 | 
							if(!pkey) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error reading private key\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							spki = NETSCAPE_SPKI_new();
 | 
				
			||||||
 | 
							if(challenge) ASN1_STRING_set(spki->spkac->challenge,
 | 
				
			||||||
 | 
											 challenge, strlen(challenge));
 | 
				
			||||||
 | 
							NETSCAPE_SPKI_set_pubkey(spki, pkey);
 | 
				
			||||||
 | 
							NETSCAPE_SPKI_sign(spki, pkey, EVP_md5());
 | 
				
			||||||
 | 
							spkstr = NETSCAPE_SPKI_b64_encode(spki);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if (outfile) out = BIO_new_file(outfile, "w");
 | 
				
			||||||
 | 
							else {
 | 
				
			||||||
 | 
								out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
								    out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
							if(!out) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error opening output file\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
							BIO_printf(out, "SPKAC=%s\n", spkstr);
 | 
				
			||||||
 | 
							OPENSSL_free(spkstr);
 | 
				
			||||||
 | 
							ret = 0;
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (infile) in = BIO_new_file(infile, "r");
 | 
				
			||||||
 | 
						else in = BIO_new_fp(stdin, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!in) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error opening input file\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						conf = CONF_load_bio(NULL, in, NULL);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!conf) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error parsing config file\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						spkstr = CONF_get_string(conf, spksect, spkac);
 | 
				
			||||||
 | 
							
 | 
				
			||||||
 | 
						if(!spkstr) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Can't find SPKAC called \"%s\"\n", spkac);
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						spki = NETSCAPE_SPKI_b64_decode(spkstr, -1);
 | 
				
			||||||
 | 
						
 | 
				
			||||||
 | 
						if(!spki) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error loading SPKAC\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (outfile) out = BIO_new_file(outfile, "w");
 | 
				
			||||||
 | 
						else {
 | 
				
			||||||
 | 
							out = BIO_new_fp(stdout, BIO_NOCLOSE);
 | 
				
			||||||
 | 
					#ifdef VMS
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							    BIO *tmpbio = BIO_new(BIO_f_linebuffer());
 | 
				
			||||||
 | 
							    out = BIO_push(tmpbio, out);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					#endif
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!out) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err, "Error opening output file\n");
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!noout) NETSCAPE_SPKI_print(out, spki);
 | 
				
			||||||
 | 
						pkey = NETSCAPE_SPKI_get_pubkey(spki);
 | 
				
			||||||
 | 
						if(verify) {
 | 
				
			||||||
 | 
							i = NETSCAPE_SPKI_verify(spki, pkey);
 | 
				
			||||||
 | 
							if(i) BIO_printf(bio_err, "Signature OK\n");
 | 
				
			||||||
 | 
							else {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Signature Failure\n");
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						if(pubkey) PEM_write_bio_PUBKEY(out, pkey);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						ret = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					end:
 | 
				
			||||||
 | 
						CONF_free(conf);
 | 
				
			||||||
 | 
						NETSCAPE_SPKI_free(spki);
 | 
				
			||||||
 | 
						BIO_free(in);
 | 
				
			||||||
 | 
						BIO_free_all(out);
 | 
				
			||||||
 | 
						BIO_free(key);
 | 
				
			||||||
 | 
						EVP_PKEY_free(pkey);
 | 
				
			||||||
 | 
						if(passin) OPENSSL_free(passin);
 | 
				
			||||||
 | 
						EXIT(ret);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
@@ -1,4 +1,5 @@
 | 
				
			|||||||
/* NOCW */
 | 
					/* NOCW */
 | 
				
			||||||
 | 
					/* used by apps/speed.c */
 | 
				
			||||||
DSA *get_dsa512(void );
 | 
					DSA *get_dsa512(void );
 | 
				
			||||||
DSA *get_dsa1024(void );
 | 
					DSA *get_dsa1024(void );
 | 
				
			||||||
DSA *get_dsa2048(void );
 | 
					DSA *get_dsa2048(void );
 | 
				
			||||||
@@ -146,3 +147,5 @@ DSA *get_dsa2048()
 | 
				
			|||||||
	return(dsa);
 | 
						return(dsa);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const char rnd_seed[] = "string to make the random number generator think it has entropy";
 | 
				
			||||||
 | 
					static int rnd_fake = 0;
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -1,4 +1,5 @@
 | 
				
			|||||||
/* apps/testrsa.h */
 | 
					/* apps/testrsa.h */
 | 
				
			||||||
 | 
					/* used by apps/speed.c */
 | 
				
			||||||
/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
					/* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com)
 | 
				
			||||||
 * All rights reserved.
 | 
					 * All rights reserved.
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 
 | 
				
			|||||||
							
								
								
									
										66
									
								
								apps/tkca
									
									
									
									
									
								
							
							
						
						
									
										66
									
								
								apps/tkca
									
									
									
									
									
								
							@@ -1,66 +0,0 @@
 | 
				
			|||||||
#!/usr/local/bin/perl5
 | 
					 | 
				
			||||||
#
 | 
					 | 
				
			||||||
# This is only something I'm playing with, it does not work :-)
 | 
					 | 
				
			||||||
#
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
use Tk;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
my $main=MainWindow->new();
 | 
					 | 
				
			||||||
my $f=$main->Frame(-relief => "ridge", -borderwidth => 2);
 | 
					 | 
				
			||||||
$f->pack(-fill => 'x');
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
my $ff=$f->Frame;
 | 
					 | 
				
			||||||
$ff->pack(-fill => 'x');
 | 
					 | 
				
			||||||
my $l=$ff->Label(-text => "TkCA - SSLeay",
 | 
					 | 
				
			||||||
	-relief => "ridge", -borderwidth => 2);
 | 
					 | 
				
			||||||
$l->pack(-fill => 'x', -ipady => 5);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
my $l=$ff->Button(-text => "Certify");
 | 
					 | 
				
			||||||
$l->pack(-fill => 'x', -ipady => 5);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
my $l=$ff->Button(-text => "Review");
 | 
					 | 
				
			||||||
$l->pack(-fill => 'x', -ipady => 5);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
my $l=$ff->Button(-text => "Revoke");
 | 
					 | 
				
			||||||
$l->pack(-fill => 'x', -ipady => 5);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
my $l=$ff->Button(-text => "Generate CRL");
 | 
					 | 
				
			||||||
$l->pack(-fill => 'x', -ipady => 5);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
my($db)=&load_db("demoCA/index.txt");
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
MainLoop;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
sub load_db
 | 
					 | 
				
			||||||
	{
 | 
					 | 
				
			||||||
	my(%ret);
 | 
					 | 
				
			||||||
	my($file)=@_;
 | 
					 | 
				
			||||||
	my(*IN);
 | 
					 | 
				
			||||||
	my(%db_serial,%db_name,@f,@db_s);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	$ret{'serial'}=\%db_serial;
 | 
					 | 
				
			||||||
	$ret{'name'}=\%db_name;
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
	open(IN,"<$file") || die "unable to open $file:$!\n";
 | 
					 | 
				
			||||||
	while (<IN>)
 | 
					 | 
				
			||||||
		{
 | 
					 | 
				
			||||||
		chop;
 | 
					 | 
				
			||||||
		s/([^\\])\t/\1\t\t/g;
 | 
					 | 
				
			||||||
		my(@f)=split(/\t\t/);
 | 
					 | 
				
			||||||
		die "wrong number of fields in $file, line $.\n"
 | 
					 | 
				
			||||||
			if ($#f != 5);
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
		my(%f);
 | 
					 | 
				
			||||||
		$f{'type'}=$f[0];
 | 
					 | 
				
			||||||
		$f{'exp'}=$f[1];
 | 
					 | 
				
			||||||
		$f{'rev'}=$f[2];
 | 
					 | 
				
			||||||
		$f{'serial'}=$f[3];
 | 
					 | 
				
			||||||
		$f{'file'}=$f[4];
 | 
					 | 
				
			||||||
		$f{'name'}=$f[5];
 | 
					 | 
				
			||||||
		die "serial number $f{'serial'} appears twice (line $.)\n"
 | 
					 | 
				
			||||||
			if (defined($db{$f{'serial'}}))
 | 
					 | 
				
			||||||
		$db_serial{$f{'serial'}}=\%f;
 | 
					 | 
				
			||||||
		$db_name{$f{'name'}}.=$f{'serial'}." ";
 | 
					 | 
				
			||||||
		}
 | 
					 | 
				
			||||||
	return \%ret;
 | 
					 | 
				
			||||||
	}
 | 
					 | 
				
			||||||
							
								
								
									
										216
									
								
								apps/verify.c
									
									
									
									
									
								
							
							
						
						
									
										216
									
								
								apps/verify.c
									
									
									
									
									
								
							@@ -63,21 +63,31 @@
 | 
				
			|||||||
#include <openssl/bio.h>
 | 
					#include <openssl/bio.h>
 | 
				
			||||||
#include <openssl/err.h>
 | 
					#include <openssl/err.h>
 | 
				
			||||||
#include <openssl/x509.h>
 | 
					#include <openssl/x509.h>
 | 
				
			||||||
 | 
					#include <openssl/x509v3.h>
 | 
				
			||||||
#include <openssl/pem.h>
 | 
					#include <openssl/pem.h>
 | 
				
			||||||
 | 
					#include <openssl/engine.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	verify_main
 | 
					#define PROG	verify_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx);
 | 
					static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx);
 | 
				
			||||||
static int check(X509_STORE *ctx,char *file);
 | 
					static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, int purpose);
 | 
				
			||||||
static int v_verbose=0;
 | 
					static STACK_OF(X509) *load_untrusted(char *file);
 | 
				
			||||||
 | 
					static int v_verbose=0, issuer_checks = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
 | 
						ENGINE *e = NULL;
 | 
				
			||||||
	int i,ret=1;
 | 
						int i,ret=1;
 | 
				
			||||||
 | 
						int purpose = -1;
 | 
				
			||||||
	char *CApath=NULL,*CAfile=NULL;
 | 
						char *CApath=NULL,*CAfile=NULL;
 | 
				
			||||||
 | 
						char *untfile = NULL, *trustfile = NULL;
 | 
				
			||||||
 | 
						STACK_OF(X509) *untrusted = NULL, *trusted = NULL;
 | 
				
			||||||
	X509_STORE *cert_ctx=NULL;
 | 
						X509_STORE *cert_ctx=NULL;
 | 
				
			||||||
	X509_LOOKUP *lookup=NULL;
 | 
						X509_LOOKUP *lookup=NULL;
 | 
				
			||||||
 | 
						char *engine=NULL;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	cert_ctx=X509_STORE_new();
 | 
						cert_ctx=X509_STORE_new();
 | 
				
			||||||
	if (cert_ctx == NULL) goto end;
 | 
						if (cert_ctx == NULL) goto end;
 | 
				
			||||||
@@ -107,8 +117,38 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
				if (argc-- < 1) goto end;
 | 
									if (argc-- < 1) goto end;
 | 
				
			||||||
				CAfile= *(++argv);
 | 
									CAfile= *(++argv);
 | 
				
			||||||
				}
 | 
									}
 | 
				
			||||||
 | 
								else if (strcmp(*argv,"-purpose") == 0)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									X509_PURPOSE *xptmp;
 | 
				
			||||||
 | 
									if (argc-- < 1) goto end;
 | 
				
			||||||
 | 
									i = X509_PURPOSE_get_by_sname(*(++argv));
 | 
				
			||||||
 | 
									if(i < 0)
 | 
				
			||||||
 | 
										{
 | 
				
			||||||
 | 
										BIO_printf(bio_err, "unrecognized purpose\n");
 | 
				
			||||||
 | 
										goto end;
 | 
				
			||||||
 | 
										}
 | 
				
			||||||
 | 
									xptmp = X509_PURPOSE_get0(i);
 | 
				
			||||||
 | 
									purpose = X509_PURPOSE_get_id(xptmp);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else if (strcmp(*argv,"-untrusted") == 0)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									if (argc-- < 1) goto end;
 | 
				
			||||||
 | 
									untfile= *(++argv);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else if (strcmp(*argv,"-trusted") == 0)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									if (argc-- < 1) goto end;
 | 
				
			||||||
 | 
									trustfile= *(++argv);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
 | 
								else if (strcmp(*argv,"-engine") == 0)
 | 
				
			||||||
 | 
									{
 | 
				
			||||||
 | 
									if (--argc < 1) goto end;
 | 
				
			||||||
 | 
									engine= *(++argv);
 | 
				
			||||||
 | 
									}
 | 
				
			||||||
			else if (strcmp(*argv,"-help") == 0)
 | 
								else if (strcmp(*argv,"-help") == 0)
 | 
				
			||||||
				goto end;
 | 
									goto end;
 | 
				
			||||||
 | 
								else if (strcmp(*argv,"-issuer_checks") == 0)
 | 
				
			||||||
 | 
									issuer_checks=1;
 | 
				
			||||||
			else if (strcmp(*argv,"-verbose") == 0)
 | 
								else if (strcmp(*argv,"-verbose") == 0)
 | 
				
			||||||
				v_verbose=1;
 | 
									v_verbose=1;
 | 
				
			||||||
			else if (argv[0][0] == '-')
 | 
								else if (argv[0][0] == '-')
 | 
				
			||||||
@@ -122,36 +162,92 @@ int MAIN(int argc, char **argv)
 | 
				
			|||||||
			break;
 | 
								break;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (engine != NULL)
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							if((e = ENGINE_by_id(engine)) == NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"invalid engine \"%s\"\n",
 | 
				
			||||||
 | 
									engine);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							if(!ENGINE_set_default(e, ENGINE_METHOD_ALL))
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								BIO_printf(bio_err,"can't use that engine\n");
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"engine \"%s\" set.\n", engine);
 | 
				
			||||||
 | 
							/* Free our "structural" reference. */
 | 
				
			||||||
 | 
							ENGINE_free(e);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	lookup=X509_STORE_add_lookup(cert_ctx,X509_LOOKUP_file());
 | 
						lookup=X509_STORE_add_lookup(cert_ctx,X509_LOOKUP_file());
 | 
				
			||||||
	if (lookup == NULL) abort();
 | 
						if (lookup == NULL) abort();
 | 
				
			||||||
	if (!X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM))
 | 
						if (CAfile) {
 | 
				
			||||||
		X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
							i=X509_LOOKUP_load_file(lookup,CAfile,X509_FILETYPE_PEM);
 | 
				
			||||||
 | 
							if(!i) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error loading file %s\n", CAfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else X509_LOOKUP_load_file(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
				
			||||||
		
 | 
							
 | 
				
			||||||
	lookup=X509_STORE_add_lookup(cert_ctx,X509_LOOKUP_hash_dir());
 | 
						lookup=X509_STORE_add_lookup(cert_ctx,X509_LOOKUP_hash_dir());
 | 
				
			||||||
	if (lookup == NULL) abort();
 | 
						if (lookup == NULL) abort();
 | 
				
			||||||
	if (!X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM))
 | 
						if (CApath) {
 | 
				
			||||||
		X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
							i=X509_LOOKUP_add_dir(lookup,CApath,X509_FILETYPE_PEM);
 | 
				
			||||||
 | 
							if(!i) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error loading directory %s\n", CApath);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						} else X509_LOOKUP_add_dir(lookup,NULL,X509_FILETYPE_DEFAULT);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ERR_clear_error();
 | 
						ERR_clear_error();
 | 
				
			||||||
	if (argc < 1) check(cert_ctx,NULL);
 | 
					
 | 
				
			||||||
 | 
						if(untfile) {
 | 
				
			||||||
 | 
							if(!(untrusted = load_untrusted(untfile))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error loading untrusted file %s\n", untfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(trustfile) {
 | 
				
			||||||
 | 
							if(!(trusted = load_untrusted(trustfile))) {
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "Error loading untrusted file %s\n", trustfile);
 | 
				
			||||||
 | 
								ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
								goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if (argc < 1) check(cert_ctx, NULL, untrusted, trusted, purpose);
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		for (i=0; i<argc; i++)
 | 
							for (i=0; i<argc; i++)
 | 
				
			||||||
			check(cert_ctx,argv[i]);
 | 
								check(cert_ctx,argv[i], untrusted, trusted, purpose);
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
	if (ret == 1)
 | 
						if (ret == 1) {
 | 
				
			||||||
		BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] cert1 cert2 ...\n");
 | 
							BIO_printf(bio_err,"usage: verify [-verbose] [-CApath path] [-CAfile file] [-purpose purpose] [-engine e] cert1 cert2 ...\n");
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"recognized usages:\n");
 | 
				
			||||||
 | 
							for(i = 0; i < X509_PURPOSE_get_count(); i++) {
 | 
				
			||||||
 | 
								X509_PURPOSE *ptmp;
 | 
				
			||||||
 | 
								ptmp = X509_PURPOSE_get0(i);
 | 
				
			||||||
 | 
								BIO_printf(bio_err, "\t%-10s\t%s\n", X509_PURPOSE_get0_sname(ptmp),
 | 
				
			||||||
 | 
													X509_PURPOSE_get0_name(ptmp));
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
	if (cert_ctx != NULL) X509_STORE_free(cert_ctx);
 | 
						if (cert_ctx != NULL) X509_STORE_free(cert_ctx);
 | 
				
			||||||
 | 
						sk_X509_pop_free(untrusted, X509_free);
 | 
				
			||||||
 | 
						sk_X509_pop_free(trusted, X509_free);
 | 
				
			||||||
	EXIT(ret);
 | 
						EXIT(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int check(X509_STORE *ctx, char *file)
 | 
					static int check(X509_STORE *ctx, char *file, STACK_OF(X509) *uchain, STACK_OF(X509) *tchain, int purpose)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	X509 *x=NULL;
 | 
						X509 *x=NULL;
 | 
				
			||||||
	BIO *in=NULL;
 | 
						BIO *in=NULL;
 | 
				
			||||||
	int i=0,ret=0;
 | 
						int i=0,ret=0;
 | 
				
			||||||
	X509_STORE_CTX csc;
 | 
						X509_STORE_CTX *csc;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	in=BIO_new(BIO_s_file());
 | 
						in=BIO_new(BIO_s_file());
 | 
				
			||||||
	if (in == NULL)
 | 
						if (in == NULL)
 | 
				
			||||||
@@ -171,7 +267,7 @@ static int check(X509_STORE *ctx, char *file)
 | 
				
			|||||||
			}
 | 
								}
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	x=PEM_read_bio_X509(in,NULL,NULL);
 | 
						x=PEM_read_bio_X509(in,NULL,NULL,NULL);
 | 
				
			||||||
	if (x == NULL)
 | 
						if (x == NULL)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		fprintf(stdout,"%s: unable to load certificate file\n",
 | 
							fprintf(stdout,"%s: unable to load certificate file\n",
 | 
				
			||||||
@@ -181,9 +277,19 @@ static int check(X509_STORE *ctx, char *file)
 | 
				
			|||||||
		}
 | 
							}
 | 
				
			||||||
	fprintf(stdout,"%s: ",(file == NULL)?"stdin":file);
 | 
						fprintf(stdout,"%s: ",(file == NULL)?"stdin":file);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	X509_STORE_CTX_init(&csc,ctx,x,NULL);
 | 
						csc = X509_STORE_CTX_new();
 | 
				
			||||||
	i=X509_verify_cert(&csc);
 | 
						if (csc == NULL)
 | 
				
			||||||
	X509_STORE_CTX_cleanup(&csc);
 | 
							{
 | 
				
			||||||
 | 
							ERR_print_errors(bio_err);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						X509_STORE_CTX_init(csc,ctx,x,uchain);
 | 
				
			||||||
 | 
						if(tchain) X509_STORE_CTX_trusted_stack(csc, tchain);
 | 
				
			||||||
 | 
						if(purpose >= 0) X509_STORE_CTX_set_purpose(csc, purpose);
 | 
				
			||||||
 | 
						if(issuer_checks)
 | 
				
			||||||
 | 
							X509_STORE_CTX_set_flags(csc, X509_V_FLAG_CB_ISSUER_CHECK);
 | 
				
			||||||
 | 
						i=X509_verify_cert(csc);
 | 
				
			||||||
 | 
						X509_STORE_CTX_free(csc);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	ret=0;
 | 
						ret=0;
 | 
				
			||||||
end:
 | 
					end:
 | 
				
			||||||
@@ -200,27 +306,75 @@ end:
 | 
				
			|||||||
	return(ret);
 | 
						return(ret);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static STACK_OF(X509) *load_untrusted(char *certfile)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						STACK_OF(X509_INFO) *sk=NULL;
 | 
				
			||||||
 | 
						STACK_OF(X509) *stack=NULL, *ret=NULL;
 | 
				
			||||||
 | 
						BIO *in=NULL;
 | 
				
			||||||
 | 
						X509_INFO *xi;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!(stack = sk_X509_new_null())) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"memory allocation failure\n");
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						if(!(in=BIO_new_file(certfile, "r"))) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"error opening the file, %s\n",certfile);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* This loads from a file, a stack of x509/crl/pkey sets */
 | 
				
			||||||
 | 
						if(!(sk=PEM_X509_INFO_read_bio(in,NULL,NULL,NULL))) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"error reading the file, %s\n",certfile);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
						/* scan over it and pull out the certs */
 | 
				
			||||||
 | 
						while (sk_X509_INFO_num(sk))
 | 
				
			||||||
 | 
							{
 | 
				
			||||||
 | 
							xi=sk_X509_INFO_shift(sk);
 | 
				
			||||||
 | 
							if (xi->x509 != NULL)
 | 
				
			||||||
 | 
								{
 | 
				
			||||||
 | 
								sk_X509_push(stack,xi->x509);
 | 
				
			||||||
 | 
								xi->x509=NULL;
 | 
				
			||||||
 | 
								}
 | 
				
			||||||
 | 
							X509_INFO_free(xi);
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
 | 
						if(!sk_X509_num(stack)) {
 | 
				
			||||||
 | 
							BIO_printf(bio_err,"no certificates in file, %s\n",certfile);
 | 
				
			||||||
 | 
							sk_X509_free(stack);
 | 
				
			||||||
 | 
							goto end;
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
						ret=stack;
 | 
				
			||||||
 | 
					end:
 | 
				
			||||||
 | 
						BIO_free(in);
 | 
				
			||||||
 | 
						sk_X509_INFO_free(sk);
 | 
				
			||||||
 | 
						return(ret);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
 | 
					static int MS_CALLBACK cb(int ok, X509_STORE_CTX *ctx)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	char buf[256];
 | 
						char buf[256];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!ok)
 | 
						if (!ok)
 | 
				
			||||||
		{
 | 
							{
 | 
				
			||||||
		/* since we are just checking the certificates, it is
 | 
							X509_NAME_oneline(
 | 
				
			||||||
		 * ok if they are self signed. */
 | 
					 | 
				
			||||||
		if (ctx->error == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT)
 | 
					 | 
				
			||||||
			ok=1;
 | 
					 | 
				
			||||||
		else
 | 
					 | 
				
			||||||
			{
 | 
					 | 
				
			||||||
			X509_NAME_oneline(
 | 
					 | 
				
			||||||
				X509_get_subject_name(ctx->current_cert),buf,256);
 | 
									X509_get_subject_name(ctx->current_cert),buf,256);
 | 
				
			||||||
			printf("%s\n",buf);
 | 
							printf("%s\n",buf);
 | 
				
			||||||
			printf("error %d at %d depth lookup:%s\n",ctx->error,
 | 
							printf("error %d at %d depth lookup:%s\n",ctx->error,
 | 
				
			||||||
				ctx->error_depth,
 | 
								ctx->error_depth,
 | 
				
			||||||
				X509_verify_cert_error_string(ctx->error));
 | 
								X509_verify_cert_error_string(ctx->error));
 | 
				
			||||||
			if (ctx->error == X509_V_ERR_CERT_HAS_EXPIRED)
 | 
							if (ctx->error == X509_V_ERR_CERT_HAS_EXPIRED) ok=1;
 | 
				
			||||||
				ok=1;
 | 
							/* since we are just checking the certificates, it is
 | 
				
			||||||
			}
 | 
							 * ok if they are self signed. But we should still warn
 | 
				
			||||||
 | 
							 * the user.
 | 
				
			||||||
 | 
					 		 */
 | 
				
			||||||
 | 
							if (ctx->error == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT) ok=1;
 | 
				
			||||||
 | 
							/* Continue after extension errors too */
 | 
				
			||||||
 | 
							if (ctx->error == X509_V_ERR_INVALID_CA) ok=1;
 | 
				
			||||||
 | 
							if (ctx->error == X509_V_ERR_PATH_LENGTH_EXCEEDED) ok=1;
 | 
				
			||||||
 | 
							if (ctx->error == X509_V_ERR_INVALID_PURPOSE) ok=1;
 | 
				
			||||||
 | 
							if (ctx->error == X509_V_ERR_DEPTH_ZERO_SELF_SIGNED_CERT) ok=1;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
	if (!v_verbose)
 | 
						if (!v_verbose)
 | 
				
			||||||
		ERR_clear_error();
 | 
							ERR_clear_error();
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -66,6 +66,8 @@
 | 
				
			|||||||
#undef PROG
 | 
					#undef PROG
 | 
				
			||||||
#define PROG	version_main
 | 
					#define PROG	version_main
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					int MAIN(int, char **);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
int MAIN(int argc, char **argv)
 | 
					int MAIN(int argc, char **argv)
 | 
				
			||||||
	{
 | 
						{
 | 
				
			||||||
	int i,ret=0;
 | 
						int i,ret=0;
 | 
				
			||||||
 
 | 
				
			|||||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user